-
1
-
-
0033714291
-
Exploring unknown environments
-
S. Alberts and M.R. Henzinger, Exploring unknown environments, SIAM J Comput 29 (2000), 1164-1188.
-
(2000)
SIAM J Comput
, vol.29
, pp. 1164-1188
-
-
Alberts, S.1
Henzinger, M.R.2
-
2
-
-
0000733092
-
The data grid: Towards an architecture for the distributed management and analysis of large scientific dataset
-
W. Allcock, A. Chervenak, I. Foster, C. Kesselman, C. Salisbury, and S. Tuecke, The data grid: Towards an architecture for the distributed management and analysis of large scientific dataset, J Network Comput Appl 2002.
-
(2002)
J Network Comput Appl
-
-
Allcock, W.1
Chervenak, A.2
Foster, I.3
Kesselman, C.4
Salisbury, C.5
Tuecke, S.6
-
3
-
-
84968918943
-
The freeze-tag problem: How to wake up a swarm of robots
-
E. Arkin, M. Bender, S. Fekete, and J. Mitchell, "The freeze-tag problem: How to wake up a swarm of robots," 13th ACM-SIAM Symposium on Discrete Algorithms (SODA '02), 2002, pp. 568-577.
-
(2002)
13th ACM-SIAM Symposium on Discrete Algorithms (SODA '02)
, pp. 568-577
-
-
Arkin, E.1
Bender, M.2
Fekete, S.3
Mitchell, J.4
-
4
-
-
0002380598
-
Security issues in mobile code systems
-
Conference on Mobile Agent Security
-
D.M. Chess, "Security issues in mobile code systems," Conference on Mobile Agent Security, LNCS 1419, 1998, pp. 1-14.
-
(1998)
LNCS
, vol.1419
, pp. 1-14
-
-
Chess, D.M.1
-
5
-
-
0142183805
-
Deterministic rendezvous in graphs
-
A. Dessmark, P. Fraigniaud, and A. Pelc, "Deterministic rendezvous in graphs," 11th Annual European Symposium on Algorithms (ESA '03), 2003, pp. 184-195.
-
(2003)
11th Annual European Symposium on Algorithms (ESA '03)
, pp. 184-195
-
-
Dessmark, A.1
Fraigniaud, P.2
Pelc, A.3
-
6
-
-
84868384208
-
Tree exploration with little memory
-
K. Diks, P. Fraigniaud, E. Kranakis, and A. Pelc, "Tree exploration with little memory," 13th ACM-SIAM Symposium on Discrete Algorithms (SODA '02), 2002, pp. 588-597.
-
(2002)
13th ACM-SIAM Symposium on Discrete Algorithms (SODA '02)
, pp. 588-597
-
-
Diks, K.1
Fraigniaud, P.2
Kranakis, E.3
Pelc, A.4
-
7
-
-
84957010128
-
Mobile agents searching for a black hole in an anonymous ring
-
S. Dobrev, P. Flocchini, G. Prencipe, and N. Santoro, "Mobile agents searching for a black hole in an anonymous ring," 15th Int. Symposium on Distributed Computing (DISC 2001), 2001, pp. 166-179.
-
(2001)
15th Int. Symposium on Distributed Computing (DISC 2001)
, pp. 166-179
-
-
Dobrev, S.1
Flocchini, P.2
Prencipe, G.3
Santoro, N.4
-
8
-
-
0036954350
-
Finding a black hole in an arbitrary network: Optimal mobile agents protocols
-
S. Dobrev, P. Flocchini, G. Prencipe, and N. Santoro, "Finding a black hole in an arbitrary network: Optimal mobile agents protocols," 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), 2002, pp. 153-162.
-
(2002)
21st ACM Symposium on Principles of Distributed Computing (PODC 2002)
, pp. 153-162
-
-
Dobrev, S.1
Flocchini, P.2
Prencipe, G.3
Santoro, N.4
-
9
-
-
27644440909
-
Collective tree exploration
-
P. Fraigniaud, L. Gasieniec, D.R. Kowalski, and A. Pelc, "Collective tree exploration," 6th Latin American Theoretical Informatics Symposium 2004, 2004, pp. 141-151.
-
(2004)
6th Latin American Theoretical Informatics Symposium 2004
, pp. 141-151
-
-
Fraigniaud, P.1
Gasieniec, L.2
Kowalski, D.R.3
Pelc, A.4
-
11
-
-
0032123682
-
Mobile agents and security
-
M.S. Greenberg, J.C. Byington, and D.G. Harper, Mobile agents and security, IEEE Commun Mag 36 (1998), 76-85.
-
(1998)
IEEE Commun Mag
, vol.36
, pp. 76-85
-
-
Greenberg, M.S.1
Byington, J.C.2
Harper, D.G.3
-
12
-
-
33645140788
-
Memoryless search algorithms in a network with faulty advice
-
N. Hanusse, D. Kavvadias, E. Kranakis, and D. Krizanc, "Memoryless search algorithms in a network with faulty advice," 2nd IFIP International Conference on Theoretical Computer Science (TCS '02), 2002, pp. 206-216.
-
(2002)
2nd IFIP International Conference on Theoretical Computer Science (TCS '02)
, pp. 206-216
-
-
Hanusse, N.1
Kavvadias, D.2
Kranakis, E.3
Krizanc, D.4
-
13
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Conference on Mobile Agent Security
-
F. Hohl, "Time limited blackbox security: Protecting mobile agents from malicious hosts," Conference on Mobile Agent Security, LNCS 1419, 1998, pp. 92-113.
-
(1998)
LNCS
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
15
-
-
84956988505
-
Locating information with uncertainty in fully interconnected networks
-
14th International Symposium on Distributed Computing (DISC 2000)
-
L.M. Kirousis, E. Kranakis, D. Krizanc, and Y. Stamatiou, "Locating information with uncertainty in fully interconnected networks," 14th International Symposium on Distributed Computing (DISC 2000), LNCS 1914, 2000, pp. 283-296.
-
(2000)
LNCS
, vol.1914
, pp. 283-296
-
-
Kirousis, L.M.1
Kranakis, E.2
Krizanc, D.3
Stamatiou, Y.4
-
16
-
-
0003819663
-
-
Morgan Kaufmann Publishers Inc., San Francisco, CA
-
FT. Leighton, Introduction to parallel algorithms and architectures: Arrays, trees, hypercubes, Morgan Kaufmann Publishers Inc., San Francisco, CA, 1992.
-
(1992)
Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes
-
-
Leighton, F.T.1
-
17
-
-
0032665338
-
Security issues related to mobile code and agent-based systems
-
R. Oppliger, Security issues related to mobile code and agent-based systems, Comput Communs 22 (1999), 1165-1170.
-
(1999)
Comput Communs
, vol.22
, pp. 1165-1170
-
-
Oppliger, R.1
-
18
-
-
0000049929
-
Exploring unknown undirected graphs
-
P. Panaite and A. Pelc, Exploring unknown undirected graphs, J Algorithms 33 (1999), 281-295.
-
(1999)
J Algorithms
, vol.33
, pp. 281-295
-
-
Panaite, P.1
Pelc, A.2
-
19
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Conference on Mobile Agent Security
-
T. Sander and C.F. Tschudin, "Protecting mobile agents against malicious hosts," Conference on Mobile Agent Security, LNCS 1419, 1998, pp. 44-60.
-
(1998)
LNCS
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
20
-
-
84957604348
-
Mobile agent security - Issues and directions
-
6th Int. Conf. on Intelligence and Services in Networks
-
K. Schelderup and J. Ones, "Mobile agent security - Issues and directions," 6th Int. Conf. on Intelligence and Services in Networks, LNCS 1597, 1999, pp. 155-167.
-
(1999)
LNCS
, vol.1597
, pp. 155-167
-
-
Schelderup, K.1
Ones, J.2
-
22
-
-
0012526412
-
Mobile computations and hostile hosts
-
D. Tsichritzis (Editor), University of Geneva
-
J. Vitek and G. Castagna, "Mobile computations and hostile hosts," Mobile objects, D. Tsichritzis (Editor), University of Geneva, 1999.
-
(1999)
Mobile Objects
-
-
Vitek, J.1
Castagna, G.2
-
23
-
-
84947780688
-
Agent rendezvous: A dynamic symmetry-breaking problem
-
23rd International Colloquium on Automata, Languages, and Programming (ICALP '96)
-
X. Yu and M. Yung, "Agent rendezvous: A dynamic symmetry-breaking problem," 23rd International Colloquium on Automata, Languages, and Programming (ICALP '96), LNCS 1099, 1996, pp. 610-621.
-
(1996)
LNCS
, vol.1099
, pp. 610-621
-
-
Yu, X.1
Yung, M.2
|