Ray,
I was intrigued by the connection between your post and Ecological Psychology. I would love to hear more about that. Also, I thought you might be the appropriate person to which to confess the following sin: In the wikipedia entry on ontology I took out a short paragraph on the ontology of J.J.Gibson. I expected to be ... educated ... from all sides by Gibsonians not a peep. I wrote a long comment justifying my change. Funny how a sin is just no fun if nobody notices. Nick Nicholas S. Thompson Professor of Psychology and Ethology Clark University [hidden email] http://home.earthlink.net/~nickthompson/ [hidden email] > [Original Message] > From: <[hidden email]> > To: <[hidden email]> > Date: 12/23/2004 9:00:21 AM > Subject: Friam Digest, Vol 18, Issue 22 > > Send Friam mailing list submissions to > [hidden email] > > To subscribe or unsubscribe via the World Wide Web, visit > http://redfish.com/mailman/listinfo/friam_redfish.com > or, via email, send a message with subject or body 'help' to > [hidden email] > > You can reach the person managing the list at > [hidden email] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Friam digest..." > > > Today's Topics: > > 1. Re: Research on weakest points in hierarchical networks > (Raymond C. Parks) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Wed, 22 Dec 2004 17:28:35 -0700 > From: "Raymond C. Parks" <[hidden email]> > Subject: Re: [FRIAM] Research on weakest points in hierarchical > networks > To: "The Friday Morning Applied Complexity Coffee Group" > <[hidden email]> > Cc: "Berg, Michael J" <[hidden email]> > Message-ID: <[hidden email]> > Content-Type: text/plain; charset=us-ascii; format=flowed > > Stephen Guerin wrote: > > > Partially related is the research from 4 or 5 years ago on percolation > > robustness in Small World and Scale Free networks which I'm sure you guys > > are aware of and probably contributed to. > > I am aware of it, but I did not contribute to that work. However, > these networks aren't really either Small World or Scale Free. They are > clearly hierarchical even though some communication is via other > networks that are Small World. > > > I haven't seen anything more specific to attacking the data content in > > hierarchical networks. Though, empirically, it would be pretty > > straightforward to write a model and sweep the parameter space to > > test your intuitions of intermediate node vulnerabilities. > > What would you use to write such a model? I'm not in the modeling > business, normally, but I could be if necessary. > > > BTW, from you description, I'm a little unclear why a command or control > > node (top of the hierarchy) wouldn't be a more vulnerable target than an > > intermediate node. Wouldn't a modification of data at the source have the > > greatest impact? Or in other words, a source node by definition has the > > smallest distance to the information source. I must be missing a key idea in > > the model description. It may be that you're talking about something > > different than a command and control network and more of a > > "Perceiving/Acting" network where information integration is happening in > > the intermediate nodes. Perceiving/Acting networks isn't a standard term for > > graph theory; I'm applying it from the Ecological Psychology literature. > > You've hit the nail on the head with your last suggestion. We are > looking at networks that transform the data during its move from the > command or control nodes out to the leaf nodes. The data is changed > from generalities to specifics. The intermediate nodes modify commands > enough that an attack on the command or control nodes is watered down by > the intermediate transformations. Conversely, the leaf nodes only have > a very small part of the total data picture. They transmit information > up the hierarchy and the intermediate nodes consolidate, aggregate, and > create new data from what the leaf nodes transmit. An attack on a leaf > node is able to affect the world of that leaf node. In a few rare > cases, the data from the leaf node may make it to the command or control > node level without change and thus affect decisions made at that level. > However, in the majority of cases, the data transformation is > sufficient that a data attack is hidden in the background by the time > data makes it to the command or control nodes. > > Thanks for the pointer. I will set our reference librarian searching > for Perceiving/Acting networks in the Ecological Psychology literature. > > -- > Ray Parks [hidden email] > IDART Project Lead Voice:505-844-4024 > IORTA Department Fax:505-844-9641 > http://www.sandia.gov/idart Pager:800-690-5288 > > > > > ------------------------------ > > _______________________________________________ > Friam mailing list > [hidden email] > http://redfish.com/mailman/listinfo/friam_redfish.com > > > End of Friam Digest, Vol 18, Issue 22 > ************************************* |
Free forum by Nabble | Edit this page |