Black hole search in dynamic rings
In this paper, we start the investigation of distributed computing by mobile agents in
dangerous dynamic networks. The danger is posed by the presence in the network of a …
dangerous dynamic networks. The danger is posed by the presence in the network of a …
Exploring an unknown dangerous graph using tokens
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the
graph topology and starting from the same node, the team must explore the graph. This …
graph topology and starting from the same node, the team must explore the graph. This …
Black hole search in dynamic cactus graph
We study the problem of black hole search by a set of mobile agents, where the underlying
graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates …
graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates …
Black hole search in computer networks: State-of-the-art, challenges and future directions
As the size and use of networks continue to increase, network anomalies and faults are
commonplace. Consequently, effective detection of such network issues is crucial for the …
commonplace. Consequently, effective detection of such network issues is crucial for the …
Black hole search in dynamic tori
We investigate the black hole search problem by a set of mobile agents in a dynamic torus.
Black hole is defined to be a dangerous stationary node which has the capability to destroy …
Black hole is defined to be a dangerous stationary node which has the capability to destroy …
Locating a black hole in a dynamic ring
In networked environments supporting mobile agents, a pressing problem is the presence of
network sites harmful for the agents. In this paper we consider the danger posed by a node …
network sites harmful for the agents. In this paper we consider the danger posed by a node …
Dangerous graphs
Anomalies and faults are inevitable in computer networks, today more than ever before. This
is due to the large scale and dynamic nature of the networks used to process big data and to …
is due to the large scale and dynamic nature of the networks used to process big data and to …
Asynchronous Gathering in a Dangerous Ring
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …
Decontaminating a network from a black virus
In this paper, we consider the problem of decontaminating a network from a black virus (BV)
using a team of mobile system agents. The BV is a harmful process which, like the …
using a team of mobile system agents. The BV is a harmful process which, like the …
Black hole search and exploration in unoriented tori with synchronous scattered finite automata
We consider the problem of locating a black hole in a synchronous, anonymous, and
unoriented torus network using mobile agents. A black hole is a harmful network node that …
unoriented torus network using mobile agents. A black hole is a harmful network node that …