pith. machine review for the scientific record. sign in

arxiv: 1801.03404 · v1 · submitted 2018-01-09 · 💻 cs.DM · cs.IT· math.IT

Recognition: unknown

Structure Entropy and Resistor Graphs

Authors on Pith no claims yet
classification 💻 cs.DM cs.ITmath.IT
keywords thetagraphgraphsresistormathcalconstantresistancesecurity
0
0 comments X
read the original abstract

We propose the notion of {\it resistance of a graph} as an accompanying notion of the structure entropy to measure the force of the graph to resist cascading failure of strategic virus attacks. We show that for any connected network $G$, the resistance of $G$ is $\mathcal{R}(G)=\mathcal{H}^1(G)-\mathcal{H}^2(G)$, where $\mathcal{H}^1(G)$ and $\mathcal{H}^2(G)$ are the one- and two-dimensional structure entropy of $G$, respectively. According to this, we define the notion of {\it security index of a graph} to be the normalized resistance, that is, $\theta (G)=\frac{\mathcal{R}(G)}{\mathcal{H}^1(H)}$. We say that a connected graph is an $(n,\theta)$-{\it resistor graph}, if $G$ has $n$ vertices and has security index $\theta (G)\geq\theta$. We show that trees and grid graphs are $(n,\theta)$-resistor graphs for large constant $\theta$, that the graphs with bounded degree $d$ and $n$ vertices, are $(n,\frac{2}{d}-o(1))$-resistor graphs, and that for a graph $G$ generated by the security model \cite{LLPZ2015, LP2016}, with high probability, $G$ is an $(n,\theta)$-resistor graph, for a constant $\theta$ arbitrarily close to $1$, provided that $n$ is sufficiently large. To the opposite side, we show that expander graphs are not good resistor graphs, in the sense that, there is a global constant $\theta_0<1$ such that expander graphs cannot be $(n,\theta)$-resistor graph for any $\theta\geq\theta_0$. In particular, for the complete graph $G$, the resistance of $G$ is a constant $O(1)$, and hence the security index of $G$ is $\theta (G)=o(1)$. Finally, we show that for any simple and connected graph $G$, if $G$ is an $(n, 1-o(1))$-resistor graph, then there is a large $k$ such that the $k$-th largest eigenvalue of the Laplacian of $G$ is $o(1)$, giving rise to an algebraic characterization for the graphs that are secure against intentional virus attack.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. SEM-RAG: Structure-Preserving Multimodal Graph Compilation and Entropy-Guided Retrieval for Telecommunication Standards

    eess.SP 2026-05 unverdicted novelty 7.0

    SEM-RAG compiles telecommunication standards into structure-preserving graphs and uses entropy-guided retrieval to reach 94.1% accuracy on TeleQnA and 93.8% on ORAN-Bench-13K while reducing indexing token usage compar...