Author:
Clement Allen,Kapritsos Manos,Lee Sangmin,Wang Yang,Alvisi Lorenzo,Dahlin Mike,Riche Taylor
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding Silent Data Corruption in Processors for Mitigating its Effects;ACM Transactions on Architecture and Code Optimization;2024-09-02
2. Reducing Persistence Overhead in Parallel State Machine Replication through Time-Phased Partitioned Checkpoint;Journal of Internet Services and Applications;2024-07-26
3. Intrusion Tolerance for Networked Systems through Two-Level Feedback Control;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
4. ZLB: A Blockchain to Tolerate Colluding Majorities;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
5. Distributed Transaction Processing in Untrusted Environments;Companion of the 2024 International Conference on Management of Data;2024-06-09