Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dc/dc16.bht:"
@article{DBLP:journals/dc/AndersonKH03, author = {James H. Anderson and Yong{-}Jik Kim and Ted Herman}, title = {Shared-memory mutual exclusion: major research trends since 1986}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {75--110}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0088-6}, doi = {10.1007/S00446-003-0088-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/AndersonKH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Aspnes03, author = {James Aspnes}, title = {Randomized protocols for asynchronous consensus}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {165--175}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0081-5}, doi = {10.1007/S00446-002-0081-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Aspnes03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/AttiyaR03, author = {Hagit Attiya and Sergio Rajsbaum}, title = {Introduction}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {69--70}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0100-1}, doi = {10.1007/S00446-003-0100-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/AttiyaR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Ben-OrE03, author = {Michael Ben{-}Or and Ran El{-}Yaniv}, title = {Resilient-optimal interactive consistency in constant time}, journal = {Distributed Comput.}, volume = {16}, number = {4}, pages = {249--262}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0083-3}, doi = {10.1007/S00446-002-0083-3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Ben-OrE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/BoldiV03, author = {Paolo Boldi and Sebastiano Vigna}, title = {Lower bounds for sense of direction in regular graphs}, journal = {Distributed Comput.}, volume = {16}, number = {4}, pages = {279--286}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0092-x}, doi = {10.1007/S00446-003-0092-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/BoldiV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Cazzola03, author = {Walter Cazzola}, title = {Remote method invocation as a first-class citizen}, journal = {Distributed Comput.}, volume = {16}, number = {4}, pages = {287--306}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0094-8}, doi = {10.1007/S00446-003-0094-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Cazzola03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/DolevS03, author = {Shlomi Dolev and Frank A. Stomp}, title = {Safety assurance via on-line monitoring}, journal = {Distributed Comput.}, volume = {16}, number = {4}, pages = {269--277}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0089-5}, doi = {10.1007/S00446-003-0089-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/DolevS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/FichR03, author = {Faith E. Fich and Eric Ruppert}, title = {Hundreds of impossibility results for distributed computing}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {121--163}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0091-y}, doi = {10.1007/S00446-003-0091-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/FichR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/FischerM03, author = {Michael J. Fischer and Michael Merritt}, title = {Appraising two decades of distributed computing theory research}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {239--247}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0096-6}, doi = {10.1007/S00446-003-0096-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/FischerM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/GafniL03, author = {Eli Gafni and Leslie Lamport}, title = {Disk Paxos}, journal = {Distributed Comput.}, volume = {16}, number = {1}, pages = {1--20}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0070-8}, doi = {10.1007/S00446-002-0070-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/GafniL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/GavoilleP03, author = {Cyril Gavoille and David Peleg}, title = {Compact and localized distributed data structures}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {111--120}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0073-5}, doi = {10.1007/S00446-002-0073-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/GavoilleP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Goldreich03, author = {Oded Goldreich}, title = {Cryptography and cryptographic protocols}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {177--199}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0077-1}, doi = {10.1007/S00446-002-0077-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Goldreich03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/HuangHH03, author = {Shing{-}Tsaan Huang and Ying{-}Sung Huang and Su{-}Shen Hung}, title = {Alternators on uniform rings of odd size}, journal = {Distributed Comput.}, volume = {16}, number = {4}, pages = {263--268}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0087-7}, doi = {10.1007/S00446-003-0087-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/HuangHH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Kurki-Suonio03, author = {Reino Kurki{-}Suonio}, title = {Action systems in incremental and aspect-oriented modeling}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {201--217}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0090-z}, doi = {10.1007/S00446-003-0090-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Kurki-Suonio03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Lamport03, author = {Leslie Lamport}, title = {Arbitration-free synchronization}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {219--237}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0076-2}, doi = {10.1007/S00446-002-0076-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Lamport03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Lynch03, author = {Nancy A. Lynch}, title = {Some perspectives on {PODC}}, journal = {Distributed Comput.}, volume = {16}, number = {2-3}, pages = {71--74}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0072-6}, doi = {10.1007/S00446-002-0072-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Lynch03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/MacKenzieR03, author = {Philip D. MacKenzie and Michael K. Reiter}, title = {Delegation of cryptographic servers for capture-resilient devices}, journal = {Distributed Comput.}, volume = {16}, number = {4}, pages = {307--327}, year = {2003}, url = {https://doi.org/10.1007/s00446-003-0098-4}, doi = {10.1007/S00446-003-0098-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/MacKenzieR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/MalkhiMRT03, author = {Dahlia Malkhi and Michael Merritt and Michael K. Reiter and Gadi Taubenfeld}, title = {Objects shared by Byzantine processes}, journal = {Distributed Comput.}, volume = {16}, number = {1}, pages = {37--48}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0075-3}, doi = {10.1007/S00446-002-0075-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/MalkhiMRT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/MinskyS03, author = {Yaron Minsky and Fred B. Schneider}, title = {Tolerating malicious gossip}, journal = {Distributed Comput.}, volume = {16}, number = {1}, pages = {49--68}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0082-4}, doi = {10.1007/S00446-002-0082-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/MinskyS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/YamaguchiEBH03, author = {Hirozumi Yamaguchi and Khaled El{-}Fakih and Gregor von Bochmann and Teruo Higashino}, title = {Protocol synthesis and re-synthesis with optimal allocation of resources based on extended Petri nets}, journal = {Distributed Comput.}, volume = {16}, number = {1}, pages = {21--35}, year = {2003}, url = {https://doi.org/10.1007/s00446-002-0074-4}, doi = {10.1007/S00446-002-0074-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/YamaguchiEBH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.