Sciweavers

46 search results - page 4 / 10
» Black holes
Sort
View
COCOA
2010
Springer
13 years 5 months ago
Time Optimal Algorithms for Black Hole Search in Rings
In a network environments supporting mobile entities (called robots or agents), a black hole is harmful site that destroys any incoming entity without leaving any visible trace. Th...
Balasingham Balamohan, Paola Flocchini, Ali Miri, ...
INFOCOM
2007
IEEE
14 years 1 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
WICOMM
2008
139views more  WICOMM 2008»
13 years 7 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
CORR
2008
Springer
113views Education» more  CORR 2008»
13 years 7 months ago
Asymptotics of Entropy Rate in Special Families of Hidden Markov Chains
We generalize a result in [8] and derive an asymptotic formula for entropy rate of a hidden Markov chain around a "weak Black Hole". We also discuss applications of the ...
Guangyue Han, Brian Marcus
WDAG
2001
Springer
91views Algorithms» more  WDAG 2001»
13 years 12 months ago
Mobile Search for a Black Hole in an Anonymous Ring
Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe,...