A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Decontaminating a Network from a Black Virus
2014
International Journal of Networking and Computing
In this paper, we consider the problem of decontaminating a network from a black virus (BV) using a team of mobile system agents. ...
intruder capture or network decontamination problem (where however there is no danger for the agents). ...
This work has been supported in part by NSERC Discovery Grants, and by Prof. Flocchini's University Research Chair. ...
doi:10.15803/ijnc.4.1_151
fatcat:kedjisjmorgzfox7hvuifcllye
A Review of Computation Solutions by Mobile Agents in an Unsafe Environment
2013
International Journal of Advanced Computer Science and Applications
In this paper, we present several solutions for a black-hole and network decontamination problems. Then, we analyze their efficiency. ...
In the second case, the dangerous agent is a virus; an agent moving between nodes infecting them, and the problem is for the "good" agents to capture it, and decontaminate the network. ...
Virus protection represents a rising importance in network decontamination methods. ...
doi:10.14569/ijacsa.2013.040415
fatcat:hf3ytez3arcwfkeqk7lrwf2tm4
Distributed Black Virus Decontamination and Rooted Acyclic Orientations
2015
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
The problem of optimal black virus decontamination (BVD) has been investigated for special classes of highly regular network topologies; a (centralized) solution exists for networks of known arbitrary ...
In a network supporting mobile agents, a particular threat is that posed by the presence of a black virus (BV), a harmful entity capable of destroying any agent arriving at the site where it resides, and ...
CONCLUSIONS In this paper, we have considered the Black Virus decontamination problem in networks of arbitrary and unknown topology. ...
doi:10.1109/cit/iucc/dasc/picom.2015.254
dblp:conf/IEEEcit/CaiFS15
fatcat:keohrqy3rzgr7cdx3ik2fogmpy
NETWORK DECONTAMINATION IN PRESENCE OF LOCAL IMMUNITY
2007
International Journal of Foundations of Computer Science
We consider the problem of decontaminating a network infected by a mobile virus. ...
In all the existing literature, it is assumed that the immunity level of a decontaminated site is nil; that is, a decontaminated node, in absence of an antiviral agent on site, may be re-contaminated by ...
The immediate impact of the presence of a virus in a network is that, in absence of anti-viral protection, the network sites become infected. ...
doi:10.1142/s0129054107004784
fatcat:ag747isxlnhd5ca3gckmihwrl4
Distributed Security Algorithms for Mobile Agents
[chapter]
2012
Mobile Agents in Networking and Distributed Computing
In this chapter we consider security problems of both types; and concentrate on two security problems, one for each type: locating a black hole, and capturing an intruder. ...
In particular, specific severe security threats are those posed to the network site by harmful agents, and those posed to the mobile agents by harmful hosts. ...
In particular we consider the presence of a mobile virus that infects any visited network site. ...
doi:10.1002/9781118135617.ch3
fatcat:fswhtelgnrgzzfvhb65a5fuk7i
Network Decontamination with Temporal Immunity by Cellular Automata
[chapter]
2010
Lecture Notes in Computer Science
Network sites are assumed to be contaminated (e.g., by a virus) and a team of agents is deployed to decontaminate the whole network. ...
Network decontamination (or disinfection) is a widely studied problem in distributed computing. ...
In such contexts, the goal is typically to devise a strategy for the agents to collaboratively decontaminate the whole network using the smallest possible team in such a way that, once cleaned, a node ...
doi:10.1007/978-3-642-15979-4_31
fatcat:nzufou2omjhkhfhqzaoofxzrsi
Network decontamination under m-immunity
2016
Discrete Applied Mathematics
In this paper, we extend these investigations and consider for the first time the network decontamination problem when the parameter m is an arbitrary integer value m ≥ 1. ...
This network decontamination problem, also called monotone connected graph search and intruder capture, has been extensively studied in the literature when m = 1 (no immunity). ...
Decontaminating Tree Networks We now study decontamination of an arbitrary unrooted tree T . ...
doi:10.1016/j.dam.2015.07.020
fatcat:kgqskmt57jbzrj5kvxkthwg26e
Network decontamination with local immunization
2006
Proceedings 20th IEEE International Parallel & Distributed Processing Symposium
We consider the problem of decontaminating a network infected by a mobile virus. ...
In this paper we consider the network decontamination problem under a new model of immunity to recontamination: we consider the case when a disinfected vertex, after the cleaning agent has gone, will become ...
In such cases, a crucial task is to decontaminate the infected network. ...
doi:10.1109/ipdps.2006.1639553
dblp:conf/ipps/LuccioPS06
fatcat:tep24v636rgvlius5hit7cmriq
Network Decontamination with a Single Agent
2015
Graphs and Combinatorics
Faults and viruses often spread in networked environments by propagating from site to neighboring site. We model this process of network contamination by graphs. ...
We study immunity number for some classes of graphs corresponding to network topologies and present upper bounds on ι1(G), in some cases with matching lower bounds. ...
Introduction Faults and viruses often spread in networked environments by propagating from site to neighboring site. The process is called network contamination. ...
doi:10.1007/s00373-015-1579-5
fatcat:fjx5ujetbrhl5bjcssjasvh36i
Faulty Node Repair and Dynamically Spawned Black Hole Search
[chapter]
2017
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
We conclude that, using our proposed algorithm, b + 4 agents can repair all faulty nodes and locate the black hole infected by a virus v within finite time, when the black hole appears in the network before ...
In a distributed environment, researchers aim, in particular, at eliminating faulty network entities. ...
[5] study a network decontamination problem with a black virus, which is related to both black hole search and intruder capture problems. ...
doi:10.1007/978-3-319-59608-2_8
fatcat:ercaxwwm3zb7nivqbbxivclygu
Network Decontamination with a Single Agent
[article]
2013
arXiv
pre-print
Faults and viruses often spread in networked environments by propagating from site to neighboring site. We model this process of network contamination by graphs. ...
We study immunity number for some classes of graphs corresponding to network topologies and present upper bounds on ι_1(G), in some cases with matching lower bounds. ...
Introduction
25 Faults and viruses often spread in networked environments by propagating from site 26 to neighboring site. The process is called network contamination. ...
arXiv:1307.7307v1
fatcat:yne7nw3jwbey7hbpwnzl7gqy64
Mobile Agents Rendezvous in spite of a Malicious Agent
[article]
2016
arXiv
pre-print
We present some necessary conditions for solving rendezvous in spite of the malicious agent in arbitrary networks. ...
Can the honest agents achieve rendezvous starting from an arbitrary configuration in spite of the malicious agent? ...
While in the classical decontamination problem the aim is to extinguish the virus, in our setting the virus cannot be extinguished and has to be contained in one part of the network, thus dividing the ...
arXiv:1410.4772v2
fatcat:v5yufmksyjejflbytvjfrag7wm
Innovative Technologies for Advancement of WHO Risk Group 4 Pathogens Research
[chapter]
2019
Global Virology III: Virology in the 21st Century
These viruses are endemic to specific geographic locations and typically cause relatively infrequent, ...
Risk Group 4 pathogens are a group of often lethal human viruses for which there are no widely available vaccines or therapeutics. ...
Though live EBOV was not used in this study, another group used a similar NGS approach for RG-2/3 viruses, Sindbis virus and Venezuelan equine encephalitis virus. ...
doi:10.1007/978-3-030-29022-1_15
fatcat:22guwbxrerhfnozjibwunum5qa
No evidence for a common blood microbiome based on a population study of 9,770 healthy humans
[article]
2022
bioRxiv
pre-print
Contrary to the expectations of a shared blood microbiome, no species were detected in 84% of individuals, while only a median of one microbial species per individual was detected in the remaining 16%. ...
Futhermore, microbes of the same species were detected in <5% of individuals, no co-occurrence patterns similar to microbiomes in other body sites was observed, and no associations between host phenotypes ...
To determine if this result is a function of our stringent decontamination filters, we generated independent network graphs for the five adult cohorts before decontamination filtering and examined the ...
doi:10.1101/2022.07.29.502098
fatcat:cybr7koatneghjhg65znyzsu5q
USING SCATTERED MOBILE AGENTS TO LOCATE A BLACK HOLE IN AN UN-ORIENTED RING WITH TOKENS
2008
International Journal of Foundations of Computer Science
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their arrival. ...
Determining the location of a black hole in a ring network has been studied when each node is equipped with a whiteboard. ...
virus infecting the network nodes); for example, see Refs ...
doi:10.1142/s0129054108006327
fatcat:n3wm3zasefblxiaceedzmpxzgi
« Previous
Showing results 1 — 15 out of 195 results