A black hole is a highly harmful host that disposes of visiting agents upon their arrival. It is known that it is possible for a team of mobile agents to locate a black hole in an asynchronous ring network if each node is equipped with a whiteboard of at least O(log n) dedicated bits of storage. In this paper, we consider the less powerful token model: each agent has has available a bounded number of tokens that can be carried, placed on a node or removed from it. All tokens are identical (i.e., indistinguishable) and no other form of communication or coordination is available to the agents. We first of all prove that a team of two agents is sufficient to locate the black hole in finite time even in this weaker coordination model. Furthermo...
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the graph topology...
This thesis deals with the problems of exploration and map construction of a dangerous network by m...
Black hole search in a ring network has been studied in a token model. It is known that locating the...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival without an...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the impact of the topological structure on the complexity of the Black hole search (Bhs) pr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
We consider the problem of locating a black hole in synchronous anonymous networks using finite stat...
International audienceWe prove that, for the black hole search problem, the pure token model is comp...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
In this paper we address the problem of mobile agents searching for a highly harmful item (called a ...
In this paper we address the problem of mobile agents searching for a highly harmful item (called bl...
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the graph topology...
This thesis deals with the problems of exploration and map construction of a dangerous network by m...
Black hole search in a ring network has been studied in a token model. It is known that locating the...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival without an...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the impact of the topological structure on the complexity of the Black hole search (Bhs) pr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
We consider the problem of locating a black hole in synchronous anonymous networks using finite stat...
International audienceWe prove that, for the black hole search problem, the pure token model is comp...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
In this paper we address the problem of mobile agents searching for a highly harmful item (called a ...
In this paper we address the problem of mobile agents searching for a highly harmful item (called bl...
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the graph topology...
This thesis deals with the problems of exploration and map construction of a dangerous network by m...
Black hole search in a ring network has been studied in a token model. It is known that locating the...