Zobrazeno 1 - 10
of 71
pro vyhledávání: '"Danziger, Michael M."'
Though robustness of networks to random attacks has been widely studied, intentional destruction by an intelligent agent is not tractable with previous methods. Here we devise a single-player game on a lattice that mimics the logic of an attacker att
Externí odkaz:
http://arxiv.org/abs/2305.07687
The increased complexity of infrastructure systems has resulted in critical interdependencies between multiple networks---communication systems require electricity, while the normal functioning of the power grid relies on communication systems. These
Externí odkaz:
http://arxiv.org/abs/2011.04623
Autor:
Deng, Hengfang, Aldrich, Daniel P., Danziger, Michael M., Gao, Jianxi, Phillips, Nolan E., Cornelius, Sean P., Wang, Qi Ryan
Major disasters such as extreme weather events can magnify and exacerbate pre-existing social disparities, with disadvantaged populations bearing disproportionate costs. Despite the implications for equity and emergency planning, we lack a quantitati
Externí odkaz:
http://arxiv.org/abs/2008.11169
Publikováno v:
Phys. Rev. E 101, 013306 (2020)
The divergence of the correlation length $\xi$ at criticality is an important phenomenon of percolation in two-dimensional systems. Substantial speed-ups to the calculation of the percolation threshold and component distribution have been achieved by
Externí odkaz:
http://arxiv.org/abs/1902.03708
Autor:
Dong, Gaogao, Wang, Fan, Shekhtman, Louis M., Danziger, Michael M., Fan, Jingfang, Du, Ruijin, Liu, Jianguo, Tian, Lixin, Stanley, H. Eugene, Havlin, Shlomo
Publikováno v:
Proceedings of the National Academy of Sciences of the United States of America, 2021 Jun 01. 118(22), 1-8.
Externí odkaz:
https://www.jstor.org/stable/27040975
Autor:
Shekhtman, Louis M., Danziger, Michael M., Bonamassa, Ivan, Buldyrev, Sergey, Caldarelli, Guido, Zlatic, Vinko, Havlin, Shlomo
We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via si
Externí odkaz:
http://arxiv.org/abs/1709.10366
From critical infrastructure, to physiology and the human brain, complex systems rarely occur in isolation. Instead, the functioning of nodes in one system often promotes or suppresses the functioning of nodes in another. Despite advances in structur
Externí odkaz:
http://arxiv.org/abs/1705.00241
Publikováno v:
New J. Phys. 19, 073037 (2017)
Many real-world multilayer systems such as critical infrastructure are interdependent and embedded in space with links of a characteristic length. They are also vulnerable to localized attacks or failures, such as terrorist attacks or natural catastr
Externí odkaz:
http://arxiv.org/abs/1704.00267
Publikováno v:
Phys. Rev. Lett. 123, 088301 (2019)
We study a spatial network model with exponentially distributed link-lengths on an underlying grid of points, undergoing a structural crossover from a random, Erd\H{o}s--R\'enyi graph to a $2D$ lattice at the characteristic interaction range $\zeta$.
Externí odkaz:
http://arxiv.org/abs/1704.00268
Publikováno v:
Phys. Rev. E 96, 022313 (2017)
Many real world networks have groups of similar nodes which are vulnerable to the same failure or adversary. Nodes can be colored in such a way that colors encode the shared vulnerabilities. Using multiple paths to avoid these vulnerabilities can gre
Externí odkaz:
http://arxiv.org/abs/1611.02617