Le problème de l'encerclement dans les réseaux a été introduit par Parson (1976) : étant donné un réseau ``contaminé'' (par exemple dans lequel un intrus s'est introduit), l'emph{encerclement} du réseau est le nombre minimum d'agents nécessaires pour ``nettoyer'' le réseau (c'est-à-dire capturer l'intrus). Une stratégie d'encerclement est dite...
-
2005 (v1)Conference paperUploaded on: December 3, 2022
-
December 2008 (v1)Journal article
Search games are attractive for their correspondence with classical width parameters. For instance, the invisible search number (a.k.a. node search number) of a graph is equal to its pathwidth plus 1, and the visible search number of a graph is equal to its treewidth plus 1. The connected variants of these games ask for search strategies that...
Uploaded on: December 3, 2022 -
2006 (v1)Conference paper
We give a constructive proof of the equality between \emph{treewidth} and \emph{connected treewidth}. More precisely, we describe an $O(nk^3)$-time algorithm that, given any $n$-node width-$k$ tree-decomposition of a connected graph $G$, returns a connected tree-decomposition of $G$ of width $\leq k$. The equality between treewidth and...
Uploaded on: December 3, 2022 -
2019 (v1)Journal article
Error-correcting codes are efficient methods for handling noisy communication channels in the context of technological networks. However, such elaborate methods differ a lot from the unsophisticated way biological entities are supposed to communicate. Yet, it has been recently shown by Feinerman, Haeupler, and Korman [PODC 2014] that complex...
Uploaded on: December 4, 2022 -
2006 (v1)Conference paper
Search games are attractive for their correspondence with classical width parameters. For instance, the \emph{invisible} search number (a.k.a. \emph{node} search number) of a graph is equal to its pathwidth plus~1, and the \emph{visible} search number of a graph is equal to its treewidth plus~1. The \emph{connected} variants of these games ask...
Uploaded on: February 22, 2023 -
November 1991 (v1)Conference paper
International audience
Uploaded on: December 4, 2022 -
February 1994 (v1)Journal article
International audience
Uploaded on: December 4, 2022 -
March 2009 (v1)Journal article
We introduce nondeterministic graph searching with a controlled amount of nondeterminism and show how this new tool can be used in algorithm design and combinatorial analysis applying to both pathwidth and treewidth. We prove equivalence between this game-theoretic approach and graph decompositions called q -branched tree decompositions, which...
Uploaded on: December 3, 2022 -
2005 (v1)Conference paper
We introduce nondeterministic graph searching with a controlled amount of nondeterminism and show how this new tool can be used in algorithm design and combinatorial analysis applying to both pathwidth and treewidth. We prove equivalence between this game-theoretic approach and graph decompositions called q -branched tree decompositions, which...
Uploaded on: December 4, 2022 -
2005 (v1)Conference paper
We introduce nondeterministic graph searching with a controlled amount of nondeterminism and show how this new tool can be used in algorithm design and combinatorial analysis applying to both pathwidth and treewidth. We prove equivalence between this game-theoretic approach and graph decompositions called q -branched tree decompositions, which...
Uploaded on: February 22, 2023 -
October 1995 (v1)Journal article
International audience
Uploaded on: December 4, 2022 -
2006 (v1)Conference paper
Nous définissons l'encerclement non-déterministe dans les graphes. Nous montrons comment ce nouvel outil peut être utilisé pour la conception d'algorithmes et pour l'analyse combinatoire de la largeur linéaire (pathwidth) comme de la largeur arborescente (treewidth) des graphes. Nous prouvons l'équivalence entre cette approche sous forme de...
Uploaded on: December 4, 2022 -
May 29, 2018 (v1)Publication
Junta de Andalucía
Uploaded on: March 27, 2023 -
2008 (v1)Journal article
This paper addresses the graph searching problem in a distributed setting.We describe a distributed protocol that enables searchers with logarithmic size memory to clear any network, in a fully decentralized manner. The search strategy for the network in which the searchers are launched is computed online by the searchers themselves without...
Uploaded on: December 4, 2022 -
2006 (v1)Conference paper
International audience
Uploaded on: February 28, 2023 -
November 2024 (v1)Publication
No description
Uploaded on: October 1, 2024 -
December 6, 2016 (v1)Publication
International audience
Uploaded on: February 28, 2023 -
2014 (v1)Report
Graph searching involves a team of mobile agents (called searchers or pursuers or cops) that aims at cap- turing a set of escaping agents (called evaders or fugitives or robbers) that hide in a network modeled by a graph. There are many variants of graph searching studied in the literature, often referred to as a pursuit- evasion game or cops...
Uploaded on: March 25, 2023 -
July 5, 2017 (v1)Report
Graph searching involves a team of mobile agents (called searchers or pursuers or cops) that aims at capturing a set of escaping agents (called evaders or fugitives or robbers) that hide in a network modeled by a graph. There are many variants of graph searching studied in the literature, often referred to as a pursuit-evasion game or cops and...
Uploaded on: February 28, 2023 -
2012 (v1)Journal article
In the graph searching game the opponents are a set of searchers and a fugitive in a graph. The searchers try to capture the fugitive by applying some sequence of moves that include placement, removal, or sliding of a searcher along an edge. The fugitive tries to avoid capture by moving along unguarded paths. The search number of a graph is the...
Uploaded on: December 3, 2022 -
August 2010 (v1)Report
In graph searching game the opponents are a set of searchers and a fugitive in a graph. The searchers try to capture the fugitive by applying some sequence moves that include placement, removal, or sliding of a searcher along an edge. The fugitive tries to avoid capture by moving along unguarded paths. The search number of a graph is the...
Uploaded on: December 4, 2022 -
1994 (v1)Book section
"Communication dans les réseaux de processeurs" écrit sous le nom de jean de Rumeur
Uploaded on: December 4, 2022