-
Designing, Develo**, and Validating Network Intelligence for Scaling in Service-Based Architectures based on Deep Reinforcement Learning
Authors:
Paola Soto,
Miguel Camelo,
Danny De Vleeschauwer,
Yorick De Bock,
Nina Slamnik-Kriještorac,
Chia-Yu Chang,
Natalia Gaviria,
Erik Mannens,
Juan F. Botero,
Steven Latré
Abstract:
Automating network processes without human intervention is crucial for the complex 6G environment. This requires zero-touch management and orchestration, the integration of Network Intelligence (NI) into the network architecture, and the efficient lifecycle management of intelligent functions. Reinforcement Learning (RL) plays a key role in this context, offering intelligent decision-making capabi…
▽ More
Automating network processes without human intervention is crucial for the complex 6G environment. This requires zero-touch management and orchestration, the integration of Network Intelligence (NI) into the network architecture, and the efficient lifecycle management of intelligent functions. Reinforcement Learning (RL) plays a key role in this context, offering intelligent decision-making capabilities suited to networks' dynamic nature. Despite its potential, integrating RL poses challenges in model development and application. To tackle those issues, we delve into designing, develo**, and validating RL algorithms for scaling network functions in service-based network architectures such as Open Radio Access Network (O-RAN). It builds upon and expands previous research on RL lifecycle management by proposing several RL algorithms and Reward Functions (RFns). Our proposed methodology is anchored on a dual approach: firstly, it evaluates the training performance of these algorithms under varying RFns, and secondly, it validates their performance after being trained to discern the practical applicability in real-world settings. We show that, despite significant progress, the development stage of RL techniques for networking applications, particularly in scaling scenarios, still leaves room for significant improvements. This study underscores the importance of ongoing research and development to enhance the practicality and resilience of RL techniques in real-world networking environments.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Modal expansions of ririgs
Authors:
Agustín L. Nagy,
William J. Zuluaga Botero
Abstract:
In this paper we introduce the variety of I-modal ririgs. We characterize the congruence lattice of its members by means of I-filters and we provide a description on I-filter generation. We also provide an axiomatic presentation for the variety generated by chains of the subvariety of contractive I-modal ririgs. Finally, we introduce a Hilbert-style calculus of a logic with I-modal ririgs as an eq…
▽ More
In this paper we introduce the variety of I-modal ririgs. We characterize the congruence lattice of its members by means of I-filters and we provide a description on I-filter generation. We also provide an axiomatic presentation for the variety generated by chains of the subvariety of contractive I-modal ririgs. Finally, we introduce a Hilbert-style calculus of a logic with I-modal ririgs as an equivalent algebraic semantics and we prove that such a logic has the parametrized local deduction-detachment theorem.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
An Adaptable and Agnostic Flow Scheduling Approach for Data Center Networks
Authors:
Sergio Armando Gutiérrez,
Juan Felipe Botero,
John Willian Branch
Abstract:
Cloud applications have reshaped the model of services and infrastructure of the Internet. Search engines, social networks, content delivery and retail and e-commerce sites belong to this group of applications. An important element in the architecture of data centers where these applications run is the communication infrastructure, commonly known as data center networks (DCNs). A critical challeng…
▽ More
Cloud applications have reshaped the model of services and infrastructure of the Internet. Search engines, social networks, content delivery and retail and e-commerce sites belong to this group of applications. An important element in the architecture of data centers where these applications run is the communication infrastructure, commonly known as data center networks (DCNs). A critical challenge DCNs have to address is the processing of the traffic of cloud applications, which due to its properties is essentially different to the traffic of other Internet applications. In order to improve the responsiveness and throughput of applications, DCNs should be able to prioritize short flows (a few KB) over long flows (several MB). However, given the time and space variations the traffic presents, the information about flow sizes is not available in advance in order to plan the flow scheduling. In this paper, we present an adaptable mechanism called Adaptable Workload-Agnostic Flow Scheduling (AWAFS). It is an adaptable approach that can adjust in an agnostic way the scheduling configuration of DCN forwarding devices. This agnostic adjustment contributes to reduce the Flow Completion Time (FCT) of those short flows, representing around 85% of the traffic handled by cloud applications. Our evaluation results based on simulation show that AWAFS can reduce the average FCT of short flows between 16.9% and 45.2% when compared to the best existing agnostic non-adaptable solution, without inducing starvation on long flows. Indeed, it can provide improvements as high as 39% for long flows. Additionally, AWAFS can improve the FCT for short flows in scenarios with high heterogeneity in the traffic present in the network, with a reduction up to 5% for the average FCT and 15% for the tail FCT.
△ Less
Submitted 1 March, 2022;
originally announced March 2022.
-
Central elements and the Gaeta topos: An algebraic and functorial overview on coextensive varieties
Authors:
W. J. Zuluaga Botero
Abstract:
In this paper we show that within the context of coextensive varieties, the functor of central elements is representable. In addition, we use the theory of central elements to establish a criterion for fp-coextensive varieties that allows to decide whether the Gaeta Topos classifies indecomposable objects in terms of the indecomposability of the free algebra on one generator.
In this paper we show that within the context of coextensive varieties, the functor of central elements is representable. In addition, we use the theory of central elements to establish a criterion for fp-coextensive varieties that allows to decide whether the Gaeta Topos classifies indecomposable objects in terms of the indecomposability of the free algebra on one generator.
△ Less
Submitted 31 January, 2022;
originally announced February 2022.
-
A topological duality for monotone expansions of semilattices
Authors:
Ismael Calomino,
Paula Menchón,
William J. Zuluaga Botero
Abstract:
In this paper we provide a Stone style duality for monotone semilattices by using the topological duality developed in \cite{Celani2020} for semilattices together with a topological description of their canonical extension. As an application of this duality we obtain a characterization of the congruences of monotone semilattices by means of monotone lower-Vietoris-type topologies.
In this paper we provide a Stone style duality for monotone semilattices by using the topological duality developed in \cite{Celani2020} for semilattices together with a topological description of their canonical extension. As an application of this duality we obtain a characterization of the congruences of monotone semilattices by means of monotone lower-Vietoris-type topologies.
△ Less
Submitted 3 September, 2021;
originally announced September 2021.
-
Watching Smartly from the Bottom: Intrusion Detection revamped through Programmable Networks and Artificial Intelligence
Authors:
Sergio Armando Gutiérrez,
John Willian Branch,
Luciano Paschoal Gaspary,
Juan Felipe Botero
Abstract:
The advent of Programmable Data Planes represents an outstanding evolution and complete revolution of the Software- Defined Networking paradigm. The capacity to define the entire behavior of forwarding devices by controlling the packet parsing procedures and executing custom operations enables offloading functionalities traditionally performed at the control plane. A recent research line has explo…
▽ More
The advent of Programmable Data Planes represents an outstanding evolution and complete revolution of the Software- Defined Networking paradigm. The capacity to define the entire behavior of forwarding devices by controlling the packet parsing procedures and executing custom operations enables offloading functionalities traditionally performed at the control plane. A recent research line has explored the possibility of even offloading to the data plane part of Artificial Intelligence algorithms, and more specifically, Machine Learning ones, to increase their accuracy and responsiveness (by having more detailed visibility of the traffic). This introduces a significant opportunity for evolution in the critical field of Intrusion Detection. However, offloading functionalities to the data plane is not a straightforward task. In this paper, we discuss how Programmable Data Planes might complement different stages of an Intrusion Detection System based on Machine Learning. We present two use cases that make evident the feasibility of this approach and highlight aspects that must be considered when addressing the challenge of deploying solutions leveraging data-plane functionalities.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Coextensive varieties via Central Elements
Authors:
W. J. Zuluaga Botero
Abstract:
In this paper we use the theory of central elements in order to provide a characterization for coextensive varieties. In particular, if the variety is of finite type, congruence-permutable and its class of directly indecomposable members is universal, then coextensivity is equivalent to be a variety of shells.
In this paper we use the theory of central elements in order to provide a characterization for coextensive varieties. In particular, if the variety is of finite type, congruence-permutable and its class of directly indecomposable members is universal, then coextensivity is equivalent to be a variety of shells.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
ORACLE: Collaboration of Data and Control Planes to Detect DDoS Attacks
Authors:
Sebastián Gómez Macías,
Luciano Paschoal Gaspary,
Juan Felipe Botero
Abstract:
The possibility of programming the control and data planes, enabled by the Software-Defined Networking (SDN) paradigm, represents a fertile ground on top of which novel operation and management mechanisms can be fully explored, being Distributed Denial of Service (DDoS) attack detection based on machine learning techniques the focus of this work. To carry out the detection, this paper proposes ORA…
▽ More
The possibility of programming the control and data planes, enabled by the Software-Defined Networking (SDN) paradigm, represents a fertile ground on top of which novel operation and management mechanisms can be fully explored, being Distributed Denial of Service (DDoS) attack detection based on machine learning techniques the focus of this work. To carry out the detection, this paper proposes ORACLE: cOllaboRation of dAta and Control pLanEs to detect DDoS attacks, an architecture that promotes the coordination of control and data planes to detect network attacks. As its first contribution, this architecture delegates to the data plane the extraction and processing of traffic information collected per flow. This is done in order to ease the calculation and classification of the feature set used in the attack detection, as the needed flow information is already processed when it arrives at the control plane. Besides, as the second contribution, this architecture breaks the limitations to calculate some features that are not possible to implement in a traditional OpenFlow-based environment. In the evaluation of ORACLE, we obtained up to 96% of accuracy in the testing phase, using a K-Nearest Neighbor model.
△ Less
Submitted 22 September, 2020;
originally announced September 2020.
-
Modules with fusion and implication based over distributive lattices: Representation and Duality
Authors:
Ismael Calomino,
William J. Zuluaga Botero
Abstract:
In this paper we study the class of modules with fusion and implication based over distributive lattices, or FIDL-modules, for short. We introduce the concepts of FIDL-subalgebra and FIDL-congruence as well as the notions of simple and subdirectly irreducible FIDL-modules. We give a bi-sorted Priestley-like duality for FIDL-modules and moreover, as an application of such a duality, we provide a to…
▽ More
In this paper we study the class of modules with fusion and implication based over distributive lattices, or FIDL-modules, for short. We introduce the concepts of FIDL-subalgebra and FIDL-congruence as well as the notions of simple and subdirectly irreducible FIDL-modules. We give a bi-sorted Priestley-like duality for FIDL-modules and moreover, as an application of such a duality, we provide a topological bi-spaced description of the FIDL-congruences. This result will allows us to characterize the simple and subdirectly irreducible FIDL-modules.
△ Less
Submitted 28 July, 2020;
originally announced July 2020.
-
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives
Authors:
Ulbert J. Botero,
Ronald Wilson,
Hangwei Lu,
Mir Tanjidur Rahman,
Mukhil A. Mallaiyan,
Fatemeh Ganji,
Navid Asadizanjani,
Mark M. Tehranipoor,
Damon L. Woodard,
Domenic Forte
Abstract:
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent…
▽ More
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent components. Hence, it can raise serious issues concerning Intellectual Property (IP) infringement, the (in)effectiveness of security-related measures, and even new opportunities for injecting hardware Trojans. Ironically, reverse engineering can enable IP owners to verify and validate the design. Nevertheless, this cannot be achieved without overcoming numerous obstacles that limit successful outcomes of the reverse engineering process. This paper surveys these challenges from two complementary perspectives: image processing and machine learning. These two fields of study form a firm basis for the enhancement of efficiency and accuracy of reverse engineering processes for both PCBs and ICs. In summary, therefore, this paper presents a roadmap indicating clearly the actions to be taken to fulfill hardware trust and assurance objectives.
△ Less
Submitted 7 April, 2021; v1 submitted 11 February, 2020;
originally announced February 2020.
-
Pierce stalks in preprimal varieties
Authors:
D. Vaggione,
W. J. Zuluaga Botero
Abstract:
An algebra $\mathbf{P}$ is called \textit{preprimal} if $\mathbf{P}$ is finite and $\func{Clo}(\mathbf{P})$ is a maximal clone. A \textit{preprimal variety} is a variety generated by a preprimal algebra. After Rosenberg's classification of maximal clones \cite{ro}; we have that a finite algebra is preprimal if and only if its term operations are exactly the functions preserving a relation of one o…
▽ More
An algebra $\mathbf{P}$ is called \textit{preprimal} if $\mathbf{P}$ is finite and $\func{Clo}(\mathbf{P})$ is a maximal clone. A \textit{preprimal variety} is a variety generated by a preprimal algebra. After Rosenberg's classification of maximal clones \cite{ro}; we have that a finite algebra is preprimal if and only if its term operations are exactly the functions preserving a relation of one of the following seven types:
1. Permutations with cycles all the same prime length,
2. Proper subsets,
3 Prime-affine relations,
4. Bounded partial orders,
5. $h$-adic relations,
6. Central relations $h\geq 2$,
7. Proper, non-trivial equivalence relations.
In \cite{kn} Knoebel studies the Pierce sheaf of the different preprimal varieties and he asks for a description of the Pierce stalks. He solves this problem for the cases 1.,2. and 3. and left open the remaining cases. In this paper, using central element theory we succeeded in describing the Pierce stalks of the cases 6. and 7..
△ Less
Submitted 31 January, 2020;
originally announced February 2020.
-
Generalized Chain Products of MTL-chains
Authors:
Jose L Castiglioni,
William J. Zuluaga Botero
Abstract:
In this paper we present a different approach to ordinal sums of MTL-chains, as extensions of finite chains in the category of semihoops. In addition, we prove in a very simple way that every finite locally unital MTL-chain can be decomposed as an ordinal sum of archimedean MTL-chains. Furthermore, we introduce Generalized Chain Products of MTL-chains and we show that ordinal sums of locally unita…
▽ More
In this paper we present a different approach to ordinal sums of MTL-chains, as extensions of finite chains in the category of semihoops. In addition, we prove in a very simple way that every finite locally unital MTL-chain can be decomposed as an ordinal sum of archimedean MTL-chains. Furthermore, we introduce Generalized Chain Products of MTL-chains and we show that ordinal sums of locally unital MTL-chains are particular cases of those.
△ Less
Submitted 12 November, 2018;
originally announced November 2018.
-
Gang Confrontation: The case of Medellin (Colombia)
Authors:
Juan D. Botero,
Weisi Guo,
Guillem Mosquera,
Alan Wilson,
Samuel Johnson,
Gisela A. Aguirre-Garcia,
Leonardo A. Pachon
Abstract:
Protracted conflict is one of the largest human challenges that have persistently undermined economic and social progress. In recent years, there has been increased emphasis on using statistical and physical science models to better understand both the universal patterns and the underlying mechanics of conflict. Whilst macroscopic power-law fractal patterns have been shown for death-toll in wars a…
▽ More
Protracted conflict is one of the largest human challenges that have persistently undermined economic and social progress. In recent years, there has been increased emphasis on using statistical and physical science models to better understand both the universal patterns and the underlying mechanics of conflict. Whilst macroscopic power-law fractal patterns have been shown for death-toll in wars and self-excitation models have been shown for roadside ambush attacks, very few works deal with the challenge of complex dynamics between gangs at the intra-city scale. Here, based on contributions to the historical memory of the conflict in Colombia, Medellin's gang-confrontation-network is presented. It is shown that socio-economic and violence indexes are moderate to highly correlated to the structure of the network. Specifically, the death-toll of conflict is strongly influenced by the leading eigenvalues of the gangs' conflict adjacency matrix, which serves a proxy for unstable self-excitation from revenge attacks. The distribution of links based on the geographic distance between gangs in confrontation leads to the confirmation that territorial control is a main catalyst of violence and retaliation among gangs. Additionally, the Boltzmann-Lotka-Volterra (BLV) dynamic interaction network analysis is applied to quantify the spatial embeddedness of the dynamic relationship between conflicting gangs in Medellin, results suggest that more involved and comprehensive models are needed to described the dynamics of Medellin's armed conflict.
△ Less
Submitted 16 December, 2019; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Variability of qualitative variables: A Hilbert space formulation
Authors:
Juan D. Botero,
Leonardo A. Pachón
Abstract:
A new formalism to express and operate on diversity measures of qualitative variables, built in a Hilbert space, is presented. The abstract character of the Hilbert space naturally incorporates the equivalence between qualitative variables and is utilized here to (i) represent the binary character of answers to categories and (ii) introduce a new criterium for choosing between different measures o…
▽ More
A new formalism to express and operate on diversity measures of qualitative variables, built in a Hilbert space, is presented. The abstract character of the Hilbert space naturally incorporates the equivalence between qualitative variables and is utilized here to (i) represent the binary character of answers to categories and (ii) introduce a new criterium for choosing between different measures of diversity, namely, robustness against uncertainty. The full potential of the formulation on a Hilbert space comes to play when addressing the reduction of categories problem, a common problem in data analysis. The present formalism solves the problem by incorporating strategies inspired by mathematical and physical statistics, specifically, it makes use of the concept of partial trace. In solving this problem, it is shown that properly normalizing the diversity measures is instrumental to provide a sensible interpretation of the results when the reduction of categories is performed. Finally, the approach presented here also allows for straightforwardly measuring diversity and performing category reduction in situations when simultaneous categories could be chosen.
△ Less
Submitted 7 May, 2018;
originally announced May 2018.
-
Population polarization dynamics and next-generation social media algorithms
Authors:
N. F. Johnson,
P. Manrique,
M. Zheng,
Z. Cao,
J. Botero,
S. Huang,
N. Aden,
C. Song,
J. Leady,
N. Velasquez,
E. M. Restrepo
Abstract:
We present a many-body theory that explains and reproduces recent observations of population polarization dynamics, is supported by controlled human experiments, and addresses the controversy surrounding the Internet's impact. It predicts that whether and how a population becomes polarized is dictated by the nature of the underlying competition, rather than the validity of the information that ind…
▽ More
We present a many-body theory that explains and reproduces recent observations of population polarization dynamics, is supported by controlled human experiments, and addresses the controversy surrounding the Internet's impact. It predicts that whether and how a population becomes polarized is dictated by the nature of the underlying competition, rather than the validity of the information that individuals receive or their online bubbles. Building on this framework, we show that next-generation social media algorithms aimed at pulling people together, will instead likely lead to an explosive percolation process that generates new pockets of extremes.
△ Less
Submitted 16 December, 2017;
originally announced December 2017.
-
On finite MTL-algebras that are representable as poset products of archimedean chains
Authors:
J. L. Castiglioni,
W. J. Zuluaga Botero
Abstract:
We obtain a duality between certain category of finite MTL-algebras and the category of finite labeled trees. In addition we prove that certain poset products of MTL-algebras are essentialy sheaves of MTL-chains over Alexandrov spaces. Finally we give a concrete description for the studied poset products in terms of direct products and ordinal sums of finite MTL-algebras.
We obtain a duality between certain category of finite MTL-algebras and the category of finite labeled trees. In addition we prove that certain poset products of MTL-algebras are essentialy sheaves of MTL-chains over Alexandrov spaces. Finally we give a concrete description for the studied poset products in terms of direct products and ordinal sums of finite MTL-algebras.
△ Less
Submitted 10 August, 2017;
originally announced August 2017.
-
Developmental tendencies in the Academic Field of Intellectual Property through the Identification of Invisible Colleges
Authors:
Guadalupe Palacios-Núñez,
Gabriel Vélez-Cuartas,
Juan D. Botero
Abstract:
The emergence of intellectual property as an academic issue opens a big gate to a cross-disciplinary field. Different disciplines start a dialogue in the framework of the international multilateral treaties in the early 90's. As global economy demands new knowledge on intellectual property, Science grows at its own pace. However, the degree of consolidation of cross-disciplinary academic communiti…
▽ More
The emergence of intellectual property as an academic issue opens a big gate to a cross-disciplinary field. Different disciplines start a dialogue in the framework of the international multilateral treaties in the early 90's. As global economy demands new knowledge on intellectual property, Science grows at its own pace. However, the degree of consolidation of cross-disciplinary academic communities is not clear. In order to know how closely related are these communities, this paper proposes a mixed methodology to find invisible colleges in the production about intellectual property. The articles examined in this paper were extracted from Web of Science. The analyzed period was from 1994 to 2016, taking into account the signature of the agreement on Trade-Related Aspects of Intellectual Property Rights in the early 90's. A total amount of 1580 papers were processed through co-citation network analysis. An especial technique, which combine algorithms of community detection and defining population of articles through thresholds of shared references, was applied. In order to contrast the invisible colleges that emerged with the existence of formal institutional relations, it was made a qualitative tracking of the authors with respect to their institutional affiliation, lines of research and meeting places. Both methods show that the subjects of interest can be grouped into 13 different issues related to intellectual property field. Even though most of them are related to Laws and Economics, there are weak linkages between disciplines which could indicate the construction of a cross-disciplinary field.
△ Less
Submitted 11 December, 2017; v1 submitted 8 June, 2017;
originally announced June 2017.
-
Open System Perspective on Incoherent Excitation of Light Harvesting Systems
Authors:
Leonardo A. Pachon,
Juan D. Botero,
Paul Brumer
Abstract:
The nature of excited states of open quantum systems produced by incoherent natural thermal light is analyzed based on a description of the generator of the dynamics. Natural thermal light is shown to generate long-lasting coherent dynamics because of (i) the super-Ohmic character of the radiation, and (ii) the absence of pure dephasing dynamics. In the presence of an environment, the long-lasting…
▽ More
The nature of excited states of open quantum systems produced by incoherent natural thermal light is analyzed based on a description of the generator of the dynamics. Natural thermal light is shown to generate long-lasting coherent dynamics because of (i) the super-Ohmic character of the radiation, and (ii) the absence of pure dephasing dynamics. In the presence of an environment, the long-lasting coherences induced by suddenly turned-on incoherent light dissipate and stationary coherences are established. As a particular application, dynamics in a subunit of the PC-645 light-harvesting complex is considered where it is further shown that aspects of the energy pathways landscape depend on the nature of the exciting light and number of chromophores excited. Specifically, pulsed laser and natural broadband incoherent excitation induce significantly different energy transfer pathways. In addition, we discuss differences in perspective associated with the eigenstate vs site basis, and note an important difference in the phase of system coherences when coupled to blackbody radiation or when coupled to a phonon background. Finally, an Appendix contains an open systems example of the loss of coherence as the turn on time of the light assumes natural time scales.
△ Less
Submitted 4 September, 2017; v1 submitted 21 March, 2017;
originally announced March 2017.
-
A representation theorem for integral rigs and its applications to residuated lattices
Authors:
J. L. Castiglioni,
M. Menni,
W. J. Zuluaga Botero
Abstract:
We prove that every integral rig in Sets is (functorially) the rig of global sections of a sheaf of really local integral rigs. We also show that this representation result may be lifted to residuated integral rigs and then restricted to varieties of these. In particular, as a corollary, we obtain a representation theorem for pre-linear residuated join-semilattices in terms of totally ordered fibe…
▽ More
We prove that every integral rig in Sets is (functorially) the rig of global sections of a sheaf of really local integral rigs. We also show that this representation result may be lifted to residuated integral rigs and then restricted to varieties of these. In particular, as a corollary, we obtain a representation theorem for pre-linear residuated join-semilattices in terms of totally ordered fibers. The restriction of this result to the level of MV-algebras coincides with the Dubuc-Poveda representation theorem.
△ Less
Submitted 20 October, 2015;
originally announced October 2015.
-
Examples of Synchronization in Discrete Chaotic Systems
Authors:
Juan C. Botero,
Jean-Jacques E. Slotine
Abstract:
This paper presents an application of partial contraction analysis to the study of global synchronization in discrete chaotic systems. Explicit sufficient conditions on the coupling strength of networks of discrete oscillators are derived. Numerical examples and applications to simple systems are presented. Previous researches have shown numerically that the systems under study, when arranged in…
▽ More
This paper presents an application of partial contraction analysis to the study of global synchronization in discrete chaotic systems. Explicit sufficient conditions on the coupling strength of networks of discrete oscillators are derived. Numerical examples and applications to simple systems are presented. Previous researches have shown numerically that the systems under study, when arranged in a network, exhibits rich and complex patterns that can dynamically change in response to variations in the environment. We show how this ``adaptation'' process strongly depends on the coupling characteristics of the network. Other potential applications of synchronized chaotic oscillators are discussed.
△ Less
Submitted 28 September, 2006; v1 submitted 27 September, 2006;
originally announced September 2006.