An annotated bibliography on guaranteed graph searching

FV Fomin, DM Thilikos - Theoretical computer science, 2008 - Elsevier
Graph searching encompasses a wide variety of combinatorial problems related to the
problem of capturing a fugitive residing in a graph using the minimum number of searchers …

Pursuing a fast robber on a graph

FV Fomin, PA Golovach, J Kratochvíl, N Nisse… - Theoretical Computer …, 2010 - Elsevier
The Cops and Robbers game as originally defined independently by Quilliot and by
Nowakowski and Winkler in the 1980s has been much studied, but very few results pertain …

Decontamination of hypercubes by mobile agents

P Flocchini, MJ Huang, FL Luccio - Networks: An International …, 2008 - Wiley Online Library
In this article we consider the decontamination problem in a hypercube network of size n.
The nodes of the network are assumed to be contaminated and they have to be …

Decontaminating chordal rings and tori using mobile agents

P Flocchini, MJ Huang, FL Luccio - International Journal of …, 2007 - World Scientific
In this paper we consider a network where an intruder is moving" contaminating" the nodes it
passes by, and we focus on the problem of decontaminating such a network by a team of …

Suade: Topology-based searches for software investigation

FW Warr, MP Robillard - 29th International Conference on …, 2007 - ieeexplore.ieee.org
The investigation of a software system prior to a modification task often constitutes an
important fraction of the overall effort associated with the task. We present Suade, an Eclipse …

On tractability of cops and robbers game

FV Fomin, PA Golovach, J Kratochvíl - Fifth Ifip International Conference …, 2008 - Springer
abstract The Cops and Robbers game is played on undirected graphs where a group of
cops tries to catch a robber. The game was defined independently by Winkler-Nowakowski …

[PS][PS] Size Optimal Strategies for Capturing an Intruder in Mesh Networks Ѓ

P Flocchini, FL Luccio, LX Song - 2005 - site.uottawa.ca
In this paper we consider the problem of capturing an intruder in a networked environment.
The intruder is defined as a mobile entity that moves inside the network and escapes from a …

Network decontamination

N Nisse - Distributed Computing by Mobile Entities: Current …, 2019 - Springer
Abstract The Network Decontamination problem consists of coordinating a team of mobile
agents in order to clean a contaminated network. The problem is actually equivalent to …

Contiguous search in the hypercube for capturing an intruder

P Flocchini, MJ Huang, FL Luccio - 19th IEEE International …, 2005 - ieeexplore.ieee.org
In this paper we consider the problem of searching for an intruder in a network. There is a
team of collaborative software agents that are deployed to capture a hostile intruder (eg, a …

From pathwidth to connected pathwidth

D Dereniowski - SIAM Journal on Discrete Mathematics, 2012 - SIAM
It is proven that the connected pathwidth of any graph G is at most 2⋅pw(G)+1, where pw(G)
is the pathwidth of G. The method is constructive, ie, it yields an efficient algorithm that for a …