[HTML][HTML] Connected graph searching

L Barrière, P Flocchini, FV Fomin, P Fraigniaud… - Information and …, 2012 - Elsevier
In the graph searching game the opponents are a set of searchers and a fugitive in a graph.
The searchers try to capture the fugitive by applying some sequence of moves that include …

The cost of monotonicity in distributed graph searching

D Ilcinkas, N Nisse, D Soguet - Distributed Computing, 2009 - Springer
Abstract Blin et al.(Theor Comput Sci 399 (1–2): 12–37, 2008) proposed a distributed
protocol enabling the smallest possible number of searchers to clear any unknown graph in …

[PDF][PDF] Cops and robbers on dynamic graphs: offline and online case

S Balev, JJ Laredo, I Lamprou… - Discrete …, 2023 - dmtcs.episciences.org
In the online case, there is no knowledge of the evolution sequence, and the game might go
on forever. Also, each generated instance is required to be connected. We provide a nearly …

Network decontamination

N Nisse - Distributed Computing by Mobile Entities: Current …, 2019 - Springer
Abstract The Network Decontamination problem consists of coordinating a team of mobile
agents in order to clean a contaminated network. The problem is actually equivalent to …

Clearing contamination in large networks

M Simpson, V Srinivasan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this work, we study the problem of clearing contamination spreading through a large
network where we model the problem as a graph searching game. The problem can be …

Distributed security algorithms for mobile agents

P Flocchini, N Santoro - Mobile Agents in Networking and …, 2012 - Wiley Online Library
Among the severe security threats faced in distributed mobile computing environments, two
are particularly troublesome: harmful agent and harmful host. This chapter consider security …

Exclusive graph searching

L Blin, J Burman, N Nisse - Algorithmica, 2017 - Springer
This paper tackles the well known graph searching problem, where a team of searchers
aims at capturing an intruder in a network, modeled as a graph. This problem has been …

Decontaminating a network from a black virus

J Cai, P Flocchini, N Santoro - International Journal of Networking …, 2014 - jstage.jst.go.jp
In this paper, we consider the problem of decontaminating a network from a black virus (BV)
using a team of mobile system agents. The BV is a harmful process which, like the …

Tree decontamination with temporary immunity

P Flocchini, B Mans, N Santoro - International Symposium on Algorithms …, 2008 - Springer
Consider a tree network that has been contaminated by a persistent and active virus: when
infected, a network site will continuously attempt to spread the virus to all its neighbours. The …

A general approach to toroidal mesh decontamination with local immunity

F Luccio, L Pagli - … IEEE International Symposium on Parallel & …, 2009 - ieeexplore.ieee.org
Network decontamination is studied on a k-dimensional torus (n 1 times ldrldrldr times nk),
with k ges 1 and 2 les n 1 lesldrldrldrles n k. The decontamination is done by a set of agents …