Searching for an evader in an unknown graph by an optimal number of searchers

Takahiro Yakami, Yukiko Yamauchi, Shuji Kijima, Masafumi Yamashita

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The graph search problem is the problem of searching a graph G for a mobile evader by mobile searchers. The edge search is an offline and centralized version, and es(G) denotes the number of searchers necessary and sufficient to edge search G. An online and distributed setting assumes a port numbering of G, a distinct homebase and a whiteboard in each node. Search algorithms typically respect the monotone and connected search strategy to protect the information on whiteboards; however, Ω(n/ log n es(G)) searchers are necessary even for trees, where n is the order of G. We investigate the problem under a new online and distributed setting: We assume that searchers can exchange information wherever they meet, instead of assuming a port numbering, a homebase and whiteboards. Under this setting, we propose a search algorithm for es(G) searchers, which is optimal.

Original languageEnglish
Title of host publicationStabilization, Safety, and Security of Distributed Systems - 18th International Symposium, SSS 2016, Proceedings
EditorsFranck Petit, Borzoo Bonakdarpour
PublisherSpringer Verlag
Pages399-414
Number of pages16
ISBN (Print)9783319492582
DOIs
Publication statusPublished - Jan 1 2016
Event18th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2016 - Lyon, France
Duration: Nov 7 2016Nov 10 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10083 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other18th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2016
CountryFrance
CityLyon
Period11/7/1611/10/16

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Searching for an evader in an unknown graph by an optimal number of searchers'. Together they form a unique fingerprint.

  • Cite this

    Yakami, T., Yamauchi, Y., Kijima, S., & Yamashita, M. (2016). Searching for an evader in an unknown graph by an optimal number of searchers. In F. Petit, & B. Bonakdarpour (Eds.), Stabilization, Safety, and Security of Distributed Systems - 18th International Symposium, SSS 2016, Proceedings (pp. 399-414). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10083 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-319-49259-9_31