Two Generals' Problem

Known as: Two Generals Paradox, Generals dilemma, Two Armies Problem 
In computing, the Two Generals Problem is a thought experiment meant to illustrate the pitfalls and design challenges of attempting to coordinate an… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The existing research on the Internet of Things(IoT) security mainly focuses on attack and defense on a single protocol layer… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Smart grid is vulnerable to many cyber attacks due to legacy nature of the infrastructure coupled with increase in control and… (More)
Is this relevant?
Review
2014
Review
2014
Multiple sclerosis (MS) is the most common chronic autoimmune neuromuscular disease with prevalence rates that has increased in… (More)
  • table 1
  • table 2
Is this relevant?
2012
2012
Long Term Evolution (LTE) is seen as the key enabler for delivering the fourth generation of mobile broadband and is the first… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 6
Is this relevant?
2012
2012
We document a divergence in the duration of rule for monarchs in Western Europe and the Islamic world beginning in the medieval… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The black hole attack is one of the security attacks that occur in mobile ad hoc networks (MANETs). In this article, the routing… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 6
Is this relevant?
2008
2008
In 1979, Smith et al. (1981) observed a group of seven killer whales (Orcinus orca) conduct a coordinated attack on a crabeater… (More)
  • table 2
  • figure 1
  • figure 1
  • figure 2
Is this relevant?
2008
2008
Software simulations have been widely used to model evacuations from fire but very few have been used to analyse a wider range of… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Byzantine Generals protocols enable processes to broadcast messages reliably in the presence of faulty processes. These protocols… (More)
Is this relevant?