Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Subject "consensus"
Now showing items 1-2 of 2
-
Of Malicious Motes and Suspicious Sensors
(2006-04-19)How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...
-
Viewstamped Replication Revisited
(2012-07-23)This paper presents an updated version of Viewstamped Replication, a replication technique that handles failures in which nodes crash. It describes how client requests are handled, how the group reorganizes when a replica ...