Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security against black hole attack in wireless sensor network-a review
BK Mishra, MC Nikam… - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
A wireless sensor network consists of geologically distributed autonomous sensors to
monitor and control over physical or environmental conditions, like temperature, sound …
monitor and control over physical or environmental conditions, like temperature, sound …
Computing without communicating: Ring exploration by asynchronous oblivious robots
We consider the problem of exploring an anonymous unoriented ring by a team of k
identical, oblivious, asynchronous mobile robots that can view the environment but cannot …
identical, oblivious, asynchronous mobile robots that can view the environment but cannot …
Distributed exploration of dynamic rings
In the graph exploration problem, a team of mobile computational entities, called agents,
arbitrarily positioned at some nodes of a graph, must cooperate so that each node is …
arbitrarily positioned at some nodes of a graph, must cooperate so that each node is …
BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks
Black hole attacks occur when an adversary captures and re-programs a set of nodes in the
network to block/drop the packets they receive/generate instead of forwarding them towards …
network to block/drop the packets they receive/generate instead of forwarding them towards …
Rendezvous of mobile agents in unknown graphs with faulty links
A group of identical mobile agents moving asynchronously among the nodes of an
anonymous network have to gather together in a single node of the graph. This problem …
anonymous network have to gather together in a single node of the graph. This problem …
Searching for black holes in subways
Current mobile agent algorithms for map** faults in computer networks assume that the
network is static. However, for large classes of highly dynamic networks (eg, wireless mobile …
network is static. However, for large classes of highly dynamic networks (eg, wireless mobile …
Live exploration of dynamic rings
Almost all the vast literature on graph exploration assumes that the graph is static: its
topology does not change during the exploration, except for occasional faults. To date, very …
topology does not change during the exploration, except for occasional faults. To date, very …
[PDF][PDF] Mobile agents in distributed computing: Network exploration
S Das - Bulletin of EATCS, 2013 - eatcs.org
One of the recent paradigms in networked distributed computing is the use of mobile agents.
Mobile agents are software robots that can autonomously migrate from node to node within …
Mobile agents are software robots that can autonomously migrate from node to node within …
Exploring an unknown dangerous graph using tokens
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the
graph topology and starting from the same node, the team must explore the graph. This …
graph topology and starting from the same node, the team must explore the graph. This …
Efficient and consistent flow update for software defined networks
KR Wu, JM Liang, SC Lee… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Software defined network (SDN) provides flexible and scalable routing by separating control
plane and data plane. With centralized control, SDN has been widely used in traffic …
plane and data plane. With centralized control, SDN has been widely used in traffic …