Skip to main content

A Self-stabilizing Algorithm for Graph Searching in Trees

  • Conference paper
Stabilization, Safety, and Security of Distributed Systems (SSS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5873))

Included in the following conference series:

Abstract

Graph searching games have been extensively studied in the past years. The graph searching problem involves a team of searchers who are attempting to capture a fugitive moving along the edges of the graph. In this paper we consider the graph searching problem in a network environment, namely a tree network. Searchers are software programs and the fugitive is a virus that spreads rapidly. Every node of the network which the virus may have reached, becomes contaminated. The purpose of the game is to clean the network. In real world distributed systems faults can occur and thus it is desirable for an algorithm to be able to facilitate the cleaning of a network in an optimal way, and also to reconfigure on the fly.

In this paper we give the first self-stabilizing algorithm for solving the graph searching problem in trees. Our algorithm stabilizes after O(n 3) time steps under the distributed adversarial daemon. Our algorithm solves the node searching variant of the graph searching problem, but can with small modifications also solve edge and mixed searching.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barrière, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Capture of an intruder by mobile agents. In: SPAA, pp. 200–209 (2002)

    Google Scholar 

  2. Bienstock, D.: Graph searching, path-width, tree-width and related problems (a survey). DIMACS Ser. in Discrete Mathematics and Theoretical Computer Science 5, 33–49 (1991)

    MathSciNet  Google Scholar 

  3. Bienstock, D., Seymour, P.D.: Monotonicity in graph searching. J. Algorithms 12(2), 239–245 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  4. Blair, J.R.S., Manne, F.: Efficient self-stabilizing algorithms for tree network. In: ICDCS, pp. 20–26. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  5. Blin, L., Fraigniaud, P., Nisse, N., Vial, S.: Distributed chasing of network intruders. Theor. Comput. Sci. 399(1-2), 12–37 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  6. Breisch, R.: An intuitive approach to speoleotopology. S.W.Cavers VI 5, 72–78 (1967)

    Google Scholar 

  7. Coudert, D., Huc, F., Mazauric, D.: A distributed algorithm for computing and updating the process number of a forest. In: Taubenfeld, G. (ed.) DISC 2008. LNCS, vol. 5218, pp. 500–501. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Commun. ACM 17(11), 643–644 (1974)

    Article  MATH  Google Scholar 

  9. Dolev, S.: Self-stabilization. MIT Press, Cambridge (2000)

    MATH  Google Scholar 

  10. Flocchini, P., Jun Huang, M., Luccio, F.L.: Contiguous search in the hypercube for capturing an intruder. In: IPDPS. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  11. Flocchini, P., Luccio, F.L., Song, L.X.: Size optimal strategies for capturing an intruder in mesh networks. In: d’Auriol, B.J., Arabnia, H.R. (eds.) Communications in Computing, pp. 200–206. CSREA Press (2005)

    Google Scholar 

  12. Flocchini, P., Mans, B., Santoro, N.: Tree decontamination with temporary immunity. In: Hong, S.-H., Nagamochi, H., Fukunaga, T. (eds.) ISAAC 2008. LNCS, vol. 5369, pp. 330–341. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  13. Fomin, F.V., Thilikos, D.M.: An annotated bibliography on guaranteed graph searching. Theor. Comput. Sci. 399(3), 236–245 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  14. Franklin, M.K., Galil, Z., Yung, M.: Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47(2), 225–243 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  15. Ilcinkas, D., Nisse, N., Soguet, D.: The cost of monotonicity in distributed graph searching. In: Tovar, E., Tsigas, P., Fouchal, H. (eds.) OPODIS 2007. LNCS, vol. 4878, pp. 415–428. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Kirousis, L.M., Papadimitriou, C.H.: Interval graphs and seatching. Discrete Mathematics 55(2), 181–184 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  17. Kirousis, L.M., Papadimitriou, C.H.: Searching and pebbling. Theor. Comput. Sci. 47(3), 205–218 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  18. LaPaugh, A.S.: Recontamination does not help to search a graph. J. ACM 40(2), 224–245 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  19. Megiddo, N., Louis Hakimi, S., Garey, M.R., Johnson, D.S., Papadimitriou, C.H.: The complexity of searching a graph. J. ACM 35(1), 18–44 (1988)

    Article  MATH  Google Scholar 

  20. Nisse, N., Soguet, D.: Graph searching with advice. Theor. Comput. Sci. 410(14), 1307–1318 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  21. Parson, T.D.: Pursuit-evasion in a graph. Theory and Applications of Graphs, 426–441 (1976)

    Google Scholar 

  22. Peng, S.L., Ho, C.W., Hsu, T.S., Ko, M.T., Tang, C.Y.: Edge and node searching problems on trees. Theor. Comput. Sci. 240(2), 429–446 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  23. Peng, S.L., Tang, C.Y., Ko, M.T., Ho, C.W., Hsu, T.: Graph searching on some subclasses of chordal graphs. Algorithmica 27(3), 395–426 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  24. Petrov, N.N.: A problem of pursuit in the absence of information on the pursued. Differentsialnye Uravneniya 18, 1345–1352, 1468 (1982)

    Google Scholar 

  25. Skodinis, K.: Construction of linear tree-layouts which are optimal with respect to vertex separation in linear time. J. Algorithms 47(1), 40–59 (2003)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mihai, R., Mjelde, M. (2009). A Self-stabilizing Algorithm for Graph Searching in Trees. In: Guerraoui, R., Petit, F. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2009. Lecture Notes in Computer Science, vol 5873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05118-0_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05118-0_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05117-3

  • Online ISBN: 978-3-642-05118-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics