Author:
Shi Wei,Peng Mengfei,Corriveau Jean-Pierre,Croft William Lee
Publisher
Springer International Publishing
Reference33 articles.
1. Almorsy, M., Grundy, J., and Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov (2010)
2. Anderson, J.H., Kim, Y.-J., Herman, T.: Shared-memory mutual ex- clusion: major research trends since 1986. Distrib. Comput. 16(2–3), 75–110 (2003)
3. Balamohan, B., Dobrev, S., Flocchini, P., Santoro, N.: Exploring an unknown dangerous graph with a constant number of tokens. Theor. Comput. Sci. 610, 169–181 (2014)
4. Lecture Notes in Computer Science;E Bampas,2014
5. Cai, J., Flocchini, P., Santoro, N.: Network decontamination from a black virus. In: 2013 IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum (IPDPSW), pp. 696–705. IEEE (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dangerous Graphs;Distributed Computing by Mobile Entities;2019