Estimation of Robustness of Interdependent Networks against Failure of Nodes

Size: px
Start display at page:

Download "Estimation of Robustness of Interdependent Networks against Failure of Nodes"

Transcription

1 Estimation of Robustness of Interdependent Networks against Failure of Nodes Srinjoy Chattopadhyay and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University. Abstract We consider a partially interdependent network and develop mathematical equations relating the fractional size of the connected component of the network, surviving the cascading failure, to the intra-layer degree distribution of the nodes. We show that these system equations can be mathematically analyzed and closed form expressions for the metrics of robustness can be obtained for the Erdos-Renyi (ER model of random graph generation. We have described the application of our analysis technique to networks with general degree distributions. In our analysis, we consider the two extremes of the attack model: randomized attack, where nodes are attacked at random without any knowledge of intra-layer degrees and perfect targeted attack, where nodes are attacked based on the strict descending order of their intra-layer degrees. Our results can enable researchers to gain a better understanding of the robustness of interdependent networks. Index Terms Interdependent networks, Critical fraction, network robustness. I. INTRODUCTION Over the past decade, inter-connectivity of systems has emerged as a prominent avenue for research in a wide variety of fields. Throughout the spectrum of cyber and physical systems, we can observe a steadfast transition to interdependent systems: smart power distribution grids which have inter-coupled power distribution and communication networks [] being the prime example in this case. The increased functionality of interdependent systems however comes at the price of enhanced sensitivity to node failures due to the phenomenon of cascading failure, where failure of a fraction of nodes initiates a recursive cascade of failures between the different layers of the network. A better understanding of the cascading failure phenomenon has been a prime focus of research work in this area. The traditional technique of analysis in this field utilizes the generating function of the intra-layer node degree distribution. Using this approach, researchers have obtained equations modeling the cascading failure for various scenarios like completely interdependent networks with one-to-one interdependence [], one-to-many interdependence [2] and partial interdependence [3], [4]. Some works have also considered the case of targeted attack [5]. Due to the inherent complexity of the generating function approach, closed form results relating the robustness to the structural parameters of the network were only obtained for a small subset of networks, particularly, completely interdependent networks with identically distributed layers. In this work, we have analyzed interdependent networks This work was supported in part by National Science Foundation under Grants CNS-626, ECCS and EARS from a percolation theory and branching process point of view, based on the classical work [6]. This method of analysis is more amenable to analysis and has been used in some recent works like [7] to obtain system equations modeling the cascading failure. Using this technique of analysis, we have been able to obtain relationships between the robustness of interdependent networks and its structural parameters for various network models and attack models which, to the best of our knowledge, do not exist in literature. The work presented in this paper is in two broad domains. Firstly, we have applied our technique of analysis on a general framework of partially interdependent network to mathematically obtain the robustness against randomized node failure for networks generated as ER graphs. Furthermore, we have been able to obtain closed form expressions for the critical fraction of nodes and phase transitions points, which are important properties [3], [7] governing the variation of robustness of networks for different strengths of attack. We have also discussed the application of the analysis techniques developed here to real world networks with known degree distribution. Secondly, we have considered the case of a targeted node failure model, where the attacker selects nodes in the order of their intralayer degrees and developed theoretical approximations for the corresponding robustness for any general network. The remainder of this paper is organized as follows. Section II presents the system model and system equations which have been analyzed for randomized attack in Section III and targeted attack in Section IV. Section V presents a comparison of the theoretically derived results with the simulations. Finally, we conclude and indicate possible future work in Section VI. II. SYSTEM MODEL We consider a system of partially interdependent network comprising two layers A and B with N nodes each. The layers consist of two types of nodes: autonomous nodes (X in Fig., which do not require support from nodes of the other layer; and interdependent nodes (Y in Fig., which are dependent on the other layer nodes for their survival. Let the fraction of interdependent nodes be denoted by q, where they are chosen randomly so that all nodes have the same probability (q of being interdependent. The two layers are constructed as random graphs with small average degrees λ A and λ B respectively (λ A, λ B N. This construction ensures the locally tree-like property [6] of the layers, which is necessary for the formulation of the system equations

2 Fig.. System model for partially interdependent network. modeling cascading failure. The interdependency between the two layers is taken to be one-to-one and bidirectional, which has been widely adopted in relevant literature as a first critical step towards understanding the operation and key phenomena of interdependent networks. Thus all interdependency links correspond to an interdependent pair of nodes, (a, b with a A and b B, which depend on each other for their survival. The interdependency links are assumed to be independent with respect to (w.r.t. the intra-layer degrees of the nodes, i.e. inter-links are constructed without the knowledge of the graph structure. In this model, we are interested in studying the effect of the failure of a fraction ( of nodes from both layers. For the first part of our analysis we will assume that the attack strategy is random in nature, i.e. the attacker (or the mother nature fails all nodes with the same probability. Subsequently in Section IV, we will consider a targeted attack scenario and investigate the corresponding robustness. Our main interest is to relate the robustness of the network to its structural parameters (λ, q. The fractional size of the mutually connected component (MCC of the network which survives the cascading failure is classically [] [5] taken to be the metric for robustness. It is known from works like [], [5] that for completely interdependent networks, the phase transition of the network robustness with varying attack strength ( is of first order, i.e. there exists a minimum = c which would lead to a non-zero MCC size in the steady state and for all < c the average size of the MCC is arbitrarily close to. In other words, the variation of robustness with attack strength is discontinuous at = c. Furthermore, partially interdependent networks [3], [4] undergo a phase transition from first order (discontinuous to second order (continuous as the fraction of interdependent nodes (q decreases below a certain threshold defined as the phase transition point (q c. In this work, we intend to obtain closed form expressions for these phenomena on networks with known degree distributions by formulating system equations for our particular network and attack models and mathematically analyzing these equations for networks generated as the celebrated ER graphs. ER graphs have been predominantly examined [], [5] as a first step in network science research to obtain insights, thanks to their amenability to analysis. Although such theoretical network structures are rarely encountered in the practical world, we strongly believe that their analysis is still important since the qualitative features of many of our results below are valid for general networks as will be shown in Section III-C. To formulate the system equations, we need to define node (ψ A and ψ B and edge (p A and p B percolation probabilities denoting the probability that a randomly chosen node (or edge belongs to the MCC. The survival of any node in the network depends on three conditions [6], [7], [8]: the node survives the initial attack; 2 the node belongs to the largest connected component in its layer; and 3 if the node is interdependent in nature, its support node in the other layer should also satisfy the above two conditions. On the basis of these conditions, we have obtained percolation theory [6], [7] based self-referencing system equations, the details of which can be obtained from the report [9]: ψ A = ( q k A f 2 (k A + q k A k B f 2 (k A f 2 (k B, ( p A = ( q k A f (k A + q k A k B f (k A f 2 (k B, (2 where f (k l = P [k l ] k l λ l [ ( p l kl ] and f 2 (k l = P [k l ][ ( p l k l ], and k l is the intra-layer degree of a node in layer l with mean degree λ l. Here f (or f 2 can be understood as the probability that a randomly chosen edge (or node is connected to a node of (is of degree k l and belongs to the MCC. Thus the summation of these individual contributions of edges and nodes gives the edge (p l and node percolation (ψ l probabilities. Note here that ψ is nothing but the fractional size of the MCC which is our metric quantifying the robustness. The system equations for layer B can be symmetrically obtained. Similar system equations exist in literature [7] and thus we have omitted the details of the derivation of these system equations. In this work, we have theoretically analyzed these system equations for networks generated as ER graphs to derive expressions describing the network robustness (ψ A and ψ B, the critical node fraction ( c, and percolation phase transition points (q c in terms of structural parameters (q, λ. III. ANALYSIS: RANDOM ATTACK We start our analysis considering random node failure, and consider the case when the network layers are generated according to the ER model. We analyze the system equations for layer A (analysis for layer B is symmetrical in parts by focusing on the individual terms. The details of the analysis is included in the report [9] which gives us: F {A} = ( + λ A P [k A ]( p A ka p A k A ( F {A} 2 = P [k A ]( p A k A k A, (3, (4 where F {A} = k A f (A and F {A} = k A f 2 (A. It can be seen that the term of interest here is the expression: F 3 ( k P [k]( pk, and its partial derivative with respect to p. The intra-layer degrees of the nodes in ER graphs is Poisson distributed, i.e. P [k] = e λ /λ k k!, where λ denotes the mean node degree. It has been shown in the report [9] that F 3 = e λp.

3 REMARK It can be observed that F 3 (λ, p/ p = λe λp, which upon substitution into (3,(4 gives F (λ, p = F 2 (λ, p. Thus from ( and (2, we get ψ = p for ER graphs, which is a very interesting result that proves ψ and p can be used interchangeably as a metric for network robustness. Using the simplifications of F 3 (λ, p, the system equations ( (2 can be written as: ψ A = ( q ( e λ Ap A + 2 q ( e λ Ap A ( e λ B p B = pa. (5 We present some interesting results below that help shed light on the resilience of interdependent networks against random node failure. A. Completely Interdependent Networks The system equations for this case (q = can be written as: ψ = 2 ( e λ Ap ( e λ Bp = p. (6 Thus for any strength of attack, we can obtain the robustness of the network (ψ by solving (6. It is known from literature [] that completely interdependent networks exhibit a firstorder phase transition, wherein ψ abruptly falls to when falls below a particular threshold c (critical fraction. THEOREM III. The robustness (ψ c = p c of an interdependent ER network with non-identically distributed layers at the critical point ( = c can be obtained by solving the following equations: f A log f A f A + f B log f B f B =, (7 f B = f r A, (8 where f A e λ Ap c and f B e λ Bp c, λ A and λ B are the mean degrees of the two layers, and r denotes the ratio r = λ B /λ A. The critical fraction of nodes ( c is then given by: c = [λ A f A ( f B + λ B f B ( f A ] /2. (9 Sketch of Proof. Note that the critical point ( c is the minimum value of for which the slopes of the functions g (p 2 ( e λap ( e λbp and g 2 (p p are equal. This idea has been used to derive the equations (7-(9, the details of which can be obtained from [9]. COROLLARY III.2 For identically distributed ER networks, c = /λ, and ψ c =.2864/λ. Proof. Here (7 simplifies to f log f = (f /2, which can be solved numerically to yield f = Thus ψ c = p c = log f/λ, and c = [2λf( f]. The result in the corollary is the same as that in literature []. Thus it establishes the equivalence of our method of analysis with existing ones. We have furthermore shown that the metrics of robustness (ψ vs of such non-identically distributed networks can be approximated by an equivalent identically distributed network whose mean intra-layer degree λ is the harmonic mean of λ A and λ B. This analysis is also included in the report [9], by which the network robustness (ψ and critical fraction of nodes ( c can be approximated by the following equations: ψ = p 2 ( e λ p 2, ( ( / c. ( Taking x e λap. the approximation error can be written as: f e (r = x r+ + 2x 2r r+ x x r x 4r r+. (2 It has been shown in report [9] that lim r f e (r =. Further graphical analysis gives us that f e (r becomes very close to for values of r >.5. Thus for practical purposes, we can consider the harmonic approximation to be an adequate measure for approximate network performance for interdependent networks generated as non-identically distributed ER graphs. λ B. Partially Interdependent Networks The analysis for partially interdependent networks is significantly more complicated due to the quadratic nature of the system equations. Thus we simplify the problem by focusing on the case of λ A = λ B, i.e. identically distributed layers. Under these conditions, the system equations can be written as: ψ = ( q( e λp + q 2 ( e λp 2 = p. (3 The phase transition properties of partially interdependent networks is much more interesting as compared to completely interdependent networks. This is motivated by the observation shown in literature [7], which indicates that phase transitions in partially interdependent networks is not exclusively first order in nature. In such systems, as the coupling between the two layers of the network (q is decreased, the phase transition order changes from first order (for higher values of q, where the robustness abruptly falls to after a certain threshold, to second order, where the robustness smoothly falls down to. Let this phase transition point be represented by q c. It should be noted here that for partially interdependent networks, the critical fraction of nodes ( c is only defined in the range of q for which the phase transition is first order in nature. To resolve this issue and to promote a unified analysis of such problems, we have defined the term critical strength of attack ( + as the minimum value of which results in a non-zero solution to the system equation (3. Let the non-zero solution to (3 at = + be represented by p +. Thus for q > q c, when the phase transition of the system is first order, + = c and p + = p c, whereas when the phase transition is second order (q < q c p gradually goes to with decreasing, i.e. p + at = +. THEOREM III.3 For a partially interdependent ER network with identically distributed layers, if q < q c, the critical strength of attack is given by: + = [λ( q], (4 where λ is the mean intra-layer degree, q is the fraction of interdependent nodes, and q c is the phase transition point. Sketch of Proof. Let us re-write the system equation under the critical strength of attack condition ( = +, p = p + using the idea that p + :

4 q Fig. 2. Comparison between the numerical solutions (markers and theoretically derived formulas (solid for + and q c. The three cases shown here: correspond to mean intra-layer degrees λ = [2, 6, 2]. The dotted vertical lines correspond to the theoretically obtained values of q c given by (6. lim p + [ ( q + e λp+ p + +q 2 + ( e λp+ 2 ] =. (5 p + Evaluating the above limit, we get the required result. THEOREM III.4 For a partially interdependent ER network with identically distributed layers, the phase transition point (q c is given by: q c = λ + 2λ +, (6 λ where λ is the mean intra-layer degree. Sketch of Proof. Note that the critical point solution to (3 below the phase transition point is p = since the network phase transition is of second order. For q > q c, the phase transition is of first order and thus (3 has a non-zero finite solution. We have used this idea to analytically derive the phase transition point for networks generated as ER graphs, the details of which can be obtained from [9]. Comparison of the numerical solutions to the system equations with the theoretically derived formulas for both + and q c is presented in Fig. 2. We can clearly observe from the figure that when the network phase transition is second order, i.e. q < q c, (4 accurately follows the numerical solution. The phase transition points (q c where the transition order changes is also very accurately presented in Fig. 2. However when the phase transition order of the network is first order, we cannot perform any simplification of the quadratic system equations since p + = p c is finite and positive. Thus for q > q c, we have no choice but to numerically solve the system equations (3 to theoretically estimate c. C. Applications: Real World Networks Although the analytical results presented in the previous section have been derived for networks constructed as ER graphs, the qualitative features of our results hold for random graphs with arbitrary degree distributions as well. Note that the essential step, which leads to the formulation of the mathematical equations relating robustness (ψ to the structural parameters (q, λ, was the simplification: F 3 (λ, p = k P [k]( pk = e λp. For networks with arbitrary degree distribution, such simplifications would not exist in most cases. However, if we know (or estimate the degree distribution of the nodes in the networks, we can numerically estimate the values of the function F 3 (λ, p and its derivative with respect to p. From the discussion in the previous section, it is evident that if the value and derivative of the function F 3 (λ, p is known to us, we can write the system equations ( (2 in terms of F 3. Thus for the theoretical estimation of the performance of real world networks whose degree distribution is known to us, we can numerically estimate the values of the function F 3 (λ, p and its derivatives at the required values of p and thereafter numerically solve the system equations modeling the cascading failure: ( (2. Note that the system equations are derived under the assumption that the network layers are locally tree-like. Random graphs have this property as long as the network is sparse [6]. However, real world networks would usually not follow such strict mathematical properties and thus the system equations derived in these cases are just theoretical approximations to the actual performance. The comparison of this theoretically predicted performance and simulation results will be presented in Section V. IV. ANALYSIS: TARGETED ATTACK The underlying assumption in the analysis presented in Section III is that the attacker randomly fails nodes. However, attacks on the nodes with high connectivity would undoubtedly be a better strategy from the perspective of disrupting the network. Previously, we have considered the case where the attacker has no knowledge about the node degrees and thus attacks nodes randomly. In this section, we analyze the other extreme situation: where the attacker has complete intra-layer degree information and attacks nodes in the strict descending order of the degrees. We present the analysis of completely interdependent networks with identically distributed layers. For a particular instance of network generation, we index the nodes in layers A and B in the increasing order of their intra-layer degrees. Let this index be represented by i: i N, where N is the number of nodes in each layer. Let k {i} A (or k{i} B be the intra-layer degree of the i th node in the layer A ( or B of the network. Let sequence {ρ} be a permutation of the number set {, 2,, N}, where N is the number of nodes in each layer, ρ i denotes the i th element of {ρ}, and the indices of any interdependent pair of nodes is represented by (i, ρ i. Thus ρ, representing an arbitrary ordering the nodes, can completely specify the one-to-one interdependence structure. As previously, the initial attack leads to the failure of a fraction ( of the nodes in the network. Due to the perfectly targeted attack model, all top ( N nodes in both layers fail due to the initial attack. It should be noted at this point that the metrics of network robustness ψ and p are defined in a mean sense over all instances of network generation with specified intra-layer degree distribution of the nodes. Thus for the purpose of obtaining system equations for ψ and p with respect to indexed nodes, we need to take an expectation over all instances for a specific degree distribution. Due to the identical distribution of the two layers of the network and the simultaneous attack on both layers, ψ and p would be the same for both layers. Thus we will drop the subscript denoting layer from the terms ψ l and p l for simplicity. Similar to the previous case, we define functions

5 (i and G{l} 2 (i to simplify the representation of the system equations and obtain: G {l} ψ = E [ N [ p = E N N i= N i= I g {A} 2 (i g {B} 2 (ρ i ], (7 ] I g {A} (i g {B} 2 (ρ i, (8 where g {l} (i = k l(i λ l [ ( p kl(i ] and g {l} 2 (i = [ ( p kl(i ], and k l (i is the intra-layer degree of the i th node in layer l having mean degree of λ l. Here E[ ] represents the expectation over all instances of network generation for a specific degree distribution of the nodes and I is an indicator function representing the targeted removal of the top ( N fraction of the indices i, i.e. I = if i (, N. THEOREM IV. The robustness of an interdependent network with identically distributed layers against targeted attack can be approximated by the two inequalities: ψ 2 [ ( p λ ][ ( p λ ], (9 p [ ( p λ ][ ( p λ ] N N i= Λ i λ, (2 where Λ i = E[k {i} ] denotes the order statistics of the intralayer degree (k {i} of the node with the i th lowest degree, λ is the intra-layer degree, and λ E[Λ i I ] where I is an indicator function representing the targeted removal of ( N nodes of highest degrees. Sketch of Proof. To prove this result, we use the concavity of the function f(x = ( p x for p [, ] and invoke the Jensen s Inequality on the system equations (7-(8.The details of this can be obtained from [9]. We have used (9,(2 to design a numerical method based algorithm to estimate the value of ψ and p for particular and λ. The order statistics [] for the degrees (Λ i can be estimated for random graph generators or real world networks if the degree distribution is known or can be estimated. For the ER model, the intra-layer degrees follow Poisson distribution whose order statistics can be readily obtained []. V. RESULTS AND DISCUSSIONS We have designed a test bench to simulate the mechanism of cascading failure in interdependent networks initiated by random or targeted removal of a certain fraction ( of nodes. The robustness is depicted by plotting the fractional size of the mutually connected component in the steady state (ψ, for various strengths of attacks (. The designed algorithm obtains the largest connected component in each layer at each stage of the recursive cascading failure and outputs the steady state fractional size of this component. We have considered networks where the constituent layers of size N = 5 are generated by the Erdos-Renyi model from the NetworkX Python library [] and the figures represent the average results of 2 independent runs ( network construction instances with 2 node removal instances each. The execution time ψ Fig. 3. Completely interdependent networks under randomized attack. The three sets of plots represent three cases with o : λ B =, : λ B = 5, and :λ B = 3; λ A = 3 for all three cases. ψ Fig. 4. Partially interdependent networks under randomized attack. The three sets of plots represent three cases with o : q =., : q =.5, and : q = ; λ = 4 for all three cases. for the simulation results, represented by the markers with dashed lines in Figs. 3-6, is on the order of hours, whereas the theoretical approximations, represented by the solid lines, can be obtained on the order of seconds. This demonstrates a key aspect of our work; fast approximation of robustness without expensive simulations. We present a brief discussion on the simulation figures next. Fig. 3 gives the comparison between the simulation results and theoretical estimation for completely interdependent networks with non-identically distributed layers. It can be easily verified from Fig. 3 that the analytical expressions very closely fit the simulation results for all three cases. This figure thus indicates that the robustness of interdependent networks can be very closely approximated by theoretical expressions instead of computationally intensive simulations. This idea is fundamental to this piece of work where the ultimate goal is to relate network robustness to the structural parameters of the network. Fig. 4 gives the same comparison as above for the case of partially interdependent networks. From Fig. 3 and Fig. 4, we can also compare the theoretical estimation and simulation results for the critical fraction of nodes ( c, which is defined as the maximum attack strength or equivalently the minimum value of which results in a non-zero MCC size in the steady state. For the case of completely interdependent networks, c is estimated by ( and gives the following numerical results: c = [.7294, 92, 47] for λ B = [, 5, 3]. We can clearly observe from the figure that the theoretical estimates are quite accurate. For the case of partially interdependent networks, c (or technically +

6 ψ Fig. 5. Targeted attack on completely interdependent ER networks with mean degrees of : λ = 4, and o : λ = 8. ψ Fig. 6. Real world networks with randomized attack. The three sets of plots represent three cases with o : q =., : q =.5, and : q =. as discussed previously can be estimated by (4 when the phase transition order is second order. For this case (λ = 4, the phase transition point is given by (6, which can be calculated to be q c =.5. Thus for the first two cases (q =.,.5, the theoretical values of + are.277 and.5 respectively which is also very accurate. The mathematical approximations for the case of targeted attack has been presented in Fig. 5. It can be observed that the gap between the simulated and theoretically predicted performance is larger than the case of randomized attack but still the approximations are close enough for us to gain a better qualitative understanding of the impact of structural parameters on the robustness (ψ and even obtain quantitative approximations for these metrics. For testing our method of analysis on real world networks, we have used the Gnutella peer-to-peer network dataset available from [2]. The interdependent network comprises two identical layers of this peer-topeer network and the interdependency has been assigned randomly. It can be clearly seen from Fig. 6 that the theoretical estimation of the performance follows the simulated performance reasonably accurately. VI. CONCLUSION AND FUTURE WORK Our aim in this work is to estimate the robustness of interdependent networks against failure of nodes and relate it to the structural parameters of network. Furthermore for networks generated as ER (Erdos-Renyi graphs, we have been able to mathematically derive closed form expressions for the critical fraction of node ( c and phase transition points (q c, the existence of which was known in literature [4]. Although such theoretical results may not accurately apply to real world networks due to the inherent simplicity of the ER model, we have shown that the qualitative features of these results are preserved even for the case of real world networks and thus the relationships obtained here are vital towards understanding the effect of structural parameters of network on its robustness against node failures. Another reason depicting the importance of such a theoretical framework for robustness estimation is that these can be used to predict the robustness of a network given its structural parameters without resorting to brute force simulations. The drawback of such simulations is that for many real world networks, they might be computationally very expensive. Furthermore simulations require the knowledge of the exact architecture of the constituent layers of the network, which can be unknown in many cases. For the case of targeted attack, we have developed numerical lower bounds for the performance metrics for any general network. One of the main aspects on which we have not focused is the impact of interdependency structures on the network, which we have considered in this work to be designed randomly without the knowledge of the intra-layer degree distribution. In future, we plan to generalize our current analysis and also explore similar estimation problems for more practical network models like Scale-Free graphs. We feel that our results would enable the academia to gain a better understanding of robustness of interdependent networks against node failures and its relationship with the structural parameters. REFERENCES [] S. V. Buldyrev, R. Parshani, G. Paul, H. E. Stanley, and S. Havlin, Catastrophic cascade of failures in interdependent networks, Nature, vol. 464, no. 729, pp , 2. [2] O. Yağan, D. Qian, J. Zhang, and D. Cochran, Optimal allocation of interconnecting links in cyber-physical systems: Interdependence, cascading failures, and robustness, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp , 22. [3] G. Ranjan and Z. Zhang, How to glue a robust smart-grid?: a finitenetwork theory for interdependent network robustness, in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research. ACM, 2, p. 22. [4] Roni Parshani, Sergey V Buldyrev, and Shlomo Havlin, Interdependent networks: reducing the coupling strength leads to a change from a first to second order percolation transition, Physical review letters, vol. 5, no. 4, pp. 487, 2. [5] X. Huang, J. Gao, S.V. Buldyrev, S. Havlin, and H.E. Stanley, Robustness of interdependent networks under targeted attack, Physical Review E, vol. 83, no. 6, pp. 65, 2. [6] L.A. Braunstein, Z. Wu, Y. Chen, S.V. Buldyrev, T. Kalisky, S. Sreenivasan, R. Cohen, E. Lopez, S. Havlin, and H.E. Stanley, Optimal path and minimal spanning trees in random weighted networks, International Journal of Bifurcation and Chaos, 27. [7] L.D. Valdez, P.A. Macri, H.E. Stanley, and L.A. Braunstein, Triple point in correlated interdependent networks, Physical Review E, vol. 88, no. 5, pp. 583, 23. [8] S. Chattopadhyay and H. Dai, Towards optimal link patterns for robustness of interdependent networks against cascading failures, in IEEE Globecom 25, Design and Next Gen. Network I, 25. [9] S. Chattopadhyay and H. Dai, Estimation of robustness of interdependent networks against node failures, Technical Report, Dept. of ECE, NCSU, 26, hdai/interdependent TP.pdf. [] H.A. David and H.N. Nagaraja, Order statistics, Wiley Online Library, 97. [] A. A. Hagberg et al., Exploring network structure, dynamics, and function using networkx, Proceedings of the 7th Python in Science Conference (SciPy28, 28. [2] J. Leskovec, J. Kleinberg, and C. Faloutsos, Graph evolution: Densification and shrinking diameters, ACM Transactions on Knowledge Discovery from Data (TKDD, vol., no., pp. 2, 27.

Estimation of Robustness of Interdependent Networks against Node Failures

Estimation of Robustness of Interdependent Networks against Node Failures Estimation of Robustness of Interdependent Networks against Node Failures Srinjoy Chattopadhyay and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University Raleigh,

More information

Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures and Robustness

Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures and Robustness Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures and Robustness arxiv:2698v2 [physics.data-an] 3 Apr 202 Osman Yağan, Dajun Qian, Junshan Zhang,

More information

The Extreme Vulnerability of Network of Networks

The Extreme Vulnerability of Network of Networks The Extreme Vulnerability of Network of Networks Shlomo Havlin Protein networks, Brain networks Bar-Ilan University Physiological systems Infrastructures Israel Cascading disaster-sudden collapse.. Two

More information

Attacks on Correlated Peer-to-Peer Networks: An Analytical Study

Attacks on Correlated Peer-to-Peer Networks: An Analytical Study The First International Workshop on Security in Computers, Networking and Communications Attacks on Correlated Peer-to-Peer Networks: An Analytical Study Animesh Srivastava Department of CSE IIT Kharagpur,

More information

Deterministic Decentralized Search in Random Graphs

Deterministic Decentralized Search in Random Graphs Deterministic Decentralized Search in Random Graphs Esteban Arcaute 1,, Ning Chen 2,, Ravi Kumar 3, David Liben-Nowell 4,, Mohammad Mahdian 3, Hamid Nazerzadeh 1,, and Ying Xu 1, 1 Stanford University.

More information

Catastrophic Cascade of Failures in Interdependent Networks

Catastrophic Cascade of Failures in Interdependent Networks Catastrophic Cascade of Failures in Interdependent Networs Wor with: S. Buldyrev (NY) R. Parshani (BIU) G. Paul (BU) H. E. Stanley (BU) Nature 464, 1025 (2010 ) New results: Jia Shao (BU) R. Parshani (BIU)

More information

TODAY S worldwide network infrastructure consists a web

TODAY S worldwide network infrastructure consists a web IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. X, XXXXXXX 202 Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures and Robustness

More information

Network Interdependence and Information Dynamics in Cyber-Physical. Systems. Dajun Qian

Network Interdependence and Information Dynamics in Cyber-Physical. Systems. Dajun Qian Network Interdependence and Information Dynamics in Cyber-Physical Systems by Dajun Qian A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved

More information

Balancing System Survivability and Cost of Smart Grid via Modeling Cascading Failures

Balancing System Survivability and Cost of Smart Grid via Modeling Cascading Failures Balancing System Survivability and Cost of Smart Grid via Modeling Cascading Failures Zhen Huang, Cheng Wang, Milos Stojmenovic, Amiya Nayak Abstract As a typical emerging application of cyber physical

More information

arxiv: v1 [physics.soc-ph] 7 Jul 2015

arxiv: v1 [physics.soc-ph] 7 Jul 2015 Epidemic spreading and immunization strategy in multiplex networks Lucila G. Alvarez Zuzek, 1, Camila Buono, 1 and Lidia A. Braunstein 1, 2 1 Departamento de Física, Facultad de Ciencias Exactas y Naturales,

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 24 Mar 2005

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 24 Mar 2005 APS/123-QED Scale-Free Networks Emerging from Weighted Random Graphs Tomer Kalisky, 1, Sameet Sreenivasan, 2 Lidia A. Braunstein, 2,3 arxiv:cond-mat/0503598v1 [cond-mat.dis-nn] 24 Mar 2005 Sergey V. Buldyrev,

More information

Percolation of networks with directed dependency links

Percolation of networks with directed dependency links Percolation of networs with directed dependency lins 9] to study the percolation phase transitions in a random networ A with both connectivity and directed dependency lins. Randomly removing a fraction

More information

arxiv: v1 [math.st] 1 Nov 2017

arxiv: v1 [math.st] 1 Nov 2017 ASSESSING THE RELIABILITY POLYNOMIAL BASED ON PERCOLATION THEORY arxiv:1711.00303v1 [math.st] 1 Nov 2017 SAJADI, FARKHONDEH A. Department of Statistics, University of Isfahan, Isfahan 81744,Iran; f.sajadi@sci.ui.ac.ir

More information

Cascading failures in interdependent systems under a flow redistribution model

Cascading failures in interdependent systems under a flow redistribution model Cascading failures in interdependent systems under a flow redistribution model Yingrui Zhuang, Alex Arenas, 2 and Osman Yağan, Department of ECE, Carnegie Mellon University, Pittsburgh, PA 523 USA 2 Departament

More information

Conjoining Speeds up Information Diffusion in Overlaying Social-Physical Networks

Conjoining Speeds up Information Diffusion in Overlaying Social-Physical Networks Conjoining Speeds up Information Diffusion in Overlaying Social-Physical Networks Osman Yağan, Dajun Qian, Junshan Zhang, and Douglas Cochran CyLab, Carnegie Mellon University, Pittsburgh, PA 15213. E-mail:

More information

Intensive Computation and Performance of Computer Networks

Intensive Computation and Performance of Computer Networks Introduction to joint projects for the courses of Intensive Computation and Performance of Computer Networks Novella Bartolini and Annalisa Massini Damage assessment and recovery after network failures

More information

Network models: random graphs

Network models: random graphs Network models: random graphs Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Structural Analysis

More information

A Necessary Condition for Learning from Positive Examples

A Necessary Condition for Learning from Positive Examples Machine Learning, 5, 101-113 (1990) 1990 Kluwer Academic Publishers. Manufactured in The Netherlands. A Necessary Condition for Learning from Positive Examples HAIM SHVAYTSER* (HAIM%SARNOFF@PRINCETON.EDU)

More information

Hard-Core Model on Random Graphs

Hard-Core Model on Random Graphs Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/30/17 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu 2

More information

Identification of K Most Vulnerable Nodes in Multi-layered Network Using a New Model of Interdependency

Identification of K Most Vulnerable Nodes in Multi-layered Network Using a New Model of Interdependency Identification of K Most Vulnerable Nodes in Multi-layered Network Using a New Model of Interdependency Arunabha Sen, Anisha Mazumder, Joydeep Banerjee, Arun Das and Randy Compton Computer Science and

More information

Network Science: Principles and Applications

Network Science: Principles and Applications Network Science: Principles and Applications CS 695 - Fall 2016 Amarda Shehu,Fei Li [amarda, lifei](at)gmu.edu Department of Computer Science George Mason University 1 Outline of Today s Class 2 Robustness

More information

Automatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries

Automatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries Automatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries Anonymous Author(s) Affiliation Address email Abstract 1 2 3 4 5 6 7 8 9 10 11 12 Probabilistic

More information

CRITICAL infrastructures such as electricity, communication,

CRITICAL infrastructures such as electricity, communication, IEEE TRANSACTIONS ON SMART GRID, VOL. 7, NO. 4, JULY 2016 1997 Cascading Failures in Interdependent Infrastructures: An Interdependent Markov-Chain Approach Mahshid Rahnamay-Naeini, Member, IEEE, and Majeed

More information

Hyperbolic metric spaces and their applications to large complex real world networks II

Hyperbolic metric spaces and their applications to large complex real world networks II Hyperbolic metric spaces Hyperbolic metric spaces and their applications to large complex real world networks II Gabriel H. Tucci Bell Laboratories Alcatel-Lucent May 17, 2010 Tucci Hyperbolic metric spaces

More information

Random Networks. Complex Networks, CSYS/MATH 303, Spring, Prof. Peter Dodds

Random Networks. Complex Networks, CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks, CSYS/MATH 303, Spring, 2010 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under

More information

Attack Strategies on Complex Networks

Attack Strategies on Complex Networks Attack Strategies on Complex Networks Lazaros K. Gallos 1, Reuven Cohen 2, Fredrik Liljeros 3, Panos Argyrakis 1, Armin Bunde 4, and Shlomo Havlin 5 1 Department of Physics, University of Thessaloniki,

More information

Networks as vectors of their motif frequencies and 2-norm distance as a measure of similarity

Networks as vectors of their motif frequencies and 2-norm distance as a measure of similarity Networks as vectors of their motif frequencies and 2-norm distance as a measure of similarity CS322 Project Writeup Semih Salihoglu Stanford University 353 Serra Street Stanford, CA semih@stanford.edu

More information

arxiv: v1 [physics.soc-ph] 14 Jun 2013

arxiv: v1 [physics.soc-ph] 14 Jun 2013 Percolation of a general network of networks Jianxi Gao,,2 Sergey V. Buldyrev, 3 H. Eugene Stanley, 2 Xiaoming Xu, and Shlomo Havlin, 4 Department of Automation, Shanghai Jiao Tong University, 8 Dongchuan

More information

Conservative variance estimation for sampling designs with zero pairwise inclusion probabilities

Conservative variance estimation for sampling designs with zero pairwise inclusion probabilities Conservative variance estimation for sampling designs with zero pairwise inclusion probabilities Peter M. Aronow and Cyrus Samii Forthcoming at Survey Methodology Abstract We consider conservative variance

More information

Convexity/Concavity of Renyi Entropy and α-mutual Information

Convexity/Concavity of Renyi Entropy and α-mutual Information Convexity/Concavity of Renyi Entropy and -Mutual Information Siu-Wai Ho Institute for Telecommunications Research University of South Australia Adelaide, SA 5095, Australia Email: siuwai.ho@unisa.edu.au

More information

Emergent Phenomena on Complex Networks

Emergent Phenomena on Complex Networks Chapter 1 Emergent Phenomena on Complex Networks 1.0.1 More is different When many interacting elements give rise to a collective behavior that cannot be explained or predicted by considering them individually,

More information

arxiv: v1 [physics.soc-ph] 15 Oct 2016

arxiv: v1 [physics.soc-ph] 15 Oct 2016 localized attack on clustering networks Gaogao Dong,, 2, Huifang Hao, Ruijin Du, Shuai Shao, H. Eugene. Stanley, 2 and Havlin Shlomo 3 Nonlinear Scientific Research Center, Faculty of Science, Jiangsu

More information

1 Mechanistic and generative models of network structure

1 Mechanistic and generative models of network structure 1 Mechanistic and generative models of network structure There are many models of network structure, and these largely can be divided into two classes: mechanistic models and generative or probabilistic

More information

Multi-Stage Complex Contagions in Random Multiplex Networks

Multi-Stage Complex Contagions in Random Multiplex Networks Multi-Stage Complex Contagions in Random Multiplex Networks Yong Zhuang and Osman Yağan Department of ECE, Carnegie Mellon University, Pittsburgh, PA 523, USA (Dated: July 4, 28) In this work, we aim to

More information

Self Similar (Scale Free, Power Law) Networks (I)

Self Similar (Scale Free, Power Law) Networks (I) Self Similar (Scale Free, Power Law) Networks (I) E6083: lecture 4 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA {predrag}@ee.columbia.edu February 7, 2007

More information

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence ECS 289 F / MAE 298, Lecture 15 May 20, 2014 Diffusion, Cascades and Influence Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic thresholds

More information

On the Scalability in Cooperative Control. Zhongkui Li. Peking University

On the Scalability in Cooperative Control. Zhongkui Li. Peking University On the Scalability in Cooperative Control Zhongkui Li Email: zhongkli@pku.edu.cn Peking University June 25, 2016 Zhongkui Li (PKU) Scalability June 25, 2016 1 / 28 Background Cooperative control is to

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 4 May 2000

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 4 May 2000 Topology of evolving networks: local events and universality arxiv:cond-mat/0005085v1 [cond-mat.dis-nn] 4 May 2000 Réka Albert and Albert-László Barabási Department of Physics, University of Notre-Dame,

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

CS224W: Social and Information Network Analysis

CS224W: Social and Information Network Analysis CS224W: Social and Information Network Analysis Reaction Paper Adithya Rao, Gautam Kumar Parai, Sandeep Sripada Keywords: Self-similar networks, fractality, scale invariance, modularity, Kronecker graphs.

More information

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Saleh Soltan, Gil Zussman Department of Electrical Engineering Columbia University, New York, NY Email: {saleh,gil}@ee.columbia.edu

More information

CHAPTER 3 MATHEMATICAL AND SIMULATION TOOLS FOR MANET ANALYSIS

CHAPTER 3 MATHEMATICAL AND SIMULATION TOOLS FOR MANET ANALYSIS 44 CHAPTER 3 MATHEMATICAL AND SIMULATION TOOLS FOR MANET ANALYSIS 3.1 INTRODUCTION MANET analysis is a multidimensional affair. Many tools of mathematics are used in the analysis. Among them, the prime

More information

Note on Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds in Scale-Free Networks

Note on Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds in Scale-Free Networks SIMULATION OnlineFirst, published on March, 2010 as doi:10.1177/003754710366018 Simulation Note on Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds

More information

Topology-Driven Performance Analysis of Power Grids

Topology-Driven Performance Analysis of Power Grids Topology-Driven Performance Analysis of Power Grids Hale Çetinay, Yakup Koç, Fernando A. Kuipers, Piet Van Mieghem Abstract Direct connections between nodes usually result in efficient transmission in

More information

Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach

Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach Nageswara S V Rao Steve W Poole Chris Y T Ma Fei He Jun Zhuang David K Y Yau Oak Ridge National Laboratory

More information

Numerical evaluation of the upper critical dimension of percolation in scale-free networks

Numerical evaluation of the upper critical dimension of percolation in scale-free networks umerical evaluation of the upper critical dimension of percolation in scale-free networks Zhenhua Wu, 1 Cecilia Lagorio, 2 Lidia A. Braunstein, 1,2 Reuven Cohen, 3 Shlomo Havlin, 3 and H. Eugene Stanley

More information

Math 345 Intro to Math Biology Lecture 7: Models of System of Nonlinear Difference Equations

Math 345 Intro to Math Biology Lecture 7: Models of System of Nonlinear Difference Equations Math 345 Intro to Math Biology Lecture 7: Models of System of Nonlinear Difference Equations Junping Shi College of William and Mary, USA Equilibrium Model: x n+1 = f (x n ), here f is a nonlinear function

More information

On the Average Pairwise Connectivity of Wireless Multihop Networks

On the Average Pairwise Connectivity of Wireless Multihop Networks On the Average Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun,

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Enumeration of spanning trees in a pseudofractal scale-free web. and Shuigeng Zhou

Enumeration of spanning trees in a pseudofractal scale-free web. and Shuigeng Zhou epl draft Enumeration of spanning trees in a pseudofractal scale-free web Zhongzhi Zhang 1,2 (a), Hongxiao Liu 1,2, Bin Wu 1,2 1,2 (b) and Shuigeng Zhou 1 School of Computer Science, Fudan University,

More information

A State-Space Approach to Control of Interconnected Systems

A State-Space Approach to Control of Interconnected Systems A State-Space Approach to Control of Interconnected Systems Part II: General Interconnections Cédric Langbort Center for the Mathematics of Information CALIFORNIA INSTITUTE OF TECHNOLOGY clangbort@ist.caltech.edu

More information

Session-Based Queueing Systems

Session-Based Queueing Systems Session-Based Queueing Systems Modelling, Simulation, and Approximation Jeroen Horters Supervisor VU: Sandjai Bhulai Executive Summary Companies often offer services that require multiple steps on the

More information

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 On the Structure of Real-Time Encoding and Decoding Functions in a Multiterminal Communication System Ashutosh Nayyar, Student

More information

Collective behavior in networks of biological neurons: mathematical modeling and software development

Collective behavior in networks of biological neurons: mathematical modeling and software development RESEARCH PROJECTS 2014 Collective behavior in networks of biological neurons: mathematical modeling and software development Ioanna Chitzanidi, Postdoctoral Researcher National Center for Scientific Research

More information

Shlomo Havlin } Anomalous Transport in Scale-free Networks, López, et al,prl (2005) Bar-Ilan University. Reuven Cohen Tomer Kalisky Shay Carmi

Shlomo Havlin } Anomalous Transport in Scale-free Networks, López, et al,prl (2005) Bar-Ilan University. Reuven Cohen Tomer Kalisky Shay Carmi Anomalous Transport in Complex Networs Reuven Cohen Tomer Kalisy Shay Carmi Edoardo Lopez Gene Stanley Shlomo Havlin } } Bar-Ilan University Boston University Anomalous Transport in Scale-free Networs,

More information

3.2 Configuration model

3.2 Configuration model 3.2 Configuration model 3.2.1 Definition. Basic properties Assume that the vector d = (d 1,..., d n ) is graphical, i.e., there exits a graph on n vertices such that vertex 1 has degree d 1, vertex 2 has

More information

arxiv: v1 [physics.soc-ph] 5 Feb 2015

arxiv: v1 [physics.soc-ph] 5 Feb 2015 A Simplified Self-Consistent Probabilities Framewor to Characterize Percolation Phenomena on Interdependent Networs : An Overview Ling Feng, 1 Christopher Pineda Monterola, 1 and Yanqing Hu 2, arxiv:1502.01601v1

More information

Social Networks- Stanley Milgram (1967)

Social Networks- Stanley Milgram (1967) Complex Networs Networ is a structure of N nodes and 2M lins (or M edges) Called also graph in Mathematics Many examples of networs Internet: nodes represent computers lins the connecting cables Social

More information

Liu et al.: Controllability of complex networks

Liu et al.: Controllability of complex networks complex networks Sandbox slides. Peter Sheridan Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont of 2 Outline 2 of 2 RESEARCH

More information

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo 3rd Biennial Canadian Discrete

More information

0.20 N=000 N=5000 0.30 0.5 0.25 P 0.0 P 0.20 0.5 0.05 0.0 0.05 0.00 0.0 0.2 0.4 0.6 0.8.0 n r 0.00 0.0 0.2 0.4 0.6 0.8.0 n r 0.4 N=0000 0.6 0.5 N=50000 P 0.3 0.2 0. P 0.4 0.3 0.2 0. 0.0 0.0 0.2 0.4 0.6

More information

Phase transitions in Boolean satisfiability and graph coloring

Phase transitions in Boolean satisfiability and graph coloring Phase transitions in Boolean satisfiability and graph coloring Alexander Tsiatas May 8, 2008 Abstract I analyzed the behavior of the known phase transitions in two NPcomplete problems, 3-colorability and

More information

Robust Motion Segmentation by Spectral Clustering

Robust Motion Segmentation by Spectral Clustering Robust Motion Segmentation by Spectral Clustering Hongbin Wang and Phil F. Culverhouse Centre for Robotics Intelligent Systems University of Plymouth Plymouth, PL4 8AA, UK {hongbin.wang, P.Culverhouse}@plymouth.ac.uk

More information

Hamilton Index and Its Algorithm of Uncertain Graph

Hamilton Index and Its Algorithm of Uncertain Graph Hamilton Index and Its Algorithm of Uncertain Graph Bo Zhang 1 Jin Peng 1 School of Mathematics and Statistics Huazhong Normal University Hubei 430079 China Institute of Uncertain Systems Huanggang Normal

More information

The Aftermath of Broken Links: Resilience of IoT Systems from A Networking Perspective

The Aftermath of Broken Links: Resilience of IoT Systems from A Networking Perspective The Aftermath of Broken Links: Resilience of IoT Systems from A Networking Perspective Sigit Pambudi, Jie Wang, Wenye Wang, Min Song, Xiaoyan Zhu Department of Electrical and Computer Engineering, North

More information

Designing securely connected wireless sensor networks in the presence of unreliable links

Designing securely connected wireless sensor networks in the presence of unreliable links Designing securely connected wireless sensor networks in the presence of unreliable links Osman Yağan and Armand M. Makowski Department of Electrical and Computer Engineering and the Institute for Systems

More information

Analysis of Bifurcations in a Power System Model with Excitation Limits

Analysis of Bifurcations in a Power System Model with Excitation Limits Analysis of Bifurcations in a Power System Model with Excitation Limits Rajesh G. Kavasseri and K. R. Padiyar Department of Electrical Engineering Indian Institute of Science, Bangalore, India Abstract

More information

A THEORY OF NETWORK SECURITY: PRINCIPLES OF NATURAL SELECTION AND COMBINATORICS

A THEORY OF NETWORK SECURITY: PRINCIPLES OF NATURAL SELECTION AND COMBINATORICS Internet Mathematics, 2:45 204, 206 Copyright Taylor & Francis Group, LLC ISSN: 542-795 print/944-9488 online DOI: 0.080/542795.205.098755 A THEORY OF NETWORK SECURITY: PRINCIPLES OF NATURAL SELECTION

More information

Time Evolution in Diffusion and Quantum Mechanics. Paul Hughes & Daniel Martin

Time Evolution in Diffusion and Quantum Mechanics. Paul Hughes & Daniel Martin Time Evolution in Diffusion and Quantum Mechanics Paul Hughes & Daniel Martin April 29, 2005 Abstract The Diffusion and Time dependent Schrödinger equations were solved using both a Fourier based method

More information

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all

More information

Cournot and Bertrand Competition in a Differentiated Duopoly with Endogenous Technology Adoption *

Cournot and Bertrand Competition in a Differentiated Duopoly with Endogenous Technology Adoption * ANNALS OF ECONOMICS AND FINANCE 16-1, 231 253 (2015) Cournot and Bertrand Competition in a Differentiated Duopoly with Endogenous Technology Adoption * Hongkun Ma School of Economics, Shandong University,

More information

Star-Structured High-Order Heterogeneous Data Co-clustering based on Consistent Information Theory

Star-Structured High-Order Heterogeneous Data Co-clustering based on Consistent Information Theory Star-Structured High-Order Heterogeneous Data Co-clustering based on Consistent Information Theory Bin Gao Tie-an Liu Wei-ing Ma Microsoft Research Asia 4F Sigma Center No. 49 hichun Road Beijing 00080

More information

Deep Learning: Approximation of Functions by Composition

Deep Learning: Approximation of Functions by Composition Deep Learning: Approximation of Functions by Composition Zuowei Shen Department of Mathematics National University of Singapore Outline 1 A brief introduction of approximation theory 2 Deep learning: approximation

More information

Link Operations for Slowing the Spread of Disease in Complex Networks. Abstract

Link Operations for Slowing the Spread of Disease in Complex Networks. Abstract PACS: 89.75.Hc; 88.80.Cd; 89.65.Ef Revision 1: Major Areas with Changes are Highlighted in Red Link Operations for Slowing the Spread of Disease in Complex Networks Adrian N. Bishop and Iman Shames NICTA,

More information

Practicing forecasters seek techniques

Practicing forecasters seek techniques HOW TO SELECT A MOST EFFICIENT OLS MODEL FOR A TIME SERIES DATA By John C. Pickett, David P. Reilly and Robert M. McIntyre Ordinary Least Square (OLS) models are often used for time series data, though

More information

Latent Tree Approximation in Linear Model

Latent Tree Approximation in Linear Model Latent Tree Approximation in Linear Model Navid Tafaghodi Khajavi Dept. of Electrical Engineering, University of Hawaii, Honolulu, HI 96822 Email: navidt@hawaii.edu ariv:1710.01838v1 [cs.it] 5 Oct 2017

More information

Random Networks. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds

Random Networks. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks CSYS/MATH 303, Spring, 2011 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under the

More information

6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes

6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes 6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes Daron Acemoglu and Asu Ozdaglar MIT September 16, 2009 1 Outline Erdös-Renyi random graph model Branching processes Phase transitions

More information

Information Structures Preserved Under Nonlinear Time-Varying Feedback

Information Structures Preserved Under Nonlinear Time-Varying Feedback Information Structures Preserved Under Nonlinear Time-Varying Feedback Michael Rotkowitz Electrical Engineering Royal Institute of Technology (KTH) SE-100 44 Stockholm, Sweden Email: michael.rotkowitz@ee.kth.se

More information

A General Unified Niche-Assembly/Dispersal-Assembly Theory of Forest Species Biodiversity

A General Unified Niche-Assembly/Dispersal-Assembly Theory of Forest Species Biodiversity A General Unified Niche-Assembly/Dispersal-Assembly Theory of Forest Species Biodiversity Keith Rennolls CMS, University of Greenwich, Park Row, London SE10 9LS k.rennolls@gre.ac.uk Abstract: A generalised

More information

An Improved Approximation Algorithm for Virtual Private Network Design

An Improved Approximation Algorithm for Virtual Private Network Design An Improved Approximation Algorithm for Virtual Private Network Design Friedrich Eisenbrand Fabrizio Grandoni Abstract Virtual private network design deals with the reservation of capacities in a network,

More information

Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications

Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Andrey Bernstein 1, Daniel Bienstock 2, David Hay 3, Meric Uzunoglu 4, Gil Zussman 5 1 Computer and Communication

More information

Basing Decisions on Sentences in Decision Diagrams

Basing Decisions on Sentences in Decision Diagrams Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu

More information

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1. Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from

More information

Discriminative Direction for Kernel Classifiers

Discriminative Direction for Kernel Classifiers Discriminative Direction for Kernel Classifiers Polina Golland Artificial Intelligence Lab Massachusetts Institute of Technology Cambridge, MA 02139 polina@ai.mit.edu Abstract In many scientific and engineering

More information

2 Theory. 2.1 State Space Representation S 2 S 1 S 3

2 Theory. 2.1 State Space Representation S 2 S 1 S 3 In the following sections we develop the theory, illustrate the technique by applying it to a sample system, and validate the results using the method of enumeration. Notations: A-state functional (acceptable)

More information

STRUCTURED SPATIAL DISCRETIZATION OF DYNAMICAL SYSTEMS

STRUCTURED SPATIAL DISCRETIZATION OF DYNAMICAL SYSTEMS ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering M. Papadrakakis, V. Papadopoulos, G. Stefanou, V. Plevris (eds. Crete Island, Greece, 5 10 June

More information

BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES. Dissertation TRANSPORT AND PERCOLATION IN COMPLEX NETWORKS GUANLIANG LI

BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES. Dissertation TRANSPORT AND PERCOLATION IN COMPLEX NETWORKS GUANLIANG LI BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES Dissertation TRANSPORT AND PERCOLATION IN COMPLEX NETWORKS by GUANLIANG LI B.S., University of Science and Technology of China, 2003 Submitted in

More information

Lecture 4: Phase Transition in Random Graphs

Lecture 4: Phase Transition in Random Graphs Lecture 4: Phase Transition in Random Graphs Radu Balan February 21, 2017 Distributions Today we discuss about phase transition in random graphs. Recall on the Erdöd-Rényi class G n,p of random graphs,

More information

Adventures in random graphs: Models, structures and algorithms

Adventures in random graphs: Models, structures and algorithms BCAM January 2011 1 Adventures in random graphs: Models, structures and algorithms Armand M. Makowski ECE & ISR/HyNet University of Maryland at College Park armand@isr.umd.edu BCAM January 2011 2 Complex

More information

REUNotes08-CircuitBasics May 28, 2008

REUNotes08-CircuitBasics May 28, 2008 Chapter One Circuits (... introduction here... ) 1.1 CIRCUIT BASICS Objects may possess a property known as electric charge. By convention, an electron has one negative charge ( 1) and a proton has one

More information

Complex contagions and hybrid phase transitions

Complex contagions and hybrid phase transitions Journal of Complex Networks Advance Access published August 14, 2015 Journal of Complex Networks (2014) Page 1 of 23 doi:10.1093/comnet/cnv021 Complex contagions and hybrid phase transitions Joel C. Miller

More information

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 1709-1718 (2008) A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems JI-CHERNG LIN, TETZ C. HUANG, CHENG-PIN

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMING: SOME CASES AND LECTURE NOTES

SENSITIVITY ANALYSIS IN LINEAR PROGRAMING: SOME CASES AND LECTURE NOTES SENSITIVITY ANALYSIS IN LINEAR PROGRAMING: SOME CASES AND LECTURE NOTES Samih Antoine Azar, Haigazian University CASE DESCRIPTION This paper presents case studies and lecture notes on a specific constituent

More information

A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective

A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective A Study on Relationship between Modularity and Diffusion Dynamics in Networks from Spectral Analysis Perspective Kiyotaka Ide, Akira Namatame Department of Computer Science National Defense Academy of

More information

First-order resolution for CTL

First-order resolution for CTL First-order resolution for Lan Zhang, Ullrich Hustadt and Clare Dixon Department of Computer Science, University of Liverpool Liverpool, L69 3BX, UK {Lan.Zhang, U.Hustadt, CLDixon}@liverpool.ac.uk Abstract

More information

Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions

Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions Matthew J. Streeter Computer Science Department and Center for the Neural Basis of Cognition Carnegie Mellon University

More information

Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs

Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs Rashad Eletreby and Osman Yağan Department of Electrical and Computer Engineering and CyLab, Carnegie Mellon

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information