Search Results - "Dolev, Danny"
-
1
Compact routing messages in self-healing trees
Published in Theoretical computer science (24-01-2018)“…Existing compact routing schemes, e.g., Thorup and Zwick [4] and Chechik [6] often have no means to tolerate failures, once the system has been set up and…”
Get full text
Journal Article -
2
Enhanced calibration technique for RSSI-based ranging in body area networks
Published in Ad hoc networks (01-01-2013)“…Indoor positioning systems based on Received Signal Strength Indicator (RSSI) in Wireless Sensor Networks (WSNs) are commonly used. The position accuracy in…”
Get full text
Journal Article -
3
Revisiting asynchronous fault tolerant computation with optimal resilience
Published in Distributed computing (01-08-2022)“…The celebrated result of Fischer, Lynch and Paterson is the fundamental lower bound for asynchronous fault tolerant computation: any 1-crash resilient…”
Get full text
Journal Article -
4
Communication complexity of byzantine agreement, revisited
Published in Distributed computing (01-03-2023)“…As Byzantine Agreement (BA) protocols find application in large-scale decentralized cryptocurrencies, an increasingly important problem is to design BA…”
Get full text
Journal Article -
5
Synchronous counting and computational algorithm design
Published in Journal of computer and system sciences (01-03-2016)“…Consider a complete communication network on n nodes. In synchronous 2-counting, the nodes receive a common clock pulse and they have to agree on which pulses…”
Get full text
Journal Article -
6
Fault Identification Via Nonparametric Belief Propagation
Published in IEEE transactions on signal processing (01-06-2011)“…We consider the problem of identifying a pattern of faults from a set of noisy linear measurements. Unfortunately, maximum a posteriori (MAP) probability…”
Get full text
Journal Article -
7
Rigorously modeling self-stabilizing fault-tolerant circuits: An ultra-robust clocking scheme for systems-on-chip
Published in Journal of computer and system sciences (01-06-2014)“…We present the first implementation of a distributed clock generation scheme for Systems-on-Chip that recovers from an unbounded number of arbitrary transient…”
Get full text
Journal Article -
8
Asynchronous resource discovery
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-07-2006)“…Consider a dynamic, large-scale communication infrastructure (e.g., the Internet) where nodes (e.g., in a peer-to-peer system) can communicate only with nodes…”
Get full text
Journal Article -
9
HEX: Scaling honeycombs is easier than scaling clock trees
Published in Journal of computer and system sciences (01-08-2016)“…We argue that a hexagonal grid with simple intermediate nodes is a robust alternative to buffered clock trees typically used for clock distribution in VLSI…”
Get full text
Journal Article -
10
Internet resiliency to attacks and failures under BGP policy routing
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-11-2006)“…We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and attacks, under the real constraint of business agreements…”
Get full text
Journal Article -
11
Asynchronous resource discovery : Algorithms for distributed systems
Published in Computer networks (Amsterdam, Netherlands : 1999) (2006)Get full text
Journal Article -
12
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
Published in IEEE transactions on dependable and secure computing (01-01-2010)“…This paper presents the first hierarchical byzantine fault-tolerant replication architecture suitable to systems that span multiple wide-area sites. The…”
Get full text
Journal Article -
13
On multicast trees
Published in IEEE/ACM transactions on networking (01-06-2006)“…This work presents a thorough investigation of the structure of multicast trees cut from the Internet and power-law topologies. Based on both generated…”
Get full text
Journal Article -
14
Colordag: An Incentive-Compatible Blockchain
Published 22-08-2023“…We present Colordag, a blockchain protocol where following the prescribed strategy is, with high probability, a best response as long as all miners have less…”
Get full text
Journal Article -
15
Peer-to-peer secure multi-party numerical computation facing malicious adversaries
Published in Peer-to-peer networking and applications (01-06-2010)“…We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of…”
Get full text
Journal Article -
16
Nonmalleable Cryptography
Published in SIAM review (01-12-2003)“…The notion of nonmalleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional…”
Get full text
Journal Article -
17
Live Distributed Objects: Enabling the Active Web
Published in IEEE internet computing (01-11-2007)“…Distributed computing has lagged behind the productivity revolution that has transformed the desktop in recent years. Programmers still generally treat the Web…”
Get full text
Journal Article -
18
Revisiting Asynchronous Fault Tolerant Computation with Optimal Resilience
Published 30-06-2020“…The celebrated result of Fischer, Lynch and Paterson is the fundamental lower bound for asynchronous fault tolerant computation: any 1-crash resilient…”
Get full text
Journal Article -
19
Possibility and Impossibility of Reliable Broadcast in the Bounded Model
Published 16-11-2016“…The Reliable Broadcast concept allows an honest party to send a message to all other parties and to make sure that all honest parties receive this message. In…”
Get full text
Journal Article -
20
Byzantine Processors and Cuckoo Birds: Confining Maliciousness to the Outset
Published 14-11-2016“…Are there Byzantine Animals? A Fooling Behavior is exhibited by the Cuckoo bird. It sneakily replaces some of the eggs of other species with its own. Lest the…”
Get full text
Journal Article