×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [faulty nodes]
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
2.985 views
Connection Machine Architecture Greg Faust, Mike Gibson, Sal Valente CS-6354 Computer Architecture Fall 2009 1
217 views
Byzantine Generals. Outline r Byzantine generals problem
272 views
Secure Network Provenance Wenchao Zhou *, Qiong Fei*, Arjun Narayan*, Andreas Haeberlen*, Boon Thau Loo*, Micah Sherr + * University of Pennsylvania +
214 views
The Byzantine Generals Problem Boon Thau Loo CS294-4
223 views
Failures and Consensus. Coordination If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate
213 views
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim
220 views
SOSP 2007 © 2007 Andreas Haeberlen, MPI-SWS 1 Practical accountability for distributed systems Andreas Haeberlen MPI-SWS / Rice University Petr Kuznetsov
217 views
Building and Programming the Cloud, Mysore, Jan 2010 1 Accountable distributed systems and the accountable cloud Peter Druschel joint work with Andreas
214 views
BFT3W'091 Intrusion Tolerance: The Killer App for BFT (?) Alysson Bessani, Miguel Correia, Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo Universidade
229 views
FIBER DISTRIBUTED DATA INTERFACE (FDDI)
106 views
EECS 262a Advanced Topics in Computer Systems Lecture 25 Byzantine Agreement December 1st, 2014 John Kubiatowicz Electrical Engineering and Computer Sciences
214 views
Next >