gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu researc...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu researc...
Date: Thu, 06 Feb 2003 04:45:08 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/02/06 04:45:07

Modified files:
        Documentation/misc/hemppah-progradu: research_problems 

Log message:
        Problem table updates

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/research_problems.diff?tr1=1.47&tr2=1.48&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/research_problems
diff -u gzz/Documentation/misc/hemppah-progradu/research_problems:1.47 
gzz/Documentation/misc/hemppah-progradu/research_problems:1.48
--- gzz/Documentation/misc/hemppah-progradu/research_problems:1.47      Thu Feb 
 6 04:39:18 2003
+++ gzz/Documentation/misc/hemppah-progradu/research_problems   Thu Feb  6 
04:45:06 2003
@@ -216,8 +216,8 @@
 Routing:                               Incorrect forwarding (hostile),         
        Query monitoring, crossc heck
                                        incorrect routing (hostile)             
        routing tables
                                                                                
                                                
-DoS:                                   Distributed, controlled burden of a     
        Client puzzles
-                                       computer(s)
+DoS:                                   Distributed, controlled burden againts  
        Client puzzles
+                                       specific computer(s)
                                        
 Sybil:                                 Single hostile entity present multiple  
        Resource demanding mechanisms for       Not practically realizable
                                        entities                                
        validating identities
@@ -227,15 +227,15 @@
                                        
 Resource spoofing:                     Hostile entity gives wrong information
                                        about the data which entity is 
responsible
-                                       for
+                                       for/knows about
                                        
 Sudden network partition:              Sub network is isolated from other 
network
-                                       because of disconnection
+                                       because of network disconnection
                                        
-Searching:                             Efficient searching exploiting previous
-                                       queries                                 
        View trees, bloom filters
+Searching:                             Efficient searching requires exploiting 
+                                       of previous queries                     
        View trees, bloom filters
                                        
-Efficient Resource discovery:          Find resources efficiently, if resource
+Efficient data discovery:              Find resources efficiently, if resource
                                        exists (broadcasting)
                                        
 Entity identification:                 Identify participating entities reliably
@@ -246,10 +246,10 @@
 
 Byzantine faults:                      Faulty nodes may behave arbitrarily
 
-Richness of queries:                   Queries should be more powerful
+Richness of queries:                   Query languages should be more powerful
 
 Robustness:                            How well system performs under hostile
-                                       attacks
+                                       attacks/in the case of severe failure
                                        
 Quality of Service, QoS:               The system cannot promise the quality 
of 
                                        service in all cases
@@ -265,7 +265,7 @@
 Malicious nodes:                       There are malicious nodes in the system.
                                        How we are able to discover them ?
                                        
-Mutual distrust:                       Nobody trust anybody
+Mutual distrust:                       Nobody trust anybody, this is a problem
 
 Lack of motivation to cooperate:       All participants do not behave
                                        like they should be, instead they go 
for 
@@ -273,7 +273,7 @@
                                        
 Heterogeneity:                         There are different kind of nodes
                                        in the system, in light of bandwidth
-                                       and computing power.
+                                       and computing power
                                        
 Network proximity:                     Can we take account the underlying
                                        network's properties better when forming
@@ -284,7 +284,7 @@
 
 Hotspots:                              What will happen if some resource
                                        is extremely popular and only
-                                       one node is hosting it
+                                       one node is hosting it ?
                                        
 Scalability:                           Broadcasting doesn't scale when 
performing
                                        searches




reply via email to

[Prev in Thread] Current Thread [Next in Thread]