Sciweavers

28 search results - page 3 / 6
» Resilient Network Coding in the Presence of Byzantine Advers...
Sort
View
SSS
2007
Springer
102views Control Systems» more  SSS 2007»
14 years 3 months ago
Secure and Self-stabilizing Clock Synchronization in Sensor Networks
Abstract. In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the cloc...
Jaap-Henk Hoepman, Andreas Larsson, Elad Michael S...
PODC
2012
ACM
12 years 6 days ago
Byzantine broadcast in point-to-point networks using local linear coding
The goal of Byzantine Broadcast (BB) is to allow a set of fault-free nodes to agree on information that a source node wants to broadcast to them, in the presence of Byzantine faul...
Guanfeng Liang, Nitin H. Vaidya
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 10 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
PODC
2009
ACM
14 years 10 months ago
Brief announcement: global consistency can be easier than point-to-point communication
Global consistency or Byzantine Agreement (BA) and reliable point-to-point communication are two of the most important and well-studied problems in distributed computing. Informal...
Prasant Gopal, Anuj Gupta, Pranav K. Vasishta, Piy...
INFOCOM
2010
IEEE
13 years 8 months ago
Network Coding Tomography for Network Failures
—Network Tomography (or network monitoring) uses end-to-end path-level measurements to characterize the network, such as topology estimation and failure detection. This work prov...
Hongyi Yao, Sidharth Jaggi, Minghua Chen