-
1
-
-
38149139869
-
Approximability of dense and sparse instances of minimum 2-connectivity, TSP and path problems
-
Philadelphia, PA, USA
-
B. Csaba, M. Karpinski, and P. Krysta. Approximability of dense and sparse instances of minimum 2-connectivity, TSP and path problems. In SODA '02: Proceedings of the thirteenth annual ACM-SIAM Symposium on Discrete algorithms, pages 74-83, Philadelphia, PA, USA, 2002.
-
(2002)
SODA '02: Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 74-83
-
-
Csaba, B.1
Karpinski, M.2
Krysta, P.3
-
2
-
-
26444573149
-
Searching for a black hole in tree networks
-
Springer LNCS
-
J. Czyzowicz, D. Kowalski, E. Markou, and A. Pelc. Searching for a black hole in tree networks. In Proc. 8th Int. Conf. on Principles of Distributed Systems (OPODIS 2004), Springer LNCS vol.3544, pages 67-80, 2004.
-
(2004)
Proc. 8th Int. Conf. on Principles of Distributed Systems (OPODIS 2004)
, vol.3544
, pp. 67-80
-
-
Czyzowicz, J.1
Kowalski, D.2
Markou, E.3
Pelc, A.4
-
4
-
-
24944487462
-
Black hole search by mobile agents in hypercubes and related networks
-
S. Dobrev, P. Flocchini, R. Kralovic, G. Prencipe, P. Ruzicka, and N. Santoro. Black hole search by mobile agents in hypercubes and related networks. In Proc. 6th Int. Conf. on Principles of Distributed Systems (OPODIS 2002), pages 169-180, 2002.
-
(2002)
Proc. 6th Int. Conf. on Principles of Distributed Systems (OPODIS 2002)
, pp. 169-180
-
-
Dobrev, S.1
Flocchini, P.2
Kralovic, R.3
Prencipe, G.4
Ruzicka, P.5
Santoro, N.6
-
5
-
-
84957010128
-
Mobile agents searching for a black hole in an anonymous ring
-
Springer LNCS
-
S. Dobrev, P. Flocchini, G. Prencipe, and N. Santoro. Mobile agents searching for a black hole in an anonymous ring. In Proc. 15th Int. Symposium on Distributed Computing (DISC 2001), Springer LNCS vol. 2180, pages 166-179, 2001.
-
(2001)
Proc. 15th Int. Symposium on Distributed Computing (DISC 2001)
, vol.2180
, pp. 166-179
-
-
Dobrev, S.1
Flocchini, P.2
Prencipe, G.3
Santoro, N.4
-
6
-
-
0036954350
-
Searching for a black hole in arbitrary networks: Optimal mobile agents protocols
-
S. Dobrev, P. Flocchini, G. Prencipe, and N. Santoro. Searching for a black hole in arbitrary networks: Optimal mobile agents protocols. In Proc. 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), pages 153-161, 2002.
-
(2002)
Proc. 21st ACM Symposium on Principles of Distributed Computing (PODC 2002)
, pp. 153-161
-
-
Dobrev, S.1
Flocchini, P.2
Prencipe, G.3
Santoro, N.4
-
7
-
-
84870774810
-
TSP with bounded metrics: Stronger approximation hardness
-
University of Bonn, February
-
L. Engebretsen and M. Karpinski. TSP with bounded metrics: stronger approximation hardness. Technical Report 85264, University of Bonn, February 2005.
-
(2005)
Technical Report 85264
-
-
Engebretsen, L.1
Karpinski, M.2
-
8
-
-
0001943763
-
Time limited black box security: Protecting mobile agents from malicious hosts
-
Springer LNCS
-
F. Hohl. Time limited black box security: Protecting mobile agents from malicious hosts. In Proc. Conf. on Mobile Agent Security, Springer LNCS vol. 1419, pages 92-113, 1998.
-
(1998)
Proc. Conf. on Mobile Agent Security
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
10
-
-
24944494818
-
Hardness and approximation results for black hole search in arbitrary graphs
-
Springer LNCS
-
R. Klasing, E. Markou, T. Radzik, and F. Sarracco. Hardness and approximation results for black hole search in arbitrary graphs. In Proc. 12th Int. Colloquium on Structural Information and Communication Complexity (SIROCCO 2005), Springer LNCS vol. 3499, pages 200-215, 2005.
-
(2005)
Proc. 12th Int. Colloquium on Structural Information and Communication Complexity (SIROCCO 2005)
, vol.3499
, pp. 200-215
-
-
Klasing, R.1
Markou, E.2
Radzik, T.3
Sarracco, F.4
-
12
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Springer LNCS
-
T. Sander and CF. Tschudin. Protecting mobile agents against malicious hosts. In Proc. Conf. on Mobile Agent Security, Springer LNCS vol. 1419, pages 44-60, 1998.
-
(1998)
Proc. Conf. on Mobile Agent Security
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
|