#### Filter Results:

- Full text PDF available (21)

#### Publication Year

1999

2015

- This year (0)
- Last 5 years (4)
- Last 10 years (12)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents' strategy for capturing the intruder. The main efficiency… (More)

- Lali Barrière, Pierre Fraigniaud, Lata Narayanan
- DIAL-M
- 2001

Several papers showed how to perform routing in <i>ad hoc</i> wireless networks based on the positions of the mobile hosts. However, all these protocols are likely to fail if the transmission ranges of the mobile hosts vary due to natural or man-made obstacles or weather conditions. These protocols may fail because in routing either some connections are not… (More)

- Lali Barrière, Pierre Fraigniaud, Lata Narayanan, Jaroslav Opatrny
- Wireless Communications and Mobile Computing
- 2003

- Lali Barrière, Paola Flocchini, Pierre Fraigniaud, Nicola Santoro
- Theory of Computing Systems
- 2005

Consider a collection of r identical asynchronous mobile agents dispersed on an arbitrary anonymous network of size n. The agents all execute the same protocol and move from node to neighboring node. At each node there is a whiteboard where the agents can write and read from. The topology of the network is unknown to the agents. We examine the problems of… (More)

Bluetooth is a promising recent radio technology for <i>ad hoc</i> networking. Bluetooth networks are based on connecting together <i>piconets</i>, to form a <i>scatternet</i>. The structure of the scatternet, and the way the scatternet is built and maintained, are not part of the Bluetooth specifications, but have a tremendous impact on the performance of… (More)

- Lali Barrière, Paola Flocchini, +4 authors Dimitrios M. Thilikos
- Inf. Comput.
- 2012

In the graph searching game the opponents are a set of searchers and a fugitive in a graph. The searchers try to capture the fugitive by applying some sequence of moves that include placement, removal, or sliding of a searcher along an edge. The fugitive tries to avoid capture by moving along unguarded paths. The search number of a graph is the minimum… (More)

- Lali Barrière, Francesc Comellas, Cristina Dalfó, Miguel Angel Fiol
- Discrete Applied Mathematics
- 2009

A new operation on graphs is introduced and some of its properties are studied. We call it hierarchical product, because of the strong (connectedness) hierarchy of the vertices in the resulting graphs. In fact, the obtained graphs turn out to be subgraphs of the cartesian product of the corresponding factors. Some well-known properties of the cartesian… (More)

This paper is concerned with the graph searching game. The search number s(G) of a graph G is the smallest number of searchers required to " clear " G. A search strategy is monotone (m) if no recontamination ever occurs. It is connected (c) if the set of clear edges always forms a connected subgraph. It is internal (i) if the removal of searchers is not… (More)