메뉴 건너뛰기




Volumn , Issue , 1985, Pages 152-162

Simple constant-time consensus protocols in realistic failure models (extended abstract)

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY;

EID: 84947960569     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/323596.323610     Document Type: Conference Paper
Times cited : (10)

References (19)
  • 3
    • 0020976844 scopus 로고
    • Another advantage of free choice: Completely asynchronous agreement protocols
    • Be Computing
    • [Be] M. Ben-Or, "Another Advantage of Free Choice: Completely Asynchronous Agreement Protocols", Proc. 2nd Annual ACM Symposium on Principles of Distributed, Computing (1983), pp. 27-30.
    • (1983) Proc. 2nd Annual ACM Symposium on Principles of Distributed , pp. 27-30
    • Ben-Or, M.1
  • 4
    • 0021900599 scopus 로고
    • An (lg n) expected rounds randomized byzantine generals algorithm
    • Br
    • [Br] G. Bracha, "An (lg n) Expected Rounds Randomized Byzantine Generals Algorithm", Proc. 17th Annual ACM Symposium on Theory of Computing (1985), pp. 316-326.
    • (1985) Proc. 17th Annual ACM Symposium on Theory of Computing , pp. 316-326
    • Bracha, G.1
  • 6
    • 0021549809 scopus 로고
    • A simple and efficient randomized byzantine agreement algorithm
    • CC To appear in IEEE Transactions on Software Engineering
    • [CC] B. Chor and B. Coan, "A Simple and Efficient Randomized Byzantine Agreement Algorithm", Proc. 4th Symposium on Reliability m Distributed Software and Database Systems (1984), pp. 98-106. To appear in IEEE Transactions on Software Engineering.
    • (1984) Proc. 4th Symposium on Reliability M Distributed Software and Database Systems , pp. 98-106
    • Chor, B.1    Coan, B.2
  • 13
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • PSL
    • [PSL] M. Pease, R. Shostak, and L. Lamport, "Reaching Agreement in the Presence of Faults" JACM 27(2) (1980) pp. 228-234.
    • (1980) JACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 16
    • 33845226507 scopus 로고
    • Vulnerability of network control protocols: An example
    • Ro
    • [Ro] E. C. Rosen, "Vulnerability of Network Control Protocols: An Example" ACM SIGSOFT Software Engineering Notes, 6(1) (1981), pp. 6-8.
    • (1981) ACM SIGSOFT Software Engineering Notes , vol.6 , Issue.1 , pp. 6-8
    • Rosen, E.C.1
  • 17
    • 0021372186 scopus 로고
    • Extending binary byzantine agreement to multi valued byzantine agreement
    • TC
    • [TC] R. Turpin and B. Coan, "Extending Binary Byzantine Agreement to Multivalued Byzantine Agreement, Information Processing Letters 18(2) (1984), pp. 73-76.
    • (1984) Information Processing Letters , vol.18 , Issue.2 , pp. 73-76
    • Turpin, R.1    Coan, B.2
  • 19
    • 85049241484 scopus 로고    scopus 로고
    • [Y2], private communication
    • [Y2] A.C. Yao, private communication.
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.