語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Diffusion in Networks : = Source Loc...
~
ProQuest Information and Learning Co.
Diffusion in Networks : = Source Localization, History Reconstruction and Real-time Network Robustification.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Diffusion in Networks :/
其他題名:
Source Localization, History Reconstruction and Real-time Network Robustification.
作者:
Chen, Zhen.
面頁冊數:
1 online resource (163 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
Contained By:
Dissertation Abstracts International79-09B(E).
標題:
Electrical engineering. -
電子資源:
click for full text (PQDT)
ISBN:
9780355911091
Diffusion in Networks : = Source Localization, History Reconstruction and Real-time Network Robustification.
Chen, Zhen.
Diffusion in Networks :
Source Localization, History Reconstruction and Real-time Network Robustification. - 1 online resource (163 pages)
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
Thesis (Ph.D.)--Arizona State University, 2018.
Includes bibliographical references
Diffusion processes in networks can be used to model many real-world processes, such as the propagation of a rumor on social networks and cascading failures on power networks. Analysis of diffusion processes in networks can help us answer important questions such as the role and the importance of each node in the network for spreading the diffusion and how to top or contain a cascading failure in the network. This dissertation consists of three parts.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355911091Subjects--Topical Terms:
596380
Electrical engineering.
Index Terms--Genre/Form:
554714
Electronic books.
Diffusion in Networks : = Source Localization, History Reconstruction and Real-time Network Robustification.
LDR
:04045ntm a2200385Ki 4500
001
919177
005
20181116131021.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780355911091
035
$a
(MiAaPQ)AAI10791761
035
$a
(MiAaPQ)asu:17680
035
$a
AAI10791761
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Chen, Zhen.
$3
1193687
245
1 0
$a
Diffusion in Networks :
$b
Source Localization, History Reconstruction and Real-time Network Robustification.
264
0
$c
2018
300
$a
1 online resource (163 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
500
$a
Advisers: Lei Ying; Hanghang Tong.
502
$a
Thesis (Ph.D.)--Arizona State University, 2018.
504
$a
Includes bibliographical references
520
$a
Diffusion processes in networks can be used to model many real-world processes, such as the propagation of a rumor on social networks and cascading failures on power networks. Analysis of diffusion processes in networks can help us answer important questions such as the role and the importance of each node in the network for spreading the diffusion and how to top or contain a cascading failure in the network. This dissertation consists of three parts.
520
$a
In the first part, we study the problem of locating multiple diffusion sources in networks under the Susceptible-Infected-Recovered (SIR) model. Given a complete snapshot of the network, we developed a sample-path-based algorithm, named clustering and localization, and proved that for regular trees, the estimators produced by the proposed algorithm are within a constant distance from the real sources with a high probability. Then, we considered the case in which only a partial snapshot is observed and proposed a new algorithm, named Optimal-Jordan-Cover (OJC). The algorithm first extracts a subgraph using a candidate selection algorithm that selects source candidates based on the number of observed infected nodes in their neighborhoods. Then, in the extracted subgraph, OJC finds a set of nodes that "cover" all observed infected nodes with the minimum radius. The set of nodes is called the Jordan cover, and is regarded as the set of diffusion sources. We proved that OJC can locate all sources with probability one asymptotically with partial observations in the Erdos-Renyi (ER) random graph. Multiple experiments on different networks were done, which show our algorithms outperform others.
520
$a
In the second part, we tackle the problem of reconstructing the diffusion history from partial observations. We formulated the diffusion history reconstruction problem as a maximum a posteriori (MAP) problem and proved the problem is NP hard. Then we proposed a step-by- step reconstruction algorithm, which can always produce a diffusion history that is consistent with the partial observations. Our experimental results based on synthetic and real networks show that the algorithm significantly outperforms some existing methods.
520
$a
In the third part, we consider the problem of improving the robustness of an interdependent network by rewiring a small number of links during a cascading attack. We formulated the problem as a Markov decision process (MDP) problem. While the problem is NP-hard, we developed an effective and efficient algorithm, RealWire, to robustify the network and to mitigate the damage during the attack. Extensive experimental results show that our algorithm outperforms other algorithms on most of the robustness metrics.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Electrical engineering.
$3
596380
650
4
$a
Computer science.
$3
573171
650
4
$a
Computer engineering.
$3
569006
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0544
690
$a
0984
690
$a
0464
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Arizona State University.
$b
Electrical Engineering.
$3
845389
773
0
$t
Dissertation Abstracts International
$g
79-09B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10791761
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入