Network decontamination under \(m\)-immunity
From MaRDI portal
Publication:908298
DOI10.1016/j.dam.2015.07.020zbMath1329.05269OpenAlexW1659542177MaRDI QIDQ908298
Fabrizio Luccio, Linda Pagli, Paola Flocchini, Nicola Santoro
Publication date: 4 February 2016
Published in: Discrete Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.dam.2015.07.020
Trees (05C05) Small world graphs, complex networks (graph-theoretic aspects) (05C82) Network design and communication in computer systems (68M10) Graph theory (including graph drawing) in computer science (68R10)
Related Items (2)
More agents may decrease global work: a case in butterfly decontamination ⋮ On-line search in two-dimensional environment
Cites Work
- Unnamed Item
- Unnamed Item
- Connected graph searching
- Connected searching of weighted trees
- An annotated bibliography on guaranteed graph searching
- Distributed chasing of network intruders
- Connected graph searching in chordal graphs
- Capturing an intruder in product networks
- Graph searching with advice
- Sweeping graphs with large clique number
- The vertex separation number of a graph equals its path-width
- A pursuit-evasion problem on a grid
- Local majorities, coalitions and monopolies in graphs: A review
- Searching and pebbling
- Approximate search strategies for weighted trees
- Contiguous search problem in Sierpiński graphs
- The cost of monotonicity in distributed graph searching
- Decontamination of hypercubes by mobile agents
- Design and Analysis of Distributed Algorithms
- Capturing an Intruder in the Pyramid
- Connected Graph Searching in Outerplanar Graphs
- NETWORK DECONTAMINATION IN PRESENCE OF LOCAL IMMUNITY
- DECONTAMINATING CHORDAL RINGS AND TORI USING MOBILE AGENTS
- Tree Decontamination with Temporary Immunity
- The complexity of searching a graph
- Monotonicity in graph searching
- Network Decontamination with Temporal Immunity by Cellular Automata
- Recontamination does not help to search a graph
- Graph-Theoretic Concepts in Computer Science
This page was built for publication: Network decontamination under \(m\)-immunity