Paulo Veríssimo

Affiliations:
  • University of Lisbon, Faculty of Sciences


According to our database1, Paulo Veríssimo authored at least 181 papers between 1988 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2008, "For contributions to dependable and secure distributed computing".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols.
CoRR, 2023

ScalOTA: Scalable Secure Over-the-Air Software Updates for Vehicles.
CoRR, 2023

System on Chip Rejuvenation in the Wake of Persistent Attacks.
CoRR, 2023

Intrusion Resilience Systems for Modern Vehicles.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

ScaIOTA: Scalable Secure Over-the-Air Software Updates for Vehicles.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Resilient and Secure System on Chip with Rejuvenation in the Wake of Persistent Attacks.
Proceedings of the 16th European Workshop on System Security, 2023

The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Attacks on tomorrow's virtual world.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Behind the last line of defense: Surviving SoC faults and intrusions.
Comput. Secur., 2022

2021
PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite.
IEEE Trans. Parallel Distributed Syst., 2021

DyPS: Dynamic, Private and Secure GWAS.
Proc. Priv. Enhancing Technol., 2021

On the Security and Performance of Blockchain Sharding.
IACR Cryptol. ePrint Arch., 2021

Sanctuary lost: a cyber-physical warfare in space.
CoRR, 2021

Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems.
CoRR, 2021

EphemeriShield - defence against cyber-antisatellite weapons.
CoRR, 2021

Threat Adaptive Byzantine Fault Tolerant State-Machine Replication.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Characterizing the Impact of Network Delay on Bitcoin Mining.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

2020
DNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment.
IEEE J. Biomed. Health Informatics, 2020

PISTIS: From a Word-of-Mouth to a Gentleman's Agreement.
CoRR, 2020

PriLok: Citizen-protecting distributed epidemic tracing.
CoRR, 2020

2019
ANCHOR: Logically Centralized Security for Software-Defined Networks.
ACM Trans. Priv. Secur., 2019

RepuCoin: Your Reputation Is Your Power.
IEEE Trans. Computers, 2019

RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast.
IEEE Trans. Computers, 2019

Asphalion: trustworthy shielding against Byzantine faults.
Proc. ACM Program. Lang., 2019

Byzantine Resilient Protocol for the IoT.
IEEE Internet Things J., 2019

Re-thinking untraceability in the CryptoNote-style blockchain.
IACR Cryptol. ePrint Arch., 2019

Exploring the Monero Peer-to-Peer Network.
IACR Cryptol. ePrint Arch., 2019

Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure.
CoRR, 2019

P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019

2018
Accurate filtering of privacy-sensitive information in raw genomic data.
J. Biomed. Informatics, 2018

The KISS Principle in Software-Defined Networking: A Framework for Secure Communications.
IEEE Secur. Priv., 2018

Towards Real-Time-Aware Intrusion Tolerance.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Improving Security for Time-Triggered Real-Time Systems with Task Replication.
Proceedings of the 24th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2018

Intrusion-Tolerant Autonomous Driving.
Proceedings of the 21st IEEE International Symposium on Real-Time Distributed Computing, 2018

Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq.
Proceedings of the Programming Languages and Systems, 2018

2017
The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure.
CoRR, 2017

Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come.
Proceedings of the Security Protocols XXV, 2017

Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information: Information Leakage and Countermeasures.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

A Perspective of Security for Mobile Service Robots.
Proceedings of the ROBOT 2017: Third Iberian Robotics Conference, 2017

Meeting the Challenges of Critical and Extreme Dependability and Security.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Cloud-Assisted Read Alignment and Privacy.
Proceedings of the 11th International Conference on Practical Applications of Computational Biology & Bioinformatics, 2017

How Can Photo Sharing Inspire Sharing Genomes?
Proceedings of the 11th International Conference on Practical Applications of Computational Biology & Bioinformatics, 2017

2016
JITeR: Just-in-time application-layer routing.
Comput. Networks, 2016

Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
Software-Defined Networking: A Comprehensive Survey.
Proc. IEEE, 2015

A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

SSIV 2015 Keynote II: From Embedded Systems to Autonomous Cooperating Objects.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

MB4CP 2015 Keynote II: Resilience of Cyber-Physical Energy Systems.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

2014
SCFS: A Shared Cloud-backed File System.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

2013
Efficient Byzantine Fault-Tolerance.
IEEE Trans. Computers, 2013

E-biobanking: What Have You Done to My Cell Samples?
IEEE Secur. Priv., 2013

Benchmarking some Portuguese S&T system research units
CoRR, 2013

BFT-TO: Intrusion Tolerance with Less Replicas.
Comput. J., 2013

Towards secure and dependable software-defined networks.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol.
Proceedings of the Middleware 2013, 2013

The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Adaptare: Supporting automatic and dependable adaptation in dynamic environments.
ACM Trans. Auton. Adapt. Syst., 2012

Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281).
Dagstuhl Reports, 2012

Critical Utility Infrastructural Resilience
CoRR, 2012

On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

The TClouds architecture: Open and resilient cloud-of-clouds computing.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

TRONE: Trustworthy and Resilient Operations in a Network Environment.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Trust and Privacy.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Monitoring and Evaluation of Semantic Rooms.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

CoMiFin Architecture and Semantic Rooms.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Collaborative Attack Detection Using Distributed Hash Tables.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Distributed Attack Detection Using Agilis.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
RITAS: Services for Randomized Intrusion Tolerance.
IEEE Trans. Dependable Secur. Comput., 2011

Byzantine consensus in asynchronous message-passing systems: a survey.
Int. J. Crit. Comput. Based Syst., 2011

Randomization can be a healer: consensus with dynamic omission failures.
Distributed Comput., 2011

Reverse Engineering of Protocols from Network Traces.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Enforcing Dependability and Timeliness in CANELy - Application to Spaceborne Data Communication Systems.
Proceedings of the PECCS 2011, 2011

Recursive virtual machines for advanced security mechanisms.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2010
Vulnerability Discovery with Attack Injection.
IEEE Trans. Software Eng., 2010

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery.
IEEE Trans. Parallel Distributed Syst., 2010

Security Made, Not Perfect, But Automatic (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Security Made, Not Perfect, But Automatic.
Proceedings of the Security Protocols XVIII, 2010

Building a Time- and Space-Partitioned Architecture for the Next Generation of Space Vehicle Avionics.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2010

RAVE: Replicated antivirus engine.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010

2009
Applying Architectural Hybridization in Networked Embedded Systems.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

Architecting Robustness and Timeliness in a New Generation of Aerospace Systems.
Proceedings of the Architecting Dependable Systems VII, 2009

Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
On Byzantine generals with alternative plans.
J. Parallel Distributed Comput., 2008

The CRUTIAL reference critical information infrastructure architecture: a blueprint.
Int. J. Syst. Syst. Eng., 2008

The Crutial Way of Critical Infrastructure Protection.
IEEE Secur. Priv., 2008

Information Assurance Technology Forecast 2008.
IEEE Secur. Priv., 2008

A framework for dependable QoS adaptation in probabilistic environments.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Finite Memory: A Vulnerability of Intrusion-Tolerant Systems.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

Detection and Prediction of Resource-Exhaustion Vulnerabilities.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

2007
Automated Rule-Based Diagnosis through a Distributed Monitor System.
IEEE Trans. Dependable Secur. Comput., 2007

Worm-IT - A wormhole-based intrusion-tolerant group communication system.
J. Syst. Softw., 2007

When 3<i>f</i>+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Architecture and Implementation of an Embedded Wormhole.
Proceedings of the IEEE Second International Symposium on Industrial Embedded Systems, 2007

On the Effects of Finite Memory on Intrusion-Tolerant Systems.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Resilient Intrusion Tolerance through Proactive and Reactive Recovery.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Intrusion Tolerance in Wireless Environments: An Experimental Evaluation.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

The CRUTIAL Architecture for Critical Information Infrastructures.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Analysis of a Redundant Architecture for Critical Infrastructure Protection.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

2006
Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia.
IEEE Trans. Dependable Secur. Comput., 2006

Travelling through wormholes: a new look at distributed systems models.
SIGACT News, 2006

Intrusion-tolerant middleware: the road to automatic security.
IEEE Secur. Priv., 2006

From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.
Comput. J., 2006

Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Proactive resilience through architectural hybridization.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Generic-Events Architecture: Integrating Real-World Aspects in Event-Based Systems.
Proceedings of the Architecting Dependable Systems IV [the book is a result of DSN 2006 workshops, 2006

Thou Shalt Not Trust non-Trustworthy Systems.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

Integrating Inaccessibility Control and Timer Management in CANELy.
Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, 2006

Using Attack Injection to Discover New Vulnerabilities.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Randomized Intrusion-Tolerant Asynchronous Services.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Solving Vector Consensus with a Wormhole.
IEEE Trans. Parallel Distributed Syst., 2005

Guidelines for a graduate curriculum on embedded software and systems.
ACM Trans. Embed. Comput. Syst., 2005

A New Programming Model for Dependable Adaptive Real-Time Applications.
IEEE Distributed Syst. Online, 2005

Low complexity Byzantine-resilient consensus.
Distributed Comput., 2005

Resilient State Machine Replication.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Dependable Adaptive Real-Time Applications in Wormhole-based Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Tolerating Intrusions in Grid Systems.
Proceedings of the International Conference on Security and Management, 2004

An architectural framework and a middleware for cooperating smart components.
Proceedings of the First Conference on Computing Frontiers, 2004

2003
Event-Driven Support of Real-Time Sentient Objects.
Proceedings of the 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), 2003

Trustworthiness of Open Information Systems: How Should It Be Achieved?
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Node Failure Detection and Membership in CANELy.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Uncertainty and Predictability: Can They Be Reconciled?
Proceedings of the Future Directions in Distributed Computing, 2003

2002
The Timely Computing Base Model and Architecture.
IEEE Trans. Computers, 2002

Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Intrusion-Tolerant Architectures: Concepts and Design.
Proceedings of the Architecting Dependable Systems [the book is a result of the ICSE 2002 Workshop on Software Architectures for Dependable Systems], 2002

The Design of a COTSReal-Time Distributed Security Kernel.
Proceedings of the Dependable Computing, 2002

Generic Timing Fault Tolerance using a Timely Computing Base.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
The logically instantaneous communication mode: a communication abstraction.
Future Gener. Comput. Syst., 2001

Using the Timely Computing Base for Dependable QoS Adaptation.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Measuring Distributed Durations with Stable Error.
Proceedings of the 22nd IEEE Real-Time Systems Symposium (RTSS 2001), 2001

The Architecture of a Secure Group Communication System Based on Intrusion Tolerance.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

Distributed systems for system architects.
Advances in distributed computing and middelware 1, Springer, ISBN: 978-0-7923-7266-0, 2001

2000
A Dynamic Light-Weight Group Service.
J. Parallel Distributed Comput., 2000

he Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Logically Instantaneous Communication on Top of Distributed Memory Parallel Machines.
Proceedings of the Parallel Computing Technologies, 1999

Embedded Platforms for Distributed Real-Time Computing: Challenges and Results.
Proceedings of the 2nd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '99), 1999

A Columbus' Egg Idea for CAN Media Redundancy.
Proceedings of the Digest of Papers: FTCS-29, 1999

Time in Distributed System Models and Algorithms.
Proceedings of the Advances in Distributed Systems, 1999

Topology-Aware Algorithms for Large-Scale Communication.
Proceedings of the Advances in Distributed Systems, 1999

Support for Distributed CSCW Applications.
Proceedings of the Advances in Distributed Systems, 1999

1998
Using Light-Weight Groups to Handle Timing Failures in Quasi-Synchronous Systems.
Proceedings of the 19th IEEE Real-Time Systems Symposium, 1998

Hardware support for CAN fault-tolerant communication.
Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, 1998

Fault-Tolerant Broadcasts in CAN.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
CesiumSpray: a Precise and Accurate Global Time Service for Large-scale Systems.
Real Time Syst., 1997

On the Role of Time in Distributed Systems.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

How Hard is Hard Real-time Communication on Field-Buses?.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Causal Delivery Protocols in Real-time Systems: A Generic Model.
Real Time Syst., 1996

A Transparent Light-Weight Group Service.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

Totally Ordered Multicast in Large-Scale Systems.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

Enhancing Dependability of Cooperative Applications in Partitionable Environments.
Proceedings of the Dependable Computing, 1996

Timing Failure Detection and Real-Time Group Communication in Quasi-Synchronous Systems.
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

Efficient Communication in a Design Environment.
Proceedings of the 33st Conference on Design Automation, 1996

1995
Using Tailored Failure Suspectors to Support Distributed Cooperative Applications.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995

Causal Separators for Large-Scale Multicast Communication.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

Reliable Computing Over Mobile Networks.
Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), 1995

The impact of group communication paradigms on groupware support.
Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), 1995

1994
Ordering and Timeliness Requirements of Dependable Real-Time Programs.
Real Time Syst., 1994

A Replication-Transparent Remote Invocation Protocol.
Proceedings of the 13th Symposium on Reliable Distributed Systems, 1994

How to avoid cost of causal communication in large-scale Systems.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994

1993
Using Atomic Broadcast to Implement a posteriori Agreement for Clock Synchronization.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

A Low-level Processor Group Membership Protocol for LANS.
Proceedings of the 13th International Conference on Distributed Computing Systems, 1993

1992
xAMp: A Multi-primitive Group Communications Service.
Proceedings of the 11th Symposium on Reliable Distributed Systems, 1992

Requirements for high performance group support in distributed systems.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992

Group orientation: a paradigm for modern distributed systems.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992

A Study on the Inaccessibility Characteristics of ISO 8802/4 Token-Bus LANs.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

A <i>posteriori</i> Agreement for Fault-Tolerant Clock Synchronization on Broadcast Networks.
Proceedings of the Digest of Papers: FTCS-22, 1992

1990
Real-Time Data Management with Clock-Less Reliable Broadcast Protocols.
Proceedings of the First Workshop on the Management of Replicated Data, 1990

Reliable Broadcast for Fault-Tolerance on Local Computer Networks.
Proceedings of the Ninth Symposium on Reliable Distributed Systems, 1990

Design of fault tolerant distributed systems: the fail-controlled approach.
Proceedings of the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, 1990

The Delta-4 extra performance architecture (XPA).
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

Formal Specification and Verification of a Network Independent Atomic Multicast Protocol.
Proceedings of the Formal Description Techniques, 1990

1989
AMp: A Highly Parallel Atomic Multicast Protocol.
Proceedings of the ACM Symposium on Communications Architectures & Protocols, 1989

1988
Redundant media mechanisms for dependable communication in token-bus LANs.
Proceedings of the 13th Conference on Local Computer Networks, 1988

The Delta-4 approach to dependability in open distributed computing systems.
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988


  Loading...