2008 | ||
---|---|---|
69 | EE | Yehuda Afek, Iftah Gamzu, Irit Levy, Michael Merritt, Gadi Taubenfeld: Group Renaming. OPODIS 2008: 58-72 |
68 | EE | Marios Mavronicolas, Michael Merritt, Gadi Taubenfeld: Sequentially consistent versus linearizable counting networks. Distributed Computing 21(4): 249-269 (2008) |
2005 | ||
67 | EE | Noga Alon, Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright: Tight bounds for shared memory systems accessed by Byzantine processes. Distributed Computing 18(2): 99-109 (2005) |
2003 | ||
66 | EE | Michael Merritt, Gadi Taubenfeld: Resilient Consensus for Infinitely Many Processes. DISC 2003: 1-15 |
65 | EE | Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld: Objects shared by Byzantine processes. Distributed Computing 16(1): 37-48 (2003) |
64 | EE | Michael J. Fischer, Michael Merritt: Appraising two decades of distributed computing theory research. Distributed Computing 16(2-3): 239-247 (2003) |
2002 | ||
63 | EE | Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright: Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes. DISC 2002: 222-236 |
62 | EE | Yehuda Afek, Anat Bremler-Barr, Haim Kaplan, Edith Cohen, Michael Merritt: Restoration by path concatenation: fast recovery of MPLS paths. Distributed Computing 15(4): 273-283 (2002) |
2001 | ||
61 | EE | Eli Gafni, Michael Merritt, Gadi Taubenfeld: The concurrency hierarchy, and algorithms for unbounded concurrency. PODC 2001: 161-169 |
60 | EE | Anat Bremler-Barr, Yehuda Afek, Haim Kaplan, Edith Cohen, Michael Merritt: Restoration by path concatenation: fast recovery of MPLS paths. PODC 2001: 43-52 |
59 | EE | Anat Bremler-Barr, Yehuda Afek, Haim Kaplan, Edith Cohen, Michael Merritt: Restoration path concatenation: fast recovery of MPLS paths. SIGMETRICS/Performance 2001: 316-317 |
2000 | ||
58 | EE | Michael Merritt, Gadi Taubenfeld: Computing with Infinitely Many Processes. DISC 2000: 164-178 |
57 | EE | Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld: Objects Shared by Byzantine Processes. DISC 2000: 345-359 |
56 | EE | Dahlia Malkhi, Michael Merritt, Ohad Rodeh: Secure Reliable Multicast Protocols in a WAN. Distributed Computing 13(1): 19-28 (2000) |
1999 | ||
55 | EE | Yehuda Afek, Michael Merritt: Fast, Wait-Free (2k)-Renaming. PODC 1999: 105-112 |
54 | EE | Marios Mavronicolas, Michael Merritt, Gadi Taubenfeld: Sequentially Consistent versus Linearizable Counting Networks. PODC 1999: 133-142 |
53 | EE | Dahlia Malkhi, Michael Merritt, Ohad Rodeh: Secure Multicast in a WAN CoRR cs.CR/9908008: (1999) |
52 | EE | Michael Merritt: Introduction. Distributed Computing 12(2-3): 55-56 (1999) |
51 | Robert P. Kurshan, Michael Merritt, Ariel Orda, Sonia R. Sachs: Modelling Asynchrony with a Synchronous Model. Formal Methods in System Design 15(3): 175-199 (1999) | |
50 | Yehuda Afek, Michael Merritt, Gadi Taubenfeld: The Power of Multiobjects. Inf. Comput. 153(1): 117-138 (1999) | |
1998 | ||
49 | EE | Michael Merritt, Gadi Taubenfeld: Fairness of Shared Objects. DISC 1998: 303-317 |
1997 | ||
48 | Dahlia Malkhi, Michael Merritt, Ohad Rodeh: Secure Reliable Multicast Protocols in a WAN. ICDCS 1997: 0- | |
47 | Yehuda Afek, Michael Merritt, Gadi Taubenfeld, Dan Touitou: Disentangling Multi-Object Operations (Extended Abstract). PODC 1997: 111-120 | |
46 | Michael Merritt, Ariel Orda, Sonia R. Sachs: Formal Verification of a Distributed Computer System. Formal Methods in System Design 10(1): 93-125 (1997) | |
45 | EE | Ariel Orda, Michael Merritt: Efficient Test & Set Constructions for Faulty Shared Memory. Inf. Process. Lett. 62(1): 41-46 (1997) |
1996 | ||
44 | Yehuda Afek, Michael Merritt, Gadi Taubenfeld: The Power of Multi-objects (Extended Abstract). PODC 1996: 213-222 | |
1995 | ||
43 | Robert P. Kurshan, Michael Merritt, Ariel Orda, Sonia R. Sachs: Modelling Asynchrony with a Synchronous Model. CAV 1995: 339-352 | |
42 | EE | Yehuda Afek, David S. Greenberg, Michael Merritt, Gadi Taubenfeld: Computing With Faulty Shared Objects. J. ACM 42(6): 1231-1274 (1995) |
1994 | ||
41 | EE | Yehuda Afek, Danny Dolev, Eli Gafni, Michael Merritt, Nir Shavit: A Bounded First-In, First-Enabled Solution to the l-Exclusion Problem. ACM Trans. Program. Lang. Syst. 16(3): 939-953 (1994) |
40 | Michael Merritt, Gadi Taubenfeld: Atomic m-Register Operations. Distributed Computing 7(4): 213-221 (1994) | |
39 | Robert P. Kurshan, Michael Merritt, Ariel Orda, Sonia R. Sachs: A Structural Linearization Principle for Processes. Formal Methods in System Design 5(3): 227-244 (1994) | |
38 | Steven M. Bellovin, Michael Merritt: An attack on the Interlock Protocol when used for authentication. IEEE Transactions on Information Theory 40(1): 273- (1994) | |
1993 | ||
37 | Nancy A. Lynch, Michael Merritt, William E. Weihl, Alan Fekete: Atomic Transactions Morgan Kaufmann 1993 | |
36 | EE | Steven M. Bellovin, Michael Merritt: Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM Conference on Computer and Communications Security 1993: 244-250 |
35 | Robert P. Kurshan, Michael Merritt, Ariel Orda, Sonia R. Sachs: A Structural Linearization Principle for Processes. CAV 1993: 491-504 | |
34 | Yehuda Afek, Michael Merritt, Gadi Taubenfeld: Benign Failure Models for Shared Memory (Preliminary Version). WDAG 1993: 69-83 | |
33 | EE | Yehuda Afek, Geoffrey M. Brown, Michael Merritt: Lazy Caching. ACM Trans. Program. Lang. Syst. 15(1): 182-205 (1993) |
32 | Michael Merritt, Gadi Taubenfeld: Knowledge in Shared Memory Systems. Distributed Computing 7(2): 99-109 (1993) | |
31 | Michael Merritt, Gadi Taubenfeld: Speeding Lamport's Fast Mutual Exclusion Algorithm. Inf. Process. Lett. 45(3): 137-142 (1993) | |
30 | EE | Yehuda Afek, Hagit Attiya, Danny Dolev, Eli Gafni, Michael Merritt, Nir Shavit: Atomic Snapshots of Shared Memory. J. ACM 40(4): 873-890 (1993) |
1992 | ||
29 | Yehuda Afek, David S. Greenberg, Michael Merritt, Gadi Taubenfeld: Computing with Faulty Shared Memory (Extended Abstract). PODC 1992: 47-58 | |
28 | EE | Phillip B. Gibbons, Michael Merritt: Specifying Non-Blocking Shared Memories (Extended Abstract). SPAA 1992: 306-315 |
27 | EE | Maurice Herlihy, Nancy A. Lynch, Michael Merritt, William E. Weihl: On the Correctness of Orphan Management Algorithms. J. ACM 39(4): 881-930 (1992) |
1991 | ||
26 | Michael Merritt, Francesmary Modugno, Marc R. Tuttle: Time-Constrained Automata (Extended Abstract) CONCUR 1991: 408-423 | |
25 | Michael Merritt, Gadi Taubenfeld: Knowledge in Shared Memory Systems (Preliminary Version). PODC 1991: 189-200 | |
24 | EE | Phillip B. Gibbons, Michael Merritt, Kourosh Gharachorloo: Proving Sequential Consistency of High-Performance Shared Memories (Extended Abstract). SPAA 1991: 292-303 |
23 | Steven M. Bellovin, Michael Merritt: Limitations of the Kerberos Authentication System. USENIX Winter 1991: 253-268 | |
22 | Michael Merritt, Gadi Taubenfeld: Atomic m-Register Operations (Extended Abstract). WDAG 1991: 289-294 | |
1990 | ||
21 | EE | Yehuda Afek, Danny Dolev, Hagit Attiya, Eli Gafni, Michael Merritt, Nir Shavit: Atomic Snapshots of Shared Memory. PODC 1990: 1-13 |
20 | Alan Fekete, Nancy A. Lynch, Michael Merritt, William E. Weihl: Commutativity-Based Locking for Nested Transactions. J. Comput. Syst. Sci. 41(1): 65-156 (1990) | |
1989 | ||
19 | EE | Alan Fekete, Nancy A. Lynch, Michael Merritt, William E. Weihl: Commutativity-Based Locking for Nested Transactions. POS 1989: 319-340 |
18 | Michael Merritt: Completeness Theorems for Automata. REX Workshop 1989: 544-560 | |
17 | EE | Yehuda Afek, Geoffrey M. Brown, Michael Merritt: A Lazy Cache Algorithm. SPAA 1989: 209-222 |
16 | EE | Benny Chor, Michael Merritt, David B. Shmoys: Simple constant-time consensus protocols in realistic failure models. J. ACM 36(3): 591-614 (1989) |
1988 | ||
15 | EE | Nancy A. Lynch, Michael Merritt, William E. Weihl, Alan Fekete: A Theory of Atomic Transactions. ICDT 1988: 41-71 |
14 | EE | James Aspnes, Alan Fekete, Nancy A. Lynch, Michael Merritt, William E. Weihl: A Theory of Timestamp-Based Concurrency Control for Nested Transactions. VLDB 1988: 431-444 |
13 | Nancy A. Lynch, Michael Merritt: Introduction to the Theory of Nested Transactions. Theor. Comput. Sci. 62(1-2): 123-185 (1988) | |
1987 | ||
12 | EE | Alan Fekete, Nancy A. Lynch, Michael Merritt, William E. Weihl: Nested Transactions and Read/Write Locking. PODS 1987: 97-111 |
1986 | ||
11 | Michael J. Fischer, Nancy A. Lynch, Michael Merritt: Easy Impossibility Proofs for Distributed Consensus Problems. Fault-Tolerant Distributed Computing 1986: 147-170 | |
10 | EE | Nancy A. Lynch, Michael Merritt: Introduction to the Theory of Nested Transactions. ICDT 1986: 278-305 |
9 | Michael J. Fischer, Nancy A. Lynch, Michael Merritt: Easy Impossibility Proofs for Distributed Consensus Problems. Distributed Computing 1(1): 26-39 (1986) | |
1985 | ||
8 | Benny Chor, Michael Merritt, David B. Shmoys: Simple Constant-Time Consensus Protocols in Realistic Failure Models (Extended Abstract). PODC 1985: 152-162 | |
7 | Michael J. Fischer, Nancy A. Lynch, Michael Merritt: Easy Impossibility Proofs for Distributed Consensus Problems. PODC 1985: 59-70 | |
1984 | ||
6 | EE | Steven Fortune, Michael Merritt: Poker Protocols. CRYPTO 1984: 454-464 |
5 | Michael Merritt: Elections in the Presence of Faults. PODC 1984: 134-142 | |
4 | Don P. Mitchell, Michael Merritt: A Distributed Algorithm for Deadlock Detection and Resolution. PODC 1984: 282-284 | |
1982 | ||
3 | Michael Merritt: Key Reconstruction. CRYPTO 1982: 321-322 | |
2 | Richard A. DeMillo, Nancy A. Lynch, Michael Merritt: Cryptographic Protocols STOC 1982: 383-400 | |
1981 | ||
1 | Richard A. DeMillo, Nancy A. Lynch, Michael Merritt: The Design and Analysis of Cryptographic Protocols. CRYPTO 1981: 71-72 |