Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Keidar, Idit
add a person with the name Keidar, Idit
 

Other publications of authors with the same name

NearBucket-LSH: Efficient Similarity Search in P2P Networks., , , and . SISAP, volume 9939 of Lecture Notes in Computer Science, page 236-249. (2016)Space Bounds for Reliable Storage: Fundamental Limits of Coding (Keynote)., , , and . OPODIS, volume 46 of LIPIcs, page 4:1-4:3. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast., , and . IEEE Trans. Dependable Secur. Comput., 3 (1): 45-61 (2006)An inheritance-based technique for building simulation proofs incrementally., , , and . ICSE, page 478-487. ACM, (2000)Utilizing shared data in chip multiprocessors with the nahalal architecture., , , and . SPAA, page 1-10. ACM, (2008)Brahms: byzantine resilient random membership sampling., , , , and . PODC, page 145-154. ACM, (2008)EquiCast: scalable multicast with selfish users., , and . PODC, page 63-71. ACM, (2006)Evaluating the running time of a communication round over the internet., and . PODC, page 243-252. ACM, (2002)Session details: Session 2A: Approximation and Learning.. PODC, ACM, (2018)On Liveness of Dynamic Storage., and . SIROCCO, volume 10641 of Lecture Notes in Computer Science, page 356-376. Springer, (2017)