Εμφάνιση απλής εγγραφής

dc.creatorBampas, E.en
dc.creatorLeonardos, N.en
dc.creatorMarkou, E.en
dc.creatorPagourtzis, A.en
dc.creatorPetrolia, M.en
dc.date.accessioned2015-11-23T10:23:32Z
dc.date.available2015-11-23T10:23:32Z
dc.date.issued2014
dc.identifier10.1007/978-3-319-09620-9-27
dc.identifier.isbn9783319096193
dc.identifier.issn3029743
dc.identifier.urihttp://hdl.handle.net/11615/26138
dc.description.abstractThe exploration problem has been extensively studied in unsafe networks containing malicious hosts of a highly harmful nature, called black holes, which completely destroy mobile agents that visit them. In a recent work, Královič and Miklík [SIROCCO 2010, LNCS 6058, pp. 157-167] considered various types of malicious host behavior in the context of the Periodic Data Retrieval problem in asynchronous ring networks with exactly one malicious host. In this problem, a team of initially co-located agents must report data from all safe nodes of the network to the homebase, infinitely often. The malicious host can choose whether to kill visiting agents or allow them to pass through (gray hole). In another variation of the model, the malicious host can, in addition, alter its whiteboard contents in order to deceive visiting agents. The goal is to design a protocol for Periodic Data Retrieval using as few agents as possible. In this paper, we present the first nontrivial lower bounds on the number of agents for Periodic Data Retrieval in asynchronous ring networks. Specifically, we show that at least 4 agents are needed when the malicious host is a gray hole, and at least 5 agents are needed when the malicious host whiteboard is unreliable. This improves the previous lower bound of 3 in both cases and answers an open question posed in the aforementioned paper. On the positive side, we propose an optimal protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, which solves the problem with only 4 agents. This improves the previous upper bound of 9 agents and settles the question of the optimal number of agents in the gray-hole case. Finally, we propose a protocol with 7 agents when the whiteboard of the malicious host is unreliable, significantly improving the previously known upper bound of 27 agents. Along the way, we set forth a detailed framework for studying networks with malicious hosts of varying capabilities. © 2014 Springer International Publishing Switzerland.en
dc.source.urihttp://www.scopus.com/inward/record.url?eid=2-s2.0-84905366049&partnerID=40&md5=3c1cbfe34f86dfd94808b3046ca991ad
dc.subjectgray holeen
dc.subjectmalicious hosten
dc.subjectperiodic data retrievalen
dc.subjectred holeen
dc.subjectunreliable whiteboarden
dc.subjectComplex networksen
dc.subjectData retrievalen
dc.subjectWhite boarden
dc.subjectMobile agentsen
dc.titleImproved periodic data retrieval in asynchronous rings with a faulty hosten
dc.typeotheren


Αρχεία σε αυτό το τεκμήριο

ΑρχείαΜέγεθοςΤύποςΠροβολή

Δεν υπάρχουν αρχεία που να σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής