Probability , Networks and Algorithms Self - destructive percolation

نویسندگان

  • J. van den Berg
  • R. M. Brouwer
چکیده

CWI's research has a theme-oriented structure and is grouped into four clusters. Listed below are the names of the clusters and in parentheses their acronyms. ABSTRACT Consider ordinary site percolation on an infinite graph in which the sites, independent of each other, are occupied with probability p and vacant with probability 1−p. Now suppose that, by some 'catastrophe', all sites which are in an infinite occupied cluster become vacant. Finally, each vacant site gets an extra enhancement to become occupied. More precisely, each site that was already vacant or that was made vacant by the catastrophe, becomes occupied with probability δ (independent of the other sites). When p is larger than but close to the critical value p c one might believe (for 'nice' graphs) that only a small δ is needed to have an infinite occupied cluster in the final configuration. This appears to be indeed the case for the binary tree. However, on the square lattice we strongly conjecture that this is not true. We discuss the background for these problems and also show that the conjecture, if true, has some remarkable consequences. Note: This report has been submitted for publication elsewere. This work has been done under project PNA 3.1.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linear lower bounds for deltac(p) for a class of 2D self-destructive percolation models

The self-destructive percolation model is defined as follows: Consider percolation with parameter p > pc. Remove the infinite occupied cluster. Finally, give each vertex (or, for bond percolation, each edge) that at this stage is vacant, an extra chance δ to become occupied. Let δc(p) be the minimal value of δ, needed to obtain an infinite occupied cluster in the final configuration. This model...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Statistical Prediction of Probable Seismic Hazard Zonation of Iran Using Self-organized Artificial Intelligence Model

The Iranian plateau has been known as one of the most seismically active regions of the world, and it frequently suffers destructive and catastrophic earthquakes that cause heavy loss of human life and widespread damage. Earthquakes are regularly felt on all sides of the region. Prediction of the occurrence location of the future earthquakes along with determining the probability percentage can...

متن کامل

A Simplified Self-Consistent Probabilities Framework to Characterize Percolation Phenomena on Interdependent Networks : An Overview

Abstract Interdependent networks are ubiquitous in our society, ranging from infrastructure to economics, and the study of their cascading behaviors using percolation theory has attracted much attention in the recent years. To analyze the percolation phenomena of these systems, different mathematical frameworks have been proposed including generating functions, eigenvalues among some others. Th...

متن کامل

Percolation in self-similar networks

We provide a simple proof that graphs in a general class of self-similar networks have zero percolation threshold. The considered self-similar networks include random scale-free graphs with given expected node degrees and zero clustering, scale-free graphs with finite clustering and metric structure, growing scale-free networks, and many real networks. The proof and the derivation of the giant ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003