Black hole search in dynamic rings

GA Di Luna, P Flocchini, G Prencipe… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
In this paper, we start the investigation of distributed computing by mobile agents in
dangerous dynamic networks. The danger is posed by the presence in the network of a …

Exploring an unknown dangerous graph using tokens

S Dobrev, P Flocchini, R Královič, N Santoro - Theoretical Computer …, 2013 - Elsevier
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the
graph topology and starting from the same node, the team must explore the graph. This …

Black hole search in dynamic cactus graph

A Bhattacharya, GF Italiano, PS Mandal - International Conference and …, 2024 - Springer
We study the problem of black hole search by a set of mobile agents, where the underlying
graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates …

Black hole search in computer networks: State-of-the-art, challenges and future directions

M Peng, W Shi, JP Corriveau, R Pazzi… - Journal of Parallel and …, 2016 - Elsevier
As the size and use of networks continue to increase, network anomalies and faults are
commonplace. Consequently, effective detection of such network issues is crucial for the …

Black hole search in dynamic tori

A Bhattacharya, GF Italiano, PS Mandal - arxiv preprint arxiv:2402.04746, 2024 - arxiv.org
We investigate the black hole search problem by a set of mobile agents in a dynamic torus.
Black hole is defined to be a dangerous stationary node which has the capability to destroy …

Locating a black hole in a dynamic ring

GA Di Luna, P Flocchini, G Prencipe… - Journal of Parallel and …, 2025 - Elsevier
In networked environments supporting mobile agents, a pressing problem is the presence of
network sites harmful for the agents. In this paper we consider the danger posed by a node …

Dangerous graphs

E Markou, W Shi - Distributed Computing by Mobile Entities: Current …, 2019 - Springer
Anomalies and faults are inevitable in computer networks, today more than ever before. This
is due to the large scale and dynamic nature of the networks used to process big data and to …

Asynchronous Gathering in a Dangerous Ring

S Dobrev, P Flocchini, G Prencipe, N Santoro - Algorithms, 2023 - mdpi.com
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …

Decontaminating a network from a black virus

J Cai, P Flocchini, N Santoro - International Journal of Networking …, 2014 - jstage.jst.go.jp
In this paper, we consider the problem of decontaminating a network from a black virus (BV)
using a team of mobile system agents. The BV is a harmful process which, like the …

Black hole search and exploration in unoriented tori with synchronous scattered finite automata

E Markou, M Paquette - … , OPODIS 2012, Rome, Italy, December 18-20 …, 2012 - Springer
We consider the problem of locating a black hole in a synchronous, anonymous, and
unoriented torus network using mobile agents. A black hole is a harmful network node that …