Sciweavers

123 search results - page 1 / 25
» Abstracting out Byzantine Behavior
Sort
View
DAGSTUHL
2006
15 years 5 months ago
Abstracting out Byzantine Behavior
Peter Druschel, Andreas Haeberlen, Petr Kouznetsov
116
Voted
EDM
2008
110views Data Mining» more  EDM 2008»
15 years 5 months ago
A Response Time Model For Bottom-Out Hints as Worked Examples
Students can use an educational system's help in unexpected r example, they may bypass abstract hints in search of a concrete solution. This behavior has traditionally been la...
Benjamin Shih, Kenneth R. Koedinger, Richard Schei...
NSDI
2007
15 years 5 months ago
Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems
Byzantine fault tolerant systems behave correctly when no more than f out of 3f + 1 replicas fail. When there are more than f failures, traditional BFT protocols make no guarantee...
Jinyuan Li, David Mazières
133
Voted
OPODIS
2010
15 years 1 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
150
Voted
SAGT
2009
Springer
192views Game Theory» more  SAGT 2009»
15 years 10 months ago
Better with Byzantine: Manipulation-Optimal Mechanisms
Abstract. A mechanism is manipulable if it is in some agents’ best interest to misrepresent their private information. The revelation principle establishes that, roughly, anythin...
Abraham Othman, Tuomas Sandholm