2004
DOI: 10.1016/s0166-218x(03)00261-0
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic monopolies in tori

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
77
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(81 citation statements)
references
References 13 publications
3
77
1
Order By: Relevance
“…This type of influence propagation process can be captured by applying the strict majority rule. Moreover, as an illustrative example of the linear threshold model [26], the strict majority propagation model is suitable for modeling transient faults in fault tolerant systems [17,31,18], and also used in verifying convergence of consensus problems on social networks [29]. Here we study the non-progressive influence models under the strict majority rule.…”
Section: Introductionmentioning
confidence: 99%
“…This type of influence propagation process can be captured by applying the strict majority rule. Moreover, as an illustrative example of the linear threshold model [26], the strict majority propagation model is suitable for modeling transient faults in fault tolerant systems [17,31,18], and also used in verifying convergence of consensus problems on social networks [29]. Here we study the non-progressive influence models under the strict majority rule.…”
Section: Introductionmentioning
confidence: 99%
“…For other different types of alliances, the reader is referred to [5,10,19] for (strong) defensive alliances, [6,17,18] for (strong) offensive alliances, and [2] for powerful alliances. A generalized version of global defensive alliance problem called defensive (offensive) r-alliance problem was introduced in [7] in which every vertex v in an offensive set S is asked to have |N S [v]|/2 + r − 1 closed neighbors in S. Besides, defensive alliances have related concept in the context of coalition, monopolies, and distributed computing [9,14,15]. A relatively new concept of alliances (defensive or offensive) in network graphs has recently attracted a great deal of attention due to some interesting applications in web communities [8,12] and fault-tolerant computing [15,20,21].…”
Section: Graph Classes A(g)â(g)mentioning
confidence: 99%
“…is the set of positive integers. Consider the following cascading process [32][33][34]53,74]. A set S of vertices, called the seeds, are active initially.…”
Section: Introductionmentioning
confidence: 99%
“…With various threshold functions φ(·), the above cascading process models the propagation of faults in majority-based fault-tolerant systems [32][33][34]53], socio-economic contagion [40,74], cascading failures in infrastructure and organizational networks [74], spread of epidemics [29] and E-mail address: clchang@saturn.yzu.edu.tw. 1 complex propagation [20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation