![State machine replication / Replication / Byzantine fault tolerance / Network File System / Consensus / Transmission Control Protocol / Communications protocol / Ping / Virtual synchrony / Computing / Fault-tolerant computer systems / Data synchronization State machine replication / Replication / Byzantine fault tolerance / Network File System / Consensus / Transmission Control Protocol / Communications protocol / Ping / Virtual synchrony / Computing / Fault-tolerant computer systems / Data synchronization](https://www.pdfsearch.io/img/8c06e0b3a0cf8aa51b1d96342640214b.jpg)
| Document Date: 2004-03-03 19:06:51 Open Document File Size: 743,72 KBShare Result on Facebook
City New Orleans / / Company CHECKPOINT / NEC / Andrew / Air Force Research Laboratory / Barbara Liskov Laboratory / / Country United States / / / Event Product Issues / FDA Phase / / Facility Technology Square / Air Force Research Laboratory / Massachusetts Institute of Technology / / IndustryTerm phase protocol / software errors / view-change protocol / file systems / atomic multicast protocol / online information services / asynchronous networks / replication protocol / replication algorithm / asynchronous systems / transactional systems / communication protocols / state-machine replication protocol / / OperatingSystem Unix / Digital Unix / / Organization Massachusetts Institute of Technology / / Person Miguel Castro / / Position administrator / system model / including our failure assumptions / / Product C-005 / MD5 / MACs / V2 / node / primary / replica / client / delay communication / ones / nodes / clients / replicas / i.e. / e.g. / / Technology Unix / Byzantinefault-tolerant algorithms / replication protocol / secret key / three phase protocol / state-machine replication protocol / operating system / UDP / Operating Systems / replication algorithm / cryptography / view-change protocol / three-phase protocol / 4 The Algorithm Our algorithm / modified algorithm / checkpoint protocol / previous Byzantine-fault-tolerant algorithms / atomic multicast protocol / Byzantine-fault-tolerant algorithms / communication protocols / digital signature / 3 Service Properties Our algorithm / 545 Technology / NFS protocol / be computed using incremental cryptography / implemented using UDP / /
SocialTag |