Shlomi Dolev
Orcid: 0000-0001-5418-6670Affiliations:
- Ben-Gurion University, Beersheba, Israel
According to our database1,
Shlomi Dolev
authored at least 382 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on cs.bgu.ac.il
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Neighborhood mutual remainder: self-stabilizing distributed implementation and applications.
Acta Informatica, March, 2024
SN Comput. Sci., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Cloud Comput., 2024
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2024
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2024
Proceedings of the 25th International Conference on Distributed Computing and Networking, 2024
2023
Comput. Commun., December, 2023
Theory Comput. Syst., April, 2023
Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs.
Acta Informatica, March, 2023
Theor. Comput. Sci., 2023
OWF Candidates Based on: Xors, Error Detection Codes, Permutations, Polynomials, Interaction and Nesting.
IACR Cryptol. ePrint Arch., 2023
Randomly Choose an Angle from an Immense Number of Angles to Rotate Qubits, Compute and Reverse.
CoRR, 2023
Concurr. Comput. Pract. Exp., 2023
GeniePool: genomic database with corresponding annotated samples based on a cloud data lake architecture.
Database J. Biol. Databases Curation, 2023
Self-Stabilizing and Private Distributed Shared Atomic Memory in Seldomly Fair Message Passing Networks.
Algorithmica, 2023
Proceedings of the 16th ACM International Conference on Systems and Storage, 2023
HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version).
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Proceedings of the 5th workshop on Advanced tools, 2023
2022
Optimal-round preprocessing-MPC of polynomials over non-zero inputs via distributed random matrix.
Wirel. Networks, 2022
IEEE Trans. Big Data, 2022
Communicationless Evaluation of Quadratic Functions over Secret Shared Dynamic Database.
SN Comput. Sci., 2022
Inroads, 2022
Inf. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing.
Wirel. Networks, 2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
Polynomial Time Prioritized Multi-Criteria k-Shortest Paths and k-Disjoint All-Criteria-Shortest Paths.
CoRR, 2021
Proceedings of the SYSTOR '21: The 14th ACM International Systems and Storage Conference, 2021
SodsBC/SodsBC++ & SodsMPC: Post-quantum Asynchronous Blockchain Suite for Consensus and Smart Contracts.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2021
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
Proceedings of the NANOCOM '21: The Eighth Annual ACM International Conference on Nanoscale Computing and Communication, Virtual Event, Italy, September 7, 2021
Proceedings of the Workshops of the EDBT/ICDT 2021 Joint Conference, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Local Deal-Agreement Based Monotonic Distributed Algorithms for Load Balancing in General Graphs.
CoRR, 2020
Self-Stabilizing Automatic Repeat Request Algorithms for (Bounded Capacity, Omitting, Duplicating and non-FIFO) Computer Networks.
CoRR, 2020
Brief Announcement: Local Deal-Agreement Based Monotonic Distributed Algorithms for Load Balancing in General Graphs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020
Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
2019
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation.
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
IEEE Trans. Big Data, 2019
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract).
IACR Cryptol. ePrint Arch., 2019
Randomly Rotate Qubits Compute and Reverse - IT-Secure Non-Interactive Fully-Compact Homomorphic Quantum Computations over Classical Data Using Random Bases.
IACR Cryptol. ePrint Arch., 2019
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets.
IACR Cryptol. ePrint Arch., 2019
Bull. EATCS, 2019
Neighborhood Mutual Remainder: Self-Stabilizing Implementation of Look-Compute-Move Robots (Extended Abstract).
CoRR, 2019
Brief Announcement: Neighborhood Mutual Remainder and Its Self-Stabilizing Implementation of Look-Compute-Move Robots.
Proceedings of the 33rd International Symposium on Distributed Computing, 2019
Proceedings of the 12th ACM International Conference on Systems and Storage, 2019
Brief Announcement: Self-stabilizing LCM Schedulers for Autonomous Mobile Robots Using Neighborhood Mutual Remainder.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2019
Brief Announcement Forgive & Forget: Self-stabilizing Swarms in Spite of Byzantine Robots.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2019
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
Beyond Replications in Blockchain - On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
CoRR, 2018
Bee's Strategy Against Byzantines Replacing Byzantine Participants - (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018
Proceedings of the Structural Information and Communication Complexity, 2018
Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
2017
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
Monitorability Bounds via Expander, Sparsifier and Random Walks - The Interplay Between On-Demand Monitoring and Anonymity (Extendend Abstract).
Proceedings of the Networked Systems - 5th International Conference, 2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Dependence graph and master switch for seamless dependent routes replacement in SDN (extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Blockchain abbreviation: Implemented by message passing and shared memory (Extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Wirel. Networks, 2016
ACM Trans. Knowl. Discov. Data, 2016
Magnifying computing gaps: Establishing encrypted communication over unidirectional channels.
Theor. Comput. Sci., 2016
Towards holographic "brain" memory based on randomization and Walsh-Hadamard transformation.
Neural Networks, 2016
Comput. Sci. Rev., 2016
Monitorability Bounds via Expander, Sparsifier and Random Walks. The Interplay Between On-Demand Monitoring and Anonymity.
CoRR, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract).
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
2015
Theor. Comput. Sci., 2015
Graph Degree Sequence Solely Determines the Expected Hopfield Network Pattern Stability.
Neural Comput., 2015
J. Math. Cryptol., 2015
J. Comput. Syst. Sci., 2015
Evol. Syst., 2015
CoRR, 2015
CoRR, 2015
J. Complex Networks, 2015
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015
Brief Announcement: Robust and Private Distributed Shared Atomic Memory in Message Passing Networks.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
Stabilizing Server-Based Storage in Byzantine Asynchronous Message-Passing Systems: Extended abstract.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Proceedings of the Workshops of the EDBT/ICDT 2015 Joint Conference (EDBT/ICDT), 2015
Proceedings of the Transactional Memory. Foundations, Algorithms, Tools, and Applications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proceedings of the Algorithms, Probability, Networks, and Games, 2015
Proceedings of the Algorithmic Aspects of Cloud Computing - First International Workshop, 2015
2014
ACM Trans. Sens. Networks, 2014
Theor. Comput. Sci., 2014
12th international symposium on stabilization, safety, and security of distributed systems.
Inf. Comput., 2014
Ad Hoc Networks, 2014
Proceedings of the Distributed Computing - 28th International Symposium, 2014
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014
Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures, 2014
Proceedings of the 2014 IEEE World Congress on Services, 2014
Proceedings of the Networked Systems - Second International Conference, 2014
Proceedings of the Networked Systems - Second International Conference, 2014
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014
2013
IEEE Trans. Mob. Comput., 2013
IEEE Trans. Commun., 2013
J. Electron. Test., 2013
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2013
Probabilistic Connectivity Threshold for Directional Antenna Widths - (Extended Abstract).
Proceedings of the Structural Information and Communication Complexity, 2013
Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond.
Proceedings of the SAFECOMP 2013, 2013
Self-stabilizing Byzantine Resilient Topology Discovery and Message Delivery - (Extended Abstract).
Proceedings of the Networked Systems - First International Conference, 2013
Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Proceedings of the Algorithms and Complexity, 8th International Conference, 2013
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Parallel decomposition of combinatorial optimization problems using electro-optical vector by matrix multiplication architecture.
J. Supercomput., 2012
Theor. Comput. Sci., 2012
Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Secur. Informatics, 2012
Electron. Colloquium Comput. Complex., 2012
CoRR, 2012
Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams.
Proceedings of the Distributed Computing - 26th International Symposium, 2012
Self-stabilizing End-to-End Communication in (Bounded Capacity, Omitting, Duplicating and non-FIFO) Dynamic Networks - (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012
Proceedings of the Principles of Distributed Systems, 16th International Conference, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Big Data Interpolation an Efficient Sampling Alternative for Sensor Data Aggregation.
Proceedings of the Algorithms for Sensor Systems, 2012
2011
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011
Wirel. Networks, 2011
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011
Int. J. Softw. Tools Technol. Transf., 2011
RFID Authentication Efficient Proactive Information Security within Computational Security.
Theory Comput. Syst., 2011
Inf. Process. Lett., 2011
Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Int. J. Found. Comput. Sci., 2011
Strategies for repeated games with subsystem takeovers implementable by deterministic and self-stabilising automata.
Int. J. Auton. Adapt. Commun. Syst., 2011
CoRR, 2011
CoRR, 2011
Leveraging Channel Diversity to Gain Efficiency and Robustness for Wireless Broadcast.
Proceedings of the Distributed Computing - 25th International Symposium, 2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the Innovations in Computer Science, 2011
Proceedings of the Hardware and Software: Verification and Testing, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Dynamic Multi-party Computation Forever for Swarm and Cloud Computing and Code Obfuscation.
Proceedings of the Algorithms for Sensor Systems, 2011
Proceedings of the Algorithms for Sensor Systems, 2011
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011
2010
Theor. Comput. Sci., 2010
Masking traveling beams: Optical solutions for NP-complete problems, trading space for time.
Theor. Comput. Sci., 2010
Int. J. Softw. Tools Technol. Transf., 2010
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests.
ACM SIGOPS Oper. Syst. Rev., 2010
Optical solution for hard on average #P-complete instances (using exponential space for solving instances of the permanent).
Nat. Comput., 2010
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010
Fast Self-stabilizing Minimum Spanning Tree Construction - Using Compact Nearest Common Ancestor Labeling Scheme.
Proceedings of the Distributed Computing, 24th International Symposium, 2010
Proceedings of the Distributed Computing, 24th International Symposium, 2010
Computing multi-party trust privately: in <i>O</i>(<i>n</i>) time units sending one (possibly large) message at a time.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Third International Workshop on Reliability, Availability, and Security, 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Optical Supercomputing - Third International Workshop, 2010
Proceedings of the Optical Supercomputing - Third International Workshop, 2010
Proceedings of the Optical Supercomputing - Third International Workshop, 2010
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Theor. Comput. Sci., 2009
Inf. Process. Lett., 2009
Deaf, Dumb, and Chatting Robots, Enabling Distributed Computation and Fault-Tolerance Among Stigmergic Robot
CoRR, 2009
Proceedings of the Stabilization, 2009
Proceedings of the Stabilization, 2009
Proceedings of the 2009 MobiHoc S³ workshop on MobiHoc S³, 2009
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009
Combinatorial Optimization Using Electro-Optical Vector by Matrix Multiplication Architecture.
Proceedings of the Optical SuperComputing, Second International Workshop, 2009
Proceedings of the Optical SuperComputing, Second International Workshop, 2009
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009
Safe and Eventually Safe: Comparing Self-stabilizing and Non-stabilizing Algorithms on a Common Ground.
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009
Proceedings of the Algorithmic Methods for Distributed Cooperative Systems, 06.09., 2009
Proceedings of the 47th Annual Allerton Conference on Communication, 2009
2008
Searching for a lion in the desert: optics-based acquisition algorithms for wireless sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008
J. Syst. Softw., 2008
Self-Stabilization from Theory to Practice.
Bull. EATCS, 2008
Distributed Comput., 2008
Proceedings of the Distributed Computing, 22nd International Symposium, 2008
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008
CAR-STM: scheduling-based collision avoidance and resolution for software transactional memory.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Proceedings of the Optical Super Computing, First International Workshop, 2008
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2008
Proceedings of the Fault-Tolerant Distributed Algorithms on VLSI Chips, 07.09., 2008
Proceedings of the Fault-Tolerant Distributed Algorithms on VLSI Chips, 07.09., 2008
Strategies for repeated games with subsystem takeovers: implementable by deterministic and self-stabilizing automata (extended abstract).
Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, 2008
2007
Distributed Comput., 2007
Proceedings of the Distributed Computing, 21st International Symposium, 2007
Stabilizing Trustand Reputationfor Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract).
Proceedings of the Stabilization, 2007
Magnifying Computing GapsEstablishing Encrypted Communication over Unidirectional Channels (Extended Abstract).
Proceedings of the Stabilization, 2007
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Fun with Algorithms, 4th International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
IEEE Trans. Mob. Comput., 2006
IEEE Trans. Computers, 2006
J. Aerosp. Comput. Inf. Commun., 2006
Eight Open Problems in Distributed Computing.
Bull. EATCS, 2006
Secure Communication for RFIDs Proactive Information Security Within Computational Security.
Proceedings of the Stabilization, 2006
Proceedings of the Principles of Distributed Systems, 10th International Conference, 2006
2005
Distributed Comput., 2005
Proceedings of the 2005 IEEE International Conference on Software, 2005
Proceedings of the Self-Stabilizing Systems, 2005
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005
Proceedings of the Principles of Distributed Systems, 9th International Conference, 2005
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005
Proceedings of the Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005
2004
J. ACM, 2004
Proceedings of the Workshops on Geometric and Topological Methods in Concurrency Theory, 2004
Proceedings of the Distributed Computing, 18th International Conference, 2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
Self-Stabilizing Microprocessor - Analyzing and Overcoming Soft-Errors (Extended Abstract).
Proceedings of the Organic and Pervasive Computing, 2004
2003
IEEE Trans. Parallel Distributed Syst., 2003
2002
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
2001
J. Parallel Distributed Comput., 2001
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001
2000
ACM Trans. Inf. Syst. Secur., 2000
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000
1999
SIAM J. Comput., 1999
Parallel composition of stabilizing algorithms.
Proceedings of the 1999 ICDCS Workshop on Self-stabilizing Systems, 1999
1998
Parallel Process. Lett., 1998
1997
IEEE Trans. Parallel Distributed Syst., 1997
Possible and Impossible Self-Stabilizing Digital Clock Synchronization in General Graphs.
Real Time Syst., 1997
Chic. J. Theor. Comput. Sci., 1997
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997
Stabilizing in the Presence of Faults, The Digital Clock Synchronization Case.
Proceedings of the On Principles Of Distributed Systems, 1997
Proceedings of the Advances in Cryptology, 1997
1996
IEEE/ACM Trans. Netw., 1996
Comput. Commun., 1996
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
1995
Bubbles: adaptive routing scheme for high-speed dynamic networks (Extended Abstract).
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
Self-Stabilizing Clock Synchronization in the Presence of Byzantine Faults (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
1994
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994
1993
Distributed Comput., 1993
Proceedings of the Distributed Algorithms, 7th International Workshop, 1993
Proceedings of the Distributed Algorithms, 7th International Workshop, 1993
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993
1991
Proceedings of the Distributed Algorithms, 5th International Workshop, 1991