Ohad Shamir, Sivan Sabato, et al.
Theoretical Computer Science
The notion of a weak snapshot scan is introduced and a methodology for using this abstraction is proposed. Two examples of algorithms are presented whose performance is enhanced while retaining a simple modular structure: bounded concurrent time-stamping and bounded randomized consensus. The resulting time-stamping protocol dominates all other currently known time-stamping protocols.
Ohad Shamir, Sivan Sabato, et al.
Theoretical Computer Science
Ziyang Liu, Sivaramakrishnan Natarajan, et al.
VLDB
Thomas M. Cheng
IT Professional
Inbal Ronen, Elad Shahar, et al.
SIGIR 2009