메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Resilient consensus protocol in the presence of trusted nodes

Author keywords

adversary; consensus; dominating set; graph robustness; Resilience

Indexed keywords

CONTROL ENGINEERING;

EID: 84908701452     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISRCS.2014.6900100     Document Type: Conference Paper
Times cited : (45)

References (16)
  • 1
    • 84856716627 scopus 로고    scopus 로고
    • Convergence speed in distributed consensus and averaging
    • A. Olshevsky and J. N. Tsitsiklis, "Convergence speed in distributed consensus and averaging," SIAM Review, vol. 53, no. 4, pp. 747-772, 2011.
    • (2011) SIAM Review , vol.53 , Issue.4 , pp. 747-772
    • Olshevsky, A.1    Tsitsiklis, J.N.2
  • 3
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. Pease, R. Shostak, and L. Lamport, "Reaching agreement in the presence of faults," Journal of the ACM, vol. 27, no. 2, pp. 228-234, 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 4
    • 0004215089 scopus 로고    scopus 로고
    • San Francisco, CA: Morgan Kaufman Publishers Inc
    • N. A. Lynch, Distributed Algorithms, San Francisco, CA: Morgan Kaufman Publishers Inc., 1997.
    • (1997) Distributed Algorithms
    • Lynch, N.A.1
  • 5
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Trans. Autom. Control, vol. 56, no. 2, 2011.
    • (2011) IEEE Trans. Autom. Control , vol.56 , Issue.2
    • Sundaram, S.1    Hadjicostis, C.2
  • 6
    • 84855392746 scopus 로고    scopus 로고
    • Consensus computation in unreliable networks A system theoretic approach
    • F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach", IEEE Trans. Autom. Control, vol. 57, no. 1, pp. 90-104, 2012.
    • (2012) IEEE Trans. Autom. Control , vol.57 , Issue.1 , pp. 90-104
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 11
    • 84860623814 scopus 로고    scopus 로고
    • Robustness of information diffusion algorithms to locally bounded adversaries
    • Montŕeal, Canada
    • H. Zhang and S. Sundaram, "Robustness of information diffusion algorithms to locally bounded adversaries," IEEE American Control Conf., Montŕeal, Canada, 2012.
    • (2012) IEEE American Control Conf.
    • Zhang, H.1    Sundaram, S.2
  • 13
    • 0037904596 scopus 로고    scopus 로고
    • Connected domination and spanning trees with many leaves
    • Y. Caro, D. B. West, and R. Yuster, "Connected domination and spanning trees with many leaves," SIAM J. Discrete Math., vol. 13, no. 2, pp. 202-211, 2000.
    • (2000) SIAM J. Discrete Math. , vol.13 , Issue.2 , pp. 202-211
    • Caro, Y.1    West, D.B.2    Yuster, R.3
  • 15
    • 1642408650 scopus 로고    scopus 로고
    • Distributed construction of connected dominating set in wireless ad hoc networks
    • P. Wan, K. M. Alzoubi, and O. Frieder, "Distributed construction of connected dominating set in wireless ad hoc networks," Mobile Networks and Applications, vol. 9, pp. 141-149, 2004.
    • (2004) Mobile Networks and Applications , vol.9 , pp. 141-149
    • Wan, P.1    Alzoubi, K.M.2    Frieder, O.3
  • 16
    • 20344399896 scopus 로고    scopus 로고
    • Consensus seeking in multiagent systems under dynamically changing interaction topologies
    • W. Ren and R. Beard, "Consensus seeking in multiagent systems under dynamically changing interaction topologies," IEEE Trans. Autom. Control, vol. 50, 2005.
    • (2005) IEEE Trans. Autom. Control , vol.50
    • Ren, W.1    Beard, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.