Modeling Self-organized Application Spreading

نویسندگان

  • Ádám Horváth
  • Károly Farkas
چکیده

Information spreading in self-organized networks is a frequently investigated research topic today; however, investigating the characteristics of application spreading by exploiting the direct connections between the user devices has not been widely studied yet. In this paper, we present our spreading model, in which we use Closed Queuing Networks to model the application spreading process. In this model, we capture the users’ behavior, as well. We also give some simulation results to demonstrate the usage of our model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avalanche and spreading exponents in systems with absorbing states.

We present generic scaling laws relating spreading critical exponents and avalanche exponents (in the sense of self-organized criticality) in general systems with absorbing states. Using these scaling laws we present a collection of the state-of-the-art exponents for directed percolation, dynamical percolation, and other universality classes. This collection of results should help to elucidate ...

متن کامل

Towards Self-organized Large-Scale Shape Formation: A Cognitive Agent-Based Computing Approach

Swarm robotic systems are currently being used to address many real-world problems. One interesting application of swarm robotics is the self-organized formation of structures and shapes. Some of the key challenges in the swarm robotic systems include swarm size constraint, random motion, coordination among robots, localization, and adaptability in a decentralized environment. Rubenstein et al....

متن کامل

Damage-Spreading in Self-Organized Critical Systems

We study the behavior under perturbations of different versions of Bak-Sneppen (BS) model in 1+1 dimension. We focus our attention on the damage-spreading features of the BS model with both random as well as deterministic updating, with sequential as well as parallel updating. In addition, we compute analytically the asymptotic plateau reached by the distance after the growing phase. Typeset us...

متن کامل

An Optimized and Improved Network Trust Model Based on P2P

Because of the spring up of the P2P network application, its open, anonymous and self-organized characteristics has offered a path for the spreading of virus and junk data, and the security has aroused people’s common concern. The traditional network trust model dealt with dishonest node has certain limitation, for this, improved P2P network trust model and applied D-S evidence theory to the tr...

متن کامل

Structural Equation Modeling (SEM) in Health Sciences Education Researches: An Overview of the Method and Its Application

Introduction: There are many situations through which researchers of human sciences particularly in health sciences education attempt to assess relationships of variables. Moreover researchers may be willing to assess overall fit of theoretical models with the data emerged from the study population. This review introduces the structural equation models method and its application in health scien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010