default search action
Fred B. Schneider
Person information
- affiliation: Cornell University, Ithaca, USA
- award (2012): IEEE Emanuel R. Piore Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c64]Yunhe Liu, Nate Foster, Fred B. Schneider:
Causal network telemetry. EuroP4@CoNEXT 2022: 46-52 - [p3]Fred B. Schneider:
Evoking Whitehead's Dictum. Edsger Wybe Dijkstra 2022: 445-454 - 2021
- [j81]Eric Grosse, Fred B. Schneider, Lynette I. Millett:
Implementing insider defenses. Commun. ACM 64(5): 60-65 (2021) - [c63]Leslie Lamport, Fred B. Schneider:
Verifying Hyperproperties With TLA. CSF 2021: 1-16 - 2020
- [j80]Elisavet Kozyri, Fred B. Schneider:
RIF: Reactive information flow labels. J. Comput. Secur. 28(2): 191-228 (2020)
2010 – 2019
- 2019
- [c62]Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider:
JRIF: Reactive Information Flow Control for Java. Foundations of Security, Protocols, and Equational Reasoning 2019: 70-88 - [c61]Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais, Nadia Tawbi:
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. CSF 2019: 351-366 - [c60]Eugene Bagdasaryan, Griffin Berlstein, Jason Waterman, Eleanor Birrell, Nate Foster, Fred B. Schneider, Deborah Estrin:
Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy. WPES@CCS 2019: 111-124 - 2018
- [j79]Fred B. Schneider:
Impediments with policy interventions to foster cybersecurity. Commun. ACM 61(3): 36-38 (2018) - [j78]Fred B. Schneider:
Putting trust in security engineering. Commun. ACM 61(5): 37-39 (2018) - [j77]Fred B. Schneider:
History and Context for Defining Liveness: Winner 2018 Edsger W. Dijkstra Prize. SIGACT News 49(4): 60-63 (2018) - [c59]Eleanor Birrell, Anders T. Gjerdrum, Robbert van Renesse, Håvard D. Johansen, Dag Johansen, Fred B. Schneider:
SGX Enforcement of Use-Based Privacy. WPES@CCS 2018: 155-167 - 2017
- [j76]Fred B. Schneider:
Technical Perspective: IronFleet simplifies proving safety and liveness properties. Commun. ACM 60(7): 82 (2017) - 2015
- [j75]Michael R. Clarkson, Fred B. Schneider:
Quantification of integrity. Math. Struct. Comput. Sci. 25(2): 207-258 (2015) - [j74]Robbert van Renesse, Nicolas Schiper, Fred B. Schneider:
Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab. IEEE Trans. Dependable Secur. Comput. 12(4): 472-484 (2015) - [j73]Åge Kvalnes, Dag Johansen, Robbert van Renesse, Fred B. Schneider, Steffen Viken Valvåg:
Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling. IEEE Trans. Parallel Distributed Syst. 26(10): 2849-2862 (2015) - [c58]Håvard D. Johansen, Eleanor Birrell, Robbert van Renesse, Fred B. Schneider, Magnus Stenhaug, Dag Johansen:
Enforcing Privacy Policies with Meta-Code. APSys 2015: 16:1-16:7 - 2014
- [c57]Mário S. Alvim, Andre Scedrov, Fred B. Schneider:
When Not All Bits Are Equal: Worth-Based Information Flow. POST 2014: 120-139 - 2013
- [j72]Fred B. Schneider:
Breaking-in Research. IEEE Secur. Priv. 11(2): 3-4 (2013) - [j71]Fred B. Schneider:
Cybersecurity Education in Universities. IEEE Secur. Priv. 11(4): 3-4 (2013) - [j70]Eleanor Birrell, Fred B. Schneider:
Federated Identity Management Systems: A Privacy-Based Characterization. IEEE Secur. Priv. 11(5): 36-48 (2013) - [c56]Fred B. Schneider:
Programming languages in security: keynote. PLDI 2013: 139-140 - [i2]Robbert van Renesse, Nicolas Schiper, Fred B. Schneider:
Vive la Différence: Paxos vs. Viewstamped Replication vs. Zab. CoRR abs/1309.5671 (2013) - 2012
- [j69]Tom Roeder, Rafael Pass, Fred B. Schneider:
Multi-Verifier Signatures. J. Cryptol. 25(2): 310-348 (2012) - 2011
- [j68]Fred B. Schneider, Deirdre K. Mulligan:
A Doctrinal Thesis. IEEE Secur. Priv. 9(4): 3-4 (2011) - [j67]Fred B. Schneider, Kevin Walsh, Emin Gün Sirer:
Nexus authorization logic (NAL): Design rationale and applications. ACM Trans. Inf. Syst. Secur. 14(1): 8:1-8:28 (2011) - [c55]Fred B. Schneider:
Beyond Traces and Independence. Dependable and Historic Computing 2011: 479-485 - [c54]Alan Shieh, Emin Gün Sirer, Fred B. Schneider:
NetQuery: a knowledge plane for reasoning about network properties. SIGCOMM 2011: 278-289 - [c53]Emin Gün Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, Fred B. Schneider:
Logical attestation: an authorization architecture for trustworthy computing. SOSP 2011: 249-264 - [i1]Robbert van Renesse, Fred B. Schneider, Johannes Gehrke:
Nerio: Leader Election and Edict Ordering. CoRR abs/1109.5111 (2011) - 2010
- [j66]Fred B. Schneider:
Fumbling the Future, Again. IEEE Secur. Priv. 8(4): 3 (2010) - [j65]Riccardo Pucella, Fred B. Schneider:
Independence from obfuscation: A semantic framework for diversity. J. Comput. Secur. 18(5): 701-749 (2010) - [j64]Michael R. Clarkson, Fred B. Schneider:
Hyperproperties. J. Comput. Secur. 18(6): 1157-1210 (2010) - [j63]Tom Roeder, Fred B. Schneider:
Proactive obfuscation. ACM Trans. Comput. Syst. 28(2): 4:1-4:54 (2010) - [c52]Alan Shieh, Emin Gün Sirer, Fred B. Schneider:
NetQuery: a knowledge plane for reasoning about network properties. StudentWorkshop@CoNEXT 2010: 23:1-23:2 - [c51]Michael R. Clarkson, Fred B. Schneider:
Quantification of Integrity. CSF 2010: 28-43 - [c50]Fred B. Schneider:
Beyond hacking: an SOS! ICSE (1) 2010: 2 - [c49]Fred B. Schneider, Lidong Zhou:
Implementing Trustworthy Services Using Replicated State Machines. Replication 2010: 151-167
2000 – 2009
- 2009
- [j62]Ken Birman, Fred B. Schneider:
Viewpoint - Program committee overload in systems. Commun. ACM 52(5): 34-37 (2009) - [j61]Jaynarayan H. Lala, Fred B. Schneider:
IT Monoculture Security Risks and Defenses. IEEE Secur. Priv. 7(1): 12-13 (2009) - [j60]Kenneth P. Birman, Fred B. Schneider:
The Monoculture Risk Put into Context. IEEE Secur. Priv. 7(1): 14-17 (2009) - [j59]Fred B. Schneider:
Accountability for Perfection. IEEE Secur. Priv. 7(2): 3-4 (2009) - [j58]Fred B. Schneider:
Labeling-in Security. IEEE Secur. Priv. 7(6): 3 (2009) - [j57]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Quantifying information flow with beliefs. J. Comput. Secur. 17(5): 655-701 (2009) - 2008
- [j56]Fred B. Schneider:
Network Neutrality versus Internet Trustworthiness? IEEE Secur. Priv. 6(4): 3-4 (2008) - [c48]Michael R. Clarkson, Fred B. Schneider:
Hyperproperties. CSF 2008: 51-65 - [c47]Yee Jiun Song, Robbert van Renesse, Fred B. Schneider, Danny Dolev:
The Building Blocks of Consensus. ICDCN 2008: 54-72 - [c46]Dan Williams, Patrick Reynolds, Kevin Walsh, Emin Gün Sirer, Fred B. Schneider:
Device Driver Safety Through a Reference Validation Mechanism. OSDI 2008: 241-254 - 2007
- [j55]Fred B. Schneider:
Trusted Computing in Context. IEEE Secur. Priv. 5(2): 4-5 (2007) - [j54]Fred B. Schneider:
Technology Scapegoats and Policy Saviors. IEEE Secur. Priv. 5(5): 3-4 (2007) - [c45]Fred B. Schneider:
Mapping the Security Landscape: A Role for Language Techniques. CONCUR 2007: 1 - [c44]Fred B. Schneider:
Credentials-Based Authorization: Evaluation and Implementation. ICALP 2007: 12-14 - 2006
- [j53]Fred B. Schneider:
Here Be Dragons. IEEE Secur. Priv. 4(3): 3 (2006) - [j52]Kevin W. Hamlen, J. Gregory Morrisett, Fred B. Schneider:
Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1): 175-205 (2006) - [c43]Riccardo Pucella, Fred B. Schneider:
Independence From Obfuscation: A Semantic Framework for Dive. CSFW 2006: 230-241 - [c42]Kevin W. Hamlen, Greg Morrisett, Fred B. Schneider:
Certified In-lined Reference Monitoring on .NET. PLAS 2006: 7-16 - 2005
- [j51]Scott D. Stoller, Fred B. Schneider:
Automated Analysis of Fault-Tolerance in Distributed Systems. Formal Methods Syst. Des. 26(2): 183-196 (2005) - [j50]Fred B. Schneider:
It Depends on What You Pay. IEEE Secur. Priv. 3(3): 3 (2005) - [j49]Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider:
Overview of Cyber Security: A Crisis of Prioritization. IEEE Secur. Priv. 3(3): 9-11 (2005) - [j48]Fred B. Schneider, Lidong Zhou:
Implementing Trustworthy Services Using Replicated State Machines. IEEE Secur. Priv. 3(5): 34-43 (2005) - [j47]Lidong Zhou, Fred B. Schneider, Robbert van Renesse:
APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8(3): 259-286 (2005) - [c41]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Belief in Information Flow. CSFW 2005: 31-45 - [c40]Lidong Zhou, Michael A. Marsh, Fred B. Schneider, Anna Redz:
Distributed Blinding for Distributed ElGamal Re-Encryption. ICDCS 2005: 815-824 - [c39]Alan Shieh, Dan Williams, Emin Gün Sirer, Fred B. Schneider:
Nexus: a new operating system for trustworthy computing. SOSP 2005: 1-2 - 2004
- [j46]Fred B. Schneider:
From the Editors: The Next Digital Divide. IEEE Secur. Priv. 2(1): 5 (2004) - [j45]Fred B. Schneider:
Time Out for Station Identification. IEEE Secur. Priv. 2(5): 5 (2004) - [j44]Michael A. Marsh, Fred B. Schneider:
CODEX: A Robust and Secure Secret Distribution System. IEEE Trans. Dependable Secur. Comput. 1(1): 34-47 (2004) - [c38]William K. Josephson, Emin Gün Sirer, Fred B. Schneider:
Peer-to-Peer Authentication with a Distributed Single Sign-On Service. IPTPS 2004: 250-258 - [c37]Robbert van Renesse, Fred B. Schneider:
Chain Replication for Supporting High Throughput and Availability. OSDI 2004: 91-104 - 2003
- [j43]Yaron Minsky, Fred B. Schneider:
Tolerating malicious gossip. Distributed Comput. 16(1): 49-68 (2003) - [j42]Fred B. Schneider:
Least Privilege and More. IEEE Secur. Priv. 1(5): 55-59 (2003) - [c36]Dag Johansen, Robbert van Renesse, Fred B. Schneider:
WAIF: Web of Asynchronous Information Filters. Future Directions in Distributed Computing 2003: 81-86 - 2002
- [j41]Fred B. Schneider:
Secure systems conundrum. Commun. ACM 45(10): 160 (2002) - [j40]Dag Johansen, Kåre J. Lauvset, Robbert van Renesse, Fred B. Schneider, Nils P. Sudmann, Kjetil Jacobsen:
A TACOMA retrospective. Softw. Pract. Exp. 32(6): 605-619 (2002) - [j39]Lidong Zhou, Fred B. Schneider, Robbert van Renesse:
COCA: A secure distributed online certification authority. ACM Trans. Comput. Syst. 20(4): 329-368 (2002) - [c35]Fred B. Schneider:
Lifting Reference Monitors from the Kernel. FASec 2002: 1-2 - 2001
- [c34]Fred B. Schneider, J. Gregory Morrisett, Robert Harper:
A Language-Based Approach to Security. Informatics 2001: 86-101 - [c33]Fred B. Schneider:
Language-Based Security: What's Needed and Why. SAS 2001: 374 - 2000
- [j38]Dejan S. Milojicic, Fred B. Schneider:
Interview - Fred B. Schneider on Distributed Computing. IEEE Distributed Syst. Online 1(1) (2000) - [j37]Fred B. Schneider:
Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1): 30-50 (2000) - [c32]Fred B. Schneider:
Open Source in Security: Visiting the Bizarre. S&P 2000: 126-127 - [c31]Úlfar Erlingsson, Fred B. Schneider:
IRM Enforcement of Java Stack Inspection. S&P 2000: 246-255
1990 – 1999
- 1999
- [j36]Fred B. Schneider, Steven M. Bellovin:
Evolving Telephone Networks. Commun. ACM 42(1): 160 (1999) - [j35]Fred B. Schneider, Steven M. Bellovin, Alan S. Inouye:
Building Trustworthy Systems: Lessons from the PTN and Internet. IEEE Internet Comput. 3(6): 64-72 (1999) - [c30]Dag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, Dmitrii Zagorodnov:
NAP: Practical Fault-Tolerance for Itinerant Computations. ICDCS 1999: 180-189 - [c29]Úlfar Erlingsson, Fred B. Schneider:
SASI enforcement of security policies: a retrospective. NSPW 1999: 87-95 - 1998
- [j34]Fred B. Schneider:
On Concurrent Programming. Commun. ACM 41(4): 128 (1998) - [j33]Fred B. Schneider:
Toward Trustworthy Networked Information Systems. Commun. ACM 41(11): 144 (1998) - [j32]Fred B. Schneider, Reinhard Möller:
On Concurrent Programming [Book Review]. IEEE Concurr. 6(1): 85-86 (1998) - [j31]David Gries, Fred B. Schneider:
Adding the Everywhere Operator to Propositional Logic. J. Log. Comput. 8(1): 119-129 (1998) - [c28]Scott D. Stoller, Fred B. Schneider:
Automated Stream-Based Analysis of Fault-Tolerance. FTRTFT 1998: 113-122 - 1997
- [b2]Fred B. Schneider:
On Concurrent Programming. Graduate Texts in Computer Science, Springer 1997, ISBN 978-1-4612-7303-5, pp. i-xix, 473 - [j30]Danny Dolev, Rüdiger Reischuk, Fred B. Schneider, H. Raymond Strong:
Report Dagstuhl Seminar on Time Services, Schloß Dagstuhl, March 11-15, 1996. Real Time Syst. 12(3): 329-345 (1997) - [c27]Fred B. Schneider:
Towards Fault-Tolerant and Secure Agentry. WDAG 1997: 1-14 - 1996
- [j29]Thomas C. Bressoud, Fred B. Schneider:
Hypervisor-Based Fault Tolerance. ACM Trans. Comput. Syst. 14(1): 80-107 (1996) - [c26]Fred B. Schneider:
On traditions in Marktoberdorf. NATO ASI DPD 1996: 1-4 - [c25]Fred B. Schneider:
Notes on proof outline logic. NATO ASI DPD 1996: 351-394 - [c24]Dag Johansen, Robbert van Renesse, Fred B. Schneider:
Supporting broad internet access to TACOMA. ACM SIGOPS European Workshop 1996: 55-58 - [c23]Yaron Minsky, Robbert van Renesse, Fred B. Schneider, Scott D. Stoller:
Cryptographic support for fault-tolerant distributed computing. ACM SIGOPS European Workshop 1996: 109-114 - 1995
- [j28]David Gries, Fred B. Schneider:
Equational Propositional Logic. Inf. Process. Lett. 53(3): 145-152 (1995) - [j27]Scott D. Stoller, Fred B. Schneider:
Verifying Programs That Use Causally-Ordered Message-Passing. Sci. Comput. Program. 24(2): 105-128 (1995) - [c22]Dag Johansen, Robbert van Renesse, Fred B. Schneider:
Operating system support for mobile agents. HotOS 1995: 42-45 - [c21]David Gries, Fred B. Schneider, Joan Krone, J. Stanley Warford, J. Peter Weston:
Teaching as a logic tool (abstract). SIGCSE 1995: 384-385 - [c20]Thomas C. Bressoud, Fred B. Schneider:
Hypervisor-based Fault-tolerance. SOSP 1995: 1-11 - [c19]Scott D. Stoller, Fred B. Schneider:
Faster Possibility Detection by Combining Two Approaches. WDAG 1995: 318-332 - [p2]David Gries, Fred B. Schneider:
Avoiding the Undefined by Underspecification. Computer Science Today 1995: 366-373 - 1994
- [c18]David Gries, Fred B. Schneider:
Teaching Logic as a Tool. CSEE 1994: 599-599 - [c17]Limor Fix, Fred B. Schneider:
Hybrid Verification by Exploiting the Environment. FTRTFT 1994: 1-18 - [c16]Limor Fix, Fred B. Schneider:
Reasoning about Programs by Exploiting the Environment. ICALP 1994: 328-339 - 1993
- [b1]David Gries, Fred B. Schneider:
A Logical Approach to Discrete Math. Texts and Monographs in Computer Science, Springer 1993, ISBN 0-387-94115-0 - [j26]Nils Klarlund, Fred B. Schneider:
Proving Nondeterministically Specified Safety Properties Using Progress Measures. Inf. Comput. 107(1): 151-170 (1993) - [j25]Özalp Babaoglu, Keith Marzullo, Fred B. Schneider:
A Formalization of Priority Inversion. Real Time Syst. 5(4): 285-303 (1993) - 1992
- [j24]Fred B. Schneider:
Introduction. Distributed Comput. 6(1): 1-3 (1992) - [j23]Jennifer Widom, David Gries, Fred B. Schneider:
Trace-Based Network Proof Systems: Expressiveness and Completeness. ACM Trans. Program. Lang. Syst. 14(3): 396-416 (1992) - [c15]Navin Budhiraja, Keith Marzullo, Fred B. Schneider, Sam Toueg:
Optimal Primary-Backup Protocols. WDAG 1992: 362-378 - 1991
- [j22]Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider:
Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View". Inf. Process. Lett. 40(3): 141-142 (1991) - [c14]Fred B. Schneider, Bard Bloom, Keith Marzullo:
Putting Time into Proof Outlines. REX Workshop 1991: 618-639 - 1990
- [j21]Fred B. Schneider:
Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. ACM Comput. Surv. 22(4): 299-319 (1990)
1980 – 1989
- 1989
- [j20]Bowen Alpern, Fred B. Schneider:
Verifying Temporal Properties without Temporal Logic. ACM Trans. Program. Lang. Syst. 11(1): 147-167 (1989) - 1988
- [j19]Fred B. Schneider, Leslie Lamport:
On E. W. Dijkstra's position paper on "fairness: ". ACM SIGSOFT Softw. Eng. Notes 13(3): 18-19 (1988) - 1987
- [j18]Bowen Alpern, Fred B. Schneider:
Recognizing Safety and Liveness. Distributed Comput. 2(3): 117-126 (1987) - [c13]Bowen Alpern, Fred B. Schneider:
Proving Boolean Combinations of Deterministic Properties. LICS 1987: 131-137 - [c12]Jennifer Widom, David Gries, Fred B. Schneider:
Completeness and Incompleteness of Trace-Based Network Proof Systems. POPL 1987: 27-38 - [e2]Fred B. Schneider:
Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, Vancouver, British Columbia, Canada, August 10-12, 1987. ACM 1987, ISBN 0-89791-239-X [contents] - 1986
- [j17]Bowen Alpern, Alan J. Demers, Fred B. Schneider:
Safety Without Stuttering. Inf. Process. Lett. 23(4): 177-180 (1986) - [j16]Robert McCurley, Fred B. Schneider:
Derivation of a Distributed Algorithm for Finding Paths in Directed Networks. Sci. Comput. Program. 6(1): 1-9 (1986) - [c11]Fred B. Schneider:
The State Machine Approach: A Tutorial. Fault-Tolerant Distributed Computing 1986: 18-41 - [c10]Fred B. Schneider:
Abstractions for Fault Tolerance in Distributed Systems (Invited Paper). IFIP Congress 1986: 727-734 - [p1]Fred B. Schneider, Gregory R. Andrews:
Concepts for Concurrent Programming. Current Trends in Concurrency 1986: 669-716 - 1985
- [j15]Fred B. Schneider, Richard Conway, Dale Skeen:
Thrifty Execution of Task Pipelines. Acta Informatica 22(1): 35-45 (1985) - [j14]Bowen Alpern, Fred B. Schneider:
Defining Liveness. Inf. Process. Lett. 21(4): 181-185 (1985) - [c9]Ralph E. Johnson, Fred B. Schneider:
Symmetry and Similarity in Distributed Systems. PODC 1985: 13-22 - [c8]Stephen R. Mahaney, Fred B. Schneider:
Inexact Agreement: Accuracy, Precision, and Graceful Degradation. PODC 1985: 237-249 - [c7]Leslie Lamport, Fred B. Schneider:
Constraints: A Uniform Approach to Aliasing and Typing. POPL 1985: 205-216 - [e1]Mack W. Alford, Jean-Pierre Ansart, Günter Hommel, Leslie Lamport, Barbara Liskov, Geoff P. Mullery, Fred B. Schneider:
Distributed Systems: Methods and Tools for Specification, An Advanced Course, April 3-12, 1984 and April 16-25, 1985, Munich, Germany. Lecture Notes in Computer Science 190, Springer 1985, ISBN 3-540-15216-4 [contents] - 1984
- [j13]Fred B. Schneider, David Gries, Richard D. Schlichting:
Fault-Tolerant Broadcasts. Sci. Comput. Program. 4(1): 1-15 (1984) - [j12]Fred B. Schneider:
Byzantine Generals in Action: Implementing Fail-Stop Processors. ACM Trans. Comput. Syst. 2(2): 145-154 (1984) - [j11]James E. Archer Jr., Richard Conway, Fred B. Schneider:
User Recovery and Reversal in Interactive Systems. ACM Trans. Program. Lang. Syst. 6(1): 1-19 (1984) - [j10]Leslie Lamport, Fred B. Schneider:
The "Hoare Logic" of CSP, and All That. ACM Trans. Program. Lang. Syst. 6(2): 281-296 (1984) - [j9]Richard D. Schlichting, Fred B. Schneider:
Using Message Passing for Distributed Programming: Proof Rules, Disciplines. ACM Trans. Program. Lang. Syst. 6(3): 402-431 (1984) - [c6]Leslie Lamport, Fred B. Schneider:
Formal Foundation for Specification and Verification. Advanced Course: Distributed Systems 1984: 203-285 - [c5]Fred B. Schneider, Leslie Lamport:
Paradigms for Distributed Programs. Advanced Course: Distributed Systems 1984: 431-480 - 1983
- [j8]Gregory R. Andrews, Fred B. Schneider:
Concepts and Notations for Concurrent Programming. ACM Comput. Surv. 15(1): 3-43 (1983) - [j7]Bowen Alpern, Fred B. Schneider:
Key Exchange Using 'Keyless Cryptography'. Inf. Process. Lett. 16(2): 79-81 (1983) - [j6]Richard D. Schlichting, Fred B. Schneider:
Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems. ACM Trans. Comput. Syst. 1(3): 222-238 (1983) - 1982
- [j5]Fred B. Schneider:
Synchronization in Distributed Programs. ACM Trans. Program. Lang. Syst. 4(2): 125-148 (1982) - [c4]Richard D. Schlichting, Fred B. Schneider:
Understanding and Using Asynchronous Message Passing (Preliminary Version). PODC 1982: 141-147 - 1981
- [j4]Dorothy E. Denning, Fred B. Schneider:
Master Keys for Group Sharing. Inf. Process. Lett. 12(1): 23-25 (1981) - [j3]Dorothy E. Denning, Henk Meijer, Fred B. Schneider:
More on Master Keys for Group Sharing. Inf. Process. Lett. 13(3): 125-126 (1981) - 1980
- [c3]Fred B. Schneider:
Ensuring Consistency in a Distributed Database System by Use of Distributed Semaphores. DDB 1980: 183-189 - [c2]Dorothy E. Denning, Fred B. Schneider:
The Master Key Problem. S&P 1980: 103-107
1970 – 1979
- 1978
- [j2]Fred B. Schneider, Arthur J. Bernstein:
Scheduling in Concurrent Pascal. ACM SIGOPS Oper. Syst. Rev. 12(2): 15-20 (1978) - [j1]Eralp A. Akkoyunlu, Arthur J. Bernstein, Fred B. Schneider, Abraham Silberschatz:
Conditions for the Equivalence of Synchronous and Asynchronous Systems. IEEE Trans. Software Eng. 4(6): 507-516 (1978) - [c1]Arthur J. Bernstein, Fred B. Schneider:
On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems. Jerusalem Conference on Information Technology 1978: 537-541
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint