Asynchronous threshold networks
نویسنده
چکیده
Let G = (V, E) be a graph with an initial sign s(v)e { _+ 1} for every vertex vs V. When a vertex v becomes active, it resets its sign to s'(v) which is the sign of the majority of its neighbors (s'(v) = 1 if there is a tie). G is in a stable state if s(v) = s'(v) for all v e V. We show that for every graph G = (V, E) and every initial signs, there is a sequence v~, v 2 ..... v, of vertices of G, in which no vertex appears more than once, such that ifv i becomes active at time i, (l < i _< r), then after these r steps G reaches a stable state. This proves a conjecture of Miller. We also consider some generalizations to directed graphs with weighted edges.
منابع مشابه
DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs
Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...
متن کاملTechnology Mapping for Robust Asynchronous Threshold Networks
As process, temperature and voltage variations become significant in deep submicron design, timing closure becomes a critical challenge in synchronous CAD flows. One attractive alternative is to use robust asynchronous circuits which gracefully accommodate timing discrepancies. However, there is currently little CAD support for such robust methodologies. In this paper, an algorithm for technolo...
متن کاملRecovery rate affects the effective epidemic threshold with synchronous updating.
Accurate identification of effective epidemic threshold is essential for understanding epidemic dynamics on complex networks. In this paper, we systematically study how the recovery rate affects the susceptible-infected-removed spreading dynamics on complex networks, where synchronous and asynchronous updating processes are taken into account. We derive the theoretical effective epidemic thresh...
متن کاملAsynchronous Perfectly Secure Computation Tolerating Generalized Adversaries
We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we sh...
متن کاملBifurcations in Boolean Networks
This paper characterizes the attractor structure of synchronous and asynchronous Boolean networks induced by bithreshold functions. Bi-threshold functions are generalizations of standard threshold functions and have separate threshold values for the transitions 0 → 1 (up-threshold) and 1 → 0 (down-threshold). We show that synchronous bi-threshold systems may, just like standard threshold system...
متن کاملA Two-Threshold Guard Channel Scheme for Minimizing Blocking Probability in Communication Networks
In this paper, we consider the call admission problem in cellular network with two classes of voice users. In the first part of paper, we introduce a two-threshold guard channel policy and study its limiting behavior under the stationary traffic. Then we give an algorithm for finding the optimal number of guard channels. In the second part of this paper, we give an algorithm, which minimizes th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Graphs and Combinatorics
دوره 1 شماره
صفحات -
تاریخ انتشار 1985