Dahlia malkhi
Dahlia malkhi
Adresse e-mail validée de fb.com - Page d'accueil
Citée par
Citée par
Fairplay-Secure Two-Party Computation System.
D Malkhi, N Nisan, B Pinkas, Y Sella
USENIX Security Symposium 4, 9, 2004
Viceroy: A scalable and dynamic emulation of the butterfly
D Malkhi, M Naor, D Ratajczak
Proceedings of the twenty-first annual symposium on Principles of …, 2002
Byzantine quorum systems
D Malkhi, M Reiter
Distributed computing 11 (4), 203-213, 1998
Byzantine quorum systems
D Malkhi, M Reiter
Proceedings of the twenty-ninth annual ACM symposium on Theory of computing …, 1997
HotStuff: BFT consensus with linearity and responsiveness
M Yin, D Malkhi, MK Reiter, GG Gueta, I Abraham
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
Probabilistic quorum systems
D Malkhi, MK Reiter, A Wool, RN Wright
Information and Computation 170 (2), 184-206, 2001
Secure and scalable replication in Phalanx
D Malkhi, MK Reiter
Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat …, 1998
K-clustering in wireless ad hoc networks
Y Fernandess, D Malkhi
Proceedings of the second ACM international workshop on Principles of mobile …, 2002
Differential raid: Rethinking raid for ssd reliability
M Balakrishnan, A Kadav, V Prabhakaran, D Malkhi
ACM Transactions on Storage (TOS) 6 (2), 1-22, 2010
Vertical paxos and primary-backup replication
L Lamport, D Malkhi, L Zhou
Proceedings of the 28th ACM symposium on Principles of distributed computing …, 2009
Byzantine disk paxos: optimal resilience with byzantine shared memory
I Abraham, G Chockler, I Keidar, D Malkhi
Distributed Computing 18 (5), 387-408, 2006
{CORFU}: A shared log design for flash clusters
M Balakrishnan, D Malkhi, V Prabhakaran, T Wobbler, M Wei, JD Davis
9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI …, 2012
Unreliable intrusion detection in distributed computations
D Malkhi, M Reiter
Proceedings 10th Computer Security Foundations Workshop, 116-124, 1997
Tango: Distributed data structures over a shared log
M Balakrishnan, D Malkhi, T Wobber, M Wu, V Prabhakaran, M Wei, ...
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
LLS: a locality aware location service for mobile ad hoc networks
I Abraham, D Dolev, D Malkhi
Proceedings of the 2004 joint workshop on Foundations of mobile computing, 75-84, 2004
Failure detectors in omission failure environments
D Dolev, R Friedman, I Keidar, D Malkhi
Cornell University, 1996
Reconfiguring a state machine
L Lamport, D Malkhi, L Zhou
ACM SIGACT News 41 (1), 63-73, 2010
Data consistency within a federation infrastructure
RL Hasha, L Xun, GKR Kakivaya, D Malkhi
US Patent 8,090,880, 2012
Secure execution of Java applets using a remote playground
D Malkhi, MK Reiter
IEEE Transactions on Software Engineering 26 (12), 1197-1209, 2000
Dynamic atomic storage without consensus
MK Aguilera, I Keidar, D Malkhi, A Shraer
Journal of the ACM (JACM) 58 (2), 1-32, 2011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20