-
1
-
-
0027660422
-
Atomic snapshots of shared memory
-
Afek A, Attiya H, Dolev D, Gafni E, Merritt M, Shavit N: Atomic snapshots of shared memory. Journal of the ACM 40(4):873-890
-
Journal of the ACM
, vol.40
, Issue.4
, pp. 873-890
-
-
Afek, A.1
Attiya, H.2
Dolev, D.3
Gafni, E.4
Merritt, M.5
Shavit, N.6
-
2
-
-
0009615465
-
A bounded first-in first-enabled-solution to the l-exclusion problem
-
LNCS 486, Springer
-
Afek Y, Dolev D, Gafni E, Merritt M, Shavit N: A bounded first-in first-enabled-solution to the l-exclusion problem. In: Proceedings of the 4th International Workshop on Distributed Algorithms. LNCS 486, Springer 1990
-
(1990)
Proceedings of the 4th International Workshop on Distributed Algorithms
-
-
Afek, Y.1
Dolev, D.2
Gafni, E.3
Merritt, M.4
Shavit, N.5
-
3
-
-
0025385690
-
Integrating security with fault-tolerant distributed databases
-
Agrawal D and El Abbadi A: Integrating security with fault-tolerant distributed databases. Comput J 33(1):71-78
-
Comput J
, vol.33
, Issue.1
, pp. 71-78
-
-
Agrawal, D.1
El Abbadi, A.2
-
4
-
-
84976715309
-
An efficient and fault-tolerant solution for distributed mutual exclusion
-
Agrawal D, El Abbadi A: An efficient and fault-tolerant solution for distributed mutual exclusion. ACM Transactions on Computer Systems 9(1):1-20 (1991)
-
(1991)
ACM Transactions on Computer Systems
, vol.9
, Issue.1
, pp. 1-20
-
-
Agrawal, D.1
El Abbadi, A.2
-
5
-
-
0000891036
-
Composite registers
-
Anderson JH: Composite registers. Distrib Comp 6(3):141-154 (1993)
-
(1993)
Distrib Comp
, vol.6
, Issue.3
, pp. 141-154
-
-
Anderson, J.H.1
-
8
-
-
0003715366
-
-
Recommendation X.509
-
International Telegraph and Telephone Consultative Committee (CCITT): The Directory - Authentication Framework, Recommendation X.509, 1988
-
(1988)
The Directory - Authentication Framework
-
-
-
10
-
-
0024866904
-
Bounded concurrent time-stamp systems are constructible
-
to appear. Also in: Proceedings of the 21st ACM Symposium on the Theory of Computing
-
Dolev D, Shavil N: Bounded concurrent time-stamp systems are constructible. SIAM Journal of Computing, to appear. Also in: Proceedings of the 21st ACM Symposium on the Theory of Computing, pp 454-466, 1989
-
(1989)
SIAM Journal of Computing
, pp. 454-466
-
-
Dolev, D.1
Shavil, N.2
-
11
-
-
0024673638
-
Maintaining availability in partitioned replicated databases
-
El Abbadi A, Toueg S: Maintaining availability in partitioned replicated databases. ACM Transactions on Database Systems 14(2):264-290 (1989)
-
(1989)
ACM Transactions on Database Systems
, vol.14
, Issue.2
, pp. 264-290
-
-
El Abbadi, A.1
Toueg, S.2
-
12
-
-
0022145769
-
How to assign votes in a distributed system
-
Garcia-Molina H, Barbara D; How to assign votes in a distributed system. Journal of the ACM 32(4):841-860 (1985)
-
(1985)
Journal of the ACM
, vol.32
, Issue.4
, pp. 841-860
-
-
Garcia-Molina, H.1
Barbara, D.2
-
14
-
-
0004074813
-
-
Interscience Series in Discrete Mathematics, New York: Wiley
-
Hall, Jr. M: Combinatorial Theory. 2nd Edn. Interscience Series in Discrete Mathematics, New York: Wiley 1986
-
(1986)
Combinatorial Theory. 2nd Edn.
-
-
Hall Jr., M.1
-
15
-
-
0022659404
-
A quorum-consensus replication method for abstract data types
-
Herlihy H: A quorum-consensus replication method for abstract data types. ACM Transactions on Computer Systems 4(1):32-53 (1986)
-
(1986)
ACM Transactions on Computer Systems
, vol.4
, Issue.1
, pp. 32-53
-
-
Herlihy, H.1
-
16
-
-
84977284109
-
How to make replicated data secure
-
Advances in Cryptology - CRYPTO '87 Proceedings, Berlin Heidelberg New York: Springer
-
Herlihy MP, Tygar JD: How to make replicated data secure. In: Advances in Cryptology - CRYPTO '87 Proceedings, Lecture Notes in Computer Science 293, pp379-391, Berlin Heidelberg New York: Springer 1988
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 379-391
-
-
Herlihy, M.P.1
Tygar, J.D.2
-
17
-
-
0000149509
-
Bounded time-stamps
-
Israeli A, Li M: (Bounded time-stamps. Distrib Comput 6(4):205-209 (1992)
-
(1992)
Distrib Comput
, vol.6
, Issue.4
, pp. 205-209
-
-
Israeli, A.1
Li, M.2
-
19
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson B, Abadi M, Burrows M, Wobber E: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4):265-310 (1992)
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
20
-
-
0022917802
-
On interprocess communication (part II: Algorithms)
-
Lamport L: On interprocess communication (part II: algorithms). Distrib Comput 1:86-101 (1986)
-
(1986)
Distrib Comput
, vol.1
, pp. 86-101
-
-
Lamport, L.1
-
22
-
-
0022069122
-
A √n algorithm for mutual exclusion in decentralized systems
-
Maekawa M: A √n algorithm for mutual exclusion in decentralized systems. ACM Transactions on Computer Systems 3(2):145-159 (1985)
-
(1985)
ACM Transactions on Computer Systems
, vol.3
, Issue.2
, pp. 145-159
-
-
Maekawa, M.1
-
30
-
-
0028405138
-
Storage efficient and secure replicated distributed databases
-
Mukkamala R: Storage efficient and secure replicated distributed databases. IEEE Transactions on Knowledge and Data Engineering 6(2):337-341 (1994)
-
(1994)
IEEE Transactions on Knowledge and Data Engineering
, vol.6
, Issue.2
, pp. 337-341
-
-
Mukkamala, R.1
-
31
-
-
0002957803
-
The load, capacity, and availability at quorum systems
-
Naor M, Wool A: The load, capacity, and availability at quorum systems. SIAM Journal of Computing 27(2):423-447 (1998)
-
(1998)
SIAM Journal of Computing
, vol.27
, Issue.2
, pp. 423-447
-
-
Naor, M.1
Wool, A.2
-
33
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Rabin MO: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36(2):335-348 (1989)
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
35
-
-
0018545449
-
How to share a secret
-
Shamir A: How to share a secret. Communications of the ACM 22(11):612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
0018480001
-
A majority consensus approach to concurrency control for multiple copy databases
-
Thomas RH: A majority consensus approach to concurrency control for multiple copy databases. ACM Transactions on Database Systems 4(2):180-209 (1979)
-
(1979)
ACM Transactions on Database Systems
, vol.4
, Issue.2
, pp. 180-209
-
-
Thomas, R.H.1
|