Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10337967 | Ad Hoc Networks | 2012 | 15 Pages |
Abstract
The proposed schemes support addition and removal of processes from the swarm, as well as corruption of a small portion of the processes in the swarm.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Shlomi Dolev, Limor Lahiani, Moti Yung,