Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time and State in Asynchronous Distributed Systems., and . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)Robust Neighbor Discovery in Multi-Hop Multi-Channel Heterogeneous Wireless Networks., , , , , and . CoRR, (2015)Detecting Locally Stable Predicates Without Modifying Application Messages., , and . OPODIS, volume 3144 of Lecture Notes in Computer Science, page 20-33. Springer, (2003)Leader Election Algorithms for Multi-channel Wireless Networks., , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 310-321. Springer, (2008)WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks., , , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 491-502. Springer, (2008)A Fast Lock-Free Internal Binary Search Tree., and . ICDCN, page 37:1-37:10. ACM, (2015)Algorithms for optimal replica placement under correlated failure in hierarchical failure domains., , and . Theor. Comput. Sci., (2020)Brief Announcement: Fast and Scalable Group Mutual Exclusion., and . DISC, volume 121 of LIPIcs, page 49:1-49:3. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Practical Concurrent Unrolled Linked Lists Using Lazy Synchronization., , and . OPODIS, volume 8878 of Lecture Notes in Computer Science, page 388-403. Springer, (2014)Locksynth: Deriving Synchronization Code for Concurrent Data Structures with ASP., , and . CoRR, (2023)