“School of Computer Science”

Back to Papers Home
Back to Papers of School of Computer Science

Paper   IPM / Computer Science / 11065
School of Computer Science
  Title:   Capturing an intruder in the pyramid
  Author(s): 
1.  P. Shareghi
2.  H. Sarbazi-Azad
  Status:   In Proceedings
  Proceeding: CSR
  Vol.:  3967
  Year:  2006
  Pages:   580-590
  Publisher(s):   LNCS, Springer Berlin / Heidelberg
  Supported by:  IPM
  Abstract:
In this paper, we envision a solution for the problem of capturing an intruder in one of the most popular interconnection topologies, namely the pyramid. A set of agents collaborate to capture a hostile intruder in the network. While the agents can move in the network one hop at a time, the intruder is assumed to be arbitrarily fast, i.e. it can traverse any number of nodes contiguously as far as there are no agents in those nodes. Here we consider a new version of the problem where each agent can replicate new agents when needed, i.e. the algorithm starts with a single agent and new agents are created on demand. In particular, we propose two different algorithms on the pyramid network and we will later discuss about the merits of each algorithm based on some performance criteria.

Download TeX format
back to top
scroll left or right