2005
DOI: 10.1007/11516798_5
|View full text |Cite
|
Sign up to set email alerts
|

Searching for a Black Hole in Tree Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(28 citation statements)
references
References 6 publications
0
28
0
Order By: Relevance
“…We consider here malicious hosts of a particularly harmful nature, called black holes [3,2,4,5,6]. A black hole is a node in a network which contains a stationary process destroying all mobile agents visiting this node, without leaving any trace on the other nodes of the network.…”
Section: Introductionmentioning
confidence: 99%
“…We consider here malicious hosts of a particularly harmful nature, called black holes [3,2,4,5,6]. A black hole is a node in a network which contains a stationary process destroying all mobile agents visiting this node, without leaving any trace on the other nodes of the network.…”
Section: Introductionmentioning
confidence: 99%
“…An agent X may infer the location of a black hole, if it expects to meet another agent Y , but agent Y does not show up. This model, but with the added restriction that there are only two agents and at most one black hole, has been previously studied in [1,2,8,9]. Those papers give NP-hardness results and approximation algorithms for the problem of calculating an optimal (shortest) traversal schedules.…”
Section: Introductionmentioning
confidence: 99%
“…Due to its nature, the site where such a process is located is called a black hole (e.g., [2,3,5,4,6,12]). …”
Section: The Problemmentioning
confidence: 99%
“…The BLACK HOLE SEARCH problem has been studied also in synchronous settings, where the time for an agent to traverse a link is assumed to be unitary; in this case, tight bounds have been established for some classes of trees [2]. In the case of general networks, approximation algorithms have been described in [2] and subsequently improved [12].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation