Login / Signup

Safe replication through bounded concurrency verification.

Gowtham KakiKapil EarankyK. C. SivaramakrishnanSuresh Jagannathan
Published in: Proc. ACM Program. Lang. (2018)
Keyphrases