Complexity of Searching for a Black Hole

نویسندگان

  • Jurek Czyzowicz
  • Dariusz R. Kowalski
  • Euripides Markou
  • Andrzej Pelc
چکیده

A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous network, assuming an upper bound on the time of any edge traversal by an agent. The minimum number of agents capable to identify a black hole is two. For a given graph and given starting node we are interested in the fastest possible black hole search by two agents, under the general scenario in which some subset of nodes is safe and the black hole can be located in one of the remaining nodes. We show that the problem of finding the fastest possible black hole search scheme by two agents is NP-hard, and we give a 9.3-approximation for it.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The phase transition of corrected black hole with f(R) gravity

In this letter, we consider static black hole in f(R) gravity.We take advantage from corrected entropy and temperature and investigate such black hole. Finally, we study the $ P - V $ critically and phase transition of corrected black hole with respect to entropy and temperature. Here also, we obtain the heat capacity for the static black hole in $ f(R) $ gravity. This calculation help us...

متن کامل

Organizational Black Hole Theory

There are issues in organizations that require new theoretical formulation. Hence, metaphorical theorizing is used in the study of organizations to interpret them and understand their complexities. In this method, the organization is likened to an entity and one of the key features of that entity is generalized to the organization. It should be borne in mind that most organizational theories ar...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Tuning of fuzzy logic controller using an improved black hole algorithm for maximizing power capture of ocean wave energy converters

Seas and oceans are the most important sources of renewable energy in the world. The main purpose of this paper is to use an appropriate control strategy to improve the performance of point absorbers. In this scheme, considering the high uncertainty in the parameters of the power take-off system in different atmospheric conditions, a new improved black hole algorithm is introduced to tune fuzzy...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Fundam. Inform.

دوره 71  شماره 

صفحات  -

تاریخ انتشار 2006