Author of the publication

Time-Lapse Snapshots.

, , , and . ISTCS, volume 601 of Lecture Notes in Computer Science, page 154-170. Springer, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Computing Through Combinatorial Topology, , and . Morgan Kaufmann, Amsterdam, (2014)Well-Structured Futures and Cache Locality., and . CoRR, (2013)Playing with Fire: Transactional Memory Revisited for Error-Resilient and Energy-Efficient MPSoC Execution., , , , , and . ACM Great Lakes Symposium on VLSI, page 9-14. ACM, (2015)Topology Approach in Distributed Computing.. Encyclopedia of Algorithms, Springer, (2008)How to Make Replicated Data Secure., and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 379-391. Springer, (1987)The Relative Power of Composite Loop Agreement Tasks., and . OPODIS, volume 46 of LIPIcs, page 13:1-13:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Linearizable Counting Networks., , and . Distributed Comput., 9 (4): 193-203 (1996)Randomized smoothing networks., and . J. Parallel Distributed Comput., 66 (5): 626-632 (2006)Asynchronous Consensus Impossibility.. Encyclopedia of Algorithms, (2016)Topology Approach in Distributed Computing.. Encyclopedia of Algorithms, (2016)