Azer Bestavros

Affiliations:
  • Boston University, USA


According to our database1, Azer Bestavros authored at least 173 papers between 1990 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A new benchmark harness for systematic and robust evaluation of streaming state stores.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

Multi-Regulation Computing: Examining the Legal and Policy Questions That Arise From Secure Multiparty Computation.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

Bridging the Computer Science - Law Divide: Recommendations from the Front Lines.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

2020
A Game-Theoretic Analysis of Shared/Buy-in Computing Systems.
IEEE Open J. Commun. Soc., 2020

Akita: A CPU scheduler for virtualized Clouds.
CoRR, 2020

Peafowl: in-application CPU scheduling to reduce power consumption of in-memory key-value stores.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

2019
Reinforcement Learning for UAV Attitude Control.
ACM Trans. Cyber Phys. Syst., 2019

MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud.
CoRR, 2019

Conclave: secure multi-party computation on big data (extended TR).
CoRR, 2019

Neuroflight: Next Generation Flight Control Firmware.
CoRR, 2019

Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Conclave: secure multi-party computation on big data.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
TerrierTail: Mitigating Tail Latency of Cloud Virtual Machines.
IEEE Trans. Parallel Distributed Syst., 2018

ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds.
Future Gener. Comput. Syst., 2018

A case study of a shared/buy-in computing ecosystem.
Clust. Comput., 2018

S3B: Software-Defined Secure Server Bindings.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

2017
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
IACR Cryptol. ePrint Arch., 2017

Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized Environments.
Future Gener. Comput. Syst., 2017

Team Formation for Scheduling Educational Material in Massive Online Classes.
CoRR, 2017

AngelCast: Cloud-based peer-assisted live streaming using optimized multi-tree construction.
Comput. Commun., 2017

User-centric distributed solutions for privacy-preserving analytics.
Commun. ACM, 2017

Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

GuideMe: Routes coordination of participating agents in mobile crowd sensing platforms.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
DEMO: Integrating MPC in Big Data Workflows.
IACR Cryptol. ePrint Arch., 2016

Markov Modeling of Moving Target Defense Games.
IACR Cryptol. ePrint Arch., 2016

Using Alloy to Formally Model and Reason About an OpenFlow Network Switch.
CoRR, 2016

Secure MPC for Analytics as a Web Application.
Proceedings of the IEEE Cybersecurity Development, 2016

PROVIDE: Hiding from Automated Network Scans with Proofs of Identity.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

Markov Modeling of Moving Target Defense Games.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
Rational coordination of crowdsourced resources for geo-temporal request satisfaction.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

A Divide-and-Conquer Algorithm for Betweenness Centrality.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

Policies for Assisted Virtual Machine Selection in Cloud Computing Environments.
Proceedings of the XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, 2015

End-to-end informed VM selection in compute clouds.
Proceedings of the IEEE International Conference on Communication, 2015

Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

Personalized Education; Solving a Group Formation and Scheduling Problem for Educational Content.
Proceedings of the 8th International Conference on Educational Data Mining, 2015

Network-Constrained Packing of Brokered Workloads in Virtualized Environments.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Distributed Server Migration for Scalable Internet Service Deployment.
IEEE/ACM Trans. Netw., 2014

Toward an Open Cloud Marketplace: Vision and First Steps.
IEEE Internet Comput., 2014

A Verification Platform for SDN-Enabled Applications.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Postlude: seamless composition and integration - a perspective on formal methods research.
Math. Struct. Comput. Sci., 2013

Preface to special issue: lightweight and practical formal methods in the design and analysis of safety-critical systems.
Math. Struct. Comput. Sci., 2013

Repetition-aware content placement in navigational networks.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Towards accessible integration and deployment of formal tools and techniques.
Proceedings of the 3rd International Workshop on Developing Tools as Plug-ins, 2013

Software-Defined IDS for securing embedded mobile devices.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2013

Verifiably-safe software-defined networks for CPS.
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), 2013

2012
The Filter-Placement Problem and its Application to Minimizing Information Multiplicity.
Proc. VLDB Endow., 2012

Peer-assisted content distribution on a budget.
Comput. Networks, 2012

A Framework for the Evaluation and Management of Network Centrality.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

CloudPack - Exploiting Workload Flexibility through Rational Pricing.
Proceedings of the Middleware 2012, 2012

Message from the Program Chairs.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012

MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Selfish Overlay Network Creation and Maintenance.
IEEE/ACM Trans. Netw., 2011

A Domain-Specific Language for Incremental and Modular Design of Large-Scale Verifiably-Safe Flow Networks (Preliminary Report).
Proceedings of the Proceedings IFIP Working Conference on Domain-Specific Languages, 2011

Trade & Cap: A customer-managed, market-based system for trading bandwidth allowances at a shared link.
Comput. Networks, 2011

An information-theoretic framework for field monitoring using autonomously mobile sensors.
Ad Hoc Networks, 2011

Formal Verification of SLA Transformations.
Proceedings of the World Congress on Services, 2011

Safe Compositional Equation-based Modeling of Constrained Flow Networks.
Proceedings of the 4th International Workshop on Equation-Based Object-Oriented Modeling Languages and Tools, 2011

Angels in the Cloud: A Peer-Assisted Bulk-Synchronous Content Distribution Service.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Distributed Network Formation for n-Way Broadcast Applications.
IEEE Trans. Parallel Distributed Syst., 2010

Wireless Network Algorithms, Systems, and Applications.
EURASIP J. Wirel. Commun. Netw., 2010

Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

A Type-Theoretic Framework for Efficient and Safe Colocation of Periodic Real-Time Systems.
Proceedings of the 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2010

Colocation as a Service: Strategic and Operational Services for Cloud Colocation.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Preferential field coverage through detour-based mobility coordination.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

Safe compositional network sketches: formal framework.
Proceedings of the 13th ACM International Conference on Hybrid Systems: Computation and Control, 2010

A Trading System for Fairly Scheduling Fixed-Sized Delay Tolerant Jobs at a Shared Link.
Proceedings of the Global Communications Conference, 2010

2009
Measuring capacity bandwidth of targeted path segments.
IEEE/ACM Trans. Netw., 2009

CSR: Constrained Selfish Routing in Ad-Hoc Networks.
Proceedings of the Wireless Algorithms, 2009

A formal type-centric framework for verification and resource allocation in pervasive Sense-and-Respond systems.
Proceedings of the ICSE 2009 Workshop on Model-Based Methodologies for Pervasive and Embedded Software, 2009

Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks.
Proceedings of the Eighth International Conference on Networks, 2009

Colocation Games and Their Application to Distributed Resource Management.
Proceedings of the Workshop on Hot Topics in Cloud Computing, 2009

2008
Wireless and physical security via embedded sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Amorphous Placement and Informed Diffusion for Timely Field Monitoring by Autonomous, Resource-Constrained, Mobile Sensors.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

NETEMBED: A network resource mapping service for distributed applications.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Swarming on Optimized Graphs for n-Way Broadcast.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

EGOIST: overlay routing using selfish neighbor selection.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Programming and Virtualization of Distributed Multitasking Sensor Networks.
Proceedings of the Handbook of Real-Time and Embedded Systems., 2007

Distributed Selfish Caching.
IEEE Trans. Parallel Distributed Syst., 2007

Adversarial exploits of end-systems adaptation dynamics.
J. Parallel Distributed Comput., 2007

Mistreatment-resilient distributed caching.
Comput. Networks, 2007

TCP over CDMA2000 Networks: A Cross-Layer Measurement Study.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

netEmbed: a service for embedding distributed applications.
Proceedings of the Middleware 2007, 2007

The Cache Inference Problem and its Application to Content and Request Routing.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Distributed Placement of Service Facilities in Large-Scale Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Implications of Selfish Neighbor Selection in Overlay Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Traffic Characteristics and Communication Patterns in Blogosphere.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

A Geometric Approach to Slot Alignment in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
A hierarchical characterization of a live streaming media workload.
IEEE/ACM Trans. Netw., 2006

Small-world characteristics of Internet topologies and implications on multicast scaling.
Comput. Networks, 2006

Exogenous-loss aware traffic management in overlay networks: Toward global fairness.
Comput. Networks, 2006

snBench: programming and virtualization framework for distributed multitasking sensor networks.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups.
Proceedings of the NETWORKING 2006, 2006

Mistreatment in Distributed Caching Groups: Causes and Implications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Characterizing and Exploiting Reference Locality in Data Stream Applications.
Proceedings of the 22nd International Conference on Data Engineering, 2006

On the Impact of Low-Rate Attacks.
Proceedings of IEEE International Conference on Communications, 2006

2005
Inference and Labeling of Metric-Induced Network Topologies.
IEEE Trans. Parallel Distributed Syst., 2005

M<sup>2</sup>RC: multiplicative-increase/additive-decrease multipath routing control for wireless sensor networks.
SIGBED Rev., 2005

Friendly virtual machines: leveraging a feedback-control model for application adaptation.
Proceedings of the 1st International Conference on Virtual Execution Environments, 2005

dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Reduction of quality (RoQ) attacks on Internet end-systems.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Typed Abstraction of Complex Network Compositions.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
Safe compositional specification of networking systems.
Comput. Commun. Rev., 2004

Performance Evaluation of Distributed Prefetching for Asynchronous Multicast in P2P Networks.
Proceedings of the Web Content Caching and Distribution: 9th International Workshop, 2004

On the interaction between data aggregation and topology control in wireless sensor networks.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Providing soft bandwidth guarantees using elastic TCP-based tunnels.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

A Typed Model for Encoding-Based Protocol Interoperability.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

2003
A spectrum of TCP-friendly window-based congestion control algorithms.
IEEE/ACM Trans. Netw., 2003

Network-aware partial caching for Internet streaming media.
Multim. Syst., 2003

Small-World Characteristics of the Internet and Multicast Scaling.
Proceedings of the 11th International Workshop on Modeling, 2003

Measuring Bottleneck Bandwidth of Targeted Path Segments.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Systematic Verification of Safety Properties of Arbitrary Network Protocol Compositions Using CHAIN.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

OSMOSIS: Scalable Delivery of Real-Time Streaming Media in Ad-Hoc Overlay Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
The Cyclone Server Architecture: streamlining delivery of popular content.
Comput. Commun., 2002

Scalability of multicast delivery for non-sequential streaming access.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2002

A Buffer-and-Relay Approach to Streaming Media Delivery for Asynchronous Clients.
Proceedings of the Networked Group Communication, Fourth International COST264 Workshop, 2002

Accelerating Internet Streaming Media Delivery using Network-Aware Partial Caching.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

Basis token consistency: supporting strong Web cache consistency.
Proceedings of the Global Telecommunications Conference, 2002

2001
GISMO: a Generator of Internet Streaming Media Objects and workloads.
SIGMETRICS Perform. Evaluation Rev., 2001

GreedyDual* Web caching algorithm: exploiting the two sources of temporal locality in Web request streams.
Comput. Commun., 2001

On the marginal utility of network topology measurements.
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop, 2001

TCP-Friendly SIMD Congestion Control and Its Convergence Behavior.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001

2000
Temporal locality in Web request streams: sources, characteristics, and caching implications (poster).
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2000

SomeCast: A Paradigm for Real-Time Adaptive Reliable Multicast.
Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium, RTAS 2000, Washington, DC, USA, May 31, 2000

Sources and Characteristics of Web Temporal Locality.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000

Robust Identification of Shared Losses Using End-to-End Unicast Probes.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000

Popularity-Aware Greedy Dual-Size Web Proxy Caching Algorithms.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Adaptive Reliable Multicast.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

1999
Changes in Web Client Access Patterns: Characteristics and Caching Implications.
World Wide Web, 1999

Load Profiling Based Routing for Guaranteed Bandwidth Flows.
Eur. Trans. Telecommun., 1999

Design and Implementation of Statistical Rate Monotonic Scheduling in KURT Linux.
Proceedings of the 20th IEEE Real-Time Systems Symposium, 1999

Multiplexing VBR traffic flows with guaranteed application-level QoS using statistical rate monotonic scheduling.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

1998
Engineering Real-Time Robotics Software Systems Using CLEOPATRA.
Integr. Comput. Aided Eng., 1998

Statistical Rate Monotonic Scheduling.
Proceedings of the 19th IEEE Real-Time Systems Symposium, 1998

A Load Profiling Approach to Routing Guaranteed Bandwidth Flows.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

Distributed Packet Rewriting and its Application to Scalable Server Architectures.
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998

1997
Self-similarity in World Wide Web traffic: evidence and possible causes.
IEEE/ACM Trans. Netw., 1997

Load Profiling in Distributed Real-Time Systems.
Inf. Sci., 1997

WWW traffic reduction and load balancing through server-based caching.
IEEE Concurrency, 1997

Concurrency Admission Control for RT Databases.
Proceedings of the Real-Time Database and Information Systems, 1997

Real-Time Mutable Broadcast Disks.
Proceedings of the Real-Time Database and Information Systems, 1997

Admission Control for Soft-Transactions in ACCORD.
Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium, 1997

Exploiting Redundancy for Timeliness in TCP Boston.
Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium, 1997

TCP Boston: A Fragmentation-Tolerant TCP Protocol for ATM Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

Load Profiling for Efficient Route Selection in Multi-Class Networks.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

Pinwheel Scheduling for Fault-Tolerant Broadcast Disks in Real-time Database Systems.
Proceedings of the Thirteenth International Conference on Data Engineering, 1997

Implementation and Performance Evaluation of TCP Boston: A Fragmentation-Tolerant TCP Protocol for ATM Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
Report on First International Workshop on Real-Time Database Systems.
SIGMOD Rec., 1996

Advances in Real-Time Database Systems Research.
SIGMOD Rec., 1996

The validation and implementation of real-time robotics systems using Cleopatra object-oriented physically-correct specifications.
OOPS Messenger, 1996

Value-cognizant Speculative Concurrency Control for Real-Time Databases.
Inf. Syst., 1996

Server-Initated Document Dissemination for the WWW.
IEEE Data Eng. Bull., 1996

Self-Similarity in World Wide Web Traffic: Evidence and Causes.
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1996

Value-cognizant admission control for RTDB systems.
Proceedings of the 17th IEEE Real-Time Systems Symposium (RTSS '96), 1996

Value-cognizant Admission Control Strategies for Real-Time DBMS.
Proceedings of the Online-Proceedings of the First International Workshop on Real-Time Databases: Issues and Applications, 1996

AIDA-based real-time fault-tolerant broadcast disks.
Proceedings of the 2nd IEEE Real-Time Technology and Applications Symposium, 1996

Characterizing Reference Locality in the WWW.
Proceedings of the Fourth International Conference on Parallel and Distributed Information Systems, 1996

Speculative Data Dissemination and Service to Reduce Server Load, Network Traffic and Service Time in Distributed Information Systems.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

Timely and fault-tolerant data access from broadcast disks: a pinwheel-based approach.
Proceedings of the Workshop on Databases - Active and Real-Time, 1996

1995
Value-cognizant Speculative Concurrency Control.
Proceedings of the VLDB'95, 1995

Demand-based document dissemination to reduce traffic and balance load in distributed information systems.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Using Speculation to Reduce Server Load and Service Time on the WWW.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

Speculative Algorithms for Concurrency Control in Responsive Databases.
Proceedings of the Responsive Computer Systems: Steps Toward Fault-Tolerant Real-Time Systems, 1995

1994
ACM SIGPLAN Workshop on Language, Compiler, and Tool Support for Real-Time Systems, 1994 (Summary of the Workshop).
ACM SIGPLAN Notices, 1994

Timeliness via Speculation for Real-Time Databases.
Proceedings of the 15th IEEE Real-Time Systems Symposium (RTSS '94), 1994

1991
Specification and Verification of Real-Time Embedded Systems Using Time-Constrained Reactive Automata.
Proceedings of the Real-Time Systems Symposium, 1991

IDA-based Redundant Arrays of Inexpensive Disks.
Proceedings of the First International Conference on Parallel and Distributed Information Systems (PDIS 1991), 1991

Efficient Execution of Homogeneous Tasks with Unequal Run Times on the Connection Machine.
Proceedings of the International Conference on Parallel Processing, 1991

1990
Parallel bin packing using first fit and k-delayed best-fit heuristics.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990

Management of sensory-motor activity in mobile robots.
Proceedings of the 1990 IEEE International Conference on Robotics and Automation, 1990

SETH: A VLSI Chip for the Real-Time Information Dispersal and Retrieval for Security and Fault-Tolerance.
Proceedings of the 1990 International Conference on Parallel Processing, 1990


  Loading...