Proceedings of the Twenty-Second Annual Symposium on Principles of Distributed Computing 2003
DOI: 10.1145/872035.872090
|View full text |Cite
|
Sign up to set email alerts
|

Adapting to a reliable network path

Abstract: We consider the model of unreliable network links, where at each time unit a link might be either up or down. We consider two related problems. The first, establishing end to end communication between two given nodes, where the performance measure is the average number of times the chosen path was disconnected. The second, is to build a spanning tree rooted at a given source node, where the performance measure is the average number of nodes that are the disconnected from the source. For both problems we design… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…Byzantine behavior causes such algorithms to collapse. Most recently, "ondemand" routing against an oblivious adversary was suggested in [3]. In this model, an adversary cannot cheat and the pattern of cheating and blocking is assumed to be oblivious, i.e., this work does not handle dynamic DOS attacks.…”
Section: Existing Work A) Algorithmic Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Byzantine behavior causes such algorithms to collapse. Most recently, "ondemand" routing against an oblivious adversary was suggested in [3]. In this model, an adversary cannot cheat and the pattern of cheating and blocking is assumed to be oblivious, i.e., this work does not handle dynamic DOS attacks.…”
Section: Existing Work A) Algorithmic Workmentioning
confidence: 99%
“…The probability associated with a neighbor is a local estimate of the the relative likelihood of that neighbor forwarding and eventually delivering the packet to the destination. The algorithm is similar to the one in [3]; however its analysis is different.…”
Section: A Solution Outlinementioning
confidence: 99%
See 3 more Smart Citations