Scattered Black Hole Search in an Oriented Ring using Tokens
暂无分享,去创建一个
Wei Shi | Nicola Santoro | Stefan Dobrev | S. Dobrev | N. Santoro | Wei Shi
[1] Euripides Markou,et al. Hardness and approximation results for Black Hole Search in arbitrary networks , 2007, Theor. Comput. Sci..
[2] Euripides Markou,et al. Searching for a Black Hole in Synchronous Tree Networks , 2007, Comb. Probab. Comput..
[3] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[4] Nicola Santoro,et al. Searching for a black hole in arbitrary networks: optimal mobile agent protocols , 2002, PODC '02.
[5] Rolf Oppliger. Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..
[6] W. A. Jansen,et al. MOBILE AGENTS AND SECURITY , 1999 .
[7] Nicola Santoro,et al. Mobile Search for a Black Hole in an Anonymous Ring , 2007, Algorithmica.
[8] Nicola Santoro,et al. Searching for a black hole in arbitrary networks: optimal mobile agents protocols , 2006, Distributed Computing.
[9] Colin Cooper,et al. Searching for Black-Hole Faults in a Network Using Multiple Agents , 2006, OPODIS.
[10] Wei Shi,et al. Locating a Black Hole in an Un-oriented Ring Using Tokens: The Case of Scattered Agents , 2007, Euro-Par.
[11] Euripides Markou,et al. Complexity of Searching for a Black Hole , 2006, Fundam. Informaticae.
[12] Nicola Santoro,et al. Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[13] Nicola Santoro,et al. Multiple Agents RendezVous in a Ring in Spite of a Black Hole , 2003, OPODIS.
[14] Wei Shi,et al. Black Hole Search in Asynchronous Rings Using Tokens , 2006, CIAC.
[15] Nicola Santoro,et al. Exploring an Unknown Graph to Locate a Black Hole Using Tokens , 2006, IFIP TCS.
[16] Nicola Santoro,et al. Black hole search in common interconnection networks , 2006 .