Shlomi Dolev

Orcid: 0000-0001-5418-6670

Affiliations:
  • Ben-Gurion University, Beersheba, Israel


According to our database1, Shlomi Dolev authored at least 379 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Neighborhood mutual remainder: self-stabilizing distributed implementation and applications.
Acta Informatica, March, 2024

Automatic Real-Time Platoon Formation Using the Road Graph.
SN Comput. Sci., January, 2024

SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework.
IEEE Trans. Dependable Secur. Comput., 2024

Optimizing Cloud Data Lake Queries With a Balanced Coverage Plan.
IEEE Trans. Cloud Comput., 2024

Post Quantum Communication Over the Internet Infrastructure.
Proceedings of the 25th International Conference on Distributed Computing and Networking, 2024

2023
Random spanning trees for expanders, sparsifiers, and virtual network security.
Comput. Commun., December, 2023

Local Deal-Agreement Algorithms for Load Balancing in Dynamic General Graphs.
Theory Comput. Syst., April, 2023

Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs.
Acta Informatica, March, 2023

Location functions for self-stabilizing byzantine tolerant swarms.
Theor. Comput. Sci., 2023

OWF Candidates Based on: Xors, Error Detection Codes, Permutations, Polynomials, Interaction and Nesting.
IACR Cryptol. ePrint Arch., 2023

Single Instance Self-Masking via Permutations.
IACR Cryptol. ePrint Arch., 2023

Randomly Choose an Angle from an Immense Number of Angles to Rotate Qubits, Compute and Reverse.
CoRR, 2023

Forgive and forget: Self-stabilizing swarms in spite of Byzantine robots.
Concurr. Comput. Pract. Exp., 2023

GeniePool: genomic database with corresponding annotated samples based on a cloud data lake architecture.
Database J. Biol. Databases Curation, 2023

Self-Stabilizing and Private Distributed Shared Atomic Memory in Seldomly Fair Message Passing Networks.
Algorithmica, 2023

Analyzing large-scale genomic data with cloud data lakes.
Proceedings of the 16th ACM International Conference on Systems and Storage, 2023

HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version).
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Single Instance Self-masking via Permutations - (Preliminary Version).
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Invited Paper: Common Public Knowledge for Enhancing Machine Learning Data Sets.
Proceedings of the 5th workshop on Advanced tools, 2023

2022
Optimal-round preprocessing-MPC of polynomials over non-zero inputs via distributed random matrix.
Wirel. Networks, 2022

Self-Stabilizing Secure Computation.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and Privacy Preserving Approximation of Distributed Statistical Queries.
IEEE Trans. Big Data, 2022

Communicationless Evaluation of Quadratic Functions over Secret Shared Dynamic Database.
SN Comput. Sci., 2022

Coordinating Amoebots via Reconfigurable Circuits.
J. Comput. Biol., 2022

The journey of computer science and software engineering in Israeli schools.
Inroads, 2022

Towards self-stabilizing blockchain, reconstructing totally erased blockchain.
Inf. Comput., 2022

Multiplicative Partially Homomorphic CRT Secret Sharing.
IACR Cryptol. ePrint Arch., 2022

Self Masking for Hardering Inversions.
IACR Cryptol. ePrint Arch., 2022

Partially Disjoint k Shortest Paths.
CoRR, 2022

Distributed Coordination Based on Quantum Entanglement.
CoRR, 2022

Brief Announcement: Self Masking for Hardening Inversions.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022

Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version).
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Swarming with (Visual) Secret (Shared) Mission.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Distributed Coordination Based on Quantum Entanglement (Work in Progress).
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Non-stopping Junctions via Traffic Scheduling.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

BFLUT Bloom Filter for Private Look Up Tables.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Randomness for Randomness Testing.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
Wavelet-based dynamic and privacy-preserving similitude data models for edge computing.
Wirel. Networks, 2021

Privacy-Preserving Secret Shared Computations Using MapReduce.
IEEE Trans. Dependable Secur. Comput., 2021

History Binding Signature.
IACR Cryptol. ePrint Arch., 2021

Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM.
IACR Cryptol. ePrint Arch., 2021

Accelerating Amoebots via Reconfigurable Circuits.
CoRR, 2021

Polynomial Time Prioritized Multi-Criteria k-Shortest Paths and k-Disjoint All-Criteria-Shortest Paths.
CoRR, 2021

Indexing cloud data lakes within the lakes.
Proceedings of the SYSTOR '21: The 14th ACM International Systems and Storage Conference, 2021

SodsBC/SodsBC++ & SodsMPC: Post-quantum Asynchronous Blockchain Suite for Consensus and Smart Contracts.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2021

Verifiable Computing Using Computation Fingerprints Within FHE.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Logarithmic Time MIMO Based Self-Stabilizing Clock Synchronization.
Proceedings of the NANOCOM '21: The Eighth Annual ACM International Conference on Nanoscale Computing and Communication, Virtual Event, Italy, September 7, 2021

Needle in a haystack queries in cloud data lakes.
Proceedings of the Workshops of the EDBT/ICDT 2021 Joint Conference, 2021

History Binding Signature - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

PolyDNN Polynomial Representation of NN for Communication-Less SMPC Inference.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts.
IACR Cryptol. ePrint Arch., 2020

SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain.
IACR Cryptol. ePrint Arch., 2020

Toward Provable One Way Functions.
IACR Cryptol. ePrint Arch., 2020

Reactive Proof Labeling Schemes for Distributed Decision.
CoRR, 2020

Local Deal-Agreement Based Monotonic Distributed Algorithms for Load Balancing in General Graphs.
CoRR, 2020

Self-Stabilizing Automatic Repeat Request Algorithms for (Bounded Capacity, Omitting, Duplicating and non-FIFO) Computer Networks.
CoRR, 2020

Brief Announcement: Local Deal-Agreement Based Monotonic Distributed Algorithms for Load Balancing in General Graphs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

Invited Paper: Reactive PLS for Distributed Decision.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

Invited Paper: Homomorphic Operations Techniques Yielding Communication Efficiency.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Average-Case Competitive Ratio of Scheduling Algorithms of Multi-user Cache.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation.
Theor. Comput. Sci., 2019

Perennial secure multi-party computation of universal Turing machine.
Theor. Comput. Sci., 2019

A Survey on Geographically Distributed Big-Data Processing Using MapReduce.
IEEE Trans. Big Data, 2019

Upper bounds for multi-level multi-server paging.
Inf. Process. Lett., 2019

Explicit Communication Among Stigmergic Robots.
Int. J. Found. Comput. Sci., 2019

Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract).
IACR Cryptol. ePrint Arch., 2019

Randomly Rotate Qubits Compute and Reverse - IT-Secure Non-Interactive Fully-Compact Homomorphic Quantum Computations over Classical Data Using Random Bases.
IACR Cryptol. ePrint Arch., 2019

Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets.
IACR Cryptol. ePrint Arch., 2019

Edsger W. Dijkstra Prize in Distributed Computing 2019 - Call for Nominations.
Bull. EATCS, 2019

Neighborhood Mutual Remainder: Self-Stabilizing Implementation of Look-Compute-Move Robots (Extended Abstract).
CoRR, 2019

Brief Announcement: Neighborhood Mutual Remainder and Its Self-Stabilizing Implementation of Look-Compute-Move Robots.
Proceedings of the 33rd International Symposium on Distributed Computing, 2019

AdaptiveClimb: adaptive policy for cache replacement.
Proceedings of the 12th ACM International Conference on Systems and Storage, 2019

Brief Announcement: Self-stabilizing LCM Schedulers for Autonomous Mobile Robots Using Neighborhood Mutual Remainder.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2019

Brief Announcement Forgive & Forget: Self-stabilizing Swarms in Spite of Byzantine Robots.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2019

2019 Edsger W. Dijkstra Prize in Distributed Computing.
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019

Forgive & Forget: Self-Stabilizing Swarms in Spite of Byzantine Robots.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Beyond Replications in Blockchain - On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Network Cloudification - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Self-stabilizing Byzantine Consensus for Blockchain - (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Deep Neural Networks as Similitude Models for Sharing Big Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Practically-self-stabilizing virtual synchrony.
J. Comput. Syst. Sci., 2018

Peripheral Authentication for Parked Vehicles over Wireless Radio Communication.
CoRR, 2018

Privacy-Preserving Secret Shared Computations using MapReduce.
CoRR, 2018

Make&activate-before-break for seamless SDN route updates.
Comput. Networks, 2018

Big data interpolation using functional representation.
Acta Informatica, 2018

Bee's Strategy Against Byzantines Replacing Byzantine Participants - (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018

Make&Activate-Before-Break: Policy Preserving Seamless Routes Replacement in SDN.
Proceedings of the Structural Information and Communication Complexity, 2018

Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

2017
Dynamic attribute based vehicle authentication.
Wirel. Networks, 2017

Improving of entropy adaptive on-line compression.
Wirel. Networks, 2017

Functional encryption for cascade automata.
Inf. Comput., 2017

Broadcast Encryption with Both Temporary and Permanent Revocation.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

Brief Announcement: Secure Self-Stabilizing Computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Monitorability Bounds via Expander, Sparsifier and Random Walks - The Interplay Between On-Demand Monitoring and Anonymity (Extendend Abstract).
Proceedings of the Networked Systems - 5th International Conference, 2017

Self-stabilizing Reconfiguration.
Proceedings of the Networked Systems - 5th International Conference, 2017

Programming reflexes (Extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Dependence graph and master switch for seamless dependent routes replacement in SDN (extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Blockchain abbreviation: Implemented by message passing and shared memory (Extended abstract).
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Efficient and private approximations of distributed databases calculations.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Vehicle authentication via monolithically certified public key and attributes.
Wirel. Networks, 2016

Assignment Problems of Different-Sized Inputs in MapReduce.
ACM Trans. Knowl. Discov. Data, 2016

Magnifying computing gaps: Establishing encrypted communication over unidirectional channels.
Theor. Comput. Sci., 2016

Efficient online detection of temporal patterns.
PeerJ Comput. Sci., 2016

Towards holographic "brain" memory based on randomization and Walsh-Hadamard transformation.
Neural Networks, 2016

Security and privacy aspects in MapReduce on clouds: A survey.
Comput. Sci. Rev., 2016

Monitorability Bounds via Expander, Sparsifier and Random Walks. The Interplay Between On-Demand Monitoring and Anonymity.
CoRR, 2016

Optical PUF for Non-Forwardable Vehicle Authentication.
Comput. Commun., 2016

Local Self-Organization with Strong Privacy Protection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Self-stabilizing Byzantine-Tolerant Distributed Replicated State Machine.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2016

Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Brief Announcement: Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016

Peripheral authentication for autonomous vehicles.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

DPDNS 2016 Keynote.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract).
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Concise essence-preserving big data representation.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Probabilistic connectivity threshold for directional antenna widths.
Theor. Comput. Sci., 2015

Rendezvous tunnel for anonymous publishing.
Peer-to-Peer Netw. Appl., 2015

Graph Degree Sequence Solely Determines the Expected Hopfield Network Pattern Stability.
Neural Comput., 2015

Compressive scanning of an object signature.
Nat. Comput., 2015

Optical SuperComputing: Preface to special issue.
Nat. Comput., 2015

Holographic parallel processor for calculating Kronecker product.
Nat. Comput., 2015

Practically stabilizing SWMR atomic memory in message-passing systems.
J. Comput. Syst. Sci., 2015

Secret Shared Random Access Machine.
IACR Cryptol. ePrint Arch., 2015

Self-* programming: run-time parallel control search for reflection box.
Evol. Syst., 2015

Vehicle to Vehicle Authentication.
CoRR, 2015

Practically Stabilizing Virtual Synchrony.
CoRR, 2015

Stabilizing Server-Based Storage in Byzantine Asynchronous Message-Passing Systems.
CoRR, 2015

Meta-MapReduce: A Technique for Reducing Communication in MapReduce Computations.
CoRR, 2015

Topology manipulations for speeding betweenness centrality computation.
J. Complex Networks, 2015

Self-stabilizing Virtual Synchrony.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015

Functional Encryption for Cascade Automata (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015

Brief Announcement: Robust and Private Distributed Shared Atomic Memory in Message Passing Networks.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

Stabilizing Server-Based Storage in Byzantine Asynchronous Message-Passing Systems: Extended abstract.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

Seamless SDN Route Updates.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

Archiving Programs for the Future.
Proceedings of the SKY 2015, 2015

Bounds for Overlapping Interval Join on MapReduce.
Proceedings of the Workshops of the EDBT/ICDT 2015 Joint Conference (EDBT/ICDT), 2015

Proactive Contention Avoidance.
Proceedings of the Transactional Memory. Foundations, Algorithms, Tools, and Applications, 2015

Securing the infrastructure and the workloads of linux containers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Rationality Authority for Provable Rational Behavior.
Proceedings of the Algorithms, Probability, Networks, and Games, 2015

The Reality Game Theory Imposes (Short Summary).
Proceedings of the Algorithms, Probability, Networks, and Games, 2015

SSSDB: Database with Private Information Search.
Proceedings of the Algorithmic Aspects of Cloud Computing - First International Workshop, 2015

2014
Deterministic and Energy-Optimal Wireless Synchronization.
ACM Trans. Sens. Networks, 2014

Sensor networks: From dependence analysis via matroid bases to online synthesis.
Theor. Comput. Sci., 2014

12th international symposium on stabilization, safety, and security of distributed systems.
Inf. Comput., 2014

Big Data Representation as High Dimensional Configuration.
CoRR, 2014

Information security for sensors by overwhelming random sequences and permutations.
Ad Hoc Networks, 2014

Direction election in flocking swarms.
Ad Hoc Networks, 2014

Assignment of Different-Sized Inputs in MapReduce.
Proceedings of the Distributed Computing - 28th International Symposium, 2014

Stateless Stabilization Bootstrap (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

Brief announcement: amoebot - a new model for programmable matter.
Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures, 2014

Self-Stabilizing Virtual Machine Hypervisor Architecture for Resilient Cloud.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Practically Self-stabilizing Paxos Replicated State-Machine.
Proceedings of the Networked Systems - Second International Conference, 2014

Abort Free SemanticTM by Dependency Aware Scheduling of Transactional Instructions.
Proceedings of the Networked Systems - Second International Conference, 2014

Entropy Adaptive On-Line Compression.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

SDN-Based Private Interconnection.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

2013
Bounded-Hop Energy-Efficient Liveness of Flocking Swarms.
IEEE Trans. Mob. Comput., 2013

Unique permutation hashing.
Theor. Comput. Sci., 2013

Efficient and Universal Corruption Resilient Fountain Codes.
IEEE Trans. Commun., 2013

Spanders: Distributed spanning expanders.
Sci. Comput. Program., 2013

Towards Efficient Private Distributed Computation on Unbounded Input Streams.
IACR Cryptol. ePrint Arch., 2013

Preserving Hamming Distance in Arithmetic and Logical Operations.
J. Electron. Test., 2013

Self-Stabilizing Paxos
CoRR, 2013

Ameba-inspired Self-organizing Particle Systems.
CoRR, 2013

Self-stabilizing Byzantine Resilient Topology Discovery and Message Delivery.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2013

Probabilistic Connectivity Threshold for Directional Antenna Widths - (Extended Abstract).
Proceedings of the Structural Information and Communication Complexity, 2013

Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond.
Proceedings of the SAFECOMP 2013, 2013

Self-stabilizing Byzantine Resilient Topology Discovery and Message Delivery - (Extended Abstract).
Proceedings of the Networked Systems - First International Conference, 2013

Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Succinct Permanent Is <i>NEXP</i>-Hard with Many Hard Instances.
Proceedings of the Algorithms and Complexity, 8th International Conference, 2013

Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Parallel decomposition of combinatorial optimization problems using electro-optical vector by matrix multiplication architecture.
J. Supercomput., 2012

Optical supercomputing: introduction to special issue.
J. Supercomput., 2012

Stabilization Enabling Technology.
IEEE Trans. Dependable Secur. Comput., 2012

Editorial for Algorithmic Aspects of Wireless Sensor Networks.
Theor. Comput. Sci., 2012

Anonymous transactions in computer networks.
ACM Trans. Auton. Adapt. Syst., 2012

Detecting unknown malicious code by applying classification techniques on OpCode patterns.
Secur. Informatics, 2012

Succinct Permanent is NEXP-hard with Many Hard Instances.
Electron. Colloquium Comput. Complex., 2012

Data Interpolation: An Efficient Sampling Alternative for Big Data Aggregation
CoRR, 2012

Efficient Private Distributed Computation on Unbounded Input Streams
CoRR, 2012

Optical Solver of Combinatorial Problems: Nano-Technological Approach
CoRR, 2012

Secret swarm unit: Reactive k-secret sharing.
Ad Hoc Networks, 2012

Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

Self-stabilizing End-to-End Communication in (Bounded Capacity, Omitting, Duplicating and non-FIFO) Dynamic Networks - (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Brief Announcement: Arbitrators in the Security Infrastructure.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Heuristics for Speeding Up Betweenness Centrality Computation.
Proceedings of the 2012 International Conference on Privacy, 2012

Object Signature Acquisition through Compressive Scanning.
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012

A Nano-Optics Vector Matrix Multiplier for Implementing State Machines.
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012

Optical Energy Efficient Asynchronous Automata and Circuits.
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012

Crash Resilient and Pseudo-Stabilizing Atomic Registers.
Proceedings of the Principles of Distributed Systems, 16th International Conference, 2012

Permanent Revocation in Attribute Based Broadcast Encryption.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Nested Merkle's Puzzles against Sampling Attacks.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Big Data Interpolation an Efficient Sampling Alternative for Sensor Data Aggregation.
Proceedings of the Algorithms for Sensor Systems, 2012

2011
Self-Stabilizing and Self-Organizing Virtual Infrastructures for Mobile Networks.
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011

Energy-efficient optical acquisition schemes in wireless sensor networks.
Wirel. Networks, 2011

A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks.
ACM Trans. Model. Comput. Simul., 2011

Preface.
Theor. Comput. Sci., 2011

Recovery oriented programming: runtime monitoring of safety and liveness.
Int. J. Softw. Tools Technol. Transf., 2011

RFID Authentication Efficient Proactive Information Security within Computational Security.
Theory Comput. Syst., 2011

Stabilizing data-link over non-FIFO channels with optimal fault-resilience.
Inf. Process. Lett., 2011

Trawling Traffic under Attack Overcoming DDoS Attacks by Target-Controlled Traffic Filtering.
Int. J. Found. Comput. Sci., 2011

Strategies for repeated games with subsystem takeovers implementable by deterministic and self-stabilising automata.
Int. J. Auton. Adapt. Commun. Syst., 2011

Robust and scalable middleware for selfish-computer systems.
Comput. Sci. Rev., 2011

Innovative approaches for security of small artefacts.
Comput. Sci. Rev., 2011

Communication Optimalement Stabilisante sur Canaux non Fiables et non FIFO
CoRR, 2011

Computer Arithmetic Preserving Hamming Distance of Operands in Operation Result
CoRR, 2011

Leveraging Channel Diversity to Gain Efficiency and Robustness for Wireless Broadcast.
Proceedings of the Distributed Computing - 25th International Symposium, 2011

Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Pragmatic Self-stabilization of Atomic Memory in Message-Passing Systems.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Analyzing group communication for preventing data leakage via email.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation.
Proceedings of the Innovations in Computer Science, 2011

On-Line Detection and Prediction of Temporal Patterns.
Proceedings of the Hardware and Software: Verification and Testing, 2011

Poster: attribute based broadcast encryption with permanent revocation.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: arbitrators in the security infrastructure, supporting positive anonymity.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Dynamic Multi-party Computation Forever for Swarm and Cloud Computing and Code Obfuscation.
Proceedings of the Algorithms for Sensor Systems, 2011

Sensor Fusion: From Dependence Analysis via Matroid Bases to Online Synthesis.
Proceedings of the Algorithms for Sensor Systems, 2011

Adaptive Hierarchical Network Structures for Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011

2010
Game authority for robust and scalable distributed selfish-computer systems.
Theor. Comput. Sci., 2010

Masking traveling beams: Optical solutions for NP-complete problems, trading space for time.
Theor. Comput. Sci., 2010

A framework for robust active super tier systems.
Int. J. Softw. Tools Technol. Transf., 2010

Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests.
ACM SIGOPS Oper. Syst. Rev., 2010

Introduction to special issue on Optical SuperComputing.
Nat. Comput., 2010

Optical solution for hard on average #P-complete instances (using exponential space for solving instances of the permanent).
Nat. Comput., 2010

When consensus meets self-stabilization.
J. Comput. Syst. Sci., 2010

Routing betweenness centrality.
J. ACM, 2010

Google Android: A Comprehensive Security Assessment.
IEEE Secur. Priv., 2010

Efficient Collaborative Application Monitoring Scheme for Mobile Networks
CoRR, 2010

Practically Stabilizing Atomic Memory
CoRR, 2010

Fast Self-Stabilizing Minimum Spanning Tree Construction
CoRR, 2010

Randomization adaptive self-stabilization.
Acta Informatica, 2010

Bounded-hop strong connectivity for flocking swarms.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

Fast Self-stabilizing Minimum Spanning Tree Construction - Using Compact Nearest Common Ancestor Labeling Scheme.
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Brief Announcement: Sharing Memory in a Self-stabilizing Manner.
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Computing multi-party trust privately: in <i>O</i>(<i>n</i>) time units sending one (possibly large) message at a time.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Purifying data by machine learning with certainty levels.
Proceedings of the Third International Workshop on Reliability, Availability, and Security, 2010

Brief announcement: swarming secrets.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Compressive Sensing of Object-Signature.
Proceedings of the Optical Supercomputing - Third International Workshop, 2010

Holographic Computation of Balanced Succinct Permanent Instances.
Proceedings of the Optical Supercomputing - Third International Workshop, 2010

Nanotechnology Based Optical Solution for NP-Hard Problems.
Proceedings of the Optical Supercomputing - Third International Workshop, 2010

RoboCast: Asynchronous Communication in Robot Networks.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010

Rendezvous tunnel for anonymous publishing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Self-stabilization preserving compiler.
ACM Trans. Program. Lang. Syst., 2009

Empire of colonies: Self-stabilizing and self-organizing distributed algorithm.
Theor. Comput. Sci., 2009

Incremental deployment of network monitors based on Group Betweenness Centrality.
Inf. Process. Lett., 2009

Google Android: A State-of-the-Art Review of Security Mechanisms
CoRR, 2009

Deaf, Dumb, and Chatting Robots, Enabling Distributed Computation and Fault-Tolerance Among Stigmergic Robot
CoRR, 2009

Brief Announcement: Unique Permutation Hashing.
Proceedings of the Stabilization, 2009

Safer Than Safe: On the Initial State of Self-stabilizing Systems.
Proceedings of the Stabilization, 2009

Reliable distributed computing on unreliable radio channels.
Proceedings of the 2009 MobiHoc S³ workshop on MobiHoc S³, 2009

The wireless synchronization problem.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Brief announcement: deaf, dumb, and chatting robots.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Heuristic Certificates via Approximations.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Combinatorial Optimization Using Electro-Optical Vector by Matrix Multiplication Architecture.
Proceedings of the Optical SuperComputing, Second International Workshop, 2009

Optical Designs for Non-deterministic Turing Machines.
Proceedings of the Optical SuperComputing, Second International Workshop, 2009

Deaf, Dumb, and Chatting Asynchronous Robots.
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009

Safe and Eventually Safe: Comparing Self-stabilizing and Non-stabilizing Algorithms on a Common Ground.
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009

Not All Fair Probabilistic Schedulers Are Equivalent.
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009

On the Fairness of Probabilistic Schedulers for Population Protocols.
Proceedings of the Algorithmic Methods for Distributed Cooperative Systems, 06.09., 2009

Swarming secrets.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Towards Self-Stabilizing Operating Systems.
IEEE Trans. Software Eng., 2008

Self-stabilizing device drivers.
ACM Trans. Auton. Adapt. Syst., 2008

Searching for a lion in the desert: optics-based acquisition algorithms for wireless sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

A self-stabilizing autonomic recoverer for eventual Byzantine software.
J. Syst. Softw., 2008

Self-Stabilization from Theory to Practice.
Bull. EATCS, 2008

Introduction to special issue dedicated to the DISC 20th anniversary.
Distributed Comput., 2008

HyperTree for self-stabilizing peer-to-peer systems.
Distributed Comput., 2008

Brief Announcment: Corruption Resilient Fountain Codes.
Proceedings of the Distributed Computing, 22nd International Symposium, 2008

Tutorial Abstract Virtual Infrastructure.
Proceedings of the Stabilization, 2008

Self-* Programming: Run-Time Parallel Control Search for Reflection Box.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

CAR-STM: scheduling-based collision avoidance and resolution for software transactional memory.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Secure communication over radio channels.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Electro-Optical DSP of Tera Operations per Second and Beyond (Extended Abstract).
Proceedings of the Optical Super Computing, First International Workshop, 2008

Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures.
Proceedings of the Intelligence and Security Informatics, 2008

Unknown Malcode Detection Using OPCODE Representation.
Proceedings of the Intelligence and Security Informatics, 2008

Self-stabilizing and self-orgenizing mobile networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2008

08371 Summary - Fault-Tolerant Distributed Algorithms on VLSI Chips.
Proceedings of the Fault-Tolerant Distributed Algorithms on VLSI Chips, 07.09., 2008

08371 Abstracts Collection - Fault-Tolerant Distributed Algorithms on VLSI Chips.
Proceedings of the Fault-Tolerant Distributed Algorithms on VLSI Chips, 07.09., 2008

Strategies for repeated games with subsystem takeovers: implementable by deterministic and self-stabilizing automata (extended abstract).
Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, 2008

2007
RT oblivious erasure correcting.
IEEE/ACM Trans. Netw., 2007

A review of the DISC 2006 conference.
SIGACT News, 2007

Stability of Multivalued Continuous Consensus.
SIAM J. Comput., 2007

Parallel composition for time-to-fault adaptive stabilization.
Distributed Comput., 2007

Transient fault detectors.
Distributed Comput., 2007

Finding the most prominent group in complex networks.
AI Commun., 2007

Gossiping in a Multi-channel Radio Network.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Stabilizing Trustand Reputationfor Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract).
Proceedings of the Stabilization, 2007

Magnifying Computing GapsEstablishing Encrypted Communication over Unidirectional Channels (Extended Abstract).
Proceedings of the Stabilization, 2007

Game authority for robust andscalable distributed selfish-computer systems.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Secret Swarm UnitReactive k-Secret Sharing.
Proceedings of the Progress in Cryptology, 2007

The Traveling Beams Optical Solutions for Bounded NP-Complete Problems.
Proceedings of the Fun with Algorithms, 4th International Conference, 2007

Self-Stabilization as a Foundation for Autonomic Computing.
Proceedings of the The Second International Conference on Availability, 2007

2006
Random Walk for Self-Stabilizing Group Communication in Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Dynamic load balancing with group communication.
Theor. Comput. Sci., 2006

Self-Stabilizing Microprocessor: Analyzing and Overcoming Soft Errors.
IEEE Trans. Computers, 2006

Memory Management for Self-Stabilizing Operating Systems.
J. Aerosp. Comput. Inf. Commun., 2006

Introduction: Self Stabilization.
J. Aerosp. Comput. Inf. Commun., 2006

Eight Open Problems in Distributed Computing.
Bull. EATCS, 2006

Polygonal broadcast, secret maturity, and the firing sensors.
Ad Hoc Networks, 2006

Secure Communication for RFIDs Proactive Information Security Within Computational Security.
Proceedings of the Stabilization, 2006

Recovery Oriented Programming.
Proceedings of the Stabilization, 2006

Empire of Colonies: Self-stabilizing and Self-organizing Distributed Algorithms.
Proceedings of the Principles of Distributed Systems, 10th International Conference, 2006

2005
Self-stabilizing distributed file system.
J. High Speed Networks, 2005

GeoQuorums: implementing atomic memory in mobile <i>ad hoc</i> networks.
Distributed Comput., 2005

Geographic Quorum System Approximations.
Algorithmica, 2005

Robust Active Super Tier Systems.
Proceedings of the 2005 IEEE International Conference on Software, 2005

Self-stabilizing Mobile Node Location Management and Message Routing.
Proceedings of the Self-Stabilizing Systems, 2005

Brief announcement: virtual stationary automata for mobile networks.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

Timed Virtual Stationary Automata for Mobile Networks.
Proceedings of the Principles of Distributed Systems, 9th International Conference, 2005

Autonomous virtual mobile nodes.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

05411 Abstracts Collection -- Anonymous Communication and its Applications.
Proceedings of the Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005

2004
Self-stabilizing clock synchronization in the presence of Byzantine faults.
J. ACM, 2004

Self Stabilization.
J. Aerosp. Comput. Inf. Commun., 2004

Stability of Multi-Valued Continuous Consensus.
Proceedings of the Workshops on Geometric and Topological Methods in Concurrency Theory, 2004

Self-stabilizing group communication in directed networks.
Acta Informatica, 2004

Virtual Mobile Nodes for Mobile Ad Hoc Networks.
Proceedings of the Distributed Computing, 18th International Conference, 2004

Brief announcement: polygonal broadcast, secret maturity and the firing sensors.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Brief announcement: virtual mobile nodes for mobile ad hoc networks.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Brief announcement: RT oblivious erasure correcting.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Toward Self-Stabilizing Operating Systems.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

Self-Stabilizing Microprocessor - Analyzing and Overcoming Soft-Errors (Extended Abstract).
Proceedings of the Organic and Pervasive Computing, 2004

2003
Communication Adaptive Self-Stabilizing Group Membership Service.
IEEE Trans. Parallel Distributed Syst., 2003

Buses for Anonymous Message Delivery.
J. Cryptol., 2003

Stability of long-lived consensus.
J. Comput. Syst. Sci., 2003

Safety assurance via on-line monitoring.
Distributed Comput., 2003

2002
Local Stabilizer.
J. Parallel Distributed Comput., 2002

Self-Stabilizing Distributed File Systems.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Random walk for self-stabilitzing group communication in ad hoc networks.
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002

2001
Self-stabilizing l-exclusion.
Theor. Comput. Sci., 2001

The Sound of Silence: Guessing Games for Saving Energy in a Mobile Environment.
J. Parallel Distributed Comput., 2001

Smooth and adaptive forward erasure correcting.
Comput. Networks, 2001

Dijkstra's Self-Stabilizing Algorithm in Unsupportive Environments.
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001

2000
Xor-trees for efficient anonymous multicast and reception.
ACM Trans. Inf. Syst. Secur., 2000

Bounded latency scheduling scheme for ATM cells.
Comput. Networks, 2000

Stability of long-lived consensus (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

Self-Stabilization
MIT Press, ISBN: 0-262-04178-2, 2000

1999
Bubbles: Adaptive Routing Scheme for High-Speed Dynamic Networks.
SIAM J. Comput., 1999

Non-Preemptive Real-Time Scheduling of Multimedia Tasks.
Real Time Syst., 1999

A competitive analysis for retransmission timeout.
Networks, 1999

Baked-Potato Routing.
J. Algorithms, 1999

Memory Requirements for Silent Stabilization.
Acta Informatica, 1999

Parallel composition of stabilizing algorithms.
Proceedings of the 1999 ICDCS Workshop on Self-stabilizing Systems, 1999

1998
Optimal Time Self-Stabilization in Uniform Dynamic Systems.
Parallel Process. Lett., 1998

1997
Uniform Dynamic Self-Stabilizing Leader Election.
IEEE Trans. Parallel Distributed Syst., 1997

On the Computational Power of Self-Stabilizing Systems.
Theor. Comput. Sci., 1997

Crash Resilient Communication in Dynamic Networks.
IEEE Trans. Computers, 1997

Resource Bounds for Self-Stabilizing Message-Driven Protocols.
SIAM J. Comput., 1997

Possible and Impossible Self-Stabilizing Digital Clock Synchronization in General Graphs.
Real Time Syst., 1997

Self-Stabilizing Routing and Related Protocol.
J. Parallel Distributed Comput., 1997

Superstabilizing Protocols for Dynamic Distributed Systems.
Chic. J. Theor. Comput. Sci., 1997

Wait-Free Clock Synchronization.
Algorithmica, 1997

Local Stabilizer (Brief Announcement).
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997

Stabilizing in the Presence of Faults, The Digital Clock Synchronization Case.
Proceedings of the On Principles Of Distributed Systems, 1997

Efficient Anonymous Multicast and Reception (Extended Abstract).
Proceedings of the Advances in Cryptology, 1997

1996
Self-stabilizing topology maintenance protocols for high-speed networks.
IEEE/ACM Trans. Netw., 1996

Modified tree structure for location management in mobile environments.
Comput. Commun., 1996

Baked Potatoes: Deadlock Prevention Via Scheduling (Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Memory Requirements for Silent Stabilization (Extended Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

1995
Analyzing Expected Time by Scheduler-Luck Games.
IEEE Trans. Software Eng., 1995

Connection Management Without Retaining Information.
Inf. Comput., 1995

Bubbles: adaptive routing scheme for high-speed dynamic networks (Extended Abstract).
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995

Self-Stabilizing Clock Synchronization in the Presence of Byzantine Faults (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

SuperStabilizing Protocols for Dynamic Distributed Systems (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

1994
Self-Stabilizing Depth-First Search.
Inf. Process. Lett., 1994

Self-Stabilization by Local Checking and Global Reset (Extended Abstract).
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994

1993
Self-Stabilization of Dynamic Systems Assuming Only Read/Write Atomicity.
Distributed Comput., 1993

Crash Resilient Communication in Dynamic Networks (Preliminary Version).
Proceedings of the Distributed Algorithms, 7th International Workshop, 1993

Optimal Time Self Stabilization in Dynamic Systems (Preliminary Version).
Proceedings of the Distributed Algorithms, 7th International Workshop, 1993

Wait-Free Clock Synchronization (Extended Abstract).
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993

1991
Maintaining Digital Clocks in Step.
Parallel Process. Lett., 1991

Uniform Dynamic Self-Stabilizing Leader Election (Extended Absrtact).
Proceedings of the Distributed Algorithms, 5th International Workshop, 1991


  Loading...