메뉴 건너뛰기




Volumn 66, Issue 6, 2002, Pages 4-

Range-based attack on links in scale-free networks: Are long-range links responsible for the small-world phenomenon?

Author keywords

[No Author keywords available]

Indexed keywords

CONNECTING NODES; LONG-RANGE LINKS; NUMERICAL COMPUTATIONS; SCALE-FREE NETWORKS;

EID: 37649030420     PISSN: 1063651X     EISSN: None     Source Type: Journal    
DOI: 10.1103/PhysRevE.66.065103     Document Type: Article
Times cited : (104)

References (27)
  • 2
    • 85036356967 scopus 로고    scopus 로고
    • D.J. Watts, Small Worlds (Princeton University Press, Princeton, 1999)
    • D.J. Watts, Small Worlds (Princeton University Press, Princeton, 1999).
  • 5
    • 85036270250 scopus 로고    scopus 로고
    • B. Bollobás, Random Graphs (Academic Press, London, 1985)
    • B. Bollobás, Random Graphs (Academic Press, London, 1985).
  • 20
    • 85036257831 scopus 로고    scopus 로고
    • We choose to sort the links according to the initial distribution of ranges, instead of an updated distribution, because we want to address the relative importance of short-range and long-range links for the original network. In addition, in terms of attack efficiency, updating is time consuming
    • We choose to sort the links according to the initial distribution of ranges, instead of an updated distribution, because we want to address the relative importance of short-range and long-range links for the original network. In addition, in terms of attack efficiency, updating is time consuming.
  • 22
    • 85036173322 scopus 로고    scopus 로고
    • Indeed, the range of a link can be regarded as the length of the second shortest path between the nodes that are connected to the link. Since we are considering the semirandom model, for which everything other than the connectivity distribution is random, the length of the second shortest path should also be correlated with the product of connectivities
    • Indeed, the range of a link can be regarded as the length of the second shortest path between the nodes that are connected to the link. Since we are considering the semirandom model, for which everything other than the connectivity distribution is random, the length of the second shortest path should also be correlated with the product of connectivities.
  • 23
    • 85036239855 scopus 로고    scopus 로고
    • For pairs of nodes connected by (Formula presented) shortest paths, the contribution to the load due to each path is (Formula presented)
    • For pairs of nodes connected by (Formula presented) shortest paths, the contribution to the load due to each path is (Formula presented)
  • 24
    • 85036295238 scopus 로고    scopus 로고
    • this model, we start with N nodes and zero links. Then for each pair of nodes, with probability p, we add a link between them. The resulting network has on average (Formula presented) links per node
    • In this model, we start with N nodes and zero links. Then for each pair of nodes, with probability p, we add a link between them. The resulting network has on average (Formula presented) links per node.
  • 25
    • 85036265676 scopus 로고    scopus 로고
    • The same tendency displayed in Figs. 22 and 44 was observed for larger fractions of removed links. In particular, short-range attack is still the most effective one for scale-free networks with scaling exponent around 3. We observe, however, that the removed fraction shown in these figures is already unrealistically large for many practical situations
    • The same tendency displayed in Figs. 22 and 44 was observed for larger fractions of removed links. In particular, short-range attack is still the most effective one for scale-free networks with scaling exponent around 3. We observe, however, that the removed fraction shown in these figures is already unrealistically large for many practical situations.
  • 26
    • 85036193063 scopus 로고    scopus 로고
    • Reference 15 also considers local strategies of attack
    • Reference 15 also considers local strategies of attack.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.