Back to Results
First PageMeta Content
Connectivity / Stack / Searchers / Tree decomposition / Topology / Graph theory / Path decomposition / Internet search engines


Distributed Chasing of Network Intruders L´elia Blin1 , Pierre Fraigniaud2 , Nicolas Nisse2 , and Sandrine Vial1 1 2
Add to Reading List

Document Date: 2007-01-17 10:04:46


Open Document

File Size: 195,63 KB

Share Result on Facebook

City

Evry / Paris / /

Country

France / /

Event

Product Issues / /

Facility

port p. / University of Evry / /

IndustryTerm

protocol dist search / search strategies / search number starting / partial search strategy / unknown network / connected sub-network / search strategy starting / monotone search strategy / software agents / space-efficient solutions / asynchronous network / dist search / then dist search / search strategy / distributed protocol / dist search uses / search number / anonymous networks / autonomous mobile computing entities / search strategy clearing / anonymous network / /

Organization

University of Evry / /

Person

Nicolas Nisse / Pushing / Sandrine Vial / Pierre Fraigniaud / /

Position

RT / /

Product

port / /

Technology

mobile computing / P2P / 7 Algorithm / distributed protocol / /

SocialTag