Technical Approach
 
 
- Solid theoretical base:
- 
- Analysis of new, strong adversary models.
 
- Network level resiliency:
- 
- Near-optimal routing and dissemination protocols that overcome strong adversaries.
 
- Information access resiliency:
- 
- Sophisticated replication protocols that allow graceful degradation of performance and semantics as network hostility increases.
 
- Optimized resource management:
- 
- A cost benefit framework to manage resources and adaptively switch gears as network conditions change.