Your cache administrator is webmaster. Rev. Phys. Phys. my review here
Our main finding is that multilayer systems are much more vulnerable to errors and intentional attacks than they seem to be from a single layer perspective. Albert, H. NCBISkip to main contentSkip to navigationResourcesAll ResourcesChemicals & BioassaysBioSystemsPubChem BioAssayPubChem CompoundPubChem Structure SearchPubChem SubstanceAll Chemicals & Bioassays Resources...DNA & RNABLAST (Basic Local Alignment Search Tool)BLAST (Stand-alone)E-UtilitiesGenBankGenBank: BankItGenBank: SequinGenBank: tbl2asnGenome WorkbenchInfluenza VirusNucleotide In some realistic cases, however, the failure unites or attack targets may be just the layer nodes. browse this site
All rights reserved. Note that, in the case of random errors, the largest connected physical component is not affected by the adopted policy (no-rerouting or full-rerouting). All rights reserved.partner of AGORA, HINARI, OARE, INASP, ORCID, CrossRef and COUNTER ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: Rev.
The largest eigenvalue Λ is given byBefore computation simulations, it is worth mentioning that the above derived theoretical framework (of generating function) is even effective in the thermodynamic limit N → ∞. The system returned: (22) Invalid argument The remote host or network may be down. A theoretical method is proposed to evaluate the robustness of multiplex networks when a fraction of layer nodes are removed. Rev.
In this regard, how multiplex networks respond to potential attack is still an open issue. Abrupt transition in the structural formation of interconnected networks. Through the simulation of the public bus-transport networks of three major cities in China, we find that in the layered public bus-transport network the traffic flow in the logical layer affects http://link.aps.org/pdf/10.1103/PhysRevE.76.026103 A. & Braunstein, L.
Educ. The networks used are multiplex ER network with average degree (a) z1 = z2 = 1, (b) z1 = 2, z2 = 3 and network size N = 5000. E, 65 (2002) 056109. X.Xu, J.Hu, F.Liu, L.Liu, Scaling and correlations in three bus-transport networks of China, Physica A, 374 (2007) 441. P.Sen, S.Dasgupta, A.Chatterjee, P.A.Sreeram, G.Mukherjee, S.S.Manna, Small-world properties of Phys.
Rev. http://www.ncbi.nlm.nih.gov/pubmed/10935628 During the past decades, there have been a great number of works contributing to this topic. In addition, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack. E 76, 026103, 2007 DOI: 10.1103/PhysRevE.76.026103 Reportnumber: Phys.
Euro. this page Y. All rights reserved. Phys.
Information about registration may be found here. B 88, 1–5 (2015).Article13.Buldyrev, S. In order to cover the whole range of features specific to these systems, we focus on two extreme policies of system's response to failures, no rerouting and full rerouting. http://axishost.net/error-and/error-and-attack-tolerance-of-complex-networks-albert.php Applied Phys.
Comments: 5 pages, 3 figures Subjects: Physics and Society (physics.soc-ph) Journalreference: Phys. Genom att använda våra tjänster godkänner du att vi använder cookies.Läs merOKMitt kontoSökMapsYouTubePlayNyheterGmailDriveKalenderGoogle+ÖversättFotonMerDokumentBloggerKontakterHangoutsÄnnu mer från GoogleLogga inDolda fältBöckerbooks.google.se - This book presents the contributions from a workshop entitled "Electricity security in M.
Sci. Therefore the filled- and empty-triangle curves coincide for all figures in the left column. B 88, 124 (2015).ArticleDownload referencesAcknowledgementsThis work is supported by: The National Natural Science Foundation of China (Grant No. 61572297 and 61471300), Shandong Province Outstanding Young Scientists Research Award Fund Project (Grant Generated Mon, 10 Oct 2016 13:03:14 GMT by s_wx1131 (squid/3.5.20) ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://0.0.0.10/ Connection
Rev. If the fraction of removed nodes exceeds this critical threshold, the giant component becomes null. In both cases we observe the size of the largest connected component in the physical graph, Gϕ (triangles), and the total weight of the remaining logical edges, (circles). http://axishost.net/error-and/error-and-attack-tolerance-of-complex-networks-bibtex.php Through numerous simulations, this method can accurately calculate the threshold and size of giant component, irrespective of the removal case.