pith. sign in

arxiv: 0801.3644 · v1 · submitted 2008-01-23 · ❄️ cond-mat.stat-mech

Dynamics of k-core percolation

classification ❄️ cond-mat.stat-mech
keywords k-coreavalanchesnetworknodesoccurorderapplicationsattack
0
0 comments X p. Extension
read the original abstract

In many network applications nodes are stable provided they have at least k neighbors, and a network of k-stable nodes is called a k-core. The vulnerability to random attack is characterized by the size of culling avalanches which occur after a randomly chosen k-core node is removed. Simulations of lattices in two, three and four dimensions, as well as small world networks, indicate that power-law avalanches occur in first order k-core systems, while truncated avalanches are characteristic of second order cases.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.