Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 14 publications
0
18
0
Order By: Relevance
“…In [2,6,8,13,16,17,21], the explored graph is undirected and the agent can traverse edges in both directions. Also, two alternative efficiency measures are adopted in most papers devoted to graph exploration, namely, the time of completing the task [1,2,[4][5][6]10,13], or the number of memory bits (states in the automaton) available to the agent [8,11,[15][16][17]19].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [2,6,8,13,16,17,21], the explored graph is undirected and the agent can traverse edges in both directions. Also, two alternative efficiency measures are adopted in most papers devoted to graph exploration, namely, the time of completing the task [1,2,[4][5][6]10,13], or the number of memory bits (states in the automaton) available to the agent [8,11,[15][16][17]19].…”
Section: Related Workmentioning
confidence: 99%
“…In [15,17], the agent was allowed to mark nodes by pebbles, or even by writing messages on whiteboards with which nodes are equipped. In [8], the authors studied special schemes of labelling nodes, which facilitate exploration with small memory.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [12,13,4,14,15,16,17], the explored graph is undirected and the agent can traverse edges in both directions. Also, two alternative e ciency measures are adopted in most papers devoted to graph exploration, namely, the time of completing the task [7,12,8,9,13,10,14], or the number of memory bits (states in the automaton) available to the agent.…”
Section: Related Workmentioning
confidence: 99%
“…With the advent of large-scale networks that involve a total number of components in the order of the million, two particular issues were stressed: (i) the resources used by the agents should be kept to a minimum given a particular problem (see e.g. [16]), and (ii) the fault and attack tolerance capabilities are of premium importance. Most of the works on fault and attack tolerance with mobile agents deals with external threats, i.e.…”
Section: Introductionmentioning
confidence: 99%