#### Filter Results:

- Full text PDF available (24)

#### Publication Year

1999

2017

- This year (1)
- Last 5 years (6)
- Last 10 years (15)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents' strategy for capturing the intruder. The main efficiency… (More)

- Lali Barrière, Pierre Fraigniaud, Lata Narayanan
- DIAL-M
- 2001

Several papers showed how to perform routing in <i>ad hoc</i> wireless networks based on the positions of the mobile hosts. However, all these protocols are likely to fail if the transmission ranges of the mobile hosts vary due to natural or man-made obstacles or weather conditions. These protocols may fail because in routing either some connections are not… (More)

- Lali Barrière, Pierre Fraigniaud, Lata Narayanan, Jaroslav Opatrny
- Wireless Communications and Mobile Computing
- 2003

Bluetooth is a promising recent radio technology for <i>ad hoc</i> networking. Bluetooth networks are based on connecting together <i>piconets</i>, to form a <i>scatternet</i>. The structure of the scatternet, and the way the scatternet is built and maintained, are not part of the Bluetooth specifications, but have a tremendous impact on the performance of… (More)

The aim of this paper is to study the computational power of the qualitative model, where entities are given distinct labels which are however mutually incomparable; this model is opposed to the quantitative model, where labels are integers. The qualitative model captures, for example,the case when the labels are written in different alphabets (e.g.,… (More)

- Lali Barrière, Paola Flocchini, Pierre Fraigniaud, Nicola Santoro
- Theory of Computing Systems
- 2005

Consider a collection of r identical asynchronous mobile agents dispersed on an arbitrary anonymous network of size n. The agents all execute the same protocol and move from node to neighboring node. At each node there is a whiteboard where the agents can write and read from. The topology of the network is unknown to the agents. We examine the problems of… (More)

This paper is concerned with the graph searching game. The search number s(G) of a graph G is the smallest number of searchers required to “clear” G. A search strategy is monotone (m) if no recontamination ever occurs. It is connected (c) if the set of clear edges always forms a connected subgraph. It is internal (i) if the removal of searchers is not… (More)

- Lali Barrière, Paola Flocchini, +4 authors Dimitrios M. Thilikos
- Inf. Comput.
- 2012

In the graph searching game the opponents are a set of searchers and a fugitive in a graph. The searchers try to capture the fugitive by applying some sequence of moves that include placement, removal, or sliding of a searcher along an edge. The fugitive tries to avoid capture by moving along unguarded paths. The search number of a graph is the minimum… (More)