Dahlia malkhi
Dahlia malkhi
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Fairplay-Secure Two-Party Computation System.
D Malkhi, N Nisan, B Pinkas, Y Sella
USENIX Security Symposium 4, 9, 2004
Viceroy: A scalable and dynamic emulation of the butterfly
D Malkhi, M Naor, D Ratajczak
Proceedings of the twenty-first annual symposium on Principles of …, 2002
Byzantine quorum systems
D Malkhi, M Reiter
Distributed computing 11 (4), 203-213, 1998
Hotstuff: Bft consensus with linearity and responsiveness
M Yin, D Malkhi, MK Reiter, GG Gueta, I Abraham
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
Byzantine quorum systems
D Malkhi, M Reiter
Proceedings of the twenty-ninth annual ACM symposium on Theory of computing …, 1997
Probabilistic quorum systems
D Malkhi, M Reiter, R Wright
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
Secure and scalable replication in Phalanx
D Malkhi, MK Reiter
Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat …, 1998
Vertical paxos and primary-backup replication
L Lamport, D Malkhi, L Zhou
Proceedings of the 28th ACM symposium on Principles of distributed computing …, 2009
K-clustering in wireless ad hoc networks
Y Fernandess, D Malkhi
Proceedings of the second ACM international workshop on Principles of mobile …, 2002
{CORFU}: A shared log design for flash clusters
M Balakrishnan, D Malkhi, V Prabhakaran, T Wobbler, M Wei, JD Davis
9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012
Differential raid: Rethinking raid for ssd reliability
M Balakrishnan, A Kadav, V Prabhakaran, D Malkhi
ACM Transactions on Storage (TOS) 6 (2), 1-22, 2010
Sbft: a scalable and decentralized trust infrastructure
GG Gueta, I Abraham, S Grossman, D Malkhi, B Pinkas, M Reiter, ...
2019 49th Annual IEEE/IFIP international conference on dependable systems …, 2019
Tango: Distributed data structures over a shared log
M Balakrishnan, D Malkhi, T Wobber, M Wu, V Prabhakaran, M Wei, ...
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
Byzantine disk paxos: optimal resilience with byzantine shared memory
I Abraham, GV Chockler, I Keidar, D Malkhi
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
Unreliable intrusion detection in distributed computations
D Malkhi, M Reiter
Proceedings 10th Computer Security Foundations Workshop, 116-124, 1997
LLS: a locality aware location service for mobile ad hoc networks
I Abraham, D Dolev, D Malkhi
Proceedings of the 2004 joint workshop on Foundations of mobile computing, 75-84, 2004
Failure detectors in omission failure environments
D Dolev, R Friedman, I Keidar, D Malkhi
Cornell University, 1996
Data consistency within a federation infrastructure
RL Hasha, L Xun, GKR Kakivaya, D Malkhi
US Patent 8,090,880, 2012
Reconfiguring a state machine
L Lamport, D Malkhi, L Zhou
ACM SIGACT News 41 (1), 63-73, 2010
Dynamic atomic storage without consensus
MK Aguilera, I Keidar, D Malkhi, A Shraer
Journal of the ACM (JACM) 58 (2), 1-32, 2011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20