Publication | Date of Publication | Type |
---|
Global sensitivity analysis of rare event probabilities | 2021-10-26 | Paper |
Multiscale Global Sensitivity Analysis for Stochastic Chemical Systems | 2021-04-08 | Paper |
Objects shared by Byzantine processes | 2020-12-04 | Paper |
Appraising two decades of distributed computing theory research | 2020-12-04 | Paper |
Secure reliable multicast protocols in a WAN | 2020-12-03 | Paper |
Restoration by path concatenation: fast recovery of MPLS paths | 2020-12-03 | Paper |
Multiscale global sensitivity analysis for stochastic chemical systems | 2020-03-17 | Paper |
Disentangling multi-object operations (extended abstract) | 2017-09-29 | Paper |
Computing with faulty shared memory | 2017-08-21 | Paper |
Efficient test \& set constructions for faulty shared memory | 2016-05-26 | Paper |
Restoration by path concatenation | 2016-03-04 | Paper |
The concurrency hierarchy, and algorithms for unbounded concurrency | 2016-03-04 | Paper |
The power of multi-objects (extended abstract) | 2015-09-11 | Paper |
Sequentially consistent versus linearizable counting networks | 2015-09-11 | Paper |
Knowledge in shared memory systems (preliminary version) | 2015-06-19 | Paper |
Computing with infinitely many processes | 2014-01-10 | Paper |
Sequentially consistent versus linearizable counting networks | 2013-06-28 | Paper |
Tight bounds for shared memory systems accessed by Byzantine processes | 2013-06-07 | Paper |
Distributed Computing | 2010-02-23 | Paper |
Dose-volume-based IMRT fluence optimization: a fast least-squares approach with differentia\-bility | 2008-02-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q5393833 | 2006-10-24 | Paper |
Interior-point gradient method for large-scale totally nonnegative least squares problems | 2006-02-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4437125 | 2003-12-07 | Paper |
The power of multiobjects. | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766871 | 2002-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766890 | 2002-01-28 | Paper |
Computing with faulty shared objects | 1998-01-28 | Paper |
Knowledge in shared memory systems. | 1995-11-22 | Paper |
An attack on the Interlock Protocol when used for authentication | 1994-10-04 | Paper |
On the correctness of orphan management algorithms | 1994-08-21 | Paper |
Atomic snapshots of shared memory | 1994-03-20 | Paper |
Speeding Lamport's fast mutual exclusion algorithm | 1993-05-16 | Paper |
Commutativity-based locking for nested transactions | 1990-01-01 | Paper |
Simple constant-time consensus protocols in realistic failure models | 1989-01-01 | Paper |
Introduction to the theory of nested transactions | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3814780 | 1988-01-01 | Paper |
Easy impossibility proofs for distributed consensus problems | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3332221 | 1981-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3863027 | 1980-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4041137 | 1974-01-01 | Paper |
Sensitivity of Dynamic Systems to Parameters Which Increase the Order of Mathematical Models | 1965-01-01 | Paper |