Constructing Node-Disjoint Paths in Enhanced Pyramid Networks
|
|
- Archibald Poole
- 5 years ago
- Views:
Transcription
1 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks Hsien-Jone Hsieh 1 and Dyi-Rong Duh 2, * 1,2 Department of Computer Science and Information Engineering National Chi Nan University, Puli, Nantou Hsien, Taiwan s @ncnu.edu.tw 2 drduh@ncnu.edu.tw Abstract. Chen et al. in 2004 proposed a new hierarchy structure, called the enhanced pyramid network (EPM, for short), by replacing each mesh in a pyramid network (PM, for short) with a torus. Recently, some topological properties and communication on the EPMs have been investigated or derived. Their results have revealed that an EPM is an attractive alternative to a PM. This study investigates the node-disjoint paths between any two distinct nodes and the upper bound of the ω-wide-diameter of an EPM. This result shows that the EPMs have smaller ω-wide-diameters than the PMs. Keywords: Enhanced pyramid networks, pyramid networks, fault-tolerance, wide diameter, node-disjoint paths, container, interconnection networks. 1 Introduction Pyramid networks (PMs, for short) have conventionally been adopted for image processing [6, 10], computer vision [6], parallel computing [5] and network computing [1]. A PM is a hierarchy structure based on meshes. Recently, there are many researches on the PMs, such as Hamiltonicity [2, 12, 16], pancyclicity [2, 16], fault tolerance [1], routing [7, 15], and broadcasting [8]. Note that the node degree of a PM is from 3 to 9, and both its node connectivity and edge connectivity are 3 [1, 16]. For establishing a PM in expandable VLSI chips, each of its nodes should be configured as a 9-port component or too many different components should be designed and fabricated. In other words, those nodes of degree less than 9 have unused ports. These ports can be used for further expansion or I/O communication. To modify a wellknown network a little bit such that the resulting network has better topological properties. Chen et al. [4] in 2004 proposed a variant network of the PM, named the enhanced pyramid network, by reconnecting some of the unused ports. An enhanced pyramid network (EPM, for short), suggested by Chen et al. [4], is a supergraph of a pyramid network with the same node set. In other words, a PM is a spanning subgraph of an EPM. The EPM can be constructed by replacing each mesh of the PM with a torus. Therefore, the hardware cost of the EPM would be slightly more expensive than the PM because some extra edges have to be added in the VLSI * Corresponding author. C. Jesshope and C. Egan (Eds.): ACSAC 2006, LNCS 4186, pp , Springer-Verlag Berlin Heidelberg 2006
2 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks 381 chips. Some topological properties and communication on the EPMs, including the number of nodes/edges, node connectivity, edge connectivity, diameter, routing algorithm, and a simple broadcasting algorithm, have been determined or derived [4]. Their results show that the EPM has better topological properties than the PM such as larger node/edge connectivity and better fault-tolerance ability. The topological structure of an interconnection network (network, for short) can be modeled by a graph [3, 10, 12, 13, 17]. The vertices and edges of a graph respectively correspond to nodes and edges of an interconnection network. The length of a path is the number of edges, which the path passes through. Given two nodes s and t in a network G, the distance between them, denoted by d G (s, t), is the length of their shortest path. The diameter of a network G, denoted by d(g), is defined as the maximum of d G (s, t) among all pairs of distinct nodes in G. A ω-wide container, denoted by C ω (s, t), is a set of node-disjoint paths of width ω. The length of C ω (s, t), denoted by l(c ω (s, t)), is the length of the longest path in C ω (s, t). The total length of C ω (s, t), denoted by l T (C ω (s, t)), is the sum of the lengths of the ω paths in the C ω (s, t). The ω- wide distance between s and t in G, denoted by d ω (s, t), is minimum among all l(c ω (s, t)). The ω-wide diameter of G, written as d ω (G), is the maximum of ω-wide distance among all pairs of distinct nodes in G. Obviously, d G (s, t) d ω (s, t), d(g) d ω (G), and d ω (s, t) d ω (G). Parallel transmission is a one-to-one communication in G such that the message can be transmitted from the source node to the destination node via a container between them to enhance the transmission performance and/or improve fault tolerance ability of the communication. Notably, the parallel transmission delay is bounded above by d ω (G). This work first constructs a ω-wide container between any two distinct nodes in an EPM and then based on the constructed containers the upper bound of the ω-wide diameter of the EPM can be determined. The rest of this paper is organized as follows. Section 2 describes the structure and terms of an EPM, and some notations and definitions in graphs. Section 3 first constructs a ω-wide container between any two distinct nodes in an EPM and then determines the upper bound of the ω-wide diameter of the EPM. Finally, the conclusion is made in Section 4. 2 Preliminaries This section first formally describes the structures of the PM and EPM and then defines some notations and definitions in graphs that are used in the rest of this paper. The node set of a mesh M(m, n) is V(M(m, n)) = {(x, y) 0 x<m, 0 y<n}. Two nodes (x 1, y 1 ) and (x 2, y 2 ) are joined by an edge iff x 1 x 2 + y 1 y 2 = 1, where (x 1, y 1 ) and (x 2, y 2 ) belong to V(M(m, n)). The n-layer pyramid network, denoted by PM[n], is a hierarchy structure based on meshes. The node set of PM[n] is V(PM[n]) = {(k; x, y) 0 k n, 0 x, y<2 k }, where n 0. Note that the node (0; 0, 0) is the PM[0]. A node (k; x, y) V(PM[n]) is said to be a node at layer k with the coordinate (x, y). The nodes at layer k are connected as a M(2 k, 2 k ). The EPM is a conjunction of a quad tree and tori. The node set of a torus T(m, n) is V(T(m, n)) = {(x, y) 0 x<m, 0 y<n}. Let {u, v} denote an edge connecting nodes u and v of a network. The edge set E(T(m, n)) = E(M(m, n)) {{(x, 0), (x, n 1)}, {(0, y), (m 1, y)} 0 x<m, 0 y<n}. In other words, an EPM can be constructed by replacing
3 382 H.-J. Hsieh and D.-R. Duh each mesh of a PM with a torus. The nodes at layer k are connected as a T(2 k, 2 k ). Notice that a M(2, 2) is also a T(2, 2) in some sense. An EPM of n layers is denoted by EPM[n]. The node set of EPM[n] is V(EPM[n]) = {(k; x, y) 0 k n, 0 x, y<2 k }, where n 2. In general, the node (0; 0, 0) is called the apex of EPM[n] (apex, for short). For ease of discussion, we define some symbols in the following. For a node v = (k; x, y) at layer 1 k n in EPM[n], the coordinate of its parent, denoted by P(v), is given by (k 1; x/2, y/2 ). Conversely, v is a child of P(v). Moreover, each node in EPM[n] has a parent (four children) except the apex (the nodes at layer n). More generally, we recursively define the h th ancestor of v, denoted by P h (v), as follows: (1) h=1, P 1 (v) = P(v) is simply the parent of v. (2) h>1, P h (v) = (k h; x/2 h, y/2 h ) is the parent of P h 1 (v). For a node v = (k; x, y) at layer 0 k<n in EPM[n], the coordinates of its four children are given by (k+1; 2x, 2y), (k+1; 2x+1, 2y), (k+1; 2x, 2y+1), and (k+1; 2x+1, 2y+1). Conversely, v is the parent of its children. For simplicity, let (a) b denote a modulo b. For a node v = (k; x, y) at layer 2 k n in EPM[n], (k; (x+1) 2 k, y), (k; x, (y+1) 2 k), (k; (x 1) 2 k, y), and (k; x, (y 1) 2 k) are the coordinates of its four siblings, and they are also denoted by S 0 (v), S 1 (v), S 2 (v), and S 3 (v), respectively. 3 Node-Disjoint Paths Before describing how to construct ω node-disjoint paths between any pair of nodes in EPM[n], some lemmas are first presented. These lemmas related to how to routing paths in EPM[n] are stated in Subsection 3.1. By the aid of these lemmas, a shortest path between any pair of nodes is first constructed and then the other ω 1 paths can be built based on the shortest path. Subsections 3.2 describes how to construct these ω paths, where 2 ω Routing in EPM[n] Given two paths P 1 and P 2, let P 1 P 2 denote joining P 2 to the tail of P 1. Let P G (u, v) denote a path between two nodes u and v in a network G. Let l(p) denote the length of a path P. Some results derived by Chen et al. [4] are described first. Lemma 1 [4]. The node connectivity of EPM[n] is 4. By Menger s theorem [17] and Lemma 1, there is a 4-wide container between any pair of nodes in EPM[n]. Lemma 2 [4]. If d T(2 k, 2 k )(u, v) < 2+d T(2 k 1, 2 k 1 )(P(u), P(v)), d T(2 k, 2 k )(u, v) = d EPM[n] (u, v). Lemma 3 [4]. Given two nodes u=(k u k; x u, y u ) and v=(k v k; x v, y v ), 0 k v k u <n, there is a shortest P EPM[n] (u, v) having the form as P EPM[n] (u, P k u k v +i (u)) P T(2 k, 2 k )(P k u k v +i (u), P i (v)) P EPM[n] (P i (v), v), where 0 i<k v.
4 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks 383 By Lemma 3, a shortest path P EPM[n] (u, v) can be constructed and it is the first constructed path when a container is built. Since a shortest path between any two nodes has been established, the diameter of EPM[n] can be easily obtained and stated in the following lemma. Lemma 4 [4]. d(epm[n]) = 2n, where n 2. After constructing a ω-wide container between any pair of nodes in a network, the upper bound of the ω-wide diameter of the network can be determined as the maximum length among the constructed ω-wide containers. The first path P 1 (s, t), constructed by Lemma 3, is shortest and its length is at most d(epm[n]) = 2n. Then the other ω 1 paths P 2,..., P ω, can be constructed based on P 1, they disjoint to each other and also disjoint to P 1. Notably, the other ω 1 paths are never shorter than P 1, and then a method is proposed to share P 1 with the others, in order to shorten the length of the ω-wide container. Given two nodes u and v at layer k u and k v of EPM[n], respectively. They have at most four siblings S i (u) and S j (v), respectively, where 0 i, j 3. P(u) (P(v)) also has at most four siblings S i (P(u)) (S j (P(v))), 0 i (j) 3. Let Q ij (u, v) denote a path from S i (u) to S j (v) along siblings of P 1 (u, v). We can recursively construct Q ij (u, v)as follows: (1) v is P(u): Q ii (u, P(u)) is a shortest path from S i (u) to S i (P(u)) excluding P 1 (u, P(u)). (2) v is P h (u), where 2 h k u 2: Q ii (u, P h (u)) = Q ii (u, P h 1 (u)) Q ii (P h 1 (u)), P h (u)). Note that Q ii (u, P h (u)) might not be a shortest path from S i (u) to S i (P h (u)) in EPM[n] excluding P 1 (u, P h (u)). (3) Let w=(k w ; x w, y w )=P k u k w (u), z=(k z ; x z, y z )=P k v k z (v), if 2 k w =k z min{k u, k v }: Q ij (u, v) = Q ii (u, w) P T(2 kw, 2 kw) (S i (w), S j (z)) Q jj (v, z). Obviously, there are 4 Q ii (u, P(u))s can be constructed. For each Q ii (u, P(u)), it is represented by π 1 (π 2 ) if l(q ii (u, P(u))) = 1 (2). l(q ii (u, P(u)))+l(Q mm (u, P(u))) = 3, where m is (i+2) 4. Also, if Q ii (u, P h (u)) has h 1 π 1 s and h 2 = h h 1 π 2 s, then Q mm (u, P h (u)) has h 2 π 1 s and h 1 π 2 s, where m is (i+2) 4. Therefore, l(q ii (u, P h (u)))=h+h 2, l(q mm (u, P h (u)))=h+h 1, and l(q ii (u, P h (u)))+l(q mm (u, P h (u))) = 3h. The shortest one of Q ii (u, P h (u)) and Q mm (u, P h (u)) is denoted by Q S (u, P h (u)). Otherwise, the longest of them is denoted by Q L (u, P h (u)). Therefore, l(q S (u, P h (u))) 3h/2 = h+ h/2, and l(q L (u, P h (u))) 2h. That is, there are at most h/2 (h) π 2 s in a Q S (u, P h (u)) (Q L (u, P h (u))). Q S is also denoted as Q SE (Q SO ) if i is even (odd). 3.2 ω-wide Container This subsection constructs a ω-wide container between any pair of nodes in EPM[n]. For ease of discussion, let s=(k s ; x s, y s ), t=(k t ; x t, y t ), w=(k w ; x w, y w )=P k s k w (s), z=(k z ; x z, y z )=P k t k z (t) be four nodes in EPM[n] for n 2, where 2 k w =k z min{k s, k t }. Lemma 5 [9]. l(q S (s, w)+d T(2 2, 2 2 )(S i (w), S j (z))+l(q S (z, t) 2n+2 n/2 4, l(q S (s, w)+d T(2 2, 2 2 )(S i (w), S j (z))+l(q L (z, t) 3n+ n/2 5, and l(q L (s, w)+d T(2 2, 2 2 )(S i (w), S j (z))+l(q S (z, t) 3n+ n/2 5.
5 384 H.-J. Hsieh and D.-R. Duh Lemma 6. l(c 2 (s, t)) and l(c 3 (s, t)) 2n+2 n/2 2, l(c 4 (s, t)) 3n+ n/2 3, l T (C 2 (s, t)) 4n+2 n/2 2, l T (C 3 (s, t)) 6n+4 n/2 4, and l T (C 4 (s, t)) 10n+2 n/2 6. Proof. For ω-wide container, 2 ω 4, by Lemma 3 and Lemma 4, a shortest path P 1 (s, t) can be first constructed and l(p 1 (s, t)) 2n. Second, a Q ij (s, t) is constructed as the second path P 2 (s, t) = {s, S i (s)} Q SE (s, w) P T(2 2, 2 2 )(S i (w), S j (z)) Q SE (z, t) {S j (t), t}. By Lemma 5, l(p 2 (s, t)) 2n+2 n/2 2. Thus, l(c 2 (s, t)) 2n+2 n/2 2 and l T (C 2 (s, t)) 4n+2 n/2 2. A C 3 (s, t) can be constructed by adding the third path P 3 (s, t)={s, S i (s)} Q SO (s, w) P T(2 2, 2 2 )(S i (w), S j (z)) Q SO (z, t) {S j (t), t} into the original C 2 (s, t). l(p 3 (s, t)) 2n+2 n/2 2. Hence, l(c 3 (s, t)) 2n+2 n/2 2 and l T (C 3 (s, t)) 6n+4 n/2 4. For constructing a C 4 (s, t), P 3 (s, t)={s, S i (s)} Q SO (s, P n 2 (s)) P T(2 2, 2 2 )(S(P n 2 (s)), S(P n 2 (t))) Q L (P n 2 (t), t) {S j (t), t} and P 4 (s, t)={s, S(s)} Q L (s, P n 2 (s)) P T(2 2, 2 2 )(S(P n 2 (s)), S(P n 2 (t))) Q SO (P n 2 (t), t) {S j (t), t}. By Lemma 5, both l(p 3 (s, t)) and l(p 4 (s, t)) 3n+ n/2 3, and l T (C 4 (s, t)) 10n+2 n/2 6 is maximum. Note that all P T(2 2, 2 2 )s disjoint to each other. The C ω (s, t) constructed in the proof of Lemma 6 is too long and l(p ω (s, t))s l(p 1 (s, t)) are too large, for 2 ω 4. A C ω (s, t) can be shortened by rerouting its paths such that each path shares some part of the P 1 (s, t). The X(P EPM[n] (u, P 2 (u)), Q ii (u, P 2 (u))) is an operation to reroute the two node-disjoint paths P EPM[n] (u, P 2 (u)) and Q ii (u, P 2 (u)) in EPM[n] by using some nodes near to them, where u V(P 1 (s, P n 2 (s)). After rerouting, one path from u to S i (P 2 (u)) is denoted by R 1, the other path from S i (u) to P 2 (u) is denoted by R 2, and they are still disjoint to each other. The rerouting would little increase the sum of the lengths of the paths. l(r 1 ) l(p EPM[n] (u, P 2 (u))) and l(r 2 ) l(q ii (u, P 2 (u))) are represented by c 1 and c 2, respectively. The main idea of rerouting is to share the shortest path of the original container with the other paths such that the longest path in C ω (u, v) is only one longer than the shortest path and then l(c ω (u, v)) can be minimized. Lemma 7. X(P EPM[n] (u, P 2 (u)) and Q ii (u, P 2 (u))) can be completed within 2 layers, and c 1 =2, c 2 = 0 or 1. Proof. Given a node u=(k; x, y), there are 4 Q ii (u, P 2 (u)))s. Without lost of generality, only X(P EPM[n] (u, P 2 (u)), Q 00 (S i (u), S i (P 2 (u)))) is discussed. Let x=(x k 1 x k 2 x 2 0x 0 ) 2 in binary, and the bit 0 of y is y 0, Q 00 (P(u), P 2 (u)) is a π 2. Hence, P(u)=(k 1; (x k 1 x k 2 x 2 0) 2, y/2 ), P 2 (u)=(k 2; (x k 1 x k 2 x 2 ) 2, y/4 ), H 0 (u)=(k; (x k 1 x k 2 x 2 10) 2, y), H 0 (P(u))=(k 1; (x k 1 x k 2 x 2 1) 2 +1, y/2 ), S 0 (P 2 (u))=(k 2; (x k 1 x k 2 x 2 ) 2 +1, y/4 ), a=(k; 2 x/2 +2, 2 y/2 +1), and b=(k; 2 x/2 +2, 2 y/2 +2). Before rerouting, l(p 1 (u, P 2 (u))) = 2 and l(q 00 (u, P 2 (u))) = 4 x 0. In order to keep disjoint to the other Q ii (u, P 2 (u)))s, after rerouting, R 2 must be P T(2 k, 2 k )(S 0 (u), a) {a, b} P(b, P 2 (u)). l(r 1 ) = 4 and l(r 2 ) = 5 x 0 y 0. Hence, c 1 = 4 2 = 2, c 2 = (5 x 0 y 0 ) (4 x 0 )=1 y 0 = 0 or 1. Theorem 8. d 2 (EPM[n]) 2n+ n/2 1, for n 2. d 3 (EPM[n]) 2n+ (2n+2)/3 (2n+ 2n/3 ) if n is even (odd), for n 4. d 4 (EPM[n]) 2n+ 3n/4 (2n+ (3n 1)/4 ) if n is even (odd), for n 4. Proof. This theorem can be proved by rerouting the C ω (s, t) constructed in the proof of Lemma 6.
6 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks 385 Case 1. (for C 2 (s, t)): Only the longest C 2 (s, t) should be considered. After reconstruction, the new paths are P' 1 (s, t)=p EPM[n] (s, w) P T(2 2, 2 2 )(w, S j (z)) Q jj (z, t) {S j (t), t} and P' 2 (s, t)={s, S i (s)} Q ii (s, w) P T(2 2, 2 2 )(S i (w), z) P EPM[n] (z, t). The lengths of P' 1 (s, t) and P' 2 (s, t) are at most 2n+ n/2 1. Case 2. (for C 3 (s, t)): Assume there are h s and h t π 2 s in Q SE (s, w) and Q SO (t, z), respectively, the lengths of h s and h t are at most (n 2)/2. Let h sx = 2 h s /3 1, h tx = 2 h t /3 1. After applying X(P EPM[n] (P hsx 2 (s), P hsx (s)), Q SE (P hsx 2 (s), P hsx (s))) and X(P EPM[n] (P htx 2 (t), P htx (t)), Q SO (P htx 2 (t), P htx (t))), the new paths are P' 1 (s, t), P' 2 (s, t), and P' 3 (s, t) with lengths l' 1, l' 2, and l' 3, respectively. By Lemma 6 and Lemma 7, l' 1, l' 3 2n+ (2n+2)/3 (2n+ 2n/3 ) and l' 2 2n+ (2n+2)/3 (2n+ 2n/3 ) if n is even (odd), for n 4. Case 3. (for C 4 (s, t)): After applying 3 times of rerouting, the new paths are P' 1 (s, t), P' 2 (s, t), P' 3 (s, t), and P' 4 (s, t) with lengths l' 1, l' 2, l' 3, and l' 4, respectively. Similarly, l' 1, l' 4 2n+ 3n/4 (2n+ (3n 1)/4 ), l' 2, l' 3 2n+ 3n/4 (2n+ (3n 1)/4 ) if n is even (odd), for n 4. It is easy to check that d 2 (EPM[1]) = d 3 (EPM[1]) = 2, d 3 (EPM[2]) = d 4 (EPM[2]) = 4, d 3 (EPM[3]) = 6, and d 4 (EPM[3]) = 7. 4 Concluding Remarks This work has revealed that d 2 (EPM[n]) 2n+ n/2 1, for n 2, d 3 (EPM[n]) 2n+ (2n+2)/3 (2n+ 2n/3 ), n is even (odd), for n 4, and d 4 (EPM[n]) 2n+ 3n/4 (2n+ (3n 1)/4 ), n is even (odd), for n 4. In [1], d 2 (PM[n]) =3n 1, and d 3 (PM[n]) 10n/3+6. Therefore, an EPM has smaller ω-wide-diameter than the pertinent PM. The ω-path transmission delay of a network is bounded below by its ω-wide diameter. The lower bound of d ω (EPM[n]) is still unknown. We are going to determine the lower bound of d ω (EPM[n]) and we claim that it is equal to its upper bound. If this is true, d ω (EPM[n]) can be eventually obtained. Acknowledgments. The authors would like to thank the National Science Council of the Republic of China for financially supporting this research under Contract No. NSC E References 1. Cao, F., Du, D.-Z., Hsu, D. F., Teng, S.-H.: Fault tolerance properties of pyramid networks. IEEE Transactions on Computers 48 (1999) Chen, Y.-C.: Pancycles and Hamiltonian connectedness of the pyramid network with one node or one edge fault. Master Report, Department of Computer Science and Information Engineering, National Chi Nan University (2003) 3. Chen, W.-M. Chen, G.-H. Hsu, D.-F.: Generalized diameters of the mesh of trees. Theory of Computing Systems 37 (2004)
7 386 H.-J. Hsieh and D.-R. Duh 4. Chen, Y.-C., Duh, D.-R., Hsieh, H.-J.: On the enhanced pyramid network. Proc. Int. Conf. on Parallel and Distributed Processing Techniques and Applications. Monte Carlo Resort, Las Vegas, Nevada, USA (2004) Cinque, L., Bongiovanni, G.: Parallel prefix computation on a pyramid computer. Pattern Recognition Letter 16 (1995) Cipher, R., Sanz, J. L. C.: SIMD architectures and algorithms for image processing and computer vision. IEEE Transactions on Acoustic, Speech, and Signal Processing 37 (1989) Hsieh, H.-J., Duh, D.-R., Shiau, J.-S.: A constant time shortest-path routing algorithm for pyramid networks. Proc. Int. Conf. on Parallel and Distributed Computing and Systems. MIT Cambridge, MA, USA (2004) Hsieh, H.-J., Duh, D.-R.: An Optimal Broadcasting Algorithm for Pyramid Networks. Proc. the 9th World Multiconference on Systemics, Cybernetics and Informatics. Orlando, Florida, USA (2005) Hsieh, H.-J., Duh, D.-R.: Containers in Enhanced Pyramid Networks. Technical Report, (2006) 10. Hsu, D. F.: Graph containers, information delay, and network vulnerability. Proc. Int. Conf. on Advanced Information Networking and Applications, Vol. 1. (2004) Jenq, J. F., Sahni, S.: Image shrinking and expanding on a pyramid. IEEE Transactions on Parallel and Distributed Systems 4 (1993) Omura, S., H. Zheng, Wada, K.: Neighborhood broadcasting in undirected de Bruijn and Kautz networks. IEICE Transactions on Information and Systems E-88-D (2005) Park, J.-H.: Two-dimensional ring-banyan network: a high-performance fault-tolerant switching network, Electronics Letters 42 (2006) Sarbazi-Azad, H., Ould-Khaoua, M., Mackenzie, L. M.: Algorithmic construction of Hamiltonians in pyramids. Information Processing Letters. Vol. 80. (2001) Shen, Z.: A routing algorithm for pyramid structures, Proc. ACM Symposium on Applied Computing, Las Vegas, Nevada, USA (2001) Wu, R.-Y.: Hamiltonicity of pyramid networks. Master Report, Department of Computer Science and Information Engineering, National Chi Nan University (2001) 17. Xu, J.: Topological structure and analysis of interconnection networks. Kluwer, Netherlands, (2002)
An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs
Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.075 An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs Jung-Hwan Chang*
More informationBipanconnectivity of Cartesian product networks
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 46 (2010), Pages 297 306 Bipanconnectivity of Cartesian product networks You Lu Jun-Ming Xu Department of Mathematics University of Science and Technology of
More informationPancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network
Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Jung-Sheng Fu Takming College, Taipei, TAIWAN jsfu@mail.takming.edu.tw Gen-Huey Chen Department of Computer Science and Information
More informationHybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model
Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis
More informationTheoretical Computer Science. Fault-free longest paths in star networks with conditional link faults
Theoretical Computer Science 410 (2009) 766 775 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Fault-free longest paths in star networks
More informationHyper-Panconnectedness of the Locally Twisted Cube
Hyper-Panconnectedness of the Locally Twisted Cube Tzu-Liang Kung Department of Computer Science and Information Engineering Asia University, Wufeng, Taichung tlkung@asia.edu.tw Lih-Hsing Hsu and Jia-Jhe
More informationAlgebraic Properties and Panconnectivity of Folded Hypercubes
Algebraic Properties and Panconnectivity of Folded Hypercubes Meijie Ma a Jun-Ming Xu b a School of Mathematics and System Science, Shandong University Jinan, 50100, China b Department of Mathematics,
More informationMutually Independent Hamiltonian Paths in Star Networks
Mutually Independent Hamiltonian Paths in Star Networks Cheng-Kuan Lin a, Hua-Min Huang a, Lih-Hsing Hsu b,, and Sheng Bau c, a Department of Mathematics National Central University, Chung-Li, Taiwan b
More informationEdge-pancyclicity of Möbius cubes
Information Processing Letters 96 (25) 136 14 www.elsevier.com/locate/ipl Edge-pancyclicity of Möbius cubes Min Xu a,b, Jun-Ming Xu b, a Institute of Applied Mathematics, Academy of Mathematics and Systems
More informationConstructing Independent Spanning Trees on Locally Twisted Cubes in Parallel
Constructing Independent Spanning Trees on Locally Twisted Cubes in Parallel Yu-Huei Chang Jinn-Shyong Yang, Jou-Ming Chang Department of Information Management, National Taipei College of Business, Taipei,
More informationDistributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars
Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars Fu Hsing Wang 1 Jou Ming Chang 2 Yue Li Wang 1, 1 Department of Information Management, National Taiwan
More informationImproving the Height of Independent Spanning Trees on Folded Hyper-Stars
Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Sih-Syuan Luo 1 Jinn-Shyong Yang 2 Jou-Ming Chang 1, An-Hang Chen 1 1 Institute of Information and Decision Sciences, National Taipei
More informationOn Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes
American Journal of Applied Sciences 5(11): 1605-1610, 2008 ISSN 1546-9239 2008 Science Publications On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes 1 Ioana Zelina, 2 Grigor Moldovan
More informationPARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes
Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Ruo-Wei Hung, Shang-Ju Chan, and Chien-Chih Liao Abstract The presence of edge-disjoint Hamiltonian
More informationConquering Edge Faults in a Butterfly with Automorphisms
International Conference on Theoretical and Mathematical Foundations of Computer Science (TMFCS-0) Conquering Edge Faults in a Butterfly with Automorphisms Meghanad D. Wagh and Khadidja Bendjilali Department
More informationNational Taiwan University Taipei, 106 Taiwan 2 Department of Computer Science and Information Engineering
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 907-919 (007) Short Paper Improved Modulo ( n + 1) Multiplier for IDEA * YI-JUNG CHEN 1, DYI-RONG DUH AND YUNGHSIANG SAM HAN 1 Department of Computer Science
More informationarxiv: v1 [math.co] 27 Apr 2016
arxiv:1604.07895v1 [math.co] 27 Apr 2016 Fault-tolerance of balanced hypercubes with faulty vertices and faulty edges Mei-Mei Gu Department of Mathematics, Beijing Jiaotong University, Beijing 100044,
More informationON THE EDGE-HYPER-HAMILTONIAN LACEABILITY OF BALANCED HYPERCUBES
Discussiones Mathematicae Graph Theory 36 (2016) 805 817 doi:10.7151/dmgt.1908 ON THE EDGE-HYPER-HAMILTONIAN LACEABILITY OF BALANCED HYPERCUBES Jianxiang Cao, Minyong Shi School of Computer Science Communication
More informationAll Good (Bad) Words Consisting of 5 Blocks
Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series
More informationConstruction of Vertex-Disjoint Paths in Alternating Group Networks
Construction of Vertex-Disjoint Paths in Alternating Group Networks (April 22, 2009) Shuming Zhou Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian 350108, P.R.
More informationCycles in the cycle prefix digraph
Ars Combinatoria 60, pp. 171 180 (2001). Cycles in the cycle prefix digraph F. Comellas a, M. Mitjana b a Departament de Matemàtica Aplicada i Telemàtica, UPC Campus Nord, C3, 08034 Barcelona, Catalonia,
More informationAdding Relations in the Same Level of a Linking Pin Type Organization Structure
Adding Relations in the Same Level of a Linking Pin Type Organization Structure Kiyoshi Sawada Abstract This paper proposes two models of adding relations to a linking pin type organization structure where
More informationMAXIMAL VERTEX-CONNECTIVITY OF S n,k
MAXIMAL VERTEX-CONNECTIVITY OF S n,k EDDIE CHENG, WILLIAM A. LINDSEY, AND DANIEL E. STEFFY Abstract. The class of star graphs is a popular topology for interconnection networks. However it has certain
More informationOn Detecting Multiple Faults in Baseline Interconnection Networks
On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,
More informationEmbed Longest Rings onto Star Graphs with Vertex Faults
Embed Longest Rings onto Star Graphs with Vertex Faults Sun-Yuan Hsieh, Gen-Huey Chen Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, ROC and Chin-Wen
More informationBiswapped Networks and Their Topological Properties
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Biswapped Networks and Their Topological Properties Wenjun Xiao, Weidong
More informationEnumeration of subtrees of trees
Enumeration of subtrees of trees Weigen Yan a,b 1 and Yeong-Nan Yeh b a School of Sciences, Jimei University, Xiamen 36101, China b Institute of Mathematics, Academia Sinica, Taipei 1159. Taiwan. Theoretical
More informationPARALLEL computing is important for speeding up
Two Edge-Disjoint Hamiltonian Cycles and Two-Equal Path Partition in Augmented Cubes Ruo-Wei Hung and Chien-Chih Liao Abstract The n-dimensional hypercube networ Q n is one of the most popular interconnection
More informationInformation Theory and Statistics Lecture 2: Source coding
Information Theory and Statistics Lecture 2: Source coding Łukasz Dębowski ldebowsk@ipipan.waw.pl Ph. D. Programme 2013/2014 Injections and codes Definition (injection) Function f is called an injection
More informationComputing and Communicating Functions over Sensor Networks
Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]
More informationGray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ
Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Myung M. Bae Scalable POWERparallel Systems, MS/P963, IBM Corp. Poughkeepsie, NY 6 myungbae@us.ibm.com Bella Bose Dept. of Computer Science Oregon
More informationBCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs
This paper was presented as part of the Mini-Conference at IEEE INFOCOM 011 BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs Deke Guo, Tao Chen, Dan Li, Yunhao Liu,
More informationα-acyclic Joins Jef Wijsen May 4, 2017
α-acyclic Joins Jef Wijsen May 4, 2017 1 Motivation Joins in a Distributed Environment Assume the following relations. 1 M[NN, Field of Study, Year] stores data about students of UMONS. For example, (19950423158,
More informationInformation Theory with Applications, Math6397 Lecture Notes from September 30, 2014 taken by Ilknur Telkes
Information Theory with Applications, Math6397 Lecture Notes from September 3, 24 taken by Ilknur Telkes Last Time Kraft inequality (sep.or) prefix code Shannon Fano code Bound for average code-word length
More informationARTICLE IN PRESS Theoretical Computer Science ( )
Theoretical Computer Science ( ) Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Conditional matching preclusion for hypercube-like
More informationOne-to-many node-disjoint paths in (n,k)-star graphs
One-to-many node-disjoint paths in (n,k)-star graphs Yonghong Xiang and Iain A. Stewart Department of Computer Science, Durham University, Science Labs, South Road, Durham DH1 3LE, U.K. e-mail: {yonghong.xiang,i.a.stewart}@durham.ac.uk
More informationarxiv: v1 [math.co] 13 May 2016
GENERALISED RAMSEY NUMBERS FOR TWO SETS OF CYCLES MIKAEL HANSSON arxiv:1605.04301v1 [math.co] 13 May 2016 Abstract. We determine several generalised Ramsey numbers for two sets Γ 1 and Γ 2 of cycles, in
More informationDisjoint Path Covers in Cubes of Connected Graphs
Disjoint Path Covers in Cubes of Connected Graphs Jung-Heum Park a, Insung Ihm b, a School of Computer Science and Information Engineering The Catholic University of Korea, Bucheon, Korea b Department
More informationTight Bounds on the Diameter of Gaussian Cubes
Tight Bounds on the Diameter of Gaussian Cubes DING-MING KWAI AND BEHROOZ PARHAMI Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106 9560, USA Email: parhami@ece.ucsb.edu
More informationHamiltonicity of hypercubes with a constraint of required and faulty edges
J Comb Optim (2007) 14: 197 204 DOI 10.1007/s10878-007-9059-3 Hamiltonicity of hypercubes with a constraint of required and faulty edges Lih-Hsing Hsu Shu-Chung Liu Yeong-Nan Yeh Published online: 31 March
More information1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).
1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting
More informationGraphs with Integer Matching Polynomial Roots
Graphs with Integer Matching Polynomial Roots S. Akbari a, P. Csikvári b, A. Ghafari a, S. Khalashi Ghezelahmad c, M. Nahvi a a Department of Mathematical Sciences, Sharif University of Technology, Tehran,
More informationTesting Equality in Communication Graphs
Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected
More informationGraph Theory and Interconnection Networks
Graph Theory and Interconnection Networks Lih-Hsing Hsu and Cheng-Kuan Lin @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa
More informationCompletely Independent Spanning Trees in Some Regular Graphs
Completely Independent Spanning Trees in Some Regular Graphs Benoit Darties, Nicolas Gastineau, Olivier Togni To cite this version: Benoit Darties, Nicolas Gastineau, Olivier Togni. Completely Independent
More informationAdding Relations in Multi-levels to an Organization Structure of a Complete Binary Tree Maximizing Total Shortening Path Length
Adding Relations in Multi-levels to an Organization Structure of a Complete Binary Tree Maximizing Total Shortening Path Length Kiyoshi Sawada and Kazuyuki Amano Abstract This paper proposes a model of
More informationParticular Solutions for Boolean Algebra Systems.
Particular Solutions for Boolean Algebra Systems. Franco Sabino Stoianoff Lindstron Universidad Nacional de La Plata Email: stoianoff2@gmail.com Abstract Any system of big Boolean equations can be reduced
More informationAnalogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph
Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph M. Lemańska a, J. A. Rodríguez-Velázquez b, Rolando Trujillo-Rasua c, a Department of Technical
More informationA Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set
A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set Sayaka Kamei and Hirotsugu Kakugawa Tottori University of Environmental Studies Osaka University Dept. of
More informationHYPERCUBE ALGORITHMS FOR IMAGE PROCESSING AND PATTERN RECOGNITION SANJAY RANKA SARTAJ SAHNI Sanjay Ranka and Sartaj Sahni
HYPERCUBE ALGORITHMS FOR IMAGE PROCESSING AND PATTERN RECOGNITION SANJAY RANKA SARTAJ SAHNI 1989 Sanjay Ranka and Sartaj Sahni 1 2 Chapter 1 Introduction 1.1 Parallel Architectures Parallel computers may
More informationNode-to-set disjoint-path routing in perfect hierarchical hypercubes
Available online at www.sciencedirect.com Procedia Computer Science 4 (2011) 442 451 International Conference on Computational Science, ICCS 2011 Node-to-set disoint-path routing in perfect hierarchical
More informationAn Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute
More informationThe Restricted Edge-Connectivity of Kautz Undirected Graphs
The Restricted Edge-Connectivity of Kautz Undirected Graphs Ying-Mei Fan College of Mathematics and Information Science Guangxi University, Nanning, Guangxi, 530004, China Jun-Ming Xu Min Lü Department
More informationNo.5 Node Grouping in System-Level Fault Diagnosis 475 identified under above strategy is precise in the sense that all nodes in F are truly faulty an
Vol.16 No.5 J. Comput. Sci. & Technol. Sept. 2001 Node Grouping in System-Level Fault Diagnosis ZHANG Dafang (± ) 1, XIE Gaogang (ΞΛ ) 1 and MIN Yinghua ( ΠΦ) 2 1 Department of Computer Science, Hunan
More informationSpanning trees with minimum weighted degrees
Spanning trees with minimum weighted degrees Mohammad Ghodsi Hamid Mahini Kian Mirjalali Shayan Oveis Gharan Amin S. Sayedi R. Morteza Zadimoghaddam Abstract Given a metric graph G, we are concerned with
More informationby applying two pairs of confocal cylindrical lenses
Title:Design of optical circulators with a small-aperture Faraday rotator by applying two pairs of confocal Author(s): Yung Hsu Class: 2nd year of Department of Photonics Student ID: M0100579 Course: Master
More informationPaths and cycles in extended and decomposable digraphs
Paths and cycles in extended and decomposable digraphs Jørgen Bang-Jensen Gregory Gutin Department of Mathematics and Computer Science Odense University, Denmark Abstract We consider digraphs called extended
More informationA Linear-Time Algorithm for the Terminal Path Cover Problem in Cographs
A Linear-Time Algorithm for the Terminal Path Cover Problem in Cographs Ruo-Wei Hung Department of Information Management Nan-Kai Institute of Technology, Tsao-Tun, Nantou 54, Taiwan rwhung@nkc.edu.tw
More informationApproximability of Packing Disjoint Cycles
Approximability of Packing Disjoint Cycles Zachary Friggstad Mohammad R. Salavatipour Department of Computing Science University of Alberta Edmonton, Alberta T6G 2E8, Canada zacharyf,mreza@cs.ualberta.ca
More informationExplicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform
Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang and Duan-Shin Lee Institute of Communications Engineering National Tsing Hua University
More information1 Matchings in Non-Bipartite Graphs
CS 598CSC: Combinatorial Optimization Lecture date: Feb 9, 010 Instructor: Chandra Chekuri Scribe: Matthew Yancey 1 Matchings in Non-Bipartite Graphs We discuss matching in general undirected graphs. Given
More informationXOR - XNOR Gates. The graphic symbol and truth table of XOR gate is shown in the figure.
XOR - XNOR Gates Lesson Objectives: In addition to AND, OR, NOT, NAND and NOR gates, exclusive-or (XOR) and exclusive-nor (XNOR) gates are also used in the design of digital circuits. These have special
More informationCMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015
NAME: CMPSCI 611 Advanced Algorithms Midterm Exam Fall 015 A. McGregor 1 October 015 DIRECTIONS: Do not turn over the page until you are told to do so. This is a closed book exam. No communicating with
More informationFPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials
FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers
More informationHamiltonian cycles in circulant digraphs with jumps 2, 3, c [We need a real title???]
Hamiltonian cycles in circulant digraphs with jumps,, c [We need a real title???] Abstract [We need an abstract???] 1 Introduction It is not known which circulant digraphs have hamiltonian cycles; this
More informationBounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia
Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction
More informationWide diameters of de Bruijn graphs
J Comb Optim (2007) 14: 143 152 DOI 10.1007/s10878-007-9066-4 Wide diameters of de Bruijn graphs Jyhmin Kuo Hung-Lin Fu Published online: 14 April 2007 Springer Science+Business Media, LLC 2007 Abstract
More informationLIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE
International Journal of Applied Mathematics Volume 31 No. 18, 41-49 ISSN: 1311-178 (printed version); ISSN: 1314-86 (on-line version) doi: http://dx.doi.org/1.173/ijam.v31i.6 LIMITING PROBABILITY TRANSITION
More informationAsymptotic redundancy and prolixity
Asymptotic redundancy and prolixity Yuval Dagan, Yuval Filmus, and Shay Moran April 6, 2017 Abstract Gallager (1978) considered the worst-case redundancy of Huffman codes as the maximum probability tends
More informationA Linear Programming Duality Approach to Analyzing Strictly Nonblocking d-ary Multilog Networks under General Crosstalk Constraints
A Linear Programming Duality Approach to Analyzing Strictly Nonblocking d-ary Multilog Networks under General Crosstalk Constraints Hung Q. Ngo, Anh Le, and Yang Wang Computer Science and Engineering,
More informationc 1999 Society for Industrial and Applied Mathematics
SIAM J. DISCRETE MATH. Vol. 1, No. 1, pp. 64 77 c 1999 Society for Industrial and Applied Mathematics OPTIMAL BOUNDS FOR MATCHING ROUTING ON TREES LOUXIN ZHANG Abstract. The permutation routing problem
More informationPerfect Dominating Sets in Gaussian Graphs
Perfect Dominating Sets in Gaussian Graphs Carmen Martínez 1, Miquel Moretó 2 and Ramón Beivide 3. Abstract Gaussian Graphs are introduced and analyzed in this paper. The set of vertices of these Cayley
More informationConstruction of Protographs for QC LDPC Codes With Girth Larger Than 12 1
Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Sunghwan Kim, Jong-Seon No School of Electrical Eng. & Com. Sci. Seoul National University, Seoul, Korea Email: {nodoubt, jsno}@snu.ac.kr
More informationSingle-Image-Based Rain and Snow Removal Using Multi-guided Filter
Single-Image-Based Rain and Snow Removal Using Multi-guided Filter Xianhui Zheng 1, Yinghao Liao 1,,WeiGuo 2, Xueyang Fu 2, and Xinghao Ding 2 1 Department of Electronic Engineering, Xiamen University,
More informationApplied Mathematics Letters
Applied Mathematics Letters (009) 15 130 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: www.elsevier.com/locate/aml Spectral characterizations of sandglass graphs
More informationOnline Packet Routing on Linear Arrays and Rings
Proc. 28th ICALP, LNCS 2076, pp. 773-784, 2001 Online Packet Routing on Linear Arrays and Rings Jessen T. Havill Department of Mathematics and Computer Science Denison University Granville, OH 43023 USA
More informationBicyclic digraphs with extremal skew energy
Electronic Journal of Linear Algebra Volume 3 Volume 3 (01) Article 01 Bicyclic digraphs with extremal skew energy Xiaoling Shen Yoaping Hou yphou@hunnu.edu.cn Chongyan Zhang Follow this and additional
More informationHamiltonian chromatic number of block graphs
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 21, no. 3, pp. 353 369 (2017) DOI: 10.7155/jgaa.00420 Hamiltonian chromatic number of block graphs Devsi Bantva 1 1 Lukhdhirji Engineering
More informationConsensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication Topologies
Proceedings of the World Congress on Engineering and Computer Science Vol I WCECS, October 9-,, San Francisco, USA Consensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication
More informationA Short Proof of the VPN Tree Routing Conjecture on Ring Networks
A Short Proof of the VPN Tree Routing Conjecture on Ring Networs Fabrizio Grandoni Voler Kaibel Gianpaolo Oriolo Martin Sutella January 15, 008 Abstract Only recently, Hurens, Keijsper, and Stougie proved
More informationarxiv: v2 [math.co] 7 Jan 2016
Global Cycle Properties in Locally Isometric Graphs arxiv:1506.03310v2 [math.co] 7 Jan 2016 Adam Borchert, Skylar Nicol, Ortrud R. Oellermann Department of Mathematics and Statistics University of Winnipeg,
More informationFinding a longest common subsequence between a run-length-encoded string and an uncompressed string
Journal of Complexity 24 (2008) 173 184 www.elsevier.com/locate/jco Finding a longest common subsequence between a run-length-encoded string and an uncompressed string J.J. Liu a, Y.L. Wang b,, R.C.T.
More informationResearch Article On Counting and Embedding a Subclass of Height-Balanced Trees
Modelling and Simulation in Engineering, Article ID 748941, 5 pages http://dxdoiorg/101155/2014/748941 Research Article On Counting and Embedding a Subclass of Height-Balanced Trees Indhumathi Raman School
More informationThe Generalization of Quicksort
The Generalization of Quicksort Shyue-Horng Shiau Chang-Biau Yang Ý Department of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung, Taiwan 804, Republic of China shiaush@cse.nsysu.edu.tw
More informationDE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS
DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS JOEL BAKER Abstract. The goal of this expository paper is to introduce De Bruijn graphs and discuss their applications to fault tolerant
More informationarxiv: v1 [cs.gr] 25 Nov 2015
EMBEDDING OF HYPERCUBE INTO CYLINDER WEIXING JI, QINGHUI LIU, GUIZHEN WANG, AND ZHUOJIA SHEN arxiv:1511.07932v1 [cs.gr] 25 Nov 2015 Abstract. Task mapping in modern high performance parallel computers
More informationEfficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem
Efficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem Hsing-Yen Ann National Center for High-Performance Computing Tainan 74147, Taiwan Chang-Biau Yang and Chiou-Ting
More informationThe super connectivity of shuffle-cubes
Information Processing Letters 96 (2005) 123 127 www.elsevier.com/locate/ipl The super connectivity of shuffle-cubes Jun-Ming Xu a,,minxu b, Qiang Zhu c a Department of Mathematics, University of Science
More informationPart 2: Random Routing and Load Balancing
1 Part 2: Random Routing and Load Balancing Sid C-K Chau Chi-Kin.Chau@cl.cam.ac.uk http://www.cl.cam.ac.uk/~ckc25/teaching Problem: Traffic Routing 2 Suppose you are in charge of transportation. What do
More informationTime Synchronization
Massachusetts Institute of Technology Lecture 7 6.895: Advanced Distributed Algorithms March 6, 2006 Professor Nancy Lynch Time Synchronization Readings: Fan, Lynch. Gradient clock synchronization Attiya,
More informationApproximation Algorithms for the Consecutive Ones Submatrix Problem on Sparse Matrices
Approximation Algorithms for the Consecutive Ones Submatrix Problem on Sparse Matrices Jinsong Tan and Louxin Zhang Department of Mathematics, National University of Singaproe 2 Science Drive 2, Singapore
More information4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd
4.8 Huffman Codes These lecture slides are supplied by Mathijs de Weerd Data Compression Q. Given a text that uses 32 symbols (26 different letters, space, and some punctuation characters), how can we
More informationan author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)
More informationA MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ
A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ NICOLAS FORD Abstract. The goal of this paper is to present a proof of the Nullstellensatz using tools from a branch of logic called model theory. In
More informationThe maximum edge-disjoint paths problem in complete graphs
Theoretical Computer Science 399 (2008) 128 140 www.elsevier.com/locate/tcs The maximum edge-disjoint paths problem in complete graphs Adrian Kosowski Department of Algorithms and System Modeling, Gdańsk
More informationCombinatorial Properties of Modified Chordal Rings Degree Four Networks
Journal of Computer Science 6 (3): 79-84, 00 ISSN 549-3636 00 Science Publications Combinatorial Properties of Modified Chordal Rings Degree Four Networks R.N. Farah,, M.Othman and 3 M.H. Selamat Laboratory
More informationHamiltonian problem on claw-free and almost distance-hereditary graphs
Discrete Mathematics 308 (2008) 6558 6563 www.elsevier.com/locate/disc Note Hamiltonian problem on claw-free and almost distance-hereditary graphs Jinfeng Feng, Yubao Guo Lehrstuhl C für Mathematik, RWTH
More informationGeneral Methods for Algorithm Design
General Methods for Algorithm Design 1. Dynamic Programming Multiplication of matrices Elements of the dynamic programming Optimal triangulation of polygons Longest common subsequence 2. Greedy Methods
More informationAverage Case Analysis of QuickSort and Insertion Tree Height using Incompressibility
Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a
More informationA necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees
A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of
More information