No free lunch for avoiding clustering vulnerabilities in distributed systems.

Autor: Chitnelawong P; Department of Physics, Engineering Physics, and Astronomy, Queen's University, Kingston, ON, K7L 3N6, Canada., Klishin AA; Department of Mechanical Engineering, University of Washington, Seattle, WA, 98195, USA.; AI Institute in Dynamic Systems, University of Washington, Seattle, WA, 98195, USA., Mackay N; Department of Physics, Engineering Physics, and Astronomy, Queen's University, Kingston, ON, K7L 3N6, Canada., Singer DJ; Department of Naval Architecture Marine Engineering, University of Michigan, Ann Arbor, MI, 48109, USA., van Anders G; Department of Physics, Engineering Physics, and Astronomy, Queen's University, Kingston, ON, K7L 3N6, Canada. gva@queensu.ca.
Jazyk: angličtina
Zdroj: Scientific reports [Sci Rep] 2024 Jun 04; Vol. 14 (1), pp. 12789. Date of Electronic Publication: 2024 Jun 04.
DOI: 10.1038/s41598-024-63278-3
Abstrakt: Emergent design failures are ubiquitous in complex systems, and often arise when system elements cluster. Approaches to systematically reduce clustering could improve a design's resilience, but reducing clustering is difficult if it is driven by collective interactions among design elements. Here, we use techniques from statistical physics to identify mechanisms by which spatial clusters of design elements emerge in complex systems modelled by heterogeneous networks. We find that, in addition to naive, attraction-driven clustering, heterogeneous networks can exhibit emergent, repulsion-driven clustering. We draw quantitative connections between our results on a model system in naval engineering to entropy-driven phenomena in nanoscale self-assembly, and give a general argument that the clustering phenomena we observe should arise in many distributed systems. We identify circumstances under which generic design problems will exhibit trade-offs between clustering and uncertainty in design objectives, and we present a framework to identify and quantify trade-offs to manage clustering vulnerabilities.
(© 2024. The Author(s).)
Databáze: MEDLINE
Nepřihlášeným uživatelům se plný text nezobrazuje