Abstract
This paper tackles the well known graph searching problem, where a team of searchers aims at capturing an intruder in a network, modeled as a graph. T......
小提示:本篇文献需要登录阅读全文,点击跳转登录