Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Merritt is active.

Publication


Featured researches published by Michael Merritt.


ACM Transactions on Programming Languages and Systems | 1993

Lazy caching

Yehuda Afek; Geoffrey Brown; Michael Merritt

This paper examines cache consistency conditions for multiprocessor shared memory systems. It states and motivates a weaker condition than is normally implemented. An algorithm is presented that exploits the weaker condition to achieve greater concurrency. The algorithm is shown to satisfy the weak consistency condition. Other properties of the algorithm and possible extensions are discussed.


international conference on distributed computing systems | 1997

Secure reliable multicast protocols in a WAN

Dahlia Malkhi; Michael Merritt; Ohad Rodeh

Summary. A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the malicious efforts of fewer than a third of the total number of processes, including the sender. This has been shown to be a useful tool in building secure distributed services, albeit with a cost that typically grows linearly with the size of the system. For very large networks, for which this is prohibitive, we present two approaches for reducing the cost: First, we show a protocol whose cost is on the order of the number of tolerated failures. Secondly, we show how relaxing the consistency requirement to a probabilistic guarantee can reduce the associated cost, effectively to a constant.


formal methods | 1997

Formal Verification of a Distributed Computer System

Michael Merritt; Ariel Orda; Sonia R. Sachs

Modeling distributed computer systems is known to be a challenging enterprise. Typically, distributed systems are comprised of large numbers of components whose coordination may require complex interactions. Modeling such systems more often than not leads to the nominal intractability of the resulting state space. Various formal methods have been proposed to address the modeling of coordination among distributed systems components. For the most part, however, these methods do not support formal verification mechanisms. By way of contrast, the L-automata/L-processes model supports formal verification mechanisms which in many examples can successfully circumvent state space explosion problems, and allow verification proofs to be extended to an arbitrary number of components. After reviewing L-automata/L-processes formalisms, we present here the formal specification of a fault-tolerant algorithm for a distributed computer system. We also expose the L-automata/L-processes verification of the distributed system, demonstrating how various techniques such as homomorphic reduction, induction, and linearization, can be used to overcome various problems which surface as one models large, complex systems.


Distributed Computing | 1993

Knowledge in shared memory systems

Michael Merritt; Gadi Taubenfeld

SummaryWe study the relation between knowledge and space. That is, we analyze how much shared memory space is needed in order to learn certain kinds of facts. Such results are useful tools for reasoning about shared memory systems. In addition we generalize a known impossibility result, and show that results about how knowledge can be gained and lost in message passing systems also hold for shared memory systems.


Archive | 1992

Cryptographic protocol for secure communications

Steven Michael Bellovin; Michael Merritt


Archive | 2008

Interdomain network aware peer-to-peer protocol

Alexandre Gerber; Jia Wang; Oliver Spatscheck; Jennifer Yates; Michael Merritt


arXiv: Cryptography and Security | 1999

Secure Multicast in a WAN

Dahlia Malkhi; Michael Merritt; Ohad Rodeh


Archive | 2003

Resilient Consensus for Infinitely Many Processes (Extended Abstract)

Michael Merritt; Gadi Taubenfeld


Archive | 1998

The Power of Multiobjects1

Yehuda Afek; Michael Merritt


Archive | 1992

Kryptographisches Protokoll zur gesicherten Kommunikation A cryptographic protocol for secure communications

Steven Michael Bellovin; Michael Merritt

Collaboration


Dive into the Michael Merritt's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gadi Taubenfeld

Interdisciplinary Center Herzliya

View shared research outputs
Top Co-Authors

Avatar

Ohad Rodeh

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Geoffrey Brown

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Sonia R. Sachs

University of California

View shared research outputs
Top Co-Authors

Avatar

Ariel Orda

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge