Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Connected graph searching
In the graph searching game the opponents are a set of searchers and a fugitive in a graph.
The searchers try to capture the fugitive by applying some sequence of moves that include …
The searchers try to capture the fugitive by applying some sequence of moves that include …
The cost of monotonicity in distributed graph searching
D Ilcinkas, N Nisse, D Soguet - Distributed Computing, 2009 - Springer
Abstract Blin et al.(Theor Comput Sci 399 (1–2): 12–37, 2008) proposed a distributed
protocol enabling the smallest possible number of searchers to clear any unknown graph in …
protocol enabling the smallest possible number of searchers to clear any unknown graph in …
[PDF][PDF] Cops and robbers on dynamic graphs: offline and online case
In the online case, there is no knowledge of the evolution sequence, and the game might go
on forever. Also, each generated instance is required to be connected. We provide a nearly …
on forever. Also, each generated instance is required to be connected. We provide a nearly …
Network decontamination
N Nisse - Distributed Computing by Mobile Entities: Current …, 2019 - Springer
Abstract The Network Decontamination problem consists of coordinating a team of mobile
agents in order to clean a contaminated network. The problem is actually equivalent to …
agents in order to clean a contaminated network. The problem is actually equivalent to …
Clearing contamination in large networks
In this work, we study the problem of clearing contamination spreading through a large
network where we model the problem as a graph searching game. The problem can be …
network where we model the problem as a graph searching game. The problem can be …
Distributed security algorithms for mobile agents
Among the severe security threats faced in distributed mobile computing environments, two
are particularly troublesome: harmful agent and harmful host. This chapter consider security …
are particularly troublesome: harmful agent and harmful host. This chapter consider security …
Exclusive graph searching
This paper tackles the well known graph searching problem, where a team of searchers
aims at capturing an intruder in a network, modeled as a graph. This problem has been …
aims at capturing an intruder in a network, modeled as a graph. This problem has been …
Decontaminating a network from a black virus
In this paper, we consider the problem of decontaminating a network from a black virus (BV)
using a team of mobile system agents. The BV is a harmful process which, like the …
using a team of mobile system agents. The BV is a harmful process which, like the …
Tree decontamination with temporary immunity
Consider a tree network that has been contaminated by a persistent and active virus: when
infected, a network site will continuously attempt to spread the virus to all its neighbours. The …
infected, a network site will continuously attempt to spread the virus to all its neighbours. The …
A general approach to toroidal mesh decontamination with local immunity
F Luccio, L Pagli - … IEEE International Symposium on Parallel & …, 2009 - ieeexplore.ieee.org
Network decontamination is studied on a k-dimensional torus (n 1 times ldrldrldr times nk),
with k ges 1 and 2 les n 1 lesldrldrldrles n k. The decontamination is done by a set of agents …
with k ges 1 and 2 les n 1 lesldrldrldrles n k. The decontamination is done by a set of agents …