-
1
-
-
85041458981
-
Fault detection for Byzantine quorum systems
-
January
-
L. Alvisi, D. Malkhi, L. Pierce, and M. K. Reiter. Fault detection for Byzantine quorum systems. In Proceedings of the 7th IFIP Working Conference on Dependable Computing for Critical Applications, pages 357-371, January 1999.
-
(1999)
Proceedings of the 7th IFIP Working Conference on Dependable Computing for Critical Applications
, pp. 357-371
-
-
Alvisi, L.1
Malkhi, D.2
Pierce, L.3
Reiter, M.K.4
-
2
-
-
0001495881
-
The Eternity service
-
Czech Technical University Publishing House, September
-
R. Anderson. The Eternity service. In Proceedings of PRAGOCRYPT '96, Czech Technical University Publishing House, September 1996.
-
(1996)
Proceedings of PRAGOCRYPT '96
-
-
Anderson, R.1
-
3
-
-
84994348621
-
Processes in KaffeOS: Isolation, resource management, and sharing in Java
-
October
-
G. Back, W. C. Hsieh, and J. Lepreau. Processes in KaffeOS: Isolation, resource management, and sharing in Java. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, October 2000.
-
(2000)
Proceedings of the 4th Symposium on Operating Systems Design and Implementation
-
-
Back, G.1
Hsieh, W.C.2
Lepreau, J.3
-
4
-
-
0033279537
-
A prototype implementation of archival intermemory
-
August
-
Y. Chen, J. Edler, A. Goldberg, A. Gottlieb, S. Sobti and P. Yianilos. A prototype implementation of archival intermemory. In Proceedings of the 4th ACM Conference on Digital Libraries, August 1999.
-
(1999)
Proceedings of the 4th ACM Conference on Digital Libraries
-
-
Chen, Y.1
Edler, J.2
Goldberg, A.3
Gottlieb, A.4
Sobti, S.5
Yianilos, P.6
-
6
-
-
0012073784
-
JRes: A resource accounting interface for Java
-
October
-
G. Czajkowski and T. von Eicken. JRes: A resource accounting interface for Java. In Proceedings of the 1998 ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 21-35, October 1998.
-
(1998)
Proceedings of the 1998 ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 21-35
-
-
Czajkowski, G.1
Von Eicken, T.2
-
7
-
-
85084164107
-
Implementing multiple protection domains in Java
-
June
-
C. Hawblitzel, C.-C. Chang, G. Czajkowski, D. Hu, and T. von Eicken. Implementing multiple protection domains in Java. In Proceedings of the 1998 USENIX Annual Technical Conference, June 1998.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
-
-
Hawblitzel, C.1
Chang, C.-C.2
Czajkowski, G.3
Hu, D.4
Von Eicken, T.5
-
10
-
-
0012472271
-
Digital signature algorithm
-
U.S. Patent 27 July
-
D. W. Kravitz. Digital signature algorithm. U.S. Patent 5,231,668, 27 July 1993.
-
(1993)
-
-
Kravitz, D.W.1
-
11
-
-
0022917802
-
On interprocess communication (Part II: Algorithms)
-
L. Lamport. "On interprocess communication (Part II: algorithms)". Distributed Computing 1:86-101, 1986.
-
(1986)
Distributed Computing
, vol.1
, pp. 86-101
-
-
Lamport, L.1
-
17
-
-
27644434751
-
Objects shared by Byzantine processes
-
Proceedings of the 14th International Symposium on Distributed Computing Springer, October
-
D. Malkhi, M. Merritt, M. K. Reiter, and G. Taubenfeld. Objects shared by Byzantine processes. In Proceedings of the 14th International Symposium on Distributed Computing (Lecture Notes in Computer Science 1914), pages 345-359, Springer, October 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1914
, pp. 345-359
-
-
Malkhi, D.1
Merritt, M.2
Reiter, M.K.3
Taubenfeld, G.4
-
20
-
-
0033719035
-
An architecture for survivable coordination in large-scale systems
-
March/April
-
D. Malkhi and M. K. Reiter. An architecture for survivable coordination in large-scale systems. IEEE Transactions on Knowledge and Data Engineering 12(2):187-202, March/April 2000.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.2
, pp. 187-202
-
-
Malkhi, D.1
Reiter, M.K.2
-
21
-
-
0034482383
-
The load and availability of Byzantine quorum systems
-
D. Malkhi, M. K. Reiter, and A. Wool. The load and availability of Byzantine quorum systems. SIAM Journal of Computing 29(6):1889-1906, 2000.
-
(2000)
SIAM Journal of Computing
, vol.29
, Issue.6
, pp. 1889-1906
-
-
Malkhi, D.1
Reiter, M.K.2
Wool, A.3
-
24
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
25
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
December
-
F. B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys 22(4):299-319, December 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
28
-
-
0033706539
-
Understanding replication in databases and distributed systems
-
Taiwan, April
-
M. Wiesmann, F. Pedone, A. Schiper, B. Kemme and G. Alonso. "Understanding replication in databases and distributed systems". In Proceedings of the 20th international conference on distributed computing systems (ICDCS 2000), pages 264-274, Taiwan, April 2000.
-
(2000)
Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS 2000)
, pp. 264-274
-
-
Wiesmann, M.1
Pedone, F.2
Schiper, A.3
Kemme, B.4
Alonso, G.5
|