Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Theoretical Computer Science
Reference26 articles.
1. Asaka, M., Okazawa, S., Taguchi, A., Goto, S.: A method of tracing intruders by use of mobile agents. In: Proceedings of the 9th Annual Conference of the Internet Society (INET), San Jose (1999). http://www.isoc.org/inet99/proceedings/4k/4k_2.htm
2. Barrière, L., Comellas, F., Dalfó, C.: Fractality and the small-world effect in Sierpiński graphs. J. Phys. A Math. Gen. 39, 11739–11753 (2006)
3. Barrière, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Capture of an intruder by mobile agents. In: Proceedings of the 14-th ACM Symposium on Parallel Algorithms and Architectures (SPAA), Winnipeg, Manitoba, Canada, pp. 200–209 (2002)
4. Bienstock, D., Seymour, P.: Monotonicity in graph searching. J. Algorithms 12, 239–245 (1991)
5. Lecture Notes in Computer Science;L. Blin,2006
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Gathering of robots in a ring with mobile faults;Theoretical Computer Science;2019-04
2. Gathering of Robots in a Grid with Mobile Faults;SOFSEM 2019: Theory and Practice of Computer Science;2019
3. Network Decontamination;Distributed Computing by Mobile Entities;2019
4. Network decontamination under m-immunity;Discrete Applied Mathematics;2016-03
5. Distributed Black Virus Decontamination and Rooted Acyclic Orientations;2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing;2015-10