Sciweavers

123 search results - page 1 / 25
» Abstracting out Byzantine Behavior
Sort
View
DAGSTUHL
2006
13 years 6 months ago
Abstracting out Byzantine Behavior
Peter Druschel, Andreas Haeberlen, Petr Kouznetsov
EDM
2008
110views Data Mining» more  EDM 2008»
13 years 6 months ago
A Response Time Model For Bottom-Out Hints as Worked Examples
Students can use an educational system's help in unexpected r example, they may bypass abstract hints in search of a concrete solution. This behavior has traditionally been la...
Benjamin Shih, Kenneth R. Koedinger, Richard Schei...
NSDI
2007
13 years 7 months ago
Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems
Byzantine fault tolerant systems behave correctly when no more than f out of 3f + 1 replicas fail. When there are more than f failures, traditional BFT protocols make no guarantee...
Jinyuan Li, David Mazières
OPODIS
2010
13 years 2 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
SAGT
2009
Springer
192views Game Theory» more  SAGT 2009»
13 years 11 months ago
Better with Byzantine: Manipulation-Optimal Mechanisms
Abstract. A mechanism is manipulable if it is in some agents’ best interest to misrepresent their private information. The revelation principle establishes that, roughly, anythin...
Abraham Othman, Tuomas Sandholm