{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T21:33:40Z","timestamp":1763415220099,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540499909"},{"type":"electronic","value":"9783540499916"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11945529_23","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T12:18:52Z","timestamp":1164629932000},"page":"320-332","source":"Crossref","is-referenced-by-count":31,"title":["Searching for Black-Hole Faults in a Network Using Multiple Agents"],"prefix":"10.1007","author":[{"given":"Colin","family":"Cooper","sequence":"first","affiliation":[]},{"given":"Ralf","family":"Klasing","sequence":"additional","affiliation":[]},{"given":"Tomasz","family":"Radzik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11516798_5","volume-title":"Principles of Distributed Systems","author":"J. Czyzowicz","year":"2005","unstructured":"Czyzowicz, J., Kowalski, D.R., Markou, E., Pelc, A.: Searching for a black hole in tree networks. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol.\u00a03544, pp. 67\u201380. Springer, Heidelberg (2005); Also appeared as: Searching for a Black Hole in Synchronous Tree Networks. In: Combinatorics, Probability and Computing"},{"issue":"2-3","key":"23_CR2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.3233\/FUN-2006-712-305","volume":"71","author":"J. Czyzowicz","year":"2006","unstructured":"Czyzowicz, J., Kowalski, D., Markou, E., Pelc, A.: Complexity of searching for a black hole. Fundamenta Informaticae\u00a071(2-3), 229\u2013242 (2006)","journal-title":"Fundamenta Informaticae"},{"key":"#cr-split#-23_CR3.1","unstructured":"Dobrev, S., Flocchini, P., Kr??lovic, R., Prencipe, G., Ruzicka, P., Santoro, N.: Black hole search in common interconnection networks. Networks (to appear);"},{"key":"#cr-split#-23_CR3.2","unstructured":"Preliminary version under the title Black Hole Search by Mobile Agents in Hypercubes and Related Networks. In: Proc.??6th Int. Conf. on Principles of Distributed Systems (OPODIS 2002) pp. 169???180 (2002)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/3-540-45414-4_12","volume-title":"Distributed Computing","author":"S. Dobrev","year":"2001","unstructured":"Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Mobile search for a black hole in an anonymous ring. In: Welch, J.L. (ed.) DISC 2001. LNCS, vol.\u00a02180, pp. 166\u2013179. Springer, Heidelberg (2001)"},{"key":"#cr-split#-23_CR5.1","unstructured":"Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Searching for a black hole in arbitrary networks: Optimal mobile agents protocols. Distributed Computing (to appear);"},{"key":"#cr-split#-23_CR5.2","unstructured":"Preliminary version. In: Proc.??21st ACM Symposium on Principles of Distributed Computing (PODC 2002), pp. 153???161 (2002)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","volume-title":"Mobile Agents and Security","author":"F. Hohl","year":"1998","unstructured":"Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 92\u2013111. Springer, Heidelberg (1998)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Hohl, F.: A framework to protect mobile agents by using reference states. In: Proc.\u00a020th Int. Conf. on Distributed Computing Systems (ICDCS 2000), pp. 410\u2013417 (2000)","DOI":"10.1109\/ICDCS.2000.840953"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/11795490_21","volume-title":"Principles of Distributed Systems","author":"R. Klasing","year":"2006","unstructured":"Klasing, R., Markou, E., Radzik, T., Sarracco, F.: Approximation bounds for black hole search problems. In: Anderson, J.H., Prencipe, G., Wattenhofer, R. (eds.) OPODIS 2005. LNCS, vol.\u00a03974, pp. 261\u2013274. Springer, Heidelberg (2006)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/11429647_17","volume-title":"Structural Information and Communication Complexity","author":"R. Klasing","year":"2005","unstructured":"Klasing, R., Markou, E., Radzik, T., Sarracco, F.: Hardness and approximation results for black hole search in arbitrary graphs. In: Pelc, A., Raynal, M. (eds.) SIROCCO 2005. LNCS, vol.\u00a03499, pp. 200\u2013215. Springer, Heidelberg (2005); Also: Theoretical Computer Science (to appear)"},{"key":"23_CR10","unstructured":"Ng, S., Cheung, K.: Protecting mobile agents against malicious hosts by intention of spreading. In: Arabnia, H. (ed.) Proc. Int. Conf. on Parallel and Distributed Processing and Applications (PDPTA 1999), vol.\u00a0II, pp. 725\u2013729 (1999)"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Principles of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11945529_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T04:36:56Z","timestamp":1736656616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11945529_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540499909","9783540499916"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11945529_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}