Technical Approach
Solid theoretical base:
- Analysis of new, strong adversary models.
Network level resiliency:
- Near-optimal routing and dissemination protocols that overcome strong adversaries.
Information access resiliency:
- Sophisticated replication protocols that allow graceful degradation of performance and semantics as network hostility increases.
Optimized resource management:
- A cost benefit framework to manage resources and adaptively switch gears as network conditions change.