Hidden Connectivity in Networks with Vulnerable Classes of Nodes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hidden Connectivity in Networks with Vulnerable Classes of Nodes

Sebastian M. Krause, Michael M. Danziger, and Vinko Zlatić Theoretical Physics Division, Rudjer Bošković Institute, Bijenicka c. 54, 10000 Zagreb, Croatia Faculty of Physics, University of Duisburg-Essen, Lotharstr. 1, 47048 Duisburg, Germany Department of Physics, Bar-Ilan University, Ramat Gan 5290002, Israel (Received 15 April 2016; revised manuscript received 20 July 2016; published 27 Octo...

متن کامل

Pinpointing connectivity despite hidden nodes within stimulus-driven networks.

The effects of hidden nodes can lead to erroneous identification of connections among measured nodes in a network. For example, common input from a hidden node may cause correlations among a pair of measured nodes that could be misinterpreted as arising from a direct connection between the measured nodes. We present an approach to control for effects of hidden nodes in networks driven by a repe...

متن کامل

Toughness of the Networks with Maximum Connectivity

The stability of a communication network composed of processing nodes and communication links is of prime importance to network designers. As the network begins losing links or nodes, eventually there is a loss in its effectiveness. Thus, communication networks must be constructed to be as stable as possible, not only with respect to the initial disruption, but also with respect to the possible...

متن کامل

Using Hidden Nodes in Bayesian Networks

In the construction of a Bayesian network, it is always assumed that the variables starting from the same parent are conditionally independent. In practice, this assumption may not hold, and will give rise to incorrect inferences. In cases where some dependency is found between variables, we propose that the creation of a hidden node, which in effect models the dependency, can solve the problem...

متن کامل

Robust Assignments with Vulnerable Nodes

Various real-life planning problems require making upfront decisions before all parameters of the problem have been disclosed. An important special case of such problem especially arises in scheduling and staff rostering problems, where a set of tasks needs to be assigned to an available set of resources (personnel or machines), in a way that each task is assigned to one resource, while no task...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review X

سال: 2016

ISSN: 2160-3308

DOI: 10.1103/physrevx.6.041022