Sciweavers

46 search results - page 6 / 10
» Black holes
Sort
View
NETWORKS
2008
13 years 7 months ago
Approximation bounds for Black Hole Search problems
Ralf Klasing, Euripides Markou, Tomasz Radzik, Fab...
IJAC
2007
59views more  IJAC 2007»
13 years 7 months ago
The Conjugacy Problem in Amalgamated Products I: Regular Elements and Black Holes
Alexandre V. Borovik, Alexei G. Myasnikov, Vladimi...
SCHOLARPEDIA
2008
75views more  SCHOLARPEDIA 2008»
13 years 7 months ago
Black holes
Teviet Creighton, Richard H. Price
CIE
2006
Springer
13 years 11 months ago
Reversible Conservative Rational Abstract Geometrical Computation Is Turing-Universal
le conservative rational abstract geometrical computation is Turing-universal d abstract) J
Jérôme Durand-Lose
TMC
2010
138views more  TMC 2010»
13 years 5 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu