• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 898
Next 10 →

Practical Byzantine fault tolerance and proactive recovery

by Miguel Castro, Barbara Liskov - ACM Transactions on Computer Systems , 2002
"... Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, B ..."
Abstract - Cited by 410 (7 self) - Add to MetaCart
, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability

Proactive Recovery in a Byzantine-Fault-Tolerant System

by Miguel Castro, Barbara Liskov , 2000
"... This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors. Our system is the first to recover Byzantine-faulty replicas proactively and it performs well because it uses symmetric rather than publ ..."
Abstract - Cited by 138 (6 self) - Add to MetaCart
public-key cryptography for authentication. The recovery mechanism allows us to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a window of vulnerability that is small under normal conditions. The window may increase under a

Optimistic replication

by Yasushi Saito, Marc Shapiro - ACM COMPUTING SURVEYS , 2005
"... Data replication is a key technology in distributed data sharing systems, enabling higher availability and performance. This paper surveys optimistic replication algorithms that allow replica contents to diverge in the short term, in order to support concurrent work practices and to tolerate failure ..."
Abstract - Cited by 290 (19 self) - Add to MetaCart
failures in low-quality communication links. The importance of such techniques is increasing as collaboration through wide-area and mobile networks becomes popular. Optimistic replication techniques are different from traditional “pessimistic” ones. Instead of synchronous replica coordination

1 Failure Resilient Distributed Commit for Web Services Atomic Transactions

by Wenbing Zhao , 2007
"... Abstract — Existing Byzantine fault tolerant distributed commit algorithms are resilient to failures up to the threshold imposed by the Byzantine agreement. A distributed transaction might not commit atomically at correct participants if there are more faults. In this paper, we report mechanisms and ..."
Abstract - Add to MetaCart
and their implementations in the context of a Web services atomic transaction framework that significantly increase the probability of atomic commitment of distributed transactions even when the majority of coordinator replicas become faulty. The core mechanisms include a piggybacking mechanism, which limits the way a

Zyzzyva: Speculative byzantine fault tolerance

by Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, Edmund Wong - In Symposium on Operating Systems Principles (SOSP , 2007
"... We present Zyzzyva, a protocol that uses speculation to reduce the cost and simplify the design of Byzantine fault tolerant state machine replication. In Zyzzyva, replicas respond to a client’s request without first running an expensive three-phase commit protocol to reach agreement on the order in ..."
Abstract - Cited by 188 (16 self) - Add to MetaCart
in which the request must be processed. Instead, they optimistically adopt the order proposed by the primary and respond immediately to the client. Replicas can thus become temporarily inconsistent with one another, but clients detect inconsistencies, help correct replicas converge on a single total

Abstract Proactive Recovery in a Byzantine-Fault-Tolerant System

by unknown authors
"... This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors. Our system is the first to recover Byzantine-faulty replicas proactively and it performs well because it uses symmetric rather than publ ..."
Abstract - Add to MetaCart
publickey cryptography for authentication. The recovery mechanism allows us to tolerate any number of faults over the lifetime of the system provided fewer than 1 3 of the replicas become faulty within a window of vulnerability that is small under normal conditions. The window may increase under a denialof

ABSTRACT Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems

by unknown authors
"... Byzantine fault tolerant systems behave correctly when no more than f out of 3f + 1 replicas fail. When there are more than f failures, traditional BFT protocols make no guarantees whatsoever. Malicious replicas can make clients accept arbitrary results, and the system behavior is totally unspecifie ..."
Abstract - Add to MetaCart
Byzantine fault tolerant systems behave correctly when no more than f out of 3f + 1 replicas fail. When there are more than f failures, traditional BFT protocols make no guarantees whatsoever. Malicious replicas can make clients accept arbitrary results, and the system behavior is totally

ABSTRACT Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems

by unknown authors
"... Byzantine fault tolerant systems behave correctly when no more than f out of 3f +1replicas fail. When there are more than f failures, traditional BFT protocols make no guarantees whatsoever. Malicious replicas can make clients accept arbitrary results, and the system behavior is totally unspecified. ..."
Abstract - Add to MetaCart
Byzantine fault tolerant systems behave correctly when no more than f out of 3f +1replicas fail. When there are more than f failures, traditional BFT protocols make no guarantees whatsoever. Malicious replicas can make clients accept arbitrary results, and the system behavior is totally unspecified

Low Latency Fault Tolerance System

by Wenbing Zhao, P. M. Melliar-smith, L. E. Moser
"... The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a local-area network, using a leader-follower replication strategy. LLFT provides application-transparent replication, with strong replica consistency, for applications that involve multiple in ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
is determined by the primary replica in the destination group. The Leader-Determined Membership Protocol provides reconfiguration and recovery when a replica becomes faulty and when a replica joins or leaves a group, where the membership of the group is determined by the primary replica. The Virtual

THE FAULTY FALSE DISCOVERY RATE

by unknown authors
"... The false discovery procedure introduced by Benjamini and Hochberg in 1995 has become a mainstream method for large scale simultaneous inference in a variety of bioinformatics problems. The procedure controls the false discovery rate (FDR) at a specified level α assuming that the distribution functi ..."
Abstract - Add to MetaCart
The false discovery procedure introduced by Benjamini and Hochberg in 1995 has become a mainstream method for large scale simultaneous inference in a variety of bioinformatics problems. The procedure controls the false discovery rate (FDR) at a specified level α assuming that the distribution
Next 10 →
Results 1 - 10 of 898
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University