نتایج جستجو برای: byzantine iconography

تعداد نتایج: 4041  

Journal: :Medical History 1984
German E. Berrios

medical texts. It is one of the major resources in measuring the shifts in perception present within systems that claim to represent the "realities" of the world. It is thus not merely of interest to parallel one world of aesthetic objects to another (as Glandien does in his work on Messerschmidt and his influence in contemporary art) or to draw the internal history of the function of photograp...

Journal: :CoRR 2016
Silvia Bonomi Antonella Del Pozzo Maria Gradinariu Potop-Butucaru Sébastien Tixeuil

This paper proposes the first implementation of a regular register by n servers that is tolerant to both mobile Byzantine agents, and transient failures (it is self-stabilizing) in a round-free synchronous model. We consider the most difficult model for mobile Byzantine agents to date where the message delay, δ, and the speed of mobile Byzantine agents, ∆, are completely decoupled. Moreover, se...

2005
Ariel Daliot Danny Dolev

There is an abundance of writing about Token Circulation (or leader election). Much of the work is dedicated to self-stabilizing Token Circulation, ever since the publishing of Dijkstra’s seminal paper. Few of the papers focus on the Byzantine fault model and, to the best of our knowledge, there is no self-stabilizing Token Circulation algorithm that tolerates Byzantine faults. In this paper, w...

2010
Ezra N. Hoch Michael Ben-Or Danny Dolev

Consider an asynchronous network in a shared-memory environment consisting of n nodes. Assume that up to f of the nodes might be Byzantine (n > 12f), where the adversary is full-information and dynamic (sometimes called adaptive). In addition, the non-Byzantine nodes may undergo transient failures. Nodes advance in atomic steps, which consist of reading all registers, performing some calculatio...

2018
Darya Melnyk Yuyi Wang Roger Wattenhofer

In the Byzantine agreement problem, n nodes with possibly different input values aim to reach agreement on a common value in the presence of t < n/3 Byzantine nodes which represent arbitrary failures in the system. This paper introduces a generalization of Byzantine agreement, where the input values of the nodes are preference rankings of three or more candidates. We show that consensus on pref...

2005
Barbara Liskov Rodrigo Rodrigues

Byzantine quorum systems have been proposed that work properly even when up to f replicas fail arbitrarily. However, these systems are not so successful when confronted with Byzantine faulty clients. This paper presents novel protocols that provide atomic semantics despite Byzantine clients. Our protocols are the first to handle all problems caused by Byzantine clients. They prevent Byzantine c...

2017
Ittai Abraham Srinivas Devadas Danny Dolev Kartik Nayak Ling Ren

We present new protocols for Byzantine state machine replication and Byzantine agreement in the synchronous and authenticated setting. The celebrated PBFT state machine replication protocol tolerates f Byzantine faults in an asynchronous setting using 3f +1 replicas, and has since been studied or deployed by numerous works. In this work, we improve the Byzantine fault tolerance threshold to n =...

Journal: :IACR Cryptology ePrint Archive 2017
Ling Ren Kartik Nayak Ittai Abraham Srinivas Devadas

We present new protocols for Byzantine state machine replication and Byzantine agreement in the synchronous and authenticated setting. The celebrated PBFT state machine replication protocol tolerates f Byzantine faults in an asynchronous setting using 3f + 1 replicas, and has since been studied or deployed by numerous works. In this work, we improve the Byzantine fault tolerance to n = 2f + 1 b...

2006
Rida A. Bazzi Young-ri Choi Mohamed G. Gouda

We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller t...

Journal: :CoRR 2016
Danny Dolev Eli Gafni

We show that asynchronous t faults Byzantine system is equivalent to asynchronous t-resilient system, where unbeknownst to all, the private inputs of at most t processors were altered and installed by a malicious oracle. The immediate ramification is that dealing with asynchronous Byzantine systems does not call for new topological methods, as was recently employed by various researchers: Async...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید