Managing Network Risk via Critical Node Identification

نویسندگان

  • ASHWIN ARULSELVAN
  • CLAYTON W. COMMANDER
  • PANOS M. PARDALOS
چکیده

We consider methodologies for managing risk in a telecommunication network based on identification of the critical nodes. The objective is to identify a set of vertices with a specified cardinality whose deletion results is maximum number of disconnected components. This is referred to as the CRITICAL NODE PROBLEM, and finds application in epidemic control, telecommunications, and military tactical planning, among others. From a telecommunication perspective, the set of critical nodes helps determine which players should be removed from the network in the event of a virus outbreak. Conversely, in order to maintain maximum global connectivity, it should be ensured that the critical nodes remain intact. In this chapter, we review the recent work in this area and examine formulations based on integer linear programming.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Artificial Bee Colony Inspired Clustering Solution to Prolong Lifetime of Wireless Sensor Networks

It is very difficult and expensive to replace sensor node battery in wireless sensor network in many critical conditions such as bridge supervising, resource exploration in hostile locations, and wildlife safety, etc. The natural choice in such situations is to maximize network lifetime. One such approach is to divide the sensing area of wireless sensor network into clusters to achieve high ene...

متن کامل

Learning Bayesian Network Structure Using Genetic Algorithm with Consideration of the Node Ordering via Principal Component Analysis

‎The most challenging task in dealing with Bayesian networks is learning their structure‎. ‎Two classical approaches are often used for learning Bayesian network structure;‎ ‎Constraint-Based method and Score-and-Search-Based one‎. ‎But neither the first nor the second one are completely satisfactory‎. ‎Therefore the heuristic search such as Genetic Alg...

متن کامل

Developing a Method for Assessing and Managing the Risk of Covid-19; Rapid Covid-19 Hazard analysis

Background and aims: Work environments are constantly changing under the influence of various factors and newer risks are introduced. Rapid changes in science and technology, increasing the complexity of the industry, increased system integration and other factors have been shown to increase total risk in the past few decades. As well, risk management becomes increasingly critical in decreasing...

متن کامل

A New Approach to Approximate Completion Time Distribution Function of Stochastic Pert Networks

The classical PERT approach uses the path with the largest expected duration as the critical path to estimate the probability of completing a network by a given deadline. However, in general, such a path is not the most critical path (MCP) and does not have the smallest estimate for the probability of completion time. The main idea of this paper is derived from the domination structure between ...

متن کامل

Inverse Identification of Circular Cavity in a 2D Object via Boundary Temperature Measurements Using Artificial Neural Network

In geometric inverse problems, it is assumed that some parts of domain boundaries are not accessible and geometric shape and dimensions of these parts cannot be measured directly. The aim of inverse geometry problems is to approximate the unknown boundary shape by conducting some experimental measurements on accessible surfaces. In the present paper, the artificial neural network is used to sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007