Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Subject "consensus"

Now showing items 1-2 of 2

  • Of Malicious Motes and Suspicious Sensors 

    Unknown author (2006-04-19)
    How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...

  • Viewstamped Replication Revisited 

    Unknown author (2012-07-23)
    This paper presents an updated version of Viewstamped Replication, a replication technique that handles failures in which nodes crash. It describes how client requests are handled, how the group reorganizes when a replica ...