نتایج جستجو برای: black hole algorithm
تعداد نتایج: 920890 فیلتر نتایج به سال:
We explicitly compute the causal structure of the Schwarzschild black hole spacetime, by providing an algorithm to decide if any pair of events is causally related. The primary motivation for this study comes from discrete quantum gravity, in particular the causal set approach, in which the fundamental variables can be thought of as the causal ordering of randomly selected events in spacetime. ...
We study how to explore efficiently an insecure network, namely a network that may contain a hostile node called black hole introduced by S. Dobrev, P. Flocchini, G. Prencipe, and N. Santoro (DISC 2001). A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locati...
With the emergence of mobile ad-hoc networks, more users desire connectivity regardless of geographic location. MANETs are a promising technology in terms of the applications in the military, emergency situations, and general daily life activities. Various protocols have been developed to handle the routing information in such networks. However, most protocols are vulnerable to various threats....
MANET is a self-configuring infrastructure less network. The lacks of an infrastructure in ad hoc networks pose large challenges in the functionality of these networks. Mobile Ad Hoc Network has number of security problems that exists due to the self-configuring nature of nodes. The black hole attack is one of the well known security intimidation in wireless mobile ad hoc networks. The intruder...
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous arbitrary network, assuming an upper bound on the time of any edge traversal by an agent. For a given graph and a given starting node we are interested in find...
We present a characteristic algorithm for computing the perturbation of a Schwarzschild spacetime by means of solving the Teukolsky equation. We implement the algorithm as a characteristic evolution code and apply it to compute the advanced solution to a black hole collision in the close approximation. The code successfully tracks the initial burst and quasinormal decay of a black hole perturba...
The proposed paper is enhanced version of our previous paper” A cryptographic approach towards Black Hole Attack Detection” accepted in CNSA 2012 gives solution for false reply from a node and confirms reply is coming from destination node in Black Hole attack. This paper proposed an algorithm for detecting malicious node that drops packet and the node that gives false reply to the source node....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید