Exponential information gathering gets Sample Clauses

Exponential information gathering gets n = 3f +1 The idea of exponential information gathering is that each process will do a lot of gossiping, but now its state is no longer just a flat set of inputs, but a tree describing who it heard what from. We build this tree out of pairs of the form (path, input) where path is a sequence of intermediaries with no repetitions and input is some input. A process’s state at each round is just a set of such pairs. At the end of f +1 rounds of communication (necessary because of the lower bound for crash failures), each non-faulty process attempts to untangle the complex web of hearsay and second-hand lies to compute the same decision value as the other processes. This technique was used by Pease, Shostak, and Lamport [PSL80] to show that their impossibility result is tight: there exists an algorithm for Byzantine agreement that runs in f +1 synchronous rounds and guarantees agreement and validity as long as n ≥ 3f + 1. → {⟨⟨⟩ ⟩} 1 S , input → 2 for round 0 .. .f do {⟨ ⟩ | ⟨ ⟩∈ Λ | | Λ /∈ } 3 Send xi, v x, v S x = round i x to all processes 4 upon receiving SÕ from j do // Filter out obviously bogus tuples 5 if 6 ⟨xjÕ, v⟩∈ SÕ : |x| = round Λ jÕ = j then 6 S → S ∪ SÕ // Compute decision value 7 for each path w of length f +1 with no repeats do ⟨ ⟩∈ 8 if w, v S for some v then 9 Let valÕ(w, i) = v 10 else 11 Let valÕ(w, i) = 0 12 for each path w of length f or less with no repeats do 13 Let valÕ(w, i) = majorityj/œw val(wj, i) 14 Decide valÕ(⟨⟩ , i)
AutoNDA by SimpleDocs

Related to Exponential information gathering gets

  • INITIAL INFORMATION § 1.1 This Agreement is based on the Initial Information set forth in this Section 1.1. (For each item in this section, insert the information or a statement such as “not applicable” or “unknown at time of execution.”)

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Payroll Information Payroll checks shall include all required information, a clear designation as to the amount and category, e.g., regular, overtime or holiday pay, of compensation for which payment is being made.

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • E4 Confidential Information E4.1 Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:

  • Treatment of Confidential Information (a) The Parties shall not, and shall cause all other Persons providing Services or having access to information of the other Party that is known to such Party as confidential or proprietary (the “Confidential Information”) not to, disclose to any other Person or use, except for purposes of this Agreement, any Confidential Information of the other Party; provided, however, that the Confidential Information may be used by such Party to the extent that such Confidential Information has been (i) in the public domain through no fault of such Party or any member of such Group or any of their respective Representatives or (ii) later lawfully acquired from other sources by such Party (or any member of such Party’s Group), which sources are not themselves bound by a confidentiality obligation; provided, further, that each Party may disclose Confidential Information of the other Party, to the extent not prohibited by applicable Law: (A) to its Representatives on a need-to-know basis in connection with the performance of such Party’s obligations under this Agreement; (B) in any report, statement, testimony or other submission required to be made to any Governmental Authority having jurisdiction over the disclosing Party; or (C) in order to comply with applicable Law, or in response to any summons, subpoena or other legal process or formal or informal investigative demand issued to the disclosing Party in the course of any litigation, investigation or administrative proceeding. In the event that a Party becomes legally compelled (based on advice of counsel) by deposition, interrogatory, request for documents subpoena, civil investigative demand or similar judicial or administrative process to disclose any Confidential Information of the other Party, such disclosing Party shall provide the other Party with prompt prior written notice of such requirement, and, to the extent reasonably practicable, cooperate with the other Party (at such other Party’s expense) to obtain a protective order or similar remedy to cause such Confidential Information not to be disclosed, including interposing all available objections thereto, such as objections based on settlement privilege. In the event that such protective order or other similar remedy is not obtained, the disclosing Party shall furnish only that portion of the Confidential Information that has been legally compelled, and shall exercise its commercially reasonable efforts (at such other Party’s expense) to obtain assurance that confidential treatment will be accorded such Confidential Information.

  • Full information You must give us any information we reasonably require for the purposes of this contract. The information must be correct, and you must not mislead or deceive us in relation to any information provided to us.

  • Return of Confidential Information Upon termination or expiration of this Agreement, the Receiving Party shall return all copies of the Disclosing Party’s confidential information (with the exception of 1 archival copy for the purpose of compliance with these obligations) or remove same from all media and destroy same.

  • CENTURYLINK OSS INFORMATION 57.1 Subject to the provisions of this Agreement and Applicable Law, CLEC shall have a limited, revocable, non-transferable, non-exclusive right to use CenturyLink OSS Information during the term of this Agreement, for CLEC’s internal use for the provision of Telecommunications Services to CLEC End Users in the State.

  • Disposal of Confidential Information The disposal of all printed materials containing Citizens Confidential Information must be done in a manner that renders the information inaccessible to others (the use of a reputable third party shredding company is permissible).

Time is Money Join Law Insider Premium to draft better contracts faster.