Proceedings of the Fourteenth Annual ACM Symposium on Parallel Algorithms and Architectures 2002
DOI: 10.1145/564870.564906
|View full text |Cite
|
Sign up to set email alerts
|

Capture of an intruder by mobile agents

Abstract: Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents' strategy for capturing the intruder. The main efficiency parameter is the size of the team. This is an instance of the well known graph-searching problem whose many variants have been extensively studied in the literature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
207
1

Year Published

2004
2004
2012
2012

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 123 publications
(208 citation statements)
references
References 33 publications
0
207
1
Order By: Relevance
“…The CMD problem [3]. We consider an initially contaminated network that has to be decontaminated by a set of agents (or searchers) arbitrarily moving inside the network.…”
Section: Upgrading Vs Decontaminatingmentioning
confidence: 99%
See 3 more Smart Citations
“…The CMD problem [3]. We consider an initially contaminated network that has to be decontaminated by a set of agents (or searchers) arbitrarily moving inside the network.…”
Section: Upgrading Vs Decontaminatingmentioning
confidence: 99%
“…The problem of finding an optimal strategy has been studied in some specific topologies such as trees [3]. In the same work it is also proved that, for trees, a non-monotone solution, i.e., allowing re-contamination of nodes, would not reduce the optimal number of required agents.…”
Section: Upgrading Vs Decontaminatingmentioning
confidence: 99%
See 2 more Smart Citations
“…The coordination of the agents necessary to perform these operations is not necessarily simple or easy to achieve. In fact, the computational problems related to these operations are definitely non trivial, and a great deal of theoretical research is devoted to the study of conditions for the solvability of these problems and to the discovery of efficient algorithmic solutions; e.g., see [4,5,6,15].…”
Section: Introductionmentioning
confidence: 99%