Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces., , , and . IEEE Trans. Parallel Distributed Syst., 20 (3): 419-432 (2009)MITRA: byzantine fault-tolerant middleware for transaction processing on replicated databases., , and . SIGMOD Record, 43 (1): 32-38 (2014)Experiências com tolerância a faltas no CORBA e extensões ao FT-CORBA para sistemas distribuidos de larga escala.. Federal University of Santa Catarina, Brazil, (2001)ndltd.org (oai:repositorio.ufsc.br:123456789/81470).SeRViSO: a selective retransmission scheme for video streaming in overlay networks., , and . SAC, page 694-698. ACM, (2010)Integrating the ROMIOP and ETF Specifications for Atomic Multicast in CORBA., , , and . OTM Conferences (1), volume 3760 of Lecture Notes in Computer Science, page 680-697. Springer, (2005)An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents., , , , and . EuroPKI, volume 6711 of Lecture Notes in Computer Science, page 193-207. Springer, (2010)Co-Evolution of Antagonistic Intelligent Agents Using Genetic Algorithms., , , , and . ICCS, volume 18 of Procedia Computer Science, page 692-701. Elsevier, (2013)BackupIT: An Intrusion-Tolerant Cooperative Backup System., , , and . ACIS-ICIS, page 724-729. IEEE Computer Society, (2009)Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary., , , and . SRDS, page 135-144. IEEE Computer Society, (2009)Finite Memory: A Vulnerability of Intrusion-Tolerant Systems., , , and . NCA, page 37-44. IEEE Computer Society, (2008)