We consider the problem of locating a black hole in synchronous anonymous networks using finite state agents. A black hole is a harmful node in the network that destroys any agent visiting that node without leaving any trace. The objective is to locate the black hole without destroying too many agents. This is difficult to achieve when the agents are initially scattered in the network and are unaware of the location of each other. Previous studies for black hole search used more powerful models where the agents had non-constant memory, were labelled with distinct identifiers and could either write messages on the nodes of the network or mark the edges of the network. In contrast, we solve the problem using a small team of finite-state agent...
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the graph topology...
As the size and use of networks continue to increase, network anomalies and faults are commonplace. ...
International audienceWe prove that, for the black hole search problem, the pure token model is comp...
We consider the problem of locating a black hole in synchronous anonymous networks using finite stat...
International audienceWe consider the problem of locating a black hole in synchronous anonymous netw...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We consider the problem of locating a black hole in a synchronous, anonymous, and unoriented torus n...
Abstract. We consider the problem of locating a black hole in a syn-chronous, anonymous, and unorien...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival. It is kno...
We study the impact of the topological structure on the complexity of the Black hole search (Bhs) pr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole is a highly harmful stationary process residing in a node of a network and destroying a...
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the graph topology...
As the size and use of networks continue to increase, network anomalies and faults are commonplace. ...
International audienceWe prove that, for the black hole search problem, the pure token model is comp...
We consider the problem of locating a black hole in synchronous anonymous networks using finite stat...
International audienceWe consider the problem of locating a black hole in synchronous anonymous netw...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
We consider the problem of locating a black hole in a synchronous, anonymous, and unoriented torus n...
Abstract. We consider the problem of locating a black hole in a syn-chronous, anonymous, and unorien...
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchr...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole is a highly harmful host that disposes of visiting agents upon their arrival. It is kno...
We study the impact of the topological structure on the complexity of the Black hole search (Bhs) pr...
Abstract. We study the problem of locating a particularly dangerous node, the so-called black hole i...
International audienceWe study the problem of locating a particularly dangerous node, the so-called ...
A black hole is a highly harmful stationary process residing in a node of a network and destroying a...
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the graph topology...
As the size and use of networks continue to increase, network anomalies and faults are commonplace. ...
International audienceWe prove that, for the black hole search problem, the pure token model is comp...