International audienceWe study the problem of locating a particularly dangerous node, the so-called black hole in a synchronous anonymous ring network with mobile agents. A black hole is a harmful stationary process residing in a node of the network and destroying all mobile agents visiting that node without leaving any trace. Unlike most previous research on the black hole search problem which employed a co-located team of agents, we consider the more challenging scenario when the agents are identical and initially scattered within the network. Moreover, we solve the problem with agents that have constant-sized memory and carry a constant number of identical tokens, which can be placed at nodes of the network. In contrast, the only known s...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
In this paper we address the problem of mobile agents searching for a highly harmful item (called a ...
In this paper we address the problem of mobile agents searching for a highly harmful item (called bl...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival without an...
Black hole search in a ring network has been studied in a token model. It is known that locating the...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their a...
In this paper we address the problem of mobile agents searching for a highly harmful item (called a ...
In this paper we address the problem of mobile agents searching for a highly harmful item (called bl...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival without an...
Black hole search in a ring network has been studied in a token model. It is known that locating the...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...
In this paper, we start the investigation of distributed computing by mobile agents in dangerous dyn...