dc.creator | Giachoudis N., Kokkou M., Markou E. | en |
dc.date.accessioned | 2023-01-31T07:41:31Z | |
dc.date.available | 2023-01-31T07:41:31Z | |
dc.date.issued | 2020 | |
dc.identifier | 10.1007/978-3-030-54921-3_13 | |
dc.identifier.isbn | 9783030549206 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://hdl.handle.net/11615/72263 | |
dc.description.abstract | We study the Black Virus Decontamination problem in ring topologies for initially scattered mobile agents. In this problem a number of mobile agents operate in a network where one of its nodes u is hostile (contaminated) in the following way: when u is visited by an agent, it is decontaminated, the agent vanishes without leaving any trace, and all adjacent nodes of u which are unoccupied by agents are now contaminated. The goal is to find the minimum number of agents that can decontaminate a given network with a black virus at an unknown location and design a fast distributed algorithm for a certain (preferably weak) model of mobile agents. The problem has been introduced by J., Cai et al in 2014 and combines details from two widely studied problems: the Black Hole Search problem and the Intruder Capture problem. We study here the problem for initially scattered mobile agents in synchronous ring topologies. We prove that ten initially scattered agents with a common chirality (i.e., agreement in a global sense of orientation) are necessary and sufficient to solve the problem. If the agents do not have a common chirality then twelve scattered agents with distinct identities are necessary and sufficient, while for anonymous agents the problem is unsolvable. To the best of our knowledge these are the first results concerning the problem for initially scattered agents. © Springer Nature Switzerland AG 2020. | en |
dc.language.iso | en | en |
dc.source | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089419541&doi=10.1007%2f978-3-030-54921-3_13&partnerID=40&md5=ac65279997ce6381ba5cf366ba0044d9 | |
dc.subject | Chirality | en |
dc.subject | Complex networks | en |
dc.subject | Computational complexity | en |
dc.subject | Computer viruses | en |
dc.subject | Decontamination | en |
dc.subject | Topology | en |
dc.subject | Viruses | en |
dc.subject | Adjacent nodes | en |
dc.subject | Black hole search | en |
dc.subject | Intruder capture | en |
dc.subject | Ring networks | en |
dc.subject | Ring topology | en |
dc.subject | Mobile agents | en |
dc.subject | Springer | en |
dc.title | Black virus decontamination of synchronous ring networks by initially scattered mobile agents | en |
dc.type | conferenceItem | en |