2021
DOI: 10.1214/21-aop1514
|View full text |Cite
|
Sign up to set email alerts
|

Chase-escape with death on trees

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Now, we consider the chase-escape model as an independent space-time process on realizations of the connectivity graph. This also brings us much closer to the existing literature on chase-escape dynamics on fixed and random graphs; see, for example, [4,7,15,[21][22][23]39], as chase-escape has not been studied on a dynamic graph so far. More precisely, we consider g ρ,r (S, X λ ∪ Y λ W ) under the Palm distribution with respect to the X λ described in (1) and let N(X i ) denote the set of direct neighbors of vertex X i .…”
Section: Chase-escape On the Connectivity Graphmentioning
confidence: 77%
See 1 more Smart Citation
“…Now, we consider the chase-escape model as an independent space-time process on realizations of the connectivity graph. This also brings us much closer to the existing literature on chase-escape dynamics on fixed and random graphs; see, for example, [4,7,15,[21][22][23]39], as chase-escape has not been studied on a dynamic graph so far. More precisely, we consider g ρ,r (S, X λ ∪ Y λ W ) under the Palm distribution with respect to the X λ described in (1) and let N(X i ) denote the set of direct neighbors of vertex X i .…”
Section: Chase-escape On the Connectivity Graphmentioning
confidence: 77%
“…Regarding the infection as some malware, there can be special devices in the network that have the property of removing the malware from infected devices, but are otherwise indistinguishable from the infected or susceptible devices. This gives rise to chase-escape processes [4,7,15,21,39] in which malware is transmitted from infected to susceptible devices and infected devices are patched. Again, the main results are concerned with exhibiting regimes of survival and extinction of the malware in the system, and such regimes have also been established in the continuum [22,23].…”
Section: Introduction and Settingmentioning
confidence: 99%
“…The authors of [2] introduced a variant called chase-escape with death in which red particles die at a given rate, independently of the spread of parasites. After the death of a red particle, its vertex is blocked and cannot be occupied by others.…”
Section: Introductionmentioning
confidence: 99%
“…They studied this process on infinite d-ary trees and characterised the phase behaviour with the occurrence of death (the phase transitions of chase-escape were previously understood in [13,5]). Much of the analysis in [2] relied on a novel connection to weighted Catalan numbers. We deepen this connection by generalising to the setting in which the host spreading and death rates depend on the distance to the nearest parasite.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation