Fault tolerance in networks of bounded degree
read more
Citations
Perfectly secure message transmission
Local majorities, coalitions and monopolies in graphs: a review
Design and Analysis of Distributed Algorithms
Perfectly secure message transmission
Dynamic Monopolies of Constant Size
References
The Byzantine generals problem
Reaching Agreement in the Presence of Faults
The Byzantine Generals strike again
Explicit constructions of linear-sized superconcentrators
Related Papers (5)
Frequently Asked Questions (5)
Q2. What is the t-resilient algorithm for = en?
THEOREM 5. For every 0 < e < 1 there exist a constant c c( e ), graphs G ofdegree 0(n ), and t-resilient 0 t)-agreement algorithms for <= en.
Q3. How many "Distance i" neighbors can p block?
Keeping p fixed and looking at all possible senders u whose paths to Fout(U) contain p the authors see that p can block at most 1/2 of the outbound paths for its 2 "distance i" neighbors.
Q4. what is the t-resilient algorithm for o(t) agreement?
TIqEOREM 1. For all r>-5 there exists a constant e e(r) such that for all < en almost all r-regular graphs (i.e., all but a vanishingly smallfraction ofsuch graphs) admit a t-resilient algorithm for O(t) agreement.
Q5. How many vertices can be corrupted by p?
Thus p can corrupt at most r(r- 1)a+3 elements in sets F(u) for vertices u at distance from p. Summing up for all distances _-< d and all faulty processors the authors see that the faulty processors can corrupt at most tdr(r-1)d+3 paths in total.