Interdependent resistor networks with process-based dependency
نویسندگان
چکیده
منابع مشابه
Babylonian resistor networks
The ancient Babylonians had an iterative technique for numerically approximating the values of square roots. Their method can be physically implemented using series and parallel resistor networks. A recursive formula for the equivalent resistance Req is developed and converted into a nonrecursive solution for circuits using geometrically increasing numbers of identical resistors. As an example,...
متن کاملElectrical impedance tomography with resistor networks
We introduce a novel inversion algorithm for electrical impedance tomography in two dimensions, based on a model reduction approach. The reduced models are resistor networks that arise in five point stencil discretizations of the elliptic partial differential equation satisfied by the electric potential, on adaptive grids that are computed as part of the problem. We prove the unique solvability...
متن کاملCoreset based Dependency Networks
Many applications infer the structure of a probabilistic graphical model from data to elucidate the relationships between variables. But how can we train graphical models on a massive data set? In this paper, we show how to construct coresets—compressed data sets which can be used as proxy for the original data and have provably bounded worst case error—for Gaussian dependency networks (DNs), i...
متن کاملModeling region-based interconnection for interdependent networks.
Various real-world networks interact with and depend on each other. The design of the interconnection between interacting networks is one of the main challenges to achieve a robust interdependent network. Due to cost considerations, network providers are inclined to interconnect nodes that are geographically close. Accordingly, we propose two topologies, the random geographic graph and the rela...
متن کاملBecoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security
We study users’ incentives to become cybercriminals when network security is interdependent. We present a game-theoretic model in which each player (i.e., network user) decides his type, honest or malicious. Honest users represent law-abiding network users, while malicious users represent cybercriminals. After deciding on their types, the users make their security choices. We will follow [29], ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Journal of Physics
سال: 2015
ISSN: 1367-2630
DOI: 10.1088/1367-2630/17/4/043046