2019 International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT) 2019
DOI: 10.23919/wiopt47501.2019.9144122
|View full text |Cite
|
Sign up to set email alerts
|

Typical Voronoi cells for Cox point processes on Manhattan grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Now, we consider the chase-escape model as an independent space-time process on realizations of the connectivity graph. This also brings us much closer to the existing literature on chase-escape dynamics on fixed and random graphs; see, for example, [4,7,15,[21][22][23]39], as chase-escape has not been studied on a dynamic graph so far. More precisely, we consider g ρ,r (S, X λ ∪ Y λ W ) under the Palm distribution with respect to the X λ described in (1) and let N(X i ) denote the set of direct neighbors of vertex X i .…”
Section: Chase-escape On the Connectivity Graphmentioning
confidence: 77%
See 1 more Smart Citation
“…Now, we consider the chase-escape model as an independent space-time process on realizations of the connectivity graph. This also brings us much closer to the existing literature on chase-escape dynamics on fixed and random graphs; see, for example, [4,7,15,[21][22][23]39], as chase-escape has not been studied on a dynamic graph so far. More precisely, we consider g ρ,r (S, X λ ∪ Y λ W ) under the Palm distribution with respect to the X λ described in (1) and let N(X i ) denote the set of direct neighbors of vertex X i .…”
Section: Chase-escape On the Connectivity Graphmentioning
confidence: 77%
“…This gives rise to chase-escape processes [4,7,15,21,39] in which malware is transmitted from infected to susceptible devices and infected devices are patched. Again, the main results are concerned with exhibiting regimes of survival and extinction of the malware in the system, and such regimes have also been established in the continuum [22,23].…”
Section: Introduction and Settingmentioning
confidence: 99%