Contiguous search by mobile agents in cube networks and chordal rings
| dc.contributor.author | Huang, Miao Jun | |
| dc.date.accessioned | 2013-11-07T17:25:29Z | |
| dc.date.available | 2013-11-07T17:25:29Z | |
| dc.date.created | 2004 | |
| dc.date.issued | 2004 | |
| dc.degree.level | Masters | |
| dc.degree.name | M.C.S. | |
| dc.description.abstract | In this thesis we consider the problem of searching for an intruder in a network. There is a team of collaborative software agents that are deployed to capture a hostile intruder (e.g., a virus). These agents move along the network links and the intruder has the capability of escaping arbitrarily fast. We propose different strategies for the solution of the problem in some widely used topologies for the local area network and interconnection network: hypercube network, butterfly network and chordal ring network. In each topology, different models are studied depending on the capabilities of agents; i.e., agents' synchronicity, cloning power and visibility. For each model, we analyze the strategies in terms of number of agents employed, number of moves performed by the agents, and time. | |
| dc.format.extent | 98 p. | |
| dc.identifier.citation | Source: Masters Abstracts International, Volume: 43-06, page: 2276. | |
| dc.identifier.uri | http://hdl.handle.net/10393/26661 | |
| dc.identifier.uri | http://dx.doi.org/10.20381/ruor-9734 | |
| dc.language.iso | en | |
| dc.publisher | University of Ottawa (Canada) | |
| dc.subject.classification | Computer Science. | |
| dc.title | Contiguous search by mobile agents in cube networks and chordal rings | |
| dc.type | Thesis |
Files
Original bundle
1 - 1 of 1
