2008 |
69 | EE | Yehuda Afek,
Iftah Gamzu,
Irit Levy,
Michael Merritt,
Gadi Taubenfeld:
Group Renaming.
OPODIS 2008: 58-72 |
68 | EE | Marios Mavronicolas,
Michael Merritt,
Gadi Taubenfeld:
Sequentially consistent versus linearizable counting networks.
Distributed Computing 21(4): 249-269 (2008) |
2005 |
67 | EE | Noga Alon,
Michael Merritt,
Omer Reingold,
Gadi Taubenfeld,
Rebecca N. Wright:
Tight bounds for shared memory systems accessed by Byzantine processes.
Distributed Computing 18(2): 99-109 (2005) |
2003 |
66 | EE | Michael Merritt,
Gadi Taubenfeld:
Resilient Consensus for Infinitely Many Processes.
DISC 2003: 1-15 |
65 | EE | Dahlia Malkhi,
Michael Merritt,
Michael K. Reiter,
Gadi Taubenfeld:
Objects shared by Byzantine processes.
Distributed Computing 16(1): 37-48 (2003) |
64 | EE | Michael J. Fischer,
Michael Merritt:
Appraising two decades of distributed computing theory research.
Distributed Computing 16(2-3): 239-247 (2003) |
2002 |
63 | EE | Michael Merritt,
Omer Reingold,
Gadi Taubenfeld,
Rebecca N. Wright:
Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes.
DISC 2002: 222-236 |
62 | EE | Yehuda Afek,
Anat Bremler-Barr,
Haim Kaplan,
Edith Cohen,
Michael Merritt:
Restoration by path concatenation: fast recovery of MPLS paths.
Distributed Computing 15(4): 273-283 (2002) |
2001 |
61 | EE | Eli Gafni,
Michael Merritt,
Gadi Taubenfeld:
The concurrency hierarchy, and algorithms for unbounded concurrency.
PODC 2001: 161-169 |
60 | EE | Anat Bremler-Barr,
Yehuda Afek,
Haim Kaplan,
Edith Cohen,
Michael Merritt:
Restoration by path concatenation: fast recovery of MPLS paths.
PODC 2001: 43-52 |
59 | EE | Anat Bremler-Barr,
Yehuda Afek,
Haim Kaplan,
Edith Cohen,
Michael Merritt:
Restoration path concatenation: fast recovery of MPLS paths.
SIGMETRICS/Performance 2001: 316-317 |
2000 |
58 | EE | Michael Merritt,
Gadi Taubenfeld:
Computing with Infinitely Many Processes.
DISC 2000: 164-178 |
57 | EE | Dahlia Malkhi,
Michael Merritt,
Michael K. Reiter,
Gadi Taubenfeld:
Objects Shared by Byzantine Processes.
DISC 2000: 345-359 |
56 | EE | Dahlia Malkhi,
Michael Merritt,
Ohad Rodeh:
Secure Reliable Multicast Protocols in a WAN.
Distributed Computing 13(1): 19-28 (2000) |
1999 |
55 | EE | Yehuda Afek,
Michael Merritt:
Fast, Wait-Free (2k)-Renaming.
PODC 1999: 105-112 |
54 | EE | Marios Mavronicolas,
Michael Merritt,
Gadi Taubenfeld:
Sequentially Consistent versus Linearizable Counting Networks.
PODC 1999: 133-142 |
53 | EE | Dahlia Malkhi,
Michael Merritt,
Ohad Rodeh:
Secure Multicast in a WAN
CoRR cs.CR/9908008: (1999) |
52 | EE | Michael Merritt:
Introduction.
Distributed Computing 12(2-3): 55-56 (1999) |
51 | | Robert P. Kurshan,
Michael Merritt,
Ariel Orda,
Sonia R. Sachs:
Modelling Asynchrony with a Synchronous Model.
Formal Methods in System Design 15(3): 175-199 (1999) |
50 | | Yehuda Afek,
Michael Merritt,
Gadi Taubenfeld:
The Power of Multiobjects.
Inf. Comput. 153(1): 117-138 (1999) |
1998 |
49 | EE | Michael Merritt,
Gadi Taubenfeld:
Fairness of Shared Objects.
DISC 1998: 303-317 |
1997 |
48 | | Dahlia Malkhi,
Michael Merritt,
Ohad Rodeh:
Secure Reliable Multicast Protocols in a WAN.
ICDCS 1997: 0- |
47 | | Yehuda Afek,
Michael Merritt,
Gadi Taubenfeld,
Dan Touitou:
Disentangling Multi-Object Operations (Extended Abstract).
PODC 1997: 111-120 |
46 | | Michael Merritt,
Ariel Orda,
Sonia R. Sachs:
Formal Verification of a Distributed Computer System.
Formal Methods in System Design 10(1): 93-125 (1997) |
45 | EE | Ariel Orda,
Michael Merritt:
Efficient Test & Set Constructions for Faulty Shared Memory.
Inf. Process. Lett. 62(1): 41-46 (1997) |
1996 |
44 | | Yehuda Afek,
Michael Merritt,
Gadi Taubenfeld:
The Power of Multi-objects (Extended Abstract).
PODC 1996: 213-222 |
1995 |
43 | | Robert P. Kurshan,
Michael Merritt,
Ariel Orda,
Sonia R. Sachs:
Modelling Asynchrony with a Synchronous Model.
CAV 1995: 339-352 |
42 | EE | Yehuda Afek,
David S. Greenberg,
Michael Merritt,
Gadi Taubenfeld:
Computing With Faulty Shared Objects.
J. ACM 42(6): 1231-1274 (1995) |
1994 |
41 | EE | Yehuda Afek,
Danny Dolev,
Eli Gafni,
Michael Merritt,
Nir Shavit:
A Bounded First-In, First-Enabled Solution to the l-Exclusion Problem.
ACM Trans. Program. Lang. Syst. 16(3): 939-953 (1994) |
40 | | Michael Merritt,
Gadi Taubenfeld:
Atomic m-Register Operations.
Distributed Computing 7(4): 213-221 (1994) |
39 | | Robert P. Kurshan,
Michael Merritt,
Ariel Orda,
Sonia R. Sachs:
A Structural Linearization Principle for Processes.
Formal Methods in System Design 5(3): 227-244 (1994) |
38 | | Steven M. Bellovin,
Michael Merritt:
An attack on the Interlock Protocol when used for authentication.
IEEE Transactions on Information Theory 40(1): 273- (1994) |
1993 |
37 | | Nancy A. Lynch,
Michael Merritt,
William E. Weihl,
Alan Fekete:
Atomic Transactions
Morgan Kaufmann 1993 |
36 | EE | Steven M. Bellovin,
Michael Merritt:
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
ACM Conference on Computer and Communications Security 1993: 244-250 |
35 | | Robert P. Kurshan,
Michael Merritt,
Ariel Orda,
Sonia R. Sachs:
A Structural Linearization Principle for Processes.
CAV 1993: 491-504 |
34 | | Yehuda Afek,
Michael Merritt,
Gadi Taubenfeld:
Benign Failure Models for Shared Memory (Preliminary Version).
WDAG 1993: 69-83 |
33 | EE | Yehuda Afek,
Geoffrey M. Brown,
Michael Merritt:
Lazy Caching.
ACM Trans. Program. Lang. Syst. 15(1): 182-205 (1993) |
32 | | Michael Merritt,
Gadi Taubenfeld:
Knowledge in Shared Memory Systems.
Distributed Computing 7(2): 99-109 (1993) |
31 | | Michael Merritt,
Gadi Taubenfeld:
Speeding Lamport's Fast Mutual Exclusion Algorithm.
Inf. Process. Lett. 45(3): 137-142 (1993) |
30 | EE | Yehuda Afek,
Hagit Attiya,
Danny Dolev,
Eli Gafni,
Michael Merritt,
Nir Shavit:
Atomic Snapshots of Shared Memory.
J. ACM 40(4): 873-890 (1993) |
1992 |
29 | | Yehuda Afek,
David S. Greenberg,
Michael Merritt,
Gadi Taubenfeld:
Computing with Faulty Shared Memory (Extended Abstract).
PODC 1992: 47-58 |
28 | EE | Phillip B. Gibbons,
Michael Merritt:
Specifying Non-Blocking Shared Memories (Extended Abstract).
SPAA 1992: 306-315 |
27 | EE | Maurice Herlihy,
Nancy A. Lynch,
Michael Merritt,
William E. Weihl:
On the Correctness of Orphan Management Algorithms.
J. ACM 39(4): 881-930 (1992) |
1991 |
26 | | Michael Merritt,
Francesmary Modugno,
Marc R. Tuttle:
Time-Constrained Automata (Extended Abstract)
CONCUR 1991: 408-423 |
25 | | Michael Merritt,
Gadi Taubenfeld:
Knowledge in Shared Memory Systems (Preliminary Version).
PODC 1991: 189-200 |
24 | EE | Phillip B. Gibbons,
Michael Merritt,
Kourosh Gharachorloo:
Proving Sequential Consistency of High-Performance Shared Memories (Extended Abstract).
SPAA 1991: 292-303 |
23 | | Steven M. Bellovin,
Michael Merritt:
Limitations of the Kerberos Authentication System.
USENIX Winter 1991: 253-268 |
22 | | Michael Merritt,
Gadi Taubenfeld:
Atomic m-Register Operations (Extended Abstract).
WDAG 1991: 289-294 |
1990 |
21 | EE | Yehuda Afek,
Danny Dolev,
Hagit Attiya,
Eli Gafni,
Michael Merritt,
Nir Shavit:
Atomic Snapshots of Shared Memory.
PODC 1990: 1-13 |
20 | | Alan Fekete,
Nancy A. Lynch,
Michael Merritt,
William E. Weihl:
Commutativity-Based Locking for Nested Transactions.
J. Comput. Syst. Sci. 41(1): 65-156 (1990) |
1989 |
19 | EE | Alan Fekete,
Nancy A. Lynch,
Michael Merritt,
William E. Weihl:
Commutativity-Based Locking for Nested Transactions.
POS 1989: 319-340 |
18 | | Michael Merritt:
Completeness Theorems for Automata.
REX Workshop 1989: 544-560 |
17 | EE | Yehuda Afek,
Geoffrey M. Brown,
Michael Merritt:
A Lazy Cache Algorithm.
SPAA 1989: 209-222 |
16 | EE | Benny Chor,
Michael Merritt,
David B. Shmoys:
Simple constant-time consensus protocols in realistic failure models.
J. ACM 36(3): 591-614 (1989) |
1988 |
15 | EE | Nancy A. Lynch,
Michael Merritt,
William E. Weihl,
Alan Fekete:
A Theory of Atomic Transactions.
ICDT 1988: 41-71 |
14 | EE | James Aspnes,
Alan Fekete,
Nancy A. Lynch,
Michael Merritt,
William E. Weihl:
A Theory of Timestamp-Based Concurrency Control for Nested Transactions.
VLDB 1988: 431-444 |
13 | | Nancy A. Lynch,
Michael Merritt:
Introduction to the Theory of Nested Transactions.
Theor. Comput. Sci. 62(1-2): 123-185 (1988) |
1987 |
12 | EE | Alan Fekete,
Nancy A. Lynch,
Michael Merritt,
William E. Weihl:
Nested Transactions and Read/Write Locking.
PODS 1987: 97-111 |
1986 |
11 | | Michael J. Fischer,
Nancy A. Lynch,
Michael Merritt:
Easy Impossibility Proofs for Distributed Consensus Problems.
Fault-Tolerant Distributed Computing 1986: 147-170 |
10 | EE | Nancy A. Lynch,
Michael Merritt:
Introduction to the Theory of Nested Transactions.
ICDT 1986: 278-305 |
9 | | Michael J. Fischer,
Nancy A. Lynch,
Michael Merritt:
Easy Impossibility Proofs for Distributed Consensus Problems.
Distributed Computing 1(1): 26-39 (1986) |
1985 |
8 | | Benny Chor,
Michael Merritt,
David B. Shmoys:
Simple Constant-Time Consensus Protocols in Realistic Failure Models (Extended Abstract).
PODC 1985: 152-162 |
7 | | Michael J. Fischer,
Nancy A. Lynch,
Michael Merritt:
Easy Impossibility Proofs for Distributed Consensus Problems.
PODC 1985: 59-70 |
1984 |
6 | EE | Steven Fortune,
Michael Merritt:
Poker Protocols.
CRYPTO 1984: 454-464 |
5 | | Michael Merritt:
Elections in the Presence of Faults.
PODC 1984: 134-142 |
4 | | Don P. Mitchell,
Michael Merritt:
A Distributed Algorithm for Deadlock Detection and Resolution.
PODC 1984: 282-284 |
1982 |
3 | | Michael Merritt:
Key Reconstruction.
CRYPTO 1982: 321-322 |
2 | | Richard A. DeMillo,
Nancy A. Lynch,
Michael Merritt:
Cryptographic Protocols
STOC 1982: 383-400 |
1981 |
1 | | Richard A. DeMillo,
Nancy A. Lynch,
Michael Merritt:
The Design and Analysis of Cryptographic Protocols.
CRYPTO 1981: 71-72 |