-
3
-
-
0003337684
-
A method of tracing intruders by use of mobile agent
-
M. Asaka, S. Okazawa, A. Taguchi, S. Goto. "A method of tracing intruders by use of mobile agent". INET, www.isoc.org, 1999.
-
(1999)
INET
-
-
Asaka, M.1
Okazawa, S.2
Taguchi, A.3
Goto, S.4
-
5
-
-
0036948911
-
Capture of an intruder by mobile agents
-
L. Barrière, P. Flocchini, P. Fraigniaud, N. Santoro. "Capture of an intruder by mobile agents". Proc. 14th ACM-SIAM Symp. on Parallel Algorithms and Architectures (SPAA), 200-209, 2002.
-
(2002)
Proc. 14th ACM-SIAM Symp. on Parallel Algorithms and Architectures (SPAA)
, pp. 200-209
-
-
Barrière, L.1
Flocchini, P.2
Fraigniaud, P.3
Santoro, N.4
-
6
-
-
0038040966
-
Can we elect if we cannot compare?
-
L. Barrière, P. Flocchini, P. Fraigniaud, N. Santoro. "Can we elect if we cannot compare?" in Proc. 15th ACM Symp. on Parallel Algorithms and Architectures (SPAA), 200-209, 2003.
-
(2003)
Proc. 15th ACM Symp. on Parallel Algorithms and Architectures (SPAA)
, pp. 200-209
-
-
Barrière, L.1
Flocchini, P.2
Fraigniaud, P.3
Santoro, N.4
-
8
-
-
0345254993
-
Searching is not jumping
-
LNCS 2880
-
L. Barrière, P. Fraigniaud, N. Santoro, D.M. Thilikos. "Searching is not jumping". Proc. 29th Int. Workshop on Graph Theoretic Concepts in Computer Science (WG), LNCS 2880, 34-45, 2003.
-
(2003)
Proc. 29th Int. Workshop on Graph Theoretic Concepts in Computer Science (WG)
, pp. 34-45
-
-
Barrière, L.1
Fraigniaud, P.2
Santoro, N.3
Thilikos, D.M.4
-
9
-
-
0031632860
-
The power of a pebble: Exploring and mapping directed graphs
-
M. Bender, A. Fernandez, D. Ron, A. Sahai, S. Vadhan. "The power of a pebble: Exploring and mapping directed graphs". In Proc. 30th ACM Symp. on Theory of Computing (STOC), 269-287, 1998.
-
(1998)
Proc. 30th ACM Symp. on Theory of Computing (STOC)
, pp. 269-287
-
-
Bender, M.1
Fernandez, A.2
Ron, D.3
Sahai, A.4
Vadhan, S.5
-
11
-
-
33746347716
-
Distributed chasing of network intruders by mobile agents
-
L. Blin, P. Fraigniaud, N. Nisse, S. Vial. "Distributed chasing of network intruders by mobile agents". Proc. of the 13th Int. Coll. on Structural Information and Communication Complexity (SIROCCO), 70-84, 2006.
-
(2006)
Proc. of the 13th Int. Coll. on Structural Information and Communication Complexity (SIROCCO)
, pp. 70-84
-
-
Blin, L.1
Fraigniaud, P.2
Nisse, N.3
Vial, S.4
-
13
-
-
24944505866
-
Searching for a black hole in tree networks
-
J. Czyzowicz, D. Kowalski, E. Markou, A. Pelc. "Searching for a black hole in tree networks". Proc. 8th Int. Conf. on Principle of Distributed Systems (OPODIS), 35-45, 2004.
-
(2004)
Proc. 8th Int. Conf. on Principle of Distributed Systems (OPODIS)
, pp. 35-45
-
-
Czyzowicz, J.1
Kowalski, D.2
Markou, E.3
Pelc, A.4
-
14
-
-
33745119003
-
Complexity of searching for a black hole
-
35-45
-
J. Czyzowicz, D. Kowalski, E. Markou, A. Pelc. "Complexity of searching for a black hole". Fundamenta Informaticae, 71(2-3), 229-242, 2006. 35-45, 2004.
-
(2004)
Fundamenta Informaticae
, vol.71
, Issue.2-3
, pp. 229-242
-
-
Czyzowicz, J.1
Kowalski, D.2
Markou, E.3
Pelc, A.4
-
15
-
-
24944457147
-
Exploration and labelling of an unknown graph by multiple agents
-
S. Das, P. Flocchini, A. Nayak, N. Santoro. "Exploration and labelling of an unknown graph by multiple agents" Proc. 12th Int. Coll. on Structural Information and Communication Complexity, (SIROCCO), 99-114, 2005.
-
(2005)
Proc. 12th Int. Coll. on Structural Information and Communication Complexity, (SIROCCO)
, pp. 99-114
-
-
Das, S.1
Flocchini, P.2
Nayak, A.3
Santoro, N.4
-
20
-
-
1842612563
-
Tree exploration with little memory
-
K. Diks, P. Fraigniaud, E. Kranakis, A. Pelc. "Tree exploration with little memory". Journal of Algorithms, 51:38-63, 2004.
-
(2004)
Journal of Algorithms
, vol.51
, pp. 38-63
-
-
Diks, K.1
Fraigniaud, P.2
Kranakis, E.3
Pelc, A.4
-
24
-
-
33645140802
-
Optimal search for a black hole in common interconnection networks
-
S. Dobrev, P. Flocchini, R. Kralovic, G. Prencipe, P. Ruzicka, N. Santoro. "Optimal search for a black hole in common interconnection networks". Networks, 47 (2), p. 61-71, 2006.
-
(2006)
Networks
, vol.47
, Issue.2
, pp. 61-71
-
-
Dobrev, S.1
Flocchini, P.2
Kralovic, R.3
Prencipe, G.4
Ruzicka, P.5
Santoro, N.6
-
26
-
-
33845605483
-
Exploring a dangerous unknown graph using tokens
-
S. Dobrev, P. Flocchini, R. Kralovic, N. Santoro. "Exploring a dangerous unknown graph using tokens". Proc. 5th IFIP Int. Conf. on Theoretical Computer Science (TCS), 131-150, 2006.
-
(2006)
Proc. 5th IFIP Int. Conf. on Theoretical Computer Science (TCS)
, pp. 131-150
-
-
Dobrev, S.1
Flocchini, P.2
Kralovic, R.3
Santoro, N.4
-
28
-
-
33746078073
-
Black hole search in asynchronous rings using tokens
-
S. Dobrev, R. Kralovic, N. Santoro, W. Shi. "Black Hole Search in Asynchronous Rings Using Tokens". Proc. 6th Conf. on Algorithms and Complexity (CIAC), 139-150, 2006.
-
(2006)
Proc. 6th Conf. on Algorithms and Complexity (CIAC)
, pp. 139-150
-
-
Dobrev, S.1
Kralovic, R.2
Santoro, N.3
Shi, W.4
-
29
-
-
0026365074
-
Robotic exploration as graph construction
-
G. Dudek, M. Jenkin, E. Milios, D. Wilkes. "Robotic exploration as graph construction". Transactions on Robotics and Automation, 7(6):859-865, 1991.
-
(1991)
Transactions on Robotics and Automation
, vol.7
, Issue.6
, pp. 859-865
-
-
Dudek, G.1
Jenkin, M.2
Milios, E.3
Wilkes, D.4
-
30
-
-
0002492958
-
The vertex separation and search number of a graph
-
J. Ellis, H. Sudborough, J. Turner. "The vertex separation and search number of a graph". Information and Computation, 113(1):50-79, 1994.
-
(1994)
Information and Computation
, vol.113
, Issue.1
, pp. 50-79
-
-
Ellis, J.1
Sudborough, H.2
Turner, J.3
-
31
-
-
33745614932
-
Multiple mobile agent rendezvous in a ring
-
P. Flocchini, E. Kranakis, D. Krizanc, N. Santoro, C. Sawchuk. "Multiple mobile agent rendezvous in a ring". Proc. 6th Latin American Theoretical Informatics Symp. (LATIN), 599-608, 2004.
-
(2004)
Proc. 6th Latin American Theoretical Informatics Symp. (LATIN)
, pp. 599-608
-
-
Flocchini, P.1
Kranakis, E.2
Krizanc, D.3
Santoro, N.4
Sawchuk, C.5
-
34
-
-
0037417715
-
Sense of direction in distributed computing
-
P. Flocchini, B. Mans, N. Santoro. "Sense of direction in distributed computing". Theoretical Computer Science, Vol. 291, 29-53, 2003.
-
(2003)
Theoretical Computer Science
, vol.291
, pp. 29-53
-
-
Flocchini, P.1
Mans, B.2
Santoro, N.3
-
36
-
-
33745903272
-
Intrusion detection with mobile agents
-
N. Foukia, J. G. Hulaas, J. Harms. "Intrusion Detection with Mobile Agents". INET, www.isoc.org, 2001.
-
(2001)
INET
-
-
Foukia, N.1
Hulaas, J.G.2
Harms, J.3
-
39
-
-
84885235963
-
Graph exploration by a finite automaton
-
to appear
-
P. Fraigniaud, D. Ilcinkas, G. Peer, A. Pelc, D. Peleg. "Graph exploration by a finite automaton". Theoreti cal Computer Science, to appear.
-
Theoreti Cal Computer Science
-
-
Fraigniaud, P.1
Ilcinkas, D.2
Peer, G.3
Pelc, A.4
Peleg, D.5
-
41
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
LNCS 1419
-
F. Hohl. "Time limited blackbox security: Protecting mobile agents from malicious hosts". In Proc. of Conf on Mobile Agent Security, LNCS 1419, pages 92-113, 1998.
-
(1998)
Proc. of Conf on Mobile Agent Security
, pp. 92-113
-
-
Hohl, F.1
-
44
-
-
24944494818
-
Hardness and approximation results for black hole search in arbitrary graphs
-
R. Klasing, E. Markou, T. Radzik, F. Sarracco. "Hardness and approximation results for black hole search in arbitrary graphs". Proc. 12th Int. Coll. on Structural Information and Communication Complexity (SIROCCO), 200-215, 2005.
-
(2005)
Proc. 12th Int. Coll. on Structural Information and Communication Complexity (SIROCCO)
, pp. 200-215
-
-
Klasing, R.1
Markou, E.2
Radzik, T.3
Sarracco, F.4
-
45
-
-
0037967989
-
Mobile agent rendezvous in a ring
-
E. Kranakis, D. Krizanc, N. Santoro, C. Sawchuk. "Mobile agent rendezvous in a ring". In Int. Conf. on Distibuted Computing Systems (ICDCS), 592-599, 2003.
-
(2003)
Int. Conf. on Distibuted Computing Systems (ICDCS)
, pp. 592-599
-
-
Kranakis, E.1
Krizanc, D.2
Santoro, N.3
Sawchuk, C.4
-
47
-
-
0027577361
-
Recontamination does not help to search a graph
-
A. Lapaugh. "Recontamination does not help to search a graph". Journal of the ACM 40(2), 224-245, 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.2
, pp. 224-245
-
-
Lapaugh, A.1
-
49
-
-
0023826724
-
The complexity of searching a graph
-
N. Megiddo, S. Hakimi, M. Garey, D. Johnson, C. Papadimitriou. "The complexity of searching a graph". Journal of the ACM 35(1), 18-44, 1988.
-
(1988)
Journal of the ACM
, vol.35
, Issue.1
, pp. 18-44
-
-
Megiddo, N.1
Hakimi, S.2
Garey, M.3
Johnson, D.4
Papadimitriou, C.5
-
50
-
-
0032665338
-
Security issues related to mobile code and agent-based systems
-
R. Oppliger. "Security issues related to mobile code and agent-based systems". Computer Communications, 22(12):1165-1170, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.12
, pp. 1165-1170
-
-
Oppliger, R.1
-
51
-
-
0000049929
-
Exploring unknown undirected graphs
-
P. Panaite, A. Pelc, "Exploring unknown undirected graphs". Journal of Algorithms, 33 281-295, 1999.
-
(1999)
Journal of Algorithms
, vol.33
, pp. 281-295
-
-
Panaite, P.1
Pelc, A.2
-
52
-
-
0034259971
-
Impact of topographic information on graph exploration efficiency
-
P. Panaite, A. Pelc. "Impact of topographic information on graph exploration efficiency". Networks, 36, 96-103, 2000.
-
(2000)
Networks
, vol.36
, pp. 96-103
-
-
Panaite, P.1
Pelc, A.2
-
55
-
-
0034300682
-
Intrusion detection using autonomous agents
-
E. H. Spafford, D. Zamboni. "Intrusion detection using autonomous agents". Computer Networks, 34(4):547-570, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
56
-
-
0012526412
-
Mobile computations and hostile hosts
-
D. Tsichritzis, editor University of Geneva
-
J. Vitek, G. Castagna. "Mobile computations and hostile hosts". In D. Tsichritzis, editor, Mobile Objects, pages 241-261. University of Geneva, 1999.
-
(1999)
Mobile Objects
, pp. 241-261
-
-
Vitek, J.1
Castagna, G.2
|