Theoretical Computer Science
The complexity of searching a graph
Journal of the ACM (JACM)
Recontamination does not help to search a graph
Journal of the ACM (JACM)
The vertex separation and search number of a graph
Information and Computation
Concrete Mathematics: A Foundation for Computer Science
Concrete Mathematics: A Foundation for Computer Science
Capture of an intruder by mobile agents
Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures
Capturing an intruder in product networks
Journal of Parallel and Distributed Computing
Distributed chasing of network intruders
Theoretical Computer Science
An annotated bibliography on guaranteed graph searching
Theoretical Computer Science
Mixed Search Number of Permutation Graphs
FAW '08 Proceedings of the 2nd annual international workshop on Frontiers in Algorithmics
Theoretical Computer Science
A Self-stabilizing Algorithm for Graph Searching in Trees
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Web marshals fighting curly link farms
FUN'07 Proceedings of the 4th international conference on Fun with algorithms
Intruder capture in Sierpinski graphs
FUN'07 Proceedings of the 4th international conference on Fun with algorithms
SIROCCO'07 Proceedings of the 14th international conference on Structural information and communication complexity
The cost of monotonicity in distributed graph searching
OPODIS'07 Proceedings of the 11th international conference on Principles of distributed systems
Decontamination of chordal rings and tori
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Network decontamination with local immunization
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Connected searching of weighted trees
Theoretical Computer Science
Capturing an intruder in product networks
HiPC'06 Proceedings of the 13th international conference on High Performance Computing
Distributed security algorithms by mobile agents
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Capturing an intruder in the pyramid
CSR'06 Proceedings of the First international computer science conference on Theory and Applications
Distributed chasing of network intruders
SIROCCO'06 Proceedings of the 13th international conference on Structural Information and Communication Complexity
Pathwidth and searching in parameterized threshold graphs
WALCOM'10 Proceedings of the 4th international conference on Algorithms and Computation
Cleaning an arbitrary regular network with mobile agents
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Hi-index | 0.00 |
In this paper we consider the problem of searching for an intruder in a network.There is a team of collaborative software agents that are deployed to capture a hostile intruder (e.g., a virus).These agents asynchronously move along the network links and the intruder has the capability of escaping arbitrarily fast.We propose two different strategies for the solution of the problem in a widely studied topology: the hypercube network.In the first strategy one of the agents acts as a coordinator making the other agents move in a precise way; this strategy requires O(n log n) moves, a team of O(\frac{n}{{n\log n}}) agents and runs in O(n log n) time steps.The second strategy is devised for a model where the agents are allowed to "see" the state of their neighbours.In this case, the computation is local, i.e., there is no need of a coordinator and agents can move automously.In this setting the solution requires \frac{n}{2} agents, but is much faster (log n time steps), and requires the same number of moves (O(n log n)).