Sciweavers

46 search results - page 6 / 10
» Black holes
Sort
View
NETWORKS
2008
14 years 10 months ago
Approximation bounds for Black Hole Search problems
Ralf Klasing, Euripides Markou, Tomasz Radzik, Fab...
IJAC
2007
59views more  IJAC 2007»
14 years 10 months ago
The Conjugacy Problem in Amalgamated Products I: Regular Elements and Black Holes
Alexandre V. Borovik, Alexei G. Myasnikov, Vladimi...
42
Voted
SCHOLARPEDIA
2008
75views more  SCHOLARPEDIA 2008»
14 years 9 months ago
Black holes
Teviet Creighton, Richard H. Price
CIE
2006
Springer
15 years 1 months ago
Reversible Conservative Rational Abstract Geometrical Computation Is Turing-Universal
le conservative rational abstract geometrical computation is Turing-universal d abstract) J
Jérôme Durand-Lose
73
Voted
TMC
2010
138views more  TMC 2010»
14 years 8 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu