{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T12:10:09Z","timestamp":1737115809676,"version":"3.33.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/ipdps.2007.370460","type":"proceedings-article","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T14:41:07Z","timestamp":1182350467000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Scattered Black Hole Search in an Oriented Ring using Tokens"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Dobrev","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Santoro","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1016\/S0140-3664(99)00083-3","article-title":"Security issues related to mobile code and agent-based systems","volume":"22","author":"oppliger","year":"1999","journal-title":"Computer Communications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/35.689634"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.04.024"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/11758471_16"},{"article-title":"Locating a black hole in a ring using tokens: The case of dispersed agents. Technical Report TR-07-02, School of Computer Science, Carleton University","year":"2007","author":"dobrev","key":"12"},{"key":"3","doi-asserted-by":"crossref","first-page":"229","DOI":"10.3233\/FUN-2006-712-305","article-title":"Complexity of searching for a black hole","volume":"71","author":"czyzowicz","year":"2006","journal-title":"Fundamenta lnformaticae"},{"key":"2","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/11945529_23","article-title":"Searching for blackhole faults in a network using multiple agents","author":"cooper","year":"2006","journal-title":"Proc 10th Int Conf on Principles of Distributed Systems (OPODIS 2006)"},{"key":"1","first-page":"1","article-title":"Security issues in mobile code systems","volume":"1419","author":"chess","year":"1998","journal-title":"LNCS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.25"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34735-6_14"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27860-3_6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/net.20095"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/S0963548306008133"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0154-y"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/s00453-006-1232-z","article-title":"Mobile search for a black hole in an anonymous ring","author":"dobrev","year":"2007","journal-title":"Algorithmica"}],"event":{"name":"2007 IEEE International Parallel and Distributed Processing Symposium","start":{"date-parts":[[2007,3,26]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2007,3,30]]}},"container-title":["2007 IEEE International Parallel and Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4203121\/4227918\/04228188.pdf?arnumber=4228188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T10:59:43Z","timestamp":1737111583000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4228188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2007.370460","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}