Capturing an intruder in the pyramid

  • Authors:
  • Pooya Shareghi;Navid Imani;Hamid Sarbazi-Azad

  • Affiliations:
  • IPM School of Computer Science, and Sharif University of Technology, Tehran, Iran;IPM School of Computer Science, and Sharif University of Technology, Tehran, Iran;IPM School of Computer Science, and Sharif University of Technology, Tehran, Iran

  • Venue:
  • CSR'06 Proceedings of the First international computer science conference on Theory and Applications
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we envision a solution for the problem of capturing an intruder in one of the most popular interconnection topologies, namely the pyramid. A set of agents collaborate to capture a hostile intruder in the network. While the agents can move in the network one hop at a time, the intruder is assumed to be arbitrarily fast, i.e. it can traverse any number of nodes contiguously as far as there are no agents in those nodes. Here we consider a new version of the problem where each agent can replicate new agents when needed, i.e. the algorithm starts with a single agent and new agents are created on demand. In particular, we propose two different algorithms on the pyramid network and we will later discuss about the merits of each algorithm based on some performance criteria.