2012
DOI: 10.14778/2140436.2140439
|View full text |Cite
|
Sign up to set email alerts
|

The filter-placement problem and its application to minimizing information multiplicity

Abstract: In many information networks, data items -such as updates in social networks, news flowing through interconnected RSS feeds and blogs, measurements in sensor networks, route updates in ad-hoc networks -propagate in an uncoordinated manner: nodes often relay information they receive to neighbors, independent of whether or not these neighbors received the same information from other sources. This uncoordinated data dissemination may result in significant, yet unnecessary communication and processing overheads, u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…Non-monotonic strategies are given in [10]. Some other problems related to graph immunization include the influence maximization [21], the filter placement [11] and the critical node detection problem (CNDP) [5,20,35]. In the influence maximization problem, the goal is to find a subset of nodes whose activation will lead to the maximal spread of information across the graph.…”
Section: Related Workmentioning
confidence: 99%
“…Non-monotonic strategies are given in [10]. Some other problems related to graph immunization include the influence maximization [21], the filter placement [11] and the critical node detection problem (CNDP) [5,20,35]. In the influence maximization problem, the goal is to find a subset of nodes whose activation will lead to the maximal spread of information across the graph.…”
Section: Related Workmentioning
confidence: 99%
“…We perform a Depth-First Search (DFS) algorithm by ζ steps based on the period of rumor propagation, and form the nodes involved in the algorithm into a set S. Based on S, we perform an Acyclic algorithm [23] on it to find the Directed Acyclic Graph (DAG). It is also for us to build the RP T structure in the next step.…”
Section: B Node Influencementioning
confidence: 99%
“…Graph vulnerability is defined as measure of how much a graph is likely to be affected by a virus attack. As in (Tong 2012), the largest eigenvalue is selected as a measure of graph vulnerability, in (Chen 2016) In filter placement (Erdös 2012), those nodes are identified which are cause of maximum information multiplicity. Moreover some reverse engineering techniques are also used for similar problems.…”
Section: Related Workmentioning
confidence: 99%
“…Undirected, unweighted graphs are considered and nodes are selected by an approximation scheme using the eigenvector corresponding to largest eigenvalue which cause the maximum drop. In filter placement (Erdös 2012), those nodes are identified which are cause of maximum information multiplicity. Moreover some reverse engineering techniques are also used for similar problems.…”
Section: Related Workmentioning
confidence: 99%