Abstract. We consider the problem of locating a black hole in a syn-chronous, anonymous, and unoriented torus network using mobile agents. A black hole is a harmful network node that destroys any agent visit-ing it without leaving any trace. The objective is to locate the black hole using as few agents as possible. We present here an almost optimal deter-ministic algorithm for synchronous (partially) unoriented tori using five scattered agents with constant memory and three identical tokens. We also study the exploration problem of a safe (i.e., without black holes) unoriented torus. While it has been previously shown that there is no universal algorithm for one agent with constant memory and any con-stant number of tokens which can explore...
Abstract. Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the grap...
Mobile agents operating in networked environments face threats from other agents as well as from the...
Black hole search in a ring network has been studied in a token model. It is known that locating the...
We consider the problem of locating a black hole in a synchronous, anonymous, and unoriented torus n...
International audienceWe consider the problem of locating a black hole in synchronous anonymous netw...
We consider the problem of locating a black hole in synchronous anonymous networks using finite stat...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the impact of the topological structure on the complexity of the Black hole search (Bhs) pr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
In this paper we address the problem of mobile agents searching for a highly harmful item (called bl...
In this paper we address the problem of mobile agents searching for a highly harmful item (called a ...
Abstract. Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the grap...
Mobile agents operating in networked environments face threats from other agents as well as from the...
Black hole search in a ring network has been studied in a token model. It is known that locating the...
We consider the problem of locating a black hole in a synchronous, anonymous, and unoriented torus n...
International audienceWe consider the problem of locating a black hole in synchronous anonymous netw...
We consider the problem of locating a black hole in synchronous anonymous networks using finite stat...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the impact of the topological structure on the complexity of the Black hole search (Bhs) pr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
In this paper we address the problem of mobile agents searching for a highly harmful item (called bl...
In this paper we address the problem of mobile agents searching for a highly harmful item (called a ...
Abstract. Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the grap...
Mobile agents operating in networked environments face threats from other agents as well as from the...
Black hole search in a ring network has been studied in a token model. It is known that locating the...