How to efficiently destroy a network with limited information

نویسندگان

  • T. M. Vieira
  • Gandhi M. Viswanathan
  • Luciano R. da Silva
چکیده

We address the general problem of how best to attack and destroy a network by node removal, given limited or no prior information about the edges. We consider a family of strategies in which nodes are randomly chosen, but not removed. Instead, a random acquaintance (i.e., a first neighbour) of the chosen node is removed from the network. By assigning an informal cost to the information about the network structure, we show using cost-benefit analysis that acquaintance removal is the optimal strategy to destroy networks efficiently. PACS numbers: 64.60.aq, 89.75.Hc

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

A Benders Decomposition Method to Solve an Integrated Logistics Network Designing Problem with Multiple Capacities

In this paper, a new model is proposed for the integrated logistics network designing problem. In many research papers in this area, it is assumed that there is only one option for the capacity of each facility in the network. However, this is not a realistic assumption because generally there may be many possible options for the capacity of the facility that is being established. Usually the c...

متن کامل

Explaining the Role of Management Accounting Information System in Strategy Formulation with Actors Network Approach

The real challenge of business environment is derived from a situation where organizations need to find opportunities on how to introduce ideas and new products to market that provide future earnings stream. Management accounting is used as a tool in this process and provides information on opportunities and threats. The purpose of this research is to explain the role of management accounting i...

متن کامل

Using Neural Networks with Limited Data to Estimate Manufacturing Cost

Neural networks were used to estimate the cost of jet engine components, specifically shafts and cases. The neural network process was compared with results produced by the current conventional cost estimation software and linear regression methods. Due to the complex nature of the parts and the limited amount of information available, data expansion techniques such as doubling-data and data-cr...

متن کامل

IRF and ISRF Sequences and their Anti-Pedagogical Value

Initiation, Response, and Feedback(IRF) sequences are the most frequent interaction network in any classroom contexts. IRF sequences have been examined profusely in previous studies and were reported to be negatively correlated with participation opportunities (Kasper, 2006; Cazden, 2001; Ellis, 1994).In all these studies, all contingent factors of any classroom context which might influence in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1411.2427  شماره 

صفحات  -

تاریخ انتشار 2014