Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neighborhood Preserving Hashing and Approximate Queries., , , , and . SODA, page 251-259. ACM/SIAM, (1994)Sicherheit in der Informationstechnik-Verantwortungsteilung zwischen Nutzern, Wirtschaft und Staat, , , , , , , , , and 1 other author(s). INFORMATIK 2011-Informatik schafft Communities, 192, page 39. (2011)Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application, , , , and . CoRR, (2008)Some Garbage In - Some Garbage Out: Asynchronous t-Byzantine as Asynchronous Benign t-resilient system with fixed t-Trojan-Horse Inputs., and . CoRR, (2016)Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries, , , and . CoRR, (2009)Implementing Mediators with Asynchronous Cheap Talk., , , and . CoRR, (2018)Linear-time Self-stabilizing Byzantine Clock Synchronization, , and . CoRR, (2006)Stateless Computation., , , , and . CoRR, (2016)Choice Coordination with Limited Failure., , and . Distributed Comput., 3 (2): 61-72 (1989)A Safe and Scalable Payment Infrastructure for Trade of Electronic Content., , and . Int. J. Cooperative Inf. Syst., 7 (4): 331-354 (1998)