1998
DOI: 10.1016/s0166-218x(97)00100-5
|View full text |Cite
|
Sign up to set email alerts
|

Reliable broadcasting in product networks

Abstract: In this paper we study the reliable broadcasting in product networks. We suppose that the faulty nodes and faulty links may arbitrarily change the messages that pass through them, and may even fabricate messages.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(25 citation statements)
references
References 16 publications
(8 reference statements)
0
25
0
Order By: Relevance
“…The design of independent spanning trees (ISTs, for short) on graphs has important applications to the reliable communication protocols [1,11,16]. If a spanning tree rooted at the source node in a network is viewed as a broadcast channel for data communication, then fault-tolerant broadcasting can be achieved by sending k copies of a message along k ISTs on the network provided that there are at most k − 1 faulty nodes (other than the root) and/or faulty edges in the network.…”
Section: J01354)mentioning
confidence: 99%
“…The design of independent spanning trees (ISTs, for short) on graphs has important applications to the reliable communication protocols [1,11,16]. If a spanning tree rooted at the source node in a network is viewed as a broadcast channel for data communication, then fault-tolerant broadcasting can be achieved by sending k copies of a message along k ISTs on the network provided that there are at most k − 1 faulty nodes (other than the root) and/or faulty edges in the network.…”
Section: J01354)mentioning
confidence: 99%
“…(1) >-path and < N a0 (u), v (2) >-path satisfy the conditions in Lemma 4, which implies that v (1) = v (2) . Thus, we can say that T 0 is a spanning tree rooted at N a0 (u) for X n ∈ {Q n , M n }.…”
Section: Lemma 4 Suppose Thatmentioning
confidence: 83%
“…After the n iterations, we have 1 + 2 0 + 2 1 + ... + 2 n−1 = 2 n nodes in tree T 0 . Choosing arbitrary two nodes v (1) and v (2) from T 0 , the < N a0 (u), v (1) >-path can be denoted by N a0 (u),…”
Section: Lemma 4 Suppose Thatmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers have proved that ISTs has many applications such as reliable communication protocols [1], the multi-node broadcasting [5], one-to-all broadcasting [6], reliable broadcasting, and secure message distribution [7]. Nevertheless, there exists a key problem on ISTs in networks:…”
Section: Introductionmentioning
confidence: 99%