94,440 research outputs found

    Information Spreading on Almost Torus Networks

    Get PDF
    Epidemic modeling has been extensively used in the last years in the field of telecommunications and computer networks. We consider the popular Susceptible-Infected-Susceptible spreading model as the metric for information spreading. In this work, we analyze information spreading on a particular class of networks denoted almost torus networks and over the lattice which can be considered as the limit when the torus length goes to infinity. Almost torus networks consist on the torus network topology where some nodes or edges have been removed. We find explicit expressions for the characteristic polynomial of these graphs and tight lower bounds for its computation. These expressions allow us to estimate their spectral radius and thus how the information spreads on these networks

    Large-scale fluctuations of the largest Lyapunov exponent in diffusive systems

    Full text link
    We present a general formalism for computing the largest Lyapunov exponent and its fluctuations in spatially extended systems described by diffusive fluctuating hydrodynamics, thus extending the concepts of dynamical system theory to a broad range of non-equilibrium systems. Our analytical results compare favourably with simulations of a lattice model of heat conduction. We further show how the computation of the Lyapunov exponent for the Symmetric Simple Exclusion Process relates to damage spreading and to a two-species pair annihilation process, for which our formalism yields new finite size results

    Global Computation in a Poorly Connected World: Fast Rumor Spreading with No Dependence on Conductance

    Get PDF
    In this paper, we study the question of how efficiently a collection of interconnected nodes can perform a global computation in the widely studied GOSSIP model of communication. In this model, nodes do not know the global topology of the network, and they may only initiate contact with a single neighbor in each round. This model contrasts with the much less restrictive LOCAL model, where a node may simultaneously communicate with all of its neighbors in a single round. A basic question in this setting is how many rounds of communication are required for the information dissemination problem, in which each node has some piece of information and is required to collect all others. In this paper, we give an algorithm that solves the information dissemination problem in at most O(D+polylog(n))O(D+\text{polylog}{(n)}) rounds in a network of diameter DD, withno dependence on the conductance. This is at most an additive polylogarithmic factor from the trivial lower bound of DD, which applies even in the LOCAL model. In fact, we prove that something stronger is true: any algorithm that requires TT rounds in the LOCAL model can be simulated in O(T+polylog(n))O(T +\mathrm{polylog}(n)) rounds in the GOSSIP model. We thus prove that these two models of distributed computation are essentially equivalent

    An autonomous GNSS anti-spoofing technique

    Get PDF
    open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals. Several proposed solutions make uses of cryptography to protect against spoofing. A limitation of cryptographic techniques is that they introduce a communication and processing computation overhead and may impact the performance in terms of availability and continuity for GNSS users. This paper introduces autonomous non cryptographic antispoofing mechanisms, that exploit semi-codeless receiver techniques to detect spoofing for signals with a component making use of spreading code encryption.openCaparra, Gianluca; Wullems, Christian; Ioannides, Rigas T.Caparra, Gianluca; Wullems, Christian; Ioannides, Rigas T

    Speed and entropy of an interacting continuous time quantum walk

    Get PDF
    We present some dynamic and entropic considerations about the evolution of a continuous time quantum walk implementing the clock of an autonomous machine. On a simple model, we study in quite explicit terms the Lindblad evolution of the clocked subsystem, relating the evolution of its entropy to the spreading of the wave packet of the clock. We explore possible ways of reducing the generation of entropy in the clocked subsystem, as it amounts to a deficit in the probability of finding the target state of the computation. We are thus lead to examine the benefits of abandoning some classical prejudice about how a clocking mechanism should operate.Comment: 25 pages, 14 figure

    Optimal curing policy for epidemic spreading over a community network with heterogeneous population

    Full text link
    The design of an efficient curing policy, able to stem an epidemic process at an affordable cost, has to account for the structure of the population contact network supporting the contagious process. Thus, we tackle the problem of allocating recovery resources among the population, at the lowest cost possible to prevent the epidemic from persisting indefinitely in the network. Specifically, we analyze a susceptible-infected-susceptible epidemic process spreading over a weighted graph, by means of a first-order mean-field approximation. First, we describe the influence of the contact network on the dynamics of the epidemics among a heterogeneous population, that is possibly divided into communities. For the case of a community network, our investigation relies on the graph-theoretical notion of equitable partition; we show that the epidemic threshold, a key measure of the network robustness against epidemic spreading, can be determined using a lower-dimensional dynamical system. Exploiting the computation of the epidemic threshold, we determine a cost-optimal curing policy by solving a convex minimization problem, which possesses a reduced dimension in the case of a community network. Lastly, we consider a two-level optimal curing problem, for which an algorithm is designed with a polynomial time complexity in the network size.Comment: to be published on Journal of Complex Network
    • …
    corecore