Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,954,322 papers from all fields of science
Search
Sign In
Create Free Account
Two Generals' Problem
Known as:
Two Generals Paradox
, Generals dilemma
, Two Armies Problem
Expand
In computing, the Two Generals Problem is a thought experiment meant to illustrate the pitfalls and design challenges of attempting to coordinate an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Acknowledgement (data networks)
Atomic commit
Byzantine fault tolerance
Common knowledge (logic)
Expand
Broader (1)
Theory of computation
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Hierarchical Multi-Agent Based Anomaly Detection for Wide-Area Protection in Smart Grid
Vivek Kumar Singh
,
Altay Ozen
,
M. Govindarasu
IEEE Radio and Wireless Symposium
2018
Corpus ID: 52897863
Future smart grid capabilities provide assurance to expand the advanced information and communication technologies to evolve into…
Expand
2013
2013
Intruder detection based on graph structured hypothesis testing
Joseph Sexton
,
C. Storlie
,
Joshua Neil
,
A. Kent
6th International Symposium on Resilient Control…
2013
Corpus ID: 10778581
Anomaly based network intruder detection is considered. In particular, we view anomaly detection as a statistical hypothesis…
Expand
2013
2013
A VIVACIOUS APPROACH TO DETECT AND PREVENT DDoS ATTACK
Kharat J S
,
R. Naik
2013
Corpus ID: 17752236
A serious problem on the Internet nowadays is Distr ibuted Denial of Service (DDoS) attacks and this is coordinated attack…
Expand
2010
2010
When is AG Short for Aspiring Governor? Ambition and Policy Making Dynamics in the Office of State Attorney General
Colin Provost
2010
Corpus ID: 14855751
Anecdotes have emerged in the media about why state attorneys general run for higher office, but there have been no empirical…
Expand
2009
2009
Improving robustness of complex communication networks by allocating redundancy links
Yue Zhuo
,
Yunfeng Peng
,
Keping Long
,
Yingkai Liu
Asia Communications and Photonics conference and…
2009
Corpus ID: 39180184
This paper propose a novel probabilistic approach to allocate redundancy links and hiding redundancy links (HRL) strategy to…
Expand
2009
2009
A Performance Analysis of AODV Routing Protocol under Combined Byzantine Attacks in MANETs
A. Sangi
,
Jianwei Liu
,
Likun Zou
International Conference on Computational…
2009
Corpus ID: 18127097
The concept of byzantine attack comes from Byzantine Generals Problem. In this abstract concept, the loyal byzantine army general…
Expand
2008
2008
Distributed intrusion detection using mobile agents against DDoS attacks
Ugur Akyazi
,
A. Uyar
International Symposium on Computer and…
2008
Corpus ID: 15611801
Along with the increasing wide applications of computer and network technologies, the security problems of information systems…
Expand
2007
2007
Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments
Alexandra Czarlinska
,
William Luh
,
D. Kundur
IEEE GLOBECOM - IEEE Global Telecommunications…
2007
Corpus ID: 9198051
Wireless Sensor Networks (WSNs) deployed in hostile environments are susceptible to various attacks directed at their data. In…
Expand
2003
2003
Microbiological and Biological Aspects of the Wastewater Treatment Plant "Wschód" in Gdańsk
K. olańczuk-Neyman
,
M. Geneja
,
+6 authors
M. Gielert
2003
Corpus ID: 38259901
This study indicates that in the wastewater treatment plant “Wschod” in Gdansk, working in the modified UCT system, the…
Expand
1985
1985
An O(lg n) expected rounds randomized Byzantine generals protocol
Gabriel Bracha
Symposium on the Theory of Computing
1985
Corpus ID: 52802568
Byzantine Generals protocols enable processes to reliably broadcast messages in the presence of faulty processes. These protocols…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE