نتایج جستجو برای: byzantine iconography

تعداد نتایج: 4041  

Journal: :Medical History 1994
John Kirkup

LEONARD F. PELTIER, MD, Orthopedics: a history and iconography, Norman Orthopedic Series No. 3, Norman Surgery Series No. 6, San Francisco, Norman Publishing, 1993, pp. xxvi, 305, illus., $225.00 (0-930405-47-1). This companion volume to Fractures: a historv and iconography oftreatment, by the same author and publisher, is equally well researched and produced. In addition to 332 illustrations o...

Journal: :Parallel Processing Letters 2003
Hagit Attiya Amir Bar-Or

This paper presents several fault-tolerant simulations of a single-writer multi-reader regular register in storage systems. One simulation tolerates fail-stop failures of storage servers and require a majority of nonfaulty servers, while the other simulation tolerates Byzantine failures and requires that two-thirds of the servers to be nonfaulty. A construction of Afek et al. [2] is used to mas...

2006
Xiuqun Wang Honglun Hou Yueting Zhuang

This paper describes the design, implementation and usage of a secure scalable Byzantine fault tolerant MDS system in the Grid. The scalable Byzantine fault tolerant MDS system provides a hierarchy GIIS servers, a local GIIS domain can require the resource it needs from remote GIIS domain. By using the statemachine replication approach and quorum system technique, the scalable Byzantine fault t...

Journal: :CoRR 2017
Tyler Crain Vincent Gramoli Mikel Larrea Michel Raynal

This paper presents a new resilience optimal Byzantine consensus algorithm targeting consortium blockchains. To this end, it first revisits the consensus validity property by requiring that the decided value satisfies a predefined predicate, which does not systematically exclude a value proposed only by Byzantine processes, thereby generalizing the validity properties found in the literature. T...

2001
Velissarios G. Gezerlis Sergios Theodoridis

In this paper we present for the first time, the development of a new system for the off-line optical recognition of the characters used in the Orthodox Hellenic Byzantine Music Notation, that has been established since 1814. We describe the structure of the new system and propose algorithms for the recognition of the 71 distinct character classes, based on Wavelets, 4-projections and other str...

2012
Carole Delporte-Gallet Hugues Fauconnier Hung Tran-The

We consider here the Byzantine Agreement problem (BA) in synchronous systems with homonyms in the case where some identifiers may be forgeable. More precisely, the n processes share a set of l (1 ≤ l ≤ n) identifiers. Assuming that at most t processes may be Byzantine and at most k (t ≤ k ≤ l) of these identifiers are forgeable in the sense that any Byzantine process can falsely use them, we pr...

2010
Saju P John Philip Samuel

Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. We refer to any arbitrary action by authenticated nodes resulting in disruption of the routing service such as drop packets, modify packets and miss-route packets as Byzantine behavior, and to such an adversary as a Byzantine adversary. Nodes may exhibit Byzantine beh...

2017
Hammurabi Mendes Maurice Herlihy

In this paper, we show that the protocol complex of a Byzantine synchronous system can remain (k− 1)-connected for up to ⌈t/k⌉ rounds, where t is the maximum number of Byzantine processes, and t ≥ k ≥ 1. Protocol complex connectivity is important since a (k − 1)-connected protocol complex does not admit solutions for the k-set agreement problem. In crash-failure systems, the connectivity upper ...

2003
Adnan Agbaria Roy Friedman

The common approach to masking Byzantine failures is by replicating the computation and running a Byzantine agreement protocol among all replicas. However, Byzantine agreement incurs high communication overhead and also requires the use of at least 3f + 1 replicas in order to overcome f such failures. However, for many applications, and in particular scientific computation, it is possible to ac...

2010
Guanfeng Liang Nitin Vaidya

In this report, we consider the problem of maximizing the throughput of Byzantine agreement. Byzantine agreement is a classical problem in distributed computing, with initial solutions presented in the seminal work of Pease, Shostak and Lamport [1, 2]. There has also been more recent work on designing multicast algorithms that can survive Byzantine attacks (e.g., [3]). Many variations on the By...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید