|
Search the dblp DataBase
Dahlia Malkhi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Danny Dolev, Roy Friedman, Idit Keidar, Dahlia Malkhi
Failure Detectors in Omission Failure Environments. [Citation Graph (1, 0)][DBLP] PODC, 1997, pp:286- [Conf]
- Dahlia Malkhi, Michael K. Reiter, Avishai Wool
The Load and Availability of Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP] PODC, 1997, pp:249-257 [Conf]
- Dahlia Malkhi, Michael K. Reiter
Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP] Distributed Computing, 1998, v:11, n:4, pp:203-213 [Journal]
- Gregory Chockler, Dahlia Malkhi, Danny Dolev
A Data-Centric Approach for Scalable State Machine Replication. [Citation Graph (0, 0)][DBLP] Future Directions in Distributed Computing, 2003, pp:159-163 [Conf]
- Dahlia Malkhi
Dynamic Lookup Networks. [Citation Graph (0, 0)][DBLP] Future Directions in Distributed Computing, 2003, pp:93-96 [Conf]
- Ittai Abraham, Dahlia Malkhi
Robust Locality-Aware Lookup Networks. [Citation Graph (0, 0)][DBLP] Self-star Properties in Complex Information Systems, 2005, pp:392-402 [Conf]
- Dahlia Malkhi, Michael K. Reiter
Unreliable Intrusion Detection in Distributed Computations. [Citation Graph (0, 0)][DBLP] CSFW, 1997, pp:116-125 [Conf]
- Zvi Gutterman, Dahlia Malkhi
Hold Your Sessions: An Attack on Java Session-Id Generation. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:44-57 [Conf]
- Ittai Abraham, Danny Dolev, Dahlia Malkhi
LLS: a locality aware location service for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] DIALM-POMC, 2004, pp:75-84 [Conf]
- Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
Dynamic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP] DSN, 2000, pp:283-0 [Conf]
- Dahlia Malkhi, Ofer Margo, Elan Pavlov
E-Voting Without 'Cryptography'. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:1-15 [Conf]
- Matthew K. Franklin, Dahlia Malkhi
Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1997, pp:151-160 [Conf]
- Dahlia Malkhi, Elan Pavlov
Anonymity without 'Cryptography'. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2001, pp:108-126 [Conf]
- Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
Scalable Secure Storage when Half the System Is Faulty. [Citation Graph (0, 0)][DBLP] ICALP, 2000, pp:576-587 [Conf]
- Ittai Abraham, Cyril Gavoille, Andrew V. Goldberg, Dahlia Malkhi
Routing in Networks with Low Doubling Dimension. [Citation Graph (0, 0)][DBLP] ICDCS, 2006, pp:75- [Conf]
- Gregory Chockler, Dahlia Malkhi, Michael K. Reiter
Backoff Protocols for Distributed Mutual Exclusion and Ordering. [Citation Graph (0, 0)][DBLP] ICDCS, 2001, pp:11-20 [Conf]
- Dahlia Malkhi, Michael Merritt, Ohad Rodeh
Secure Reliable Multicast Protocols in a WAN. [Citation Graph (0, 0)][DBLP] ICDCS, 1997, pp:0-0 [Conf]
- Ittai Abraham, Baruch Awerbuch, Yossi Azar, Yair Bartal, Dahlia Malkhi, Elan Pavlov
A Generic Scheme for Building Overlay Networks in Adversarial Scenarios. [Citation Graph (0, 0)][DBLP] IPDPS, 2003, pp:40- [Conf]
- Yaacov Fernandess, Dahlia Malkhi
On collaborative content distribution using multi-message gossip. [Citation Graph (0, 0)][DBLP] IPDPS, 2006, pp:- [Conf]
- Ittai Abraham, Ankur Badola, Danny Bickson, Dahlia Malkhi, Sharad Maloo, Saar Ron
Practical Locality-Awareness for Large Scale Information Sharing. [Citation Graph (0, 0)][DBLP] IPTPS, 2005, pp:173-181 [Conf]
- Nancy A. Lynch, Dahlia Malkhi, David Ratajczak
Atomic Data Access in Distributed Hash Tables. [Citation Graph (0, 0)][DBLP] IPTPS, 2002, pp:295-305 [Conf]
- Gregory Chockler, Dahlia Malkhi, Barak Merimovich, David Rabinowitz
Aquarius: A Data-Centric Approach to CORBA Fault-Tolerance. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2003, pp:885-898 [Conf]
- Ittai Abraham, Gregory Chockler, Idit Keidar, Dahlia Malkhi
Byzantine disk paxos: optimal resilience with byzantine shared memory. [Citation Graph (0, 0)][DBLP] PODC, 2004, pp:226-235 [Conf]
- Ittai Abraham, Dahlia Malkhi
Compact routing on euclidian metrics. [Citation Graph (0, 0)][DBLP] PODC, 2004, pp:141-149 [Conf]
- Gregory Chockler, Dahlia Malkhi
Active disk paxos with infinitely many processes. [Citation Graph (0, 0)][DBLP] PODC, 2002, pp:78-87 [Conf]
- Dahlia Malkhi, Moni Naor, David Ratajczak
Viceroy: a scalable and dynamic emulation of the butterfly. [Citation Graph (0, 0)][DBLP] PODC, 2002, pp:183-192 [Conf]
- Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP] PODC, 1997, pp:267-273 [Conf]
- Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
Probabilistic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP] PODC, 1998, pp:321- [Conf]
- Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter
On k-Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP] PODC, 1999, pp:257-265 [Conf]
- Yaacov Fernandess, Dahlia Malkhi
K-clustering in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP] POMC, 2002, pp:31-37 [Conf]
- Ittai Abraham, Dahlia Malkhi, Oren Dobzinski
LAND: stretch (1 + epsilon) locality-aware networks for DHTs. [Citation Graph (0, 0)][DBLP] SODA, 2004, pp:550-559 [Conf]
- Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
On space-stretch trade-offs: lower bounds. [Citation Graph (0, 0)][DBLP] SPAA, 2006, pp:207-216 [Conf]
- Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
On space-stretch trade-offs: upper bounds. [Citation Graph (0, 0)][DBLP] SPAA, 2006, pp:217-224 [Conf]
- Ittai Abraham, Cyril Gavoille, Dahlia Malkhi, Noam Nisan, Mikkel Thorup
Compact name-independent routing with minimum stretch. [Citation Graph (0, 0)][DBLP] SPAA, 2004, pp:20-24 [Conf]
- Ittai Abraham, Dahlia Malkhi
Name independent routing for growth bounded networks. [Citation Graph (0, 0)][DBLP] SPAA, 2005, pp:49-55 [Conf]
- Dahlia Malkhi
From Byzantine Agreement to Practical Survivability. [Citation Graph (0, 0)][DBLP] SRDS, 2002, pp:374-379 [Conf]
- Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
On Diffusing Updates in a Byzantine Environment. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1999, pp:134-143 [Conf]
- Dahlia Malkhi, Michael K. Reiter
Secure and Scalable Replication in Phalanx. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1998, pp:51-58 [Conf]
- Dahlia Malkhi, Michael K. Reiter
Survivable Consensus Objects. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1998, pp:271-279 [Conf]
- Dahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella
Efficient Update Diffusion in Byzantine Environments. [Citation Graph (0, 0)][DBLP] SRDS, 2001, pp:90-98 [Conf]
- Dahlia Malkhi, Michael K. Reiter
Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP] STOC, 1997, pp:569-578 [Conf]
- Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella
Fairplay - Secure Two-Party Computation System. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:287-302 [Conf]
- Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
Routing with Improved Communication-Space Trade-Off. [Citation Graph (0, 0)][DBLP] DISC, 2004, pp:305-319 [Conf]
- Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
Compact Routing for Graphs Excluding a Fixed Minor. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:442-456 [Conf]
- Ittai Abraham, Dahlia Malkhi
Probabilistic Quorums for Dynamic Systems. [Citation Graph (0, 0)][DBLP] DISC, 2003, pp:60-74 [Conf]
- Ittai Abraham, Dahlia Malkhi, Gurmeet Singh Manku
Papillon: Greedy Routing in Rings. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:514-515 [Conf]
- Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld
Objects Shared by Byzantine Processes. [Citation Graph (0, 0)][DBLP] DISC, 2000, pp:345-359 [Conf]
- Dahlia Malkhi, Florian Oprea, Lidong Zhou
Omega Meets Paxos: Leader Election and Stability Without Eventual Timely Links. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:199-213 [Conf]
- Dahlia Malkhi, Elan Pavlov, Yaron Sella
Optimal Unconditional Information Diffusion. [Citation Graph (0, 0)][DBLP] DISC, 2001, pp:63-77 [Conf]
- Dahlia Malkhi, Douglas B. Terry
Concise Version Vectors in WinFS. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:339-353 [Conf]
- Dahlia Malkhi, Michael Merritt, Ohad Rodeh
Secure Multicast in a WAN [Citation Graph (0, 0)][DBLP] CoRR, 1999, v:0, n:, pp:- [Journal]
- Dahlia Malkhi, Michael K. Reiter
Secure Execution of Java Applets using a Remote Playground [Citation Graph (0, 0)][DBLP] CoRR, 1999, v:0, n:, pp:- [Journal]
- Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
On Propagating Updates in a Byzantine Environment [Citation Graph (0, 0)][DBLP] CoRR, 1999, v:0, n:, pp:- [Journal]
- Dahlia Malkhi, Michael K. Reiter, Avishai Wool
The Load and Availability of Byzantine Quorum Systems [Citation Graph (0, 0)][DBLP] CoRR, 1999, v:0, n:, pp:- [Journal]
- Ittai Abraham, Gregory Chockler, Idit Keidar, Dahlia Malkhi
Byzantine disk paxos: optimal resilience with byzantine shared memory. [Citation Graph (0, 0)][DBLP] Distributed Computing, 2006, v:18, n:5, pp:387-408 [Journal]
- Ittai Abraham, Dahlia Malkhi
Probabilistic quorums for dynamic systems. [Citation Graph (0, 0)][DBLP] Distributed Computing, 2005, v:18, n:2, pp:113-124 [Journal]
- Gregory Chockler, Dahlia Malkhi
Active Disk Paxos with infinitely many processes. [Citation Graph (0, 0)][DBLP] Distributed Computing, 2005, v:18, n:1, pp:73-84 [Journal]
- Dahlia Malkhi, Michael Merritt, Ohad Rodeh
Secure Reliable Multicast Protocols in a WAN. [Citation Graph (0, 0)][DBLP] Distributed Computing, 2000, v:13, n:1, pp:19-28 [Journal]
- Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld
Objects shared by Byzantine processes. [Citation Graph (0, 0)][DBLP] Distributed Computing, 2003, v:16, n:1, pp:37-48 [Journal]
- Dahlia Malkhi
Locality-Aware Network Solutions - A survey (Column: Distributed Computing). [Citation Graph (0, 0)][DBLP] Bulletin of the EATCS, 2004, v:83, n:, pp:121-138 [Journal]
- Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
Scalable Secure Storage When Half the System Is Faulty. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2002, v:174, n:2, pp:203-213 [Journal]
- Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2001, v:170, n:2, pp:184-206 [Journal]
- Gregory Chockler, Dahlia Malkhi
Light-Weight Leases for Storage-Centric Coordination. [Citation Graph (0, 0)][DBLP] International Journal of Parallel Programming, 2006, v:34, n:2, pp:143-170 [Journal]
- Keren Horowitz, Dahlia Malkhi
Estimating network size from local information. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2003, v:88, n:5, pp:237-243 [Journal]
- Ittai Abraham, Gregory Chockler, Idit Keidar, Dahlia Malkhi
Wait-free regular storage from Byzantine components. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2007, v:101, n:2, pp:60-65 [Journal]
- Dahlia Malkhi, Michael K. Reiter
A High-Throughput Secure Reliable Multicast Protocol. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:2, pp:113-128 [Journal]
- Matthew K. Franklin, Dahlia Malkhi
Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1998, v:6, n:4, pp:237-256 [Journal]
- Dahlia Malkhi, Michael K. Reiter, Avishai Wool
The Load and Availability of Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2000, v:29, n:6, pp:1889-1906 [Journal]
- Dahlia Malkhi, Lev Novik, Chris Purcell
P2P replica synchronization with vector sets. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2007, v:41, n:2, pp:68-74 [Journal]
- Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
Diffusion without false rumors: on propagating updates in a Byzantine environment. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:1, n:299, pp:289-306 [Journal]
- Dahlia Malkhi, Michael K. Reiter
An Architecture for Survivable Coordination in Large Distributed Systems. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:187-202 [Journal]
- Lorenzo Alvisi, Dahlia Malkhi, Evelyn Tumlin Pierce, Michael K. Reiter
Fault Detection for Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:9, pp:996-1007 [Journal]
- Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter
On k-Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:1, pp:7-21 [Journal]
- Dahlia Malkhi, Michael K. Reiter
Secure Execution of Java Applets Using a Remote Playground. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 2000, v:26, n:12, pp:1197-1209 [Journal]
- Ittai Abraham, Mahesh Balakrishnan, Fabian Kuhn, Dahlia Malkhi, Venugopalan Ramasubramanian, Kunal Talwar
Reconstructing approximate tree metrics. [Citation Graph (0, 0)][DBLP] PODC, 2007, pp:43-52 [Conf]
- Ittai Abraham, Cyril Gavoille, Dahlia Malkhi, Udi Wieder
Strong-diameter decompositions of minor free graphs. [Citation Graph (0, 0)][DBLP] SPAA, 2007, pp:16-24 [Conf]
- Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou
Brief Announcement: Chasing the Weakest System Model for Implementing Omega and Consensus. [Citation Graph (0, 0)][DBLP] SSS, 2006, pp:576-577 [Conf]
- Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
Addendum to "Scalable secure storage when half the system is faulty" [Inform. Comput 174 (2)(2002) 203-213]. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2007, v:205, n:7, pp:1114-1116 [Journal]
RPC Chains: Efficient Client-Server Communication in Geodistributed Systems. [Citation Graph (, )][DBLP]
Peer-to-Peer Rating. [Citation Graph (, )][DBLP]
Efficient distributed approximation algorithms via probabilistic tree embeddings. [Citation Graph (, )][DBLP]
Vertical paxos and primary-backup replication. [Citation Graph (, )][DBLP]
Dynamic atomic storage without consensus. [Citation Graph (, )][DBLP]
On the treeness of internet latency and bandwidth. [Citation Graph (, )][DBLP]
Secure Execution of Java Applets using a Remote Playground. [Citation Graph (, )][DBLP]
On spreading recommendations via social gossip. [Citation Graph (, )][DBLP]
Compact Multicast Routing. [Citation Graph (, )][DBLP]
Virtual Ring Routing Trends. [Citation Graph (, )][DBLP]
Brief Announcement: Flash-Log - A High Throughput Log. [Citation Graph (, )][DBLP]
Fast Asynchronous Consensus with Optimal Resilience. [Citation Graph (, )][DBLP]
Differential RAID: rethinking RAID for SSD reliability. [Citation Graph (, )][DBLP]
Papillon: Greedy Routing in Rings [Citation Graph (, )][DBLP]
Concise version vectors in WinFS. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.457secs
|