299 research outputs found
Variations on Cops and Robbers
We consider several variants of the classical Cops and Robbers game. We treat
the version where the robber can move R > 1 edges at a time, establishing a
general upper bound of N / \alpha ^{(1-o(1))\sqrt{log_\alpha N}}, where \alpha
= 1 + 1/R, thus generalizing the best known upper bound for the classical case
R = 1 due to Lu and Peng. We also show that in this case, the cop number of an
N-vertex graph can be as large as N^{1 - 1/(R-2)} for finite R, but linear in N
if R is infinite. For R = 1, we study the directed graph version of the
problem, and show that the cop number of any strongly connected digraph on N
vertices is at most O(N(log log N)^2/log N). Our approach is based on
expansion.Comment: 18 page
Cops and Invisible Robbers: the Cost of Drunkenness
We examine a version of the Cops and Robber (CR) game in which the robber is
invisible, i.e., the cops do not know his location until they capture him.
Apparently this game (CiR) has received little attention in the CR literature.
We examine two variants: in the first the robber is adversarial (he actively
tries to avoid capture); in the second he is drunk (he performs a random walk).
Our goal in this paper is to study the invisible Cost of Drunkenness (iCOD),
which is defined as the ratio ct_i(G)/dct_i(G), with ct_i(G) and dct_i(G) being
the expected capture times in the adversarial and drunk CiR variants,
respectively. We show that these capture times are well defined, using game
theory for the adversarial case and partially observable Markov decision
processes (POMDP) for the drunk case. We give exact asymptotic values of iCOD
for several special graph families such as -regular trees, give some bounds
for grids, and provide general upper and lower bounds for general classes of
graphs. We also give an infinite family of graphs showing that iCOD can be
arbitrarily close to any value in [2,infinty). Finally, we briefly examine one
more CiR variant, in which the robber is invisible and "infinitely fast"; we
argue that this variant is significantly different from the Graph Search game,
despite several similarities between the two games
The -visibility Localization Game
We study a variant of the Localization game in which the cops have limited
visibility, along with the corresponding optimization parameter, the
-visibility localization number , where is a non-negative
integer. We give bounds on -visibility localization numbers related to
domination, maximum degree, and isoperimetric inequalities. For all , we
give a family of trees with unbounded values. Extending results known
for the localization number, we show that for , every tree contains a
subdivision with . For many , we give the exact value of
for the Cartesian grid graphs, with the remaining cases
being one of two values as long as is sufficiently large. These examples
also illustrate that for all distinct choices of and
$j.
Search and Pursuit-Evasion in Mobile Robotics, A survey
This paper surveys recent results in pursuitevasion
and autonomous search relevant to applications
in mobile robotics. We provide a taxonomy of search
problems that highlights the differences resulting from
varying assumptions on the searchers, targets, and the
environment. We then list a number of fundamental
results in the areas of pursuit-evasion and probabilistic
search, and we discuss field implementations on mobile
robotic systems. In addition, we highlight current open
problems in the area and explore avenues for future
work
Dagstuhl Reports : Volume 1, Issue 2, February 2011
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061) : Simone Fischer-Hübner, Chris Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris and Michael Marhöfer Self-Repairing Programs (Dagstuhl Seminar 11062) : Mauro Pezzé, Martin C. Rinard, Westley Weimer and Andreas Zeller Theory and Applications of Graph Searching Problems (Dagstuhl Seminar 11071) : Fedor V. Fomin, Pierre Fraigniaud, Stephan Kreutzer and Dimitrios M. Thilikos Combinatorial and Algorithmic Aspects of Sequence Processing (Dagstuhl Seminar 11081) : Maxime Crochemore, Lila Kari, Mehryar Mohri and Dirk Nowotka Packing and Scheduling Algorithms for Information and Communication Services (Dagstuhl Seminar 11091) Klaus Jansen, Claire Mathieu, Hadas Shachnai and Neal E. Youn
Graph-theoretic Approach To Modeling Propagation And Control Of Network Worms
In today\u27s network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2) Building an accurate epidemiological model for the propagation of a worm employing local strategies, (3) Devising distributed architecture and algorithms for detection of worm scanning activities, (4) Designing effective control strategies against the worm, and (5) Simulation of the developed models and strategies on large, scale-free graphs representing real-world communication networks. The proposed pair-approximation model uses the information about the network structure--order, size, degree distribution, and transitivity. The empirical study of propagation on large scale-free graphs is in agreement with the theoretical analysis of the proposed pair-approximation model. We, then, describe a natural generalization of the classical cops-and-robbers game--a combinatorial model of worm propagation and control. With the help of this game on graphs, we show that the problem of containing the worm is NP-hard. Six novel near-optimal control strategies are devised: combination of static and dynamic immunization, reactive dynamic and invariant dynamic immunization, soft quarantining, predictive traffic-blocking, and contact-tracing. The analysis of the predictive dynamic traffic-blocking, employing only local information, shows that the worm can be contained so that 40\% of the network nodes are not affected. Finally, we develop the Detection via Distributed Blackholes architecture and algorithm which reflect the propagation strategy used by the worm and the salient properties of the network. Our distributed detection algorithm can detect the worm scanning activity when only 1.5% of the network has been affected by the propagation. The proposed models and algorithms are analyzed with an individual-based simulation of worm propagation on realistic scale-free topologies
- …