Shivakant Mishra

Orcid: 0000-0001-5070-9366

According to our database1, Shivakant Mishra authored at least 174 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PureConnect: A Localized Social Media System to Increase Awareness and Connectedness in Environmental Justice Communities.
CoRR, 2024

2023
An IoT Architecture Leveraging Digital Twins: Compromised Node Detection Scenario.
CoRR, 2023

A Dynamic Distributed Scheduler for Computing on the Edge.
CoRR, 2023

A Fog-based Smart Agriculture System to Detect Animal Intrusion.
CoRR, 2023

An Energy Efficient LoRa-based Multi-Sensor IoT Network for Smart Sensor Agriculture System.
Proceedings of the 2023 IEEE Topical Conference on Wireless Sensors and Sensor Networks, 2023

Towards a Scalable Architecture for Building Digital Twins at the Edge.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2023

A Fog-based Smart Agriculture System to Detect Animal Intrusion.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Shimmy: Accelerating Inter-Container Communication for the IoT Edge.
Proceedings of the IEEE Global Communications Conference, 2023

PureNav: A Personalized Navigation Service for Environmental Justice Communities Impacted by Planned Disruptions.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
Utilizing Players' Playtime Records for Churn Prediction: Mining Playtime Regularity.
IEEE Trans. Games, 2022

Do Twitter users change their behavior after exposure to misinformation? An in-depth analysis.
Soc. Netw. Anal. Min., 2022

Deradicalizing YouTube: Characterization, Detection, and Personalization of Religiously Intolerant Arabic Videos.
Proc. ACM Hum. Comput. Interact., 2022

Incorporating individual and group privacy preferences in the internet of things.
J. Ambient Intell. Humaniz. Comput., 2022

Utilizing Microservices Architecture for Enhanced Service Sharing in IoT Edge Environments.
IEEE Access, 2022

Impact of Work from Home During the Pandemic in Saudi Arabia.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

Understanding the Impact of Culture in Assessing Helpfulness of Online Reviews.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

2021
"Think before you upload": an in-depth analysis of unavailable videos on YouTube.
Soc. Netw. Anal. Min., 2021

Analyzing Twitter Users' Behavior Before and After Contact by the Russia's Internet Research Agency.
Proc. ACM Hum. Comput. Interact., 2021

Intelligent Robust Base-Station Research in Harsh Outdoor Wilderness Environments for Wildsense.
KSII Trans. Internet Inf. Syst., 2021

An edge-based architecture to support the execution of ambience intelligence tasks using the IoP paradigm.
Future Gener. Comput. Syst., 2021

Optimizing and Extending Serverless Platforms: A Survey.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Analyzing behavioral changes of Twitter users after exposure to misinformation.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
Analyzing Twitter Users' Behavior Before and After Contact by the Internet Research Agency.
CoRR, 2020

Identifying Differentiating Factors for Cyberbullying in Vine and Instagram.
Proceedings of the Information Management and Big Data, 2020

BullyAlert- A Mobile Application for Adaptive Cyberbullying Detection.
Proceedings of the Mobile Computing, Applications, and Services, 2020

Correlation Between Personality and Social Interactions in Online Strategy Games.
Proceedings of the IEEE Conference on Games, 2020

Understanding How Readers Determine the Legitimacy of Online News Articles in the Era of Fake News.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

"Video Unavailable": Analysis and Prediction of Deleted and Moderated YouTube Videos.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
Investigating the effect of combining GRU neural networks with handcrafted features for religious hatred detection on Arabic Twitter space.
Soc. Netw. Anal. Min., 2019

Hateful People or Hateful Bots?: Detection and Characterization of Bots Spreading Religious Hatred in Arabic Social Media.
Proc. ACM Hum. Comput. Interact., 2019

GEVR: An Event Venue Recommendation System for Groups of Mobile Users.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Shimmy: Shared Memory Channels for High Performance Inter-Container Communication.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Edge Computing, 2019

Mining Player In-game Time Spending Regularity for Churn Prediction in Free Online Games.
Proceedings of the IEEE Conference on Games, 2019

Purchase Prediction in Free Online Games via Survival Analysis.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
International Workshop on Cybersafety Chairs' Welcome & Organization.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Scalable and timely detection of cyberbullying in online social networks.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

A Privacy Negotiation Mechanism for the Internet of Things.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic Twittersphere.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Having Fun?: Personalized Activity-Based Mood Prediction in Social Media.
Proceedings of the Prediction and Inference from Social Networks and Social Media, 2017

Understanding Group Event Scheduling via the OutWithFriendz Mobile Application.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Calibrating Time-variant, Device-specific Phase Noise for COTS WiFi Devices.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Leveraging BLE and social trust to enable mobile in situ collaborations.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

EmotionSensing: Predicting Mobile User Emotion.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Analysis and detection of labeled cyberbullying instances in Vine, a video-based social network.
Soc. Netw. Anal. Min., 2016

WildSense: Monitoring Interactions among Wild Deer in Harsh Outdoor Environments Using a Delay-Tolerant WSN.
J. Sensors, 2016

Optimizing power consumption in multicore smartphones.
J. Parallel Distributed Comput., 2016

Investigating Factors Influencing the Latency of Cyberbullying Detection.
CoRR, 2016

CyberSafety 2016: The First International Workshop on Computational Methods in CyberSafety.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Prediction of cyberbullying incidents in a media-based social network.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Supporting Healthy Grocery Shopping via Mobile Augmented Reality.
ACM Trans. Multim. Comput. Commun. Appl., 2015

Studying the attributes of users in Twitter considering their emotional states.
Soc. Netw. Anal. Min., 2015

A Middleware for Power Management in Multicore Smartphones.
EAI Endorsed Trans. Energy Web, 2015

Prediction of Cyberbullying Incidents on the Instagram Social Network.
CoRR, 2015

Detection of Cyberbullying Incidents on the Instagram Social Network.
CoRR, 2015

Design, implementation and evaluation of a smartphone position discovery service for accurate context sensing.
Comput. Electr. Eng., 2015

Analyzing Factors Impacting Revining on the Vine Social Network.
Proceedings of the Social Informatics - 7th International Conference, 2015

Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network.
Proceedings of the Social Informatics - 7th International Conference, 2015

Demo abstract: Power aware core scheduling in multicore smartphones.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Poster: Detection of Cyberbullying in a Mobile Social Network: Systems Issues.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Panorama: A Framework to Support Collaborative Context Monitoring on Co-located Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2015

Features for mood prediction in social media.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Careful what you share in six seconds: Detecting cyberbullying instances in Vine.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Analyzing Negative User Behavior in a Semi-anonymous Social Network.
CoRR, 2014

Time and Location Power Based Malicious Code Detection Techniques for Smartphones.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

Data partitioning: an approach to preserving data privacy in computation offload in pervasive computing systems.
Proceedings of the Q2SWinet'14, 2014

Multi-modal fusion for flasher detection in a mobile video chat application.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

Virtual GPS: a middleware for power efficient localization of smartphones using cross layer approach.
Proceedings of the Middleware Industry Track, Bordeaux, France, December 8-12, 2014, 2014

CUDSwap: Tolerating Memory Exhaustion Failures in Cloud Computing.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

A Comparison of Common Users across Instagram and Ask.fm to Better Understand Cyberbullying.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

An analysis of positivity and negativity attributes of users in twitter.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Towards understanding cyberbullying behavior in a semi-anonymous social network.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
SafeVchat: A System for Obscene Content Detection in Online Video Chat Services.
ACM Trans. Internet Techn., 2013

ACM HotMobile 2013 demo: preserving data privacy through data partitioning in mobile application.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

Results from a Practical Deployment of the MyZone Decentralized P2P Social Network
CoRR, 2013

Power Based Malicious Code Detection Techniques for Smartphones.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Enhancing Context-Aware Applications Accuracy with Position Discovery.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Identifying and quantifying the android device users' security risk exposure.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Understanding user behavior at scale in a mobile video chat application.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Addressing memory exhaustion failures in Virtual Machines in a cloud environment.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services
CoRR, 2012

Efficient misbehaving user detection in online video chat services.
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012

Location based routing using smartphones in an infrastructureless environment.
Proceedings of the ACM Symposium on Applied Computing, 2012

Demo: MVChat: flasher detection for mobile video chat.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Personalized Energy Consumption Modeling on Smartphones.
Proceedings of the Mobile Computing, Applications, and Services, 2012

Scalable misbehavior detection in online video chat services.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Attribute Based Content Sharing in Mobile Adhoc Networks of Smartphones over WiFi.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
Understanding Characteristics of Available Bandwidth in Wireless Environment.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

MyZone: A Next-Generation Online Social Network
CoRR, 2011

SafeVchat: detecting obscene content and misbehaving users in online video chat services.
Proceedings of the 20th International Conference on World Wide Web, 2011

A highly scalable bandwidth estimation of commercial hotspot access points.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

CID3: System Support for Loosely-Coupled Personal Computing Environments.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Location based power analysis to detect malicious code in smartphones.
Proceedings of the SPSM'11, 2011

2010
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
CoRR, 2010

Fusing mobile, sensor, and social data to fully enable context-aware computing.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

GPS assisted adhoc routing using cellphones for poorly connected areas.
Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions, 2010

System support for anywhere anytime personal computing environment.
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010

ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Enhancing group recommendation by incorporating social relationship interactions.
Proceedings of the 2010 International ACM SIGGROUP Conference on Supporting Group Work, 2010

On rootkit and malware detection in smartphones.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010

2009
MapReduce System over Heterogeneous Mobile Devices.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

A Privacy Preserving Intrusion Tolerant Voting Architecture.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Where is the tight link in a home wireless broadband environment?
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

Improving Opportunistic Data Dissemination via Known Vector.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Security and Privacy in a Sensor-Based Search and Rescue System.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

2008
A Protocol for Building Secure and Reliable Covert Channel.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

An Evaluation of Java RMI/JavaSpaces and Ruby DRb/Rinda.
Proceedings of the 2008 IEEE International Performance, 2008

Support for Security and Privacy in SenSearch.
Proceedings of the 2008 IEEE International Performance, 2008

Enhanced server fault-tolerance for improved user experience.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Secure and reliable covert channel.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Using Context in Security Design of a Search and Rescue System.
Proceedings of the First International Workshop on Combining Context with Trust, 2007

Systems Architectures for Transactional Network Interface.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Flexible intrusion tolerant voting architecture.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

P2P backup storage: Are they really useful?
Proceedings of the ISCA 20th International Conference on Parallel and Distributed Computing Systems, 2007

2006
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks.
Pervasive Mob. Comput., 2006

Limiting DoS attacks during multihop data delivery in wireless sensor networks.
Int. J. Secur. Networks, 2006

INSENS: Intrusion-tolerant routing for wireless sensor networks.
Comput. Commun., 2006

Fault-tolerant and scalable TCP splice and web server architecture.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Efficiently Authenticating Code Images in Dynamically ReprogrammedWireless Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Secure code distribution in dynamically programmable wireless sensor networks.
Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, 2006

2005
CenWits: a sensor-based loosely coupled search and rescue system using witnesses.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Defending against path-based DoS attacks in wireless sensor networks.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Batch Rekeying in Mykil Key Management System.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

A Sensor-Based Tracking System Using Witnesses.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A System Demonstration of ST-TCP.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

A Flexible and Intrusion Tolerant Voting Mechanism.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

2004
Evaluation of gossip to build scalable and reliable multicast protocols.
Perform. Evaluation, 2004

Flexible Intrusion Tolerant Group Membership Protocol.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Support for Mobility and Fault Tolerance in Mykil.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Building a Secure and Highly Scalable Data Distribution System.
Proceedings of the Intelligent Information Technology, 2004

2003
Interagent Communication and Synchronization Support in the DaAgent Mobile Agent-Based Computing System.
IEEE Trans. Parallel Distributed Syst., 2003

Security support for in-network processing in Wireless Sensor Networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Information Processing in Sensor Networks, 2003

Mykil: a highly scalable key distribution protocol for large group multicast.
Proceedings of the Global Telecommunications Conference, 2003

TCP Server Fault Tolerance Using Connection Migration to a Backup Server.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Issues in Building Intrusion Tolerant Group Membership Protocols.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
The Timewheel Group Communication System.
IEEE Trans. Computers, 2002

Teams: An Availability Management Service for a Timed Asynchronous Distributed System.
Int. J. Comput. Their Appl., 2002

A Peer-to-Peer System Assignment for Teaching Distributed Systems Concepts.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Improving the Performance of Distributed CORBA Applications.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

CORBA-as-Needed: A Technique to Construct High Performance CORBA Applications.
Proceedings of the High Performance Computing, 2002

A Middleware for Constructing Highly Available, Fault Tolerant, and Attack Tolerant Services.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2001
On Group Communication Support in CORBA.
IEEE Trans. Parallel Distributed Syst., 2001

Interagent Communication and Synchronization in DaAgent.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

Statistical analysis of security violations in computer software.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

Communication and Synchronization Models in Mobile Agent-Based Computing Systems.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001

2000
Newsmonger: a technique to improve the performance of atomic broadcast protocols.
J. Syst. Softw., 2000

Design, Implementation and Performance Evaluation of a High Performance CORBA Group Membership Protocol.
Proceedings of the High Performance Computing, 2000

Specifying and Checking Fault-Tolerant Agent-Based Protocols Using Maude.
Proceedings of the Formal Approaches to Agent-Based Systems, First International Workshop, 2000

1999
Design, Implementation and Performance Evaluation of a CORBA Group Communication Service.
Proceedings of the Digest of Papers: FTCS-29, 1999

1998
An evaluation of flow control in group communication.
IEEE/ACM Trans. Netw., 1998

Thread-Based vs Event-Based Implementation of a Group Communication Service.
Proceedings of the 12th International Parallel Processing Symposium / 9th Symposium on Parallel and Distributed Processing (IPPS/SPDP '98), March 30, 1998

The Timewheel Group Membership Protocol.
Proceedings of the Parallel and Distributed Processing, 10 IPPS/SPDP'98 Workshops Held in Conjunction with the 12th International Parallel Processing Symposium and 9th Symposium on Parallel and Distributed Processing, Orlando, Florida, USA, March 30, 1998

1997
Units of Computation in Fault-Tolerant Distributed Systems.
J. Parallel Distributed Comput., 1997

High-performance asynchronous atomic broadcast.
Distributed Syst. Eng., 1997

The Timewheel Asynchronous Atomic Broadcast Protocol.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

1996
Implementation and Performance of a Stable-Storage Service in Unix.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

A Toolkit of Services for Implementing Fault-Tolerant Distributed Protocols.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

1995
The pinwheel asynchronous atomic broadcast protocols.
Proceedings of the Second International Symposium on Autonomous Decentralized Systems, 1995

Comparing How Well Asynchronous Atomic Broadcast Protocols Perform.
Proceedings of the Responsive Computer Systems: Steps Toward Fault-Tolerant Real-Time Systems, 1995

1994
A performance comparison of asynchronous atomic broadcast protocols.
Distributed Syst. Eng., 1994

Automatic service availability management in asynchronous distributed systems.
Proceedings of the Second International Workshop on Configurable Distributed Systems, 1994

1993
Experience with Modularity in Consul.
Softw. Pract. Exp., 1993

Consul: a communication substrate for fault-tolerant distributed programs.
Distributed Syst. Eng., 1993

Modularity in the design and implementation of Consul.
Proceedings of the International Symposium on Autonomous Decentralized Systems, 1993

1992
Protocol Modularity in Systems for Managing Replicated Data.
Proceedings of the Second Workshop on the Management of Replicated Data, 1992

1990
Fault-tolerant mutual exclusion algorithms.
J. Syst. Softw., 1990

Performance evaluation of distributed mutual exclusion algorithms for computer networks.
Comput. Syst. Sci. Eng., 1990

Communication Substrate for Maintaining Replicated Data.
Proceedings of the First Workshop on the Management of Replicated Data, 1990

1989
Tools for Implementing Network Protocols.
Softw. Pract. Exp., 1989

Implementing Fault-Tolerant Replicated Ojects Using Psync.
Proceedings of the Eigthth Symposium on Reliable Distributed Systems, 1989


  Loading...