Sciweavers

123 search results - page 1 / 25
» Abstracting out Byzantine Behavior
Sort
View
DAGSTUHL
2006
14 years 11 months ago
Abstracting out Byzantine Behavior
Peter Druschel, Andreas Haeberlen, Petr Kouznetsov
EDM
2008
110views Data Mining» more  EDM 2008»
14 years 11 months ago
A Response Time Model For Bottom-Out Hints as Worked Examples
Students can use an educational system's help in unexpected r example, they may bypass abstract hints in search of a concrete solution. This behavior has traditionally been la...
Benjamin Shih, Kenneth R. Koedinger, Richard Schei...
NSDI
2007
15 years 10 days ago
Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems
Byzantine fault tolerant systems behave correctly when no more than f out of 3f + 1 replicas fail. When there are more than f failures, traditional BFT protocols make no guarantee...
Jinyuan Li, David Mazières
OPODIS
2010
14 years 8 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
SAGT
2009
Springer
192views Game Theory» more  SAGT 2009»
15 years 4 months ago
Better with Byzantine: Manipulation-Optimal Mechanisms
Abstract. A mechanism is manipulable if it is in some agents’ best interest to misrepresent their private information. The revelation principle establishes that, roughly, anythin...
Abraham Othman, Tuomas Sandholm