Optimizing threshold protocols in adversarial structures

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many replication protocols are using a threshold model in which failures are independent and identically distributed (IID). In this model, one assumes that no more than t out of n components can fail. In many real systems, however, failures are not IID, and a straightforward application of threshold protocols yields suboptimal results. Here, we examine the problem of optimally transforming threshold protocols into survivor-set protocols tolerating dependent failures. In particular, we are interested in threshold protocols where the number of components n and the number of failures t are related by n > k • t, where k is a positive integer constant k. We develop an optimal transformation that translates any such threshold protocol to a survivor-set dependent failure model, and hence, to adversarial structures. Our transformation does not require authentication, self-verification or encryption. We characterize equivalence classes of adversarial structures, regarding solvability, using certain hierarchical properties based on set intersection. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Herlihy, M., Junqueira, F. P., Marzullo, K., & Penso, L. D. (2008). Optimizing threshold protocols in adversarial structures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5218 LNCS, pp. 335–349). https://doi.org/10.1007/978-3-540-87779-0_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free