Hardness and Approximation Results for Black Hole Search in Arbitrary Graphs
暂无分享,去创建一个
[1] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[2] Euripides Markou,et al. Complexity of Searching for a Black Hole , 2006, Fundam. Informaticae.
[3] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[4] Nicola Santoro,et al. Searching for a black hole in arbitrary networks: optimal mobile agent protocols , 2002, PODC '02.
[5] Euripides Markou,et al. Searching for a Black Hole in Tree Networks , 2004, OPODIS.
[6] David S. Johnson,et al. The Planar Hamiltonian Circuit Problem is NP-Complete , 1976, SIAM J. Comput..
[7] Kwok-Wai Cheung,et al. Protecting Mobile Agents Against Malicious Hosts by Intention Spreading , 1999, PDPTA.
[8] Jan Vitek,et al. Mobile Computations and Hostile Hosts , 1999 .
[9] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[10] Daniel J. Kleitman,et al. Spanning Trees with Many Leaves , 1991, SIAM J. Discret. Math..
[11] Nicola Santoro,et al. Multiple Agents RendezVous in a Ring in Spite of a Black Hole , 2003, OPODIS.
[12] Nicola Santoro,et al. Searching for a black hole in arbitrary networks: optimal mobile agents protocols , 2006, Distributed Computing.
[13] Nicola Santoro,et al. Mobile Search for a Black Hole in an Anonymous Ring , 2001, DISC.
[14] Jon Ølnes,et al. Mobile Agent Security - Issues and Directions , 1999, IS&N.
[15] Nicola Santoro,et al. Black Hole Search by Mobile Agents in Hypercubes and Related Networks , 2002, OPODIS.
[16] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.