A maximum independent set approach for collusion detection in voting pools
From agreement problems to replicated software execution, we frequently find scenarios
with voting pools. Unfortunately, Byzantine adversaries can join and collude to distort the …
with voting pools. Unfortunately, Byzantine adversaries can join and collude to distort the …
Distributed results checking for MapReduce in volunteer computing
MapReduce is a promising approach to support data-intensive applications on Volunteer
Computing Systems. Existent middleware like Bit Dew allows running MapReduce …
Computing Systems. Existent middleware like Bit Dew allows running MapReduce …
Collusion in peer-to-peer systems
G Ciccarelli, RL Cigno - Computer Networks, 2011 - Elsevier
P2P systems are used to provide distributed storage, file sharing, video streaming,
distributed gaming, and other applications based on the collaboration of participating peers …
distributed gaming, and other applications based on the collaboration of participating peers …
[PDF][PDF] Trusted community: a novel multiagent organisation for open distributed systems
L Klejnowski - 2014 - repo.uni-hannover.de
Open Distributed Systems, be it the Internet, peer-to-peer systems, e-commerce systems,
Desktop Grid Systems, wireless sensor networks, or vehicular ad-hoc networks, have …
Desktop Grid Systems, wireless sensor networks, or vehicular ad-hoc networks, have …
Collusion detection for grid computing
A common technique for result verification in grid computing is to delegate a computation
redundantly to different workers and apply majority voting to the returned results. However …
redundantly to different workers and apply majority voting to the returned results. However …
Virtual screening in a desktop grid: Replication and the optimal quorum
I Chernov, N Nikitina - … , PaCT 2015, Petrozavodsk, Russia, August 31 …, 2015 - Springer
We propose a mathematical model of a desktop grid computing system that solves tasks with
two possible answers. Replication is used in order to reduce the error risk: wrong answers …
two possible answers. Replication is used in order to reduce the error risk: wrong answers …
Optimal spot-checking for collusion tolerance in computer grids
Many grid-computing systems adopt voting-based techniques to resist sabotage. However,
these techniques become ineffective in grid systems subject to collusion behavior, where …
these techniques become ineffective in grid systems subject to collusion behavior, where …
Algorithmic mechanisms for reliable crowdsourcing computation under collusion
We consider a computing system where a master processor assigns a task for execution to
worker processors that may collude. We model the workers' decision of whether to comply …
worker processors that may collude. We model the workers' decision of whether to comply …
CoVFeFE: Collusion-Resilient verifiable computing framework for Resource-Constrained devices at network edge
With the rapid growth of Internet of Vehicles (IoV) applications and the advancement of edge
computing, resource-limited vehicles (and other IoT devices) increasingly rely on external …
computing, resource-limited vehicles (and other IoT devices) increasingly rely on external …
A fuzzy collusive attack detection mechanism for reputation aggregation in mobile social networks: A trust relationship based perspective
B Zhang, Q Song, T Yang, Z Zheng… - Mobile Information …, 2016 - Wiley Online Library
While the mechanism of reputation aggregation proves to be an effective scheme for
indicating an individual's trustworthiness and further identifying malicious ones in mobile …
indicating an individual's trustworthiness and further identifying malicious ones in mobile …