, DESCARTES (ANR-16-CE40-0023) This study has been carried out in the frame of the " Investments for the future, Programme IdEx Bordeaux ? CPU
Tree exploration with logarithmic memory, ACM Transactions on Algorithms, vol.7, issue.2, pp.1-1721, 2011. ,
DOI : 10.1145/1921659.1921663
Distributed chasing of network intruders, Theoretical Computer Science, vol.399, issue.1-2, pp.12-37, 2008. ,
DOI : 10.1016/j.tcs.2008.02.004
URL : https://hal.archives-ouvertes.fr/hal-01311355
An Effective Characterization of Computability in Anonymous Networks, DISC 2001, pp.33-47, 2001. ,
DOI : 10.1007/3-540-45414-4_3
Universal dynamic synchronous self-stabilization, Distributed Computing, vol.15, issue.3, pp.137-153, 2002. ,
DOI : 10.1007/s004460100062
Fast Distributed Algorithms for Testing Graph Properties, DISC 2016, pp.43-56, 2016. ,
Local Terminations and Distributed Computability in Anonymous Networks, DISC 2008, pp.47-62, 2008. ,
DOI : 10.1007/978-3-540-87779-0_4
URL : https://hal.archives-ouvertes.fr/hal-00332759
About the Termination Detection in the Asynchronous Message Passing Model, SOFSEM 2007, pp.200-211, 2007. ,
DOI : 10.1007/978-3-540-69507-3_16
URL : https://hal.archives-ouvertes.fr/hal-00308126
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996. ,
DOI : 10.1145/226643.226647
Mobile agents in distributed computing: Network exploration, Bull. Eur. Assoc. Theor. Comput. Sci. EATCS, vol.109, pp.54-69, 2013. ,
Distributed Verification Using Mobile Agents, ICDCN 2013, pp.330-347, 2013. ,
DOI : 10.1007/978-3-642-35668-1_23
Distributed Verification and Hardness of Distributed Approximation, SIAM Journal on Computing, vol.41, issue.5, pp.1235-1265, 2012. ,
DOI : 10.1137/11085178X
Searching for a black hole in arbitrary networks, Proceedings of the twenty-first annual symposium on Principles of distributed computing , PODC '02, pp.1-18, 2006. ,
DOI : 10.1145/571825.571853
Anonymous networks, Proceedings of the 2014 ACM symposium on Principles of distributed computing, PODC '14, pp.96-105, 2014. ,
DOI : 10.1145/2611462.2611478
, Survey of Distributed Decision. Bulletin of the EATCS, vol.119, 2016.
An annotated bibliography on guaranteed graph searching, Theoretical Computer Science, vol.399, issue.3, pp.236-245, 2008. ,
DOI : 10.1016/j.tcs.2008.02.040
What can be decided locally without identifiers?, Proceedings of the 2013 ACM symposium on Principles of distributed computing, PODC '13, pp.157-165, 2013. ,
DOI : 10.1145/2484239.2484264
URL : https://hal.archives-ouvertes.fr/hal-00912527
On the Impact of Identifiers on Local Decision, OPODIS 2012, pp.224-238, 2012. ,
DOI : 10.1007/978-3-642-35476-2_16
URL : https://hal.archives-ouvertes.fr/hal-01241093
Towards a complexity theory for local distributed computing, Journal of the ACM, vol.60, issue.5, p.35, 2013. ,
DOI : 10.1145/2499228
Decidability classes for mobile agents computing, Journal of Parallel and Distributed Computing, vol.109, pp.117-128, 2017. ,
DOI : 10.1016/j.jpdc.2017.04.003
URL : https://hal.archives-ouvertes.fr/hal-01674623
Locality and checkability in wait-free computing, Distributed Computing, vol.15, issue.4, pp.223-242, 2013. ,
DOI : 10.1007/BF01961540
URL : https://hal.archives-ouvertes.fr/hal-00605244
Locally Checkable Proofs in Distributed Computing, Theory of Computing, vol.12, issue.1, pp.1-33, 2016. ,
Wait-free synchronization, ACM Transactions on Programming Languages and Systems, vol.13, issue.1, pp.124-149, 1991. ,
DOI : 10.1145/114005.102808
Proof labeling schemes, Distributed Computing, vol.34, issue.2, pp.215-233, 2010. ,
DOI : 10.1007/s00446-010-0095-3
Seven good reasons for mobile agents, Communications of the ACM, vol.42, issue.3, pp.88-89, 1999. ,
DOI : 10.1145/295685.298136
Identifying hostile nodes in networks using mobile agents, Bull. Eur. Assoc. Theor. Comput. Sci. EATCS, vol.108, pp.93-129, 2012. ,
What Can be Computed Locally?, SIAM Journal on Computing, vol.24, issue.6, pp.1259-1277, 1995. ,
DOI : 10.1137/S0097539793254571
Deterministic rendezvous in networks: A comprehensive survey, Networks, vol.7, issue.3, pp.331-347, 2012. ,
DOI : 10.1109/71.481599
Computing functions on asynchronous anonymous networks, Mathematical Systems Theory, vol.7, issue.1, pp.331-356, 1996. ,
DOI : 10.1145/48014.48247