ترغب بنشر مسار تعليمي؟ اضغط هنا

Infection Spreading and Source Identification: A Hide and Seek Game

117   0   0.0 ( 0 )
 نشر من قبل Wuqiong Luo
 تاريخ النشر 2015
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator. On the other hand, the network administrator aims to identify the source node based on knowledge of which nodes have been infected. We model the infection spreading and source identification problem as a strategic game, where the infection source and the network administrator are the two players. As the Jordan center estimator is a minimax source estimator that has been shown to be robust in recent works, we assume that the network administrator utilizes a source estimation strategy that can probe any nodes within a given radius of the Jordan center. Given any estimation strategy, we design a best-response infection strategy for the source. Given any infection strategy, we design a best-response estimation strategy for the network administrator. We derive conditions under which a Nash equilibrium of the strategic game exists. Simulations in both synthetic and real-world networks demonstrate that our proposed infection strategy infects more nodes while maintaining the same safety margin between the true source node and the Jordan center source estimator.

قيم البحث

اقرأ أيضاً

We train embodied agents to play Visual Hide and Seek where a prey must navigate in a simulated environment in order to avoid capture from a predator. We place a variety of obstacles in the environment for the prey to hide behind, and we only give th e agents partial observations of their environment using an egocentric perspective. Although we train the model to play this game from scratch, experiments and visualizations suggest that the agent learns to predict its own visibility in the environment. Furthermore, we quantitatively analyze how agent weaknesses, such as slower speed, effect the learned policy. Our results suggest that, although agent weaknesses make the learning problem more challenging, they also cause more useful features to be learned. Our project website is available at: http://www.cs.columbia.edu/ ~bchen/visualhideseek/.
115 - K. Sneppen 2004
Signaling pathways and networks determine the ability to communicate in systems ranging from living cells to human society. We investigate how the network structure constrains communication in social-, man-made and biological networks. We find that h uman networks of governance and collaboration are predictable on teat-a-teat level, reflecting well defined pathways, but globally inefficient. In contrast, the Internet tends to have better overall communication abilities, more alternative pathways, and is therefore more robust. Between these extremes the molecular network of Saccharomyces cerevisea is more similar to the simpler social systems, whereas the pattern of interactions in the more complex Drosophilia melanogaster, resembles the robust Internet.
We use $sim$83,000 star-forming galaxies at $0.04<z<0.3$ from the Sloan Digital Sky Survey to study the so-called fundamental metallicity relation (FMR) and report on the disappearance of its anti-correlation between metallicity and star formation ra te (SFR) when using the new metallicity indicator recently proposed by Dopita et al. In this calibration, metallicity is primarily sensitive to the emission line ratio [NII]$lambda$6584 / [SII]$lambdalambda$6717, 6731 that is insensitive to dilution by pristine infalling gas that may drive the FMR anti-correlation with SFR. Therefore, we conclude that the apparent disappearance of the FMR (using this new metallicity indicator) does not rule out its existence.
Photometry in B, V (down to V ~ 26 mag) is presented for two 23 x 23 fields of the Andromeda galaxy (M31) that were observed with the blue channel camera of the Large Binocular Telescope during the Science Demonstration Time. Each field covers an are a of about 5.1kpc x 5.1kpc at the distance of M31 ((m-M)o ~ 24.4 mag), sampling, respectively, a northeast region close to the M31 giant stream (field S2), and an eastern portion of the halo in the direction of the galaxy minor axis (field H1). The stream field spans a region that includes Andromedas disk and the giant stream, and this is reflected in the complexity of the color magnitude diagram of the field. One corner of the halo field also includes a portion of the giant stream. Even though these demonstration time data were obtained under non-optimal observing conditions the B photometry, acquired in time-series mode, allowed us to identify 274 variable stars (among which 96 are bona fide and 31 are candidate RR Lyrae stars, 71 are Cepheids, and 16 are binary systems) by applying the image subtraction technique to selected portions of the observed fields. Differential flux light curves were obtained for the vast majority of these variables. Our sample includes mainly pulsating stars which populate the instability strip from the Classical Cepheids down to the RR Lyrae stars, thus tracing the different stellar generations in these regions of M31 down to the horizontal branch of the oldest (t ~ 10 Gyr) component.
Gluinos that result in classic large missing transverse momentum signatures at the LHC have been excluded by 2011 searches if they are lighter than around 800 GeV. This adds to the tension between experiment and supersymmetric solutions of the natura lness problem, since the gluino is required to be light if the electroweak scale is to be natural. Here, we examine natural scenarios where supersymmetry is present, but was hidden from 2011 searches due to violation of R-parity and the absence of a large missing transverse momentum signature. Naturalness suggests that third generation states should dominate gluino decays and we argue that this leads to a generic signature in the form of same-sign, flavour-ambivalent leptons, without large missing transverse momentum. As a result, searches in this channel are able to cover a broad range of scenarios with some generality and one should seek gluinos that decay in this way with masses below a TeV. We encourage the LHC experiments to tailor a search for supersymmetry in this form. We consider a specific case that is good at hiding: baryon number violation, and estimate that the most constraining existing search from 2011 data implies a lower bound on the gluino mass of 550 GeV.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا