English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 61875/94645 (65%)
造訪人次 : 1635340      線上人數 : 7
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/78771

    題名: From Immediate Agreement to Eventual Agreement: Early Stopping Agreement Protocol for Dynamic Networks with Malicious Faulty Processors
    作者: Cheng, Chien-fu;Tsai, Kuo-tang
    貢獻者: 淡江大學資訊工程學系
    關鍵詞: Fault-tolerance distributed system;Byzantine Agreement;Eventual Byzantine Agreement;Immediate Byzantine Agreement;Early stopping;Dynamic network
    日期: 2012-11-01
    上傳時間: 2012-10-22 10:29:23 (UTC+8)
    出版者: New York: Springer New York LLC
    摘要: With the rapid advancement of wireless networking technology, networks have evolved from static to dynamic. Reliability of dynamic networks has virtually become an important issue. Fortunately, a solution to the above issue can be derived from solutions to the Byzantine Agreement (BA) problem. BA problem can be solved by protocols that make processors reach an agreement through message exchange. Protocols used to solve the problem can be divided into Immediate Byzantine Agreement (IBA) protocols and Eventual Byzantine Agreement (EBA) protocols. In IBA protocols, the number of rounds of message exchange is determined by the total number of processors in the network. Even if no faulty processor is present in the network, IBA protocols still require a fixed number of rounds of message exchange, causing a waste of time. In contrast, EBA protocols dynamically adjust the number of rounds of message exchange according to the interference of faulty processors. In terms of efficiency, EBA protocols certainly outperform IBA protocols. Due to the fact that the existing EBA protocols have been designed for static networks, they cannot work on dynamic networks. In this paper, we revisit the EBA problem in dynamic networks to increase the reliability of dynamic networks. Simulations will be conducted to validate that the proposed protocol requires the minimum rounds of message exchange and can tolerate the maximum number of malicious faulty processors compared to other existing protocols.
    關聯: The Journal of Supercomputing 62(2), pp.874-894
    DOI: 10.1007/s11227-012-0758-x
    顯示於類別:[資訊工程學系暨研究所] 期刊論文


    檔案 描述 大小格式瀏覽次數



    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋