The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dahlia Malkhi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Danny Dolev, Roy Friedman, Idit Keidar, Dahlia Malkhi
    Failure Detectors in Omission Failure Environments. [Citation Graph (1, 0)][DBLP]
    PODC, 1997, pp:286- [Conf]
  2. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP]
    PODC, 1997, pp:249-257 [Conf]
  3. Dahlia Malkhi, Michael K. Reiter
    Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP]
    Distributed Computing, 1998, v:11, n:4, pp:203-213 [Journal]
  4. Gregory Chockler, Dahlia Malkhi, Danny Dolev
    A Data-Centric Approach for Scalable State Machine Replication. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:159-163 [Conf]
  5. Dahlia Malkhi
    Dynamic Lookup Networks. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:93-96 [Conf]
  6. Ittai Abraham, Dahlia Malkhi
    Robust Locality-Aware Lookup Networks. [Citation Graph (0, 0)][DBLP]
    Self-star Properties in Complex Information Systems, 2005, pp:392-402 [Conf]
  7. Dahlia Malkhi, Michael K. Reiter
    Unreliable Intrusion Detection in Distributed Computations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:116-125 [Conf]
  8. Zvi Gutterman, Dahlia Malkhi
    Hold Your Sessions: An Attack on Java Session-Id Generation. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:44-57 [Conf]
  9. Ittai Abraham, Danny Dolev, Dahlia Malkhi
    LLS: a locality aware location service for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    DIALM-POMC, 2004, pp:75-84 [Conf]
  10. Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
    Dynamic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:283-0 [Conf]
  11. Dahlia Malkhi, Ofer Margo, Elan Pavlov
    E-Voting Without 'Cryptography'. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:1-15 [Conf]
  12. Matthew K. Franklin, Dahlia Malkhi
    Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:151-160 [Conf]
  13. Dahlia Malkhi, Elan Pavlov
    Anonymity without 'Cryptography'. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:108-126 [Conf]
  14. Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
    Scalable Secure Storage when Half the System Is Faulty. [Citation Graph (0, 0)][DBLP]
    ICALP, 2000, pp:576-587 [Conf]
  15. Ittai Abraham, Cyril Gavoille, Andrew V. Goldberg, Dahlia Malkhi
    Routing in Networks with Low Doubling Dimension. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:75- [Conf]
  16. Gregory Chockler, Dahlia Malkhi, Michael K. Reiter
    Backoff Protocols for Distributed Mutual Exclusion and Ordering. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:11-20 [Conf]
  17. Dahlia Malkhi, Michael Merritt, Ohad Rodeh
    Secure Reliable Multicast Protocols in a WAN. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1997, pp:0-0 [Conf]
  18. Ittai Abraham, Baruch Awerbuch, Yossi Azar, Yair Bartal, Dahlia Malkhi, Elan Pavlov
    A Generic Scheme for Building Overlay Networks in Adversarial Scenarios. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:40- [Conf]
  19. Yaacov Fernandess, Dahlia Malkhi
    On collaborative content distribution using multi-message gossip. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  20. Ittai Abraham, Ankur Badola, Danny Bickson, Dahlia Malkhi, Sharad Maloo, Saar Ron
    Practical Locality-Awareness for Large Scale Information Sharing. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2005, pp:173-181 [Conf]
  21. Nancy A. Lynch, Dahlia Malkhi, David Ratajczak
    Atomic Data Access in Distributed Hash Tables. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:295-305 [Conf]
  22. Gregory Chockler, Dahlia Malkhi, Barak Merimovich, David Rabinowitz
    Aquarius: A Data-Centric Approach to CORBA Fault-Tolerance. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:885-898 [Conf]
  23. Ittai Abraham, Gregory Chockler, Idit Keidar, Dahlia Malkhi
    Byzantine disk paxos: optimal resilience with byzantine shared memory. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:226-235 [Conf]
  24. Ittai Abraham, Dahlia Malkhi
    Compact routing on euclidian metrics. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:141-149 [Conf]
  25. Gregory Chockler, Dahlia Malkhi
    Active disk paxos with infinitely many processes. [Citation Graph (0, 0)][DBLP]
    PODC, 2002, pp:78-87 [Conf]
  26. Dahlia Malkhi, Moni Naor, David Ratajczak
    Viceroy: a scalable and dynamic emulation of the butterfly. [Citation Graph (0, 0)][DBLP]
    PODC, 2002, pp:183-192 [Conf]
  27. Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
    Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1997, pp:267-273 [Conf]
  28. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:321- [Conf]
  29. Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter
    On k-Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1999, pp:257-265 [Conf]
  30. Yaacov Fernandess, Dahlia Malkhi
    K-clustering in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    POMC, 2002, pp:31-37 [Conf]
  31. Ittai Abraham, Dahlia Malkhi, Oren Dobzinski
    LAND: stretch (1 + epsilon) locality-aware networks for DHTs. [Citation Graph (0, 0)][DBLP]
    SODA, 2004, pp:550-559 [Conf]
  32. Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
    On space-stretch trade-offs: lower bounds. [Citation Graph (0, 0)][DBLP]
    SPAA, 2006, pp:207-216 [Conf]
  33. Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
    On space-stretch trade-offs: upper bounds. [Citation Graph (0, 0)][DBLP]
    SPAA, 2006, pp:217-224 [Conf]
  34. Ittai Abraham, Cyril Gavoille, Dahlia Malkhi, Noam Nisan, Mikkel Thorup
    Compact name-independent routing with minimum stretch. [Citation Graph (0, 0)][DBLP]
    SPAA, 2004, pp:20-24 [Conf]
  35. Ittai Abraham, Dahlia Malkhi
    Name independent routing for growth bounded networks. [Citation Graph (0, 0)][DBLP]
    SPAA, 2005, pp:49-55 [Conf]
  36. Dahlia Malkhi
    From Byzantine Agreement to Practical Survivability. [Citation Graph (0, 0)][DBLP]
    SRDS, 2002, pp:374-379 [Conf]
  37. Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
    On Diffusing Updates in a Byzantine Environment. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:134-143 [Conf]
  38. Dahlia Malkhi, Michael K. Reiter
    Secure and Scalable Replication in Phalanx. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:51-58 [Conf]
  39. Dahlia Malkhi, Michael K. Reiter
    Survivable Consensus Objects. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:271-279 [Conf]
  40. Dahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella
    Efficient Update Diffusion in Byzantine Environments. [Citation Graph (0, 0)][DBLP]
    SRDS, 2001, pp:90-98 [Conf]
  41. Dahlia Malkhi, Michael K. Reiter
    Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    STOC, 1997, pp:569-578 [Conf]
  42. Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella
    Fairplay - Secure Two-Party Computation System. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:287-302 [Conf]
  43. Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
    Routing with Improved Communication-Space Trade-Off. [Citation Graph (0, 0)][DBLP]
    DISC, 2004, pp:305-319 [Conf]
  44. Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
    Compact Routing for Graphs Excluding a Fixed Minor. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:442-456 [Conf]
  45. Ittai Abraham, Dahlia Malkhi
    Probabilistic Quorums for Dynamic Systems. [Citation Graph (0, 0)][DBLP]
    DISC, 2003, pp:60-74 [Conf]
  46. Ittai Abraham, Dahlia Malkhi, Gurmeet Singh Manku
    Papillon: Greedy Routing in Rings. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:514-515 [Conf]
  47. Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld
    Objects Shared by Byzantine Processes. [Citation Graph (0, 0)][DBLP]
    DISC, 2000, pp:345-359 [Conf]
  48. Dahlia Malkhi, Florian Oprea, Lidong Zhou
    Omega Meets Paxos: Leader Election and Stability Without Eventual Timely Links. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:199-213 [Conf]
  49. Dahlia Malkhi, Elan Pavlov, Yaron Sella
    Optimal Unconditional Information Diffusion. [Citation Graph (0, 0)][DBLP]
    DISC, 2001, pp:63-77 [Conf]
  50. Dahlia Malkhi, Douglas B. Terry
    Concise Version Vectors in WinFS. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:339-353 [Conf]
  51. Dahlia Malkhi, Michael Merritt, Ohad Rodeh
    Secure Multicast in a WAN [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  52. Dahlia Malkhi, Michael K. Reiter
    Secure Execution of Java Applets using a Remote Playground [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  53. Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
    On Propagating Updates in a Byzantine Environment [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  54. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  55. Ittai Abraham, Gregory Chockler, Idit Keidar, Dahlia Malkhi
    Byzantine disk paxos: optimal resilience with byzantine shared memory. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2006, v:18, n:5, pp:387-408 [Journal]
  56. Ittai Abraham, Dahlia Malkhi
    Probabilistic quorums for dynamic systems. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:18, n:2, pp:113-124 [Journal]
  57. Gregory Chockler, Dahlia Malkhi
    Active Disk Paxos with infinitely many processes. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:18, n:1, pp:73-84 [Journal]
  58. Dahlia Malkhi, Michael Merritt, Ohad Rodeh
    Secure Reliable Multicast Protocols in a WAN. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2000, v:13, n:1, pp:19-28 [Journal]
  59. Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld
    Objects shared by Byzantine processes. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2003, v:16, n:1, pp:37-48 [Journal]
  60. Dahlia Malkhi
    Locality-Aware Network Solutions - A survey (Column: Distributed Computing). [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 2004, v:83, n:, pp:121-138 [Journal]
  61. Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
    Scalable Secure Storage When Half the System Is Faulty. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2002, v:174, n:2, pp:203-213 [Journal]
  62. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:170, n:2, pp:184-206 [Journal]
  63. Gregory Chockler, Dahlia Malkhi
    Light-Weight Leases for Storage-Centric Coordination. [Citation Graph (0, 0)][DBLP]
    International Journal of Parallel Programming, 2006, v:34, n:2, pp:143-170 [Journal]
  64. Keren Horowitz, Dahlia Malkhi
    Estimating network size from local information. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:88, n:5, pp:237-243 [Journal]
  65. Ittai Abraham, Gregory Chockler, Idit Keidar, Dahlia Malkhi
    Wait-free regular storage from Byzantine components. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2007, v:101, n:2, pp:60-65 [Journal]
  66. Dahlia Malkhi, Michael K. Reiter
    A High-Throughput Secure Reliable Multicast Protocol. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:2, pp:113-128 [Journal]
  67. Matthew K. Franklin, Dahlia Malkhi
    Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:4, pp:237-256 [Journal]
  68. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2000, v:29, n:6, pp:1889-1906 [Journal]
  69. Dahlia Malkhi, Lev Novik, Chris Purcell
    P2P replica synchronization with vector sets. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2007, v:41, n:2, pp:68-74 [Journal]
  70. Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
    Diffusion without false rumors: on propagating updates in a Byzantine environment. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:1, n:299, pp:289-306 [Journal]
  71. Dahlia Malkhi, Michael K. Reiter
    An Architecture for Survivable Coordination in Large Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:187-202 [Journal]
  72. Lorenzo Alvisi, Dahlia Malkhi, Evelyn Tumlin Pierce, Michael K. Reiter
    Fault Detection for Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:9, pp:996-1007 [Journal]
  73. Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter
    On k-Set Consensus Problems in Asynchronous Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:1, pp:7-21 [Journal]
  74. Dahlia Malkhi, Michael K. Reiter
    Secure Execution of Java Applets Using a Remote Playground. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:12, pp:1197-1209 [Journal]
  75. Ittai Abraham, Mahesh Balakrishnan, Fabian Kuhn, Dahlia Malkhi, Venugopalan Ramasubramanian, Kunal Talwar
    Reconstructing approximate tree metrics. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:43-52 [Conf]
  76. Ittai Abraham, Cyril Gavoille, Dahlia Malkhi, Udi Wieder
    Strong-diameter decompositions of minor free graphs. [Citation Graph (0, 0)][DBLP]
    SPAA, 2007, pp:16-24 [Conf]
  77. Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou
    Brief Announcement: Chasing the Weakest System Model for Implementing Omega and Consensus. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:576-577 [Conf]
  78. Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
    Addendum to "Scalable secure storage when half the system is faulty" [Inform. Comput 174 (2)(2002) 203-213]. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2007, v:205, n:7, pp:1114-1116 [Journal]

  79. RPC Chains: Efficient Client-Server Communication in Geodistributed Systems. [Citation Graph (, )][DBLP]


  80. Peer-to-Peer Rating. [Citation Graph (, )][DBLP]


  81. Efficient distributed approximation algorithms via probabilistic tree embeddings. [Citation Graph (, )][DBLP]


  82. Vertical paxos and primary-backup replication. [Citation Graph (, )][DBLP]


  83. Dynamic atomic storage without consensus. [Citation Graph (, )][DBLP]


  84. On the treeness of internet latency and bandwidth. [Citation Graph (, )][DBLP]


  85. Secure Execution of Java Applets using a Remote Playground. [Citation Graph (, )][DBLP]


  86. On spreading recommendations via social gossip. [Citation Graph (, )][DBLP]


  87. Compact Multicast Routing. [Citation Graph (, )][DBLP]


  88. Virtual Ring Routing Trends. [Citation Graph (, )][DBLP]


  89. Brief Announcement: Flash-Log - A High Throughput Log. [Citation Graph (, )][DBLP]


  90. Fast Asynchronous Consensus with Optimal Resilience. [Citation Graph (, )][DBLP]


  91. Differential RAID: rethinking RAID for SSD reliability. [Citation Graph (, )][DBLP]


  92. Papillon: Greedy Routing in Rings [Citation Graph (, )][DBLP]


  93. Concise version vectors in WinFS. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002