Method for securing concurrence among asynchronous processors
Journal Article
·
· IBM Tech. Disclosure Bull.; (United States)
OSTI ID:5214249
The authors describe a method of securing concurrence among asynchronous processors in the presence of undetected faults, comprising the steps of (1) invoking an authentication protocol in order to ensure that received messages were faithfully relayed by intermediate processors whether faulty or not, and (2) transmitting a target message among the processors to secure agreement as to a value within the messages such that no more than two messages need be sent.
- Research Organization:
- IBM Corp., Armonk, NY
- OSTI ID:
- 5214249
- Journal Information:
- IBM Tech. Disclosure Bull.; (United States), Journal Name: IBM Tech. Disclosure Bull.; (United States) Vol. 3A; ISSN IBMTA
- Country of Publication:
- United States
- Language:
- English
Similar Records
Authenticated algorithms for Byzantine agreement
Simulating synchronous processors. Technical report
Asynchronous PVM network computing
Journal Article
·
Mon Oct 31 23:00:00 EST 1983
· SIAM J. Comput.; (United States)
·
OSTI ID:5170704
Simulating synchronous processors. Technical report
Technical Report
·
Wed Jun 01 00:00:00 EDT 1988
·
OSTI ID:6642219
Asynchronous PVM network computing
Conference
·
Thu Nov 30 23:00:00 EST 1995
·
OSTI ID:125621