Fault diagnosis in wireless sensor networks: A survey

A Mahapatro, PM Khilar - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
The sensor nodes in wireless sensor networks may be deployed in unattended and possibly
hostile environments. The ill-disposed environment affects the monitoring infrastructure that …

Byzantine fault-tolerant state-machine replication from a systems perspective

T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …

[图书][B] Microwaves and metals

M Gupta, EWW Leong - 2008 - books.google.com
Using microwaves to treat metal-based materials is rapidly emerging as an energy-efficient
tool to interact with metals for a number of processes such as sintering, melting, brazing …

PeerReview: Practical accountability for distributed systems

A Haeberlen, P Kouznetsov, P Druschel - ACM SIGOPS operating …, 2007 - dl.acm.org
We describe PeerReview, a system that provides accountability in distributed systems.
PeerReview ensures that Byzantine faults whose effects are observed by a correct node are …

Byzantine ordered consensus without byzantine oligarchy

Y Zhang, S Setty, Q Chen, L Zhou, L Alvisi - 14th USENIX Symposium …, 2020 - usenix.org
The specific order of commands agreed upon when running state machine replication
(SMR) is immaterial to fault-tolerance: all that is required is for all correct deterministic …

Highly available intrusion-tolerant services with proactive-reactive recovery

P Sousa, AN Bessani, M Correia… - … on Parallel and …, 2009 - ieeexplore.ieee.org
In the past, some research has been done on how to use proactive recovery to build
intrusion-tolerant replicated systems that are resilient to any number of faults, as long as …

Secure network provenance

W Zhou, Q Fei, A Narayan, A Haeberlen… - Proceedings of the …, 2011 - dl.acm.org
This paper introduces secure network provenance (SNP), a novel technique that enables
networked systems to explain to their operators why they are in a certain state--eg, why a …

[PDF][PDF] Accountable virtual machines

A Haeberlen, P Aditya, R Rodrigues… - 9th USENIX Symposium …, 2010 - usenix.org
In this paper, we introduce accountable virtual machines (AVMs). Like ordinary virtual
machines, AVMs can execute binary software images in a virtualized copy of a computer …

The Bedrock of Byzantine Fault Tolerance: A Unified Platform for {BFT} Protocols Analysis, Implementation, and Experimentation

MJ Amiri, C Wu, D Agrawal, A El Abbadi… - … USENIX Symposium on …, 2024 - usenix.org
Byzantine Fault-Tolerant (BFT) protocols cover a broad spectrum of design dimensions from
infrastructure settings, such as the communication topology, to more technical features, such …

Nero: A deterministic leaderless consensus algorithm for dag-based cryptocurrencies

R Morais, P Crocker, V Leithardt - Algorithms, 2023 - mdpi.com
This paper presents the research undertaken with the goal of designing a consensus
algorithm for cryptocurrencies with less latency than the current state-of-the-art while …