Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,309 papers from all fields of science
Search
Sign In
Create Free Account
Two Generals' Problem
Known as:
Two Generals Paradox
, Generals dilemma
, Two Armies Problem
Expand
In computing, the Two Generals Problem is a thought experiment meant to illustrate the pitfalls and design challenges of attempting to coordinate an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Acknowledgement (data networks)
Atomic commit
Byzantine fault tolerance
Common knowledge (logic)
Expand
Broader (1)
Theory of computation
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Intruder detection based on graph structured hypothesis testing
Joseph Sexton
,
C. Storlie
,
Joshua Neil
,
A. Kent
6th International Symposium on Resilient Control…
2013
Corpus ID: 10778581
Anomaly based network intruder detection is considered. In particular, we view anomaly detection as a statistical hypothesis…
Expand
2013
2013
A VIVACIOUS APPROACH TO DETECT AND PREVENT DDoS ATTACK
Kharat J S
,
R. Naik
2013
Corpus ID: 17752236
A serious problem on the Internet nowadays is Distr ibuted Denial of Service (DDoS) attacks and this is coordinated attack…
Expand
2013
2013
Explaining Patterns of Redistribution under Autocracy The Case of Peru’s Revolution from Above
Michael Albertus
2013
Corpus ID: 146806034
Who benefits and who loses during redistribution under dictatorship? This article argues that expropriating powerful preexisting…
Expand
2010
2010
When is AG Short for Aspiring Governor? Ambition and Policy Making Dynamics in the Office of State Attorney General
Colin Provost
2010
Corpus ID: 14855751
Anecdotes have emerged in the media about why state attorneys general run for higher office, but there have been no empirical…
Expand
2009
2009
Improving robustness of complex communication networks by allocating redundancy links
Yue Zhuo
,
Yunfeng Peng
,
Keping Long
,
Yingkai Liu
Asia Communications and Photonics conference and…
2009
Corpus ID: 39180184
This paper propose a novel probabilistic approach to allocate redundancy links and hiding redundancy links (HRL) strategy to…
Expand
2009
2009
A Performance Analysis of AODV Routing Protocol under Combined Byzantine Attacks in MANETs
A. Sangi
,
Jianwei Liu
,
Likun Zou
International Conference on Computational…
2009
Corpus ID: 18127097
The concept of byzantine attack comes from Byzantine Generals Problem. In this abstract concept, the loyal byzantine army general…
Expand
2008
2008
Distributed intrusion detection using mobile agents against DDoS attacks
Ugur Akyazi
,
A. Uyar
International Symposium on Computer and…
2008
Corpus ID: 15611801
Along with the increasing wide applications of computer and network technologies, the security problems of information systems…
Expand
2007
2007
Attacks on Sensing in Hostile Wireless Sensor-Actuator Environments
Alexandra Czarlinska
,
William Luh
,
D. Kundur
IEEE GLOBECOM - IEEE Global Telecommunications…
2007
Corpus ID: 9198051
Wireless Sensor Networks (WSNs) deployed in hostile environments are susceptible to various attacks directed at their data. In…
Expand
2006
2006
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks
Zonghua Zhang
,
P. Ho
,
Xiaodong Lin
,
Hong Shen
International Conference on Information Security…
2006
Corpus ID: 31588418
The multi-stage coordinated attack (MSCA) bring many challenges to the security analysts due to their special temporal an spacial…
Expand
2003
2003
Microbiological and Biological Aspects of the Wastewater Treatment Plant "Wschód" in Gdańsk
K. olańczuk-Neyman
,
M. Geneja
,
+6 authors
M. Gielert
2003
Corpus ID: 38259901
This study indicates that in the wastewater treatment plant “Wschod” in Gdansk, working in the modified UCT system, the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE