Constructing Node-Disjoint Paths in Enhanced Pyramid Networks

Size: px
Start display at page:

Download "Constructing Node-Disjoint Paths in Enhanced Pyramid Networks"

Transcription

1 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks Hsien-Jone Hsieh 1 and Dyi-Rong Duh 2, * 1,2 Department of Computer Science and Information Engineering National Chi Nan University, Puli, Nantou Hsien, Taiwan s @ncnu.edu.tw 2 drduh@ncnu.edu.tw Abstract. Chen et al. in 2004 proposed a new hierarchy structure, called the enhanced pyramid network (EPM, for short), by replacing each mesh in a pyramid network (PM, for short) with a torus. Recently, some topological properties and communication on the EPMs have been investigated or derived. Their results have revealed that an EPM is an attractive alternative to a PM. This study investigates the node-disjoint paths between any two distinct nodes and the upper bound of the ω-wide-diameter of an EPM. This result shows that the EPMs have smaller ω-wide-diameters than the PMs. Keywords: Enhanced pyramid networks, pyramid networks, fault-tolerance, wide diameter, node-disjoint paths, container, interconnection networks. 1 Introduction Pyramid networks (PMs, for short) have conventionally been adopted for image processing [6, 10], computer vision [6], parallel computing [5] and network computing [1]. A PM is a hierarchy structure based on meshes. Recently, there are many researches on the PMs, such as Hamiltonicity [2, 12, 16], pancyclicity [2, 16], fault tolerance [1], routing [7, 15], and broadcasting [8]. Note that the node degree of a PM is from 3 to 9, and both its node connectivity and edge connectivity are 3 [1, 16]. For establishing a PM in expandable VLSI chips, each of its nodes should be configured as a 9-port component or too many different components should be designed and fabricated. In other words, those nodes of degree less than 9 have unused ports. These ports can be used for further expansion or I/O communication. To modify a wellknown network a little bit such that the resulting network has better topological properties. Chen et al. [4] in 2004 proposed a variant network of the PM, named the enhanced pyramid network, by reconnecting some of the unused ports. An enhanced pyramid network (EPM, for short), suggested by Chen et al. [4], is a supergraph of a pyramid network with the same node set. In other words, a PM is a spanning subgraph of an EPM. The EPM can be constructed by replacing each mesh of the PM with a torus. Therefore, the hardware cost of the EPM would be slightly more expensive than the PM because some extra edges have to be added in the VLSI * Corresponding author. C. Jesshope and C. Egan (Eds.): ACSAC 2006, LNCS 4186, pp , Springer-Verlag Berlin Heidelberg 2006

2 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks 381 chips. Some topological properties and communication on the EPMs, including the number of nodes/edges, node connectivity, edge connectivity, diameter, routing algorithm, and a simple broadcasting algorithm, have been determined or derived [4]. Their results show that the EPM has better topological properties than the PM such as larger node/edge connectivity and better fault-tolerance ability. The topological structure of an interconnection network (network, for short) can be modeled by a graph [3, 10, 12, 13, 17]. The vertices and edges of a graph respectively correspond to nodes and edges of an interconnection network. The length of a path is the number of edges, which the path passes through. Given two nodes s and t in a network G, the distance between them, denoted by d G (s, t), is the length of their shortest path. The diameter of a network G, denoted by d(g), is defined as the maximum of d G (s, t) among all pairs of distinct nodes in G. A ω-wide container, denoted by C ω (s, t), is a set of node-disjoint paths of width ω. The length of C ω (s, t), denoted by l(c ω (s, t)), is the length of the longest path in C ω (s, t). The total length of C ω (s, t), denoted by l T (C ω (s, t)), is the sum of the lengths of the ω paths in the C ω (s, t). The ω- wide distance between s and t in G, denoted by d ω (s, t), is minimum among all l(c ω (s, t)). The ω-wide diameter of G, written as d ω (G), is the maximum of ω-wide distance among all pairs of distinct nodes in G. Obviously, d G (s, t) d ω (s, t), d(g) d ω (G), and d ω (s, t) d ω (G). Parallel transmission is a one-to-one communication in G such that the message can be transmitted from the source node to the destination node via a container between them to enhance the transmission performance and/or improve fault tolerance ability of the communication. Notably, the parallel transmission delay is bounded above by d ω (G). This work first constructs a ω-wide container between any two distinct nodes in an EPM and then based on the constructed containers the upper bound of the ω-wide diameter of the EPM can be determined. The rest of this paper is organized as follows. Section 2 describes the structure and terms of an EPM, and some notations and definitions in graphs. Section 3 first constructs a ω-wide container between any two distinct nodes in an EPM and then determines the upper bound of the ω-wide diameter of the EPM. Finally, the conclusion is made in Section 4. 2 Preliminaries This section first formally describes the structures of the PM and EPM and then defines some notations and definitions in graphs that are used in the rest of this paper. The node set of a mesh M(m, n) is V(M(m, n)) = {(x, y) 0 x<m, 0 y<n}. Two nodes (x 1, y 1 ) and (x 2, y 2 ) are joined by an edge iff x 1 x 2 + y 1 y 2 = 1, where (x 1, y 1 ) and (x 2, y 2 ) belong to V(M(m, n)). The n-layer pyramid network, denoted by PM[n], is a hierarchy structure based on meshes. The node set of PM[n] is V(PM[n]) = {(k; x, y) 0 k n, 0 x, y<2 k }, where n 0. Note that the node (0; 0, 0) is the PM[0]. A node (k; x, y) V(PM[n]) is said to be a node at layer k with the coordinate (x, y). The nodes at layer k are connected as a M(2 k, 2 k ). The EPM is a conjunction of a quad tree and tori. The node set of a torus T(m, n) is V(T(m, n)) = {(x, y) 0 x<m, 0 y<n}. Let {u, v} denote an edge connecting nodes u and v of a network. The edge set E(T(m, n)) = E(M(m, n)) {{(x, 0), (x, n 1)}, {(0, y), (m 1, y)} 0 x<m, 0 y<n}. In other words, an EPM can be constructed by replacing

3 382 H.-J. Hsieh and D.-R. Duh each mesh of a PM with a torus. The nodes at layer k are connected as a T(2 k, 2 k ). Notice that a M(2, 2) is also a T(2, 2) in some sense. An EPM of n layers is denoted by EPM[n]. The node set of EPM[n] is V(EPM[n]) = {(k; x, y) 0 k n, 0 x, y<2 k }, where n 2. In general, the node (0; 0, 0) is called the apex of EPM[n] (apex, for short). For ease of discussion, we define some symbols in the following. For a node v = (k; x, y) at layer 1 k n in EPM[n], the coordinate of its parent, denoted by P(v), is given by (k 1; x/2, y/2 ). Conversely, v is a child of P(v). Moreover, each node in EPM[n] has a parent (four children) except the apex (the nodes at layer n). More generally, we recursively define the h th ancestor of v, denoted by P h (v), as follows: (1) h=1, P 1 (v) = P(v) is simply the parent of v. (2) h>1, P h (v) = (k h; x/2 h, y/2 h ) is the parent of P h 1 (v). For a node v = (k; x, y) at layer 0 k<n in EPM[n], the coordinates of its four children are given by (k+1; 2x, 2y), (k+1; 2x+1, 2y), (k+1; 2x, 2y+1), and (k+1; 2x+1, 2y+1). Conversely, v is the parent of its children. For simplicity, let (a) b denote a modulo b. For a node v = (k; x, y) at layer 2 k n in EPM[n], (k; (x+1) 2 k, y), (k; x, (y+1) 2 k), (k; (x 1) 2 k, y), and (k; x, (y 1) 2 k) are the coordinates of its four siblings, and they are also denoted by S 0 (v), S 1 (v), S 2 (v), and S 3 (v), respectively. 3 Node-Disjoint Paths Before describing how to construct ω node-disjoint paths between any pair of nodes in EPM[n], some lemmas are first presented. These lemmas related to how to routing paths in EPM[n] are stated in Subsection 3.1. By the aid of these lemmas, a shortest path between any pair of nodes is first constructed and then the other ω 1 paths can be built based on the shortest path. Subsections 3.2 describes how to construct these ω paths, where 2 ω Routing in EPM[n] Given two paths P 1 and P 2, let P 1 P 2 denote joining P 2 to the tail of P 1. Let P G (u, v) denote a path between two nodes u and v in a network G. Let l(p) denote the length of a path P. Some results derived by Chen et al. [4] are described first. Lemma 1 [4]. The node connectivity of EPM[n] is 4. By Menger s theorem [17] and Lemma 1, there is a 4-wide container between any pair of nodes in EPM[n]. Lemma 2 [4]. If d T(2 k, 2 k )(u, v) < 2+d T(2 k 1, 2 k 1 )(P(u), P(v)), d T(2 k, 2 k )(u, v) = d EPM[n] (u, v). Lemma 3 [4]. Given two nodes u=(k u k; x u, y u ) and v=(k v k; x v, y v ), 0 k v k u <n, there is a shortest P EPM[n] (u, v) having the form as P EPM[n] (u, P k u k v +i (u)) P T(2 k, 2 k )(P k u k v +i (u), P i (v)) P EPM[n] (P i (v), v), where 0 i<k v.

4 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks 383 By Lemma 3, a shortest path P EPM[n] (u, v) can be constructed and it is the first constructed path when a container is built. Since a shortest path between any two nodes has been established, the diameter of EPM[n] can be easily obtained and stated in the following lemma. Lemma 4 [4]. d(epm[n]) = 2n, where n 2. After constructing a ω-wide container between any pair of nodes in a network, the upper bound of the ω-wide diameter of the network can be determined as the maximum length among the constructed ω-wide containers. The first path P 1 (s, t), constructed by Lemma 3, is shortest and its length is at most d(epm[n]) = 2n. Then the other ω 1 paths P 2,..., P ω, can be constructed based on P 1, they disjoint to each other and also disjoint to P 1. Notably, the other ω 1 paths are never shorter than P 1, and then a method is proposed to share P 1 with the others, in order to shorten the length of the ω-wide container. Given two nodes u and v at layer k u and k v of EPM[n], respectively. They have at most four siblings S i (u) and S j (v), respectively, where 0 i, j 3. P(u) (P(v)) also has at most four siblings S i (P(u)) (S j (P(v))), 0 i (j) 3. Let Q ij (u, v) denote a path from S i (u) to S j (v) along siblings of P 1 (u, v). We can recursively construct Q ij (u, v)as follows: (1) v is P(u): Q ii (u, P(u)) is a shortest path from S i (u) to S i (P(u)) excluding P 1 (u, P(u)). (2) v is P h (u), where 2 h k u 2: Q ii (u, P h (u)) = Q ii (u, P h 1 (u)) Q ii (P h 1 (u)), P h (u)). Note that Q ii (u, P h (u)) might not be a shortest path from S i (u) to S i (P h (u)) in EPM[n] excluding P 1 (u, P h (u)). (3) Let w=(k w ; x w, y w )=P k u k w (u), z=(k z ; x z, y z )=P k v k z (v), if 2 k w =k z min{k u, k v }: Q ij (u, v) = Q ii (u, w) P T(2 kw, 2 kw) (S i (w), S j (z)) Q jj (v, z). Obviously, there are 4 Q ii (u, P(u))s can be constructed. For each Q ii (u, P(u)), it is represented by π 1 (π 2 ) if l(q ii (u, P(u))) = 1 (2). l(q ii (u, P(u)))+l(Q mm (u, P(u))) = 3, where m is (i+2) 4. Also, if Q ii (u, P h (u)) has h 1 π 1 s and h 2 = h h 1 π 2 s, then Q mm (u, P h (u)) has h 2 π 1 s and h 1 π 2 s, where m is (i+2) 4. Therefore, l(q ii (u, P h (u)))=h+h 2, l(q mm (u, P h (u)))=h+h 1, and l(q ii (u, P h (u)))+l(q mm (u, P h (u))) = 3h. The shortest one of Q ii (u, P h (u)) and Q mm (u, P h (u)) is denoted by Q S (u, P h (u)). Otherwise, the longest of them is denoted by Q L (u, P h (u)). Therefore, l(q S (u, P h (u))) 3h/2 = h+ h/2, and l(q L (u, P h (u))) 2h. That is, there are at most h/2 (h) π 2 s in a Q S (u, P h (u)) (Q L (u, P h (u))). Q S is also denoted as Q SE (Q SO ) if i is even (odd). 3.2 ω-wide Container This subsection constructs a ω-wide container between any pair of nodes in EPM[n]. For ease of discussion, let s=(k s ; x s, y s ), t=(k t ; x t, y t ), w=(k w ; x w, y w )=P k s k w (s), z=(k z ; x z, y z )=P k t k z (t) be four nodes in EPM[n] for n 2, where 2 k w =k z min{k s, k t }. Lemma 5 [9]. l(q S (s, w)+d T(2 2, 2 2 )(S i (w), S j (z))+l(q S (z, t) 2n+2 n/2 4, l(q S (s, w)+d T(2 2, 2 2 )(S i (w), S j (z))+l(q L (z, t) 3n+ n/2 5, and l(q L (s, w)+d T(2 2, 2 2 )(S i (w), S j (z))+l(q S (z, t) 3n+ n/2 5.

5 384 H.-J. Hsieh and D.-R. Duh Lemma 6. l(c 2 (s, t)) and l(c 3 (s, t)) 2n+2 n/2 2, l(c 4 (s, t)) 3n+ n/2 3, l T (C 2 (s, t)) 4n+2 n/2 2, l T (C 3 (s, t)) 6n+4 n/2 4, and l T (C 4 (s, t)) 10n+2 n/2 6. Proof. For ω-wide container, 2 ω 4, by Lemma 3 and Lemma 4, a shortest path P 1 (s, t) can be first constructed and l(p 1 (s, t)) 2n. Second, a Q ij (s, t) is constructed as the second path P 2 (s, t) = {s, S i (s)} Q SE (s, w) P T(2 2, 2 2 )(S i (w), S j (z)) Q SE (z, t) {S j (t), t}. By Lemma 5, l(p 2 (s, t)) 2n+2 n/2 2. Thus, l(c 2 (s, t)) 2n+2 n/2 2 and l T (C 2 (s, t)) 4n+2 n/2 2. A C 3 (s, t) can be constructed by adding the third path P 3 (s, t)={s, S i (s)} Q SO (s, w) P T(2 2, 2 2 )(S i (w), S j (z)) Q SO (z, t) {S j (t), t} into the original C 2 (s, t). l(p 3 (s, t)) 2n+2 n/2 2. Hence, l(c 3 (s, t)) 2n+2 n/2 2 and l T (C 3 (s, t)) 6n+4 n/2 4. For constructing a C 4 (s, t), P 3 (s, t)={s, S i (s)} Q SO (s, P n 2 (s)) P T(2 2, 2 2 )(S(P n 2 (s)), S(P n 2 (t))) Q L (P n 2 (t), t) {S j (t), t} and P 4 (s, t)={s, S(s)} Q L (s, P n 2 (s)) P T(2 2, 2 2 )(S(P n 2 (s)), S(P n 2 (t))) Q SO (P n 2 (t), t) {S j (t), t}. By Lemma 5, both l(p 3 (s, t)) and l(p 4 (s, t)) 3n+ n/2 3, and l T (C 4 (s, t)) 10n+2 n/2 6 is maximum. Note that all P T(2 2, 2 2 )s disjoint to each other. The C ω (s, t) constructed in the proof of Lemma 6 is too long and l(p ω (s, t))s l(p 1 (s, t)) are too large, for 2 ω 4. A C ω (s, t) can be shortened by rerouting its paths such that each path shares some part of the P 1 (s, t). The X(P EPM[n] (u, P 2 (u)), Q ii (u, P 2 (u))) is an operation to reroute the two node-disjoint paths P EPM[n] (u, P 2 (u)) and Q ii (u, P 2 (u)) in EPM[n] by using some nodes near to them, where u V(P 1 (s, P n 2 (s)). After rerouting, one path from u to S i (P 2 (u)) is denoted by R 1, the other path from S i (u) to P 2 (u) is denoted by R 2, and they are still disjoint to each other. The rerouting would little increase the sum of the lengths of the paths. l(r 1 ) l(p EPM[n] (u, P 2 (u))) and l(r 2 ) l(q ii (u, P 2 (u))) are represented by c 1 and c 2, respectively. The main idea of rerouting is to share the shortest path of the original container with the other paths such that the longest path in C ω (u, v) is only one longer than the shortest path and then l(c ω (u, v)) can be minimized. Lemma 7. X(P EPM[n] (u, P 2 (u)) and Q ii (u, P 2 (u))) can be completed within 2 layers, and c 1 =2, c 2 = 0 or 1. Proof. Given a node u=(k; x, y), there are 4 Q ii (u, P 2 (u)))s. Without lost of generality, only X(P EPM[n] (u, P 2 (u)), Q 00 (S i (u), S i (P 2 (u)))) is discussed. Let x=(x k 1 x k 2 x 2 0x 0 ) 2 in binary, and the bit 0 of y is y 0, Q 00 (P(u), P 2 (u)) is a π 2. Hence, P(u)=(k 1; (x k 1 x k 2 x 2 0) 2, y/2 ), P 2 (u)=(k 2; (x k 1 x k 2 x 2 ) 2, y/4 ), H 0 (u)=(k; (x k 1 x k 2 x 2 10) 2, y), H 0 (P(u))=(k 1; (x k 1 x k 2 x 2 1) 2 +1, y/2 ), S 0 (P 2 (u))=(k 2; (x k 1 x k 2 x 2 ) 2 +1, y/4 ), a=(k; 2 x/2 +2, 2 y/2 +1), and b=(k; 2 x/2 +2, 2 y/2 +2). Before rerouting, l(p 1 (u, P 2 (u))) = 2 and l(q 00 (u, P 2 (u))) = 4 x 0. In order to keep disjoint to the other Q ii (u, P 2 (u)))s, after rerouting, R 2 must be P T(2 k, 2 k )(S 0 (u), a) {a, b} P(b, P 2 (u)). l(r 1 ) = 4 and l(r 2 ) = 5 x 0 y 0. Hence, c 1 = 4 2 = 2, c 2 = (5 x 0 y 0 ) (4 x 0 )=1 y 0 = 0 or 1. Theorem 8. d 2 (EPM[n]) 2n+ n/2 1, for n 2. d 3 (EPM[n]) 2n+ (2n+2)/3 (2n+ 2n/3 ) if n is even (odd), for n 4. d 4 (EPM[n]) 2n+ 3n/4 (2n+ (3n 1)/4 ) if n is even (odd), for n 4. Proof. This theorem can be proved by rerouting the C ω (s, t) constructed in the proof of Lemma 6.

6 Constructing Node-Disjoint Paths in Enhanced Pyramid Networks 385 Case 1. (for C 2 (s, t)): Only the longest C 2 (s, t) should be considered. After reconstruction, the new paths are P' 1 (s, t)=p EPM[n] (s, w) P T(2 2, 2 2 )(w, S j (z)) Q jj (z, t) {S j (t), t} and P' 2 (s, t)={s, S i (s)} Q ii (s, w) P T(2 2, 2 2 )(S i (w), z) P EPM[n] (z, t). The lengths of P' 1 (s, t) and P' 2 (s, t) are at most 2n+ n/2 1. Case 2. (for C 3 (s, t)): Assume there are h s and h t π 2 s in Q SE (s, w) and Q SO (t, z), respectively, the lengths of h s and h t are at most (n 2)/2. Let h sx = 2 h s /3 1, h tx = 2 h t /3 1. After applying X(P EPM[n] (P hsx 2 (s), P hsx (s)), Q SE (P hsx 2 (s), P hsx (s))) and X(P EPM[n] (P htx 2 (t), P htx (t)), Q SO (P htx 2 (t), P htx (t))), the new paths are P' 1 (s, t), P' 2 (s, t), and P' 3 (s, t) with lengths l' 1, l' 2, and l' 3, respectively. By Lemma 6 and Lemma 7, l' 1, l' 3 2n+ (2n+2)/3 (2n+ 2n/3 ) and l' 2 2n+ (2n+2)/3 (2n+ 2n/3 ) if n is even (odd), for n 4. Case 3. (for C 4 (s, t)): After applying 3 times of rerouting, the new paths are P' 1 (s, t), P' 2 (s, t), P' 3 (s, t), and P' 4 (s, t) with lengths l' 1, l' 2, l' 3, and l' 4, respectively. Similarly, l' 1, l' 4 2n+ 3n/4 (2n+ (3n 1)/4 ), l' 2, l' 3 2n+ 3n/4 (2n+ (3n 1)/4 ) if n is even (odd), for n 4. It is easy to check that d 2 (EPM[1]) = d 3 (EPM[1]) = 2, d 3 (EPM[2]) = d 4 (EPM[2]) = 4, d 3 (EPM[3]) = 6, and d 4 (EPM[3]) = 7. 4 Concluding Remarks This work has revealed that d 2 (EPM[n]) 2n+ n/2 1, for n 2, d 3 (EPM[n]) 2n+ (2n+2)/3 (2n+ 2n/3 ), n is even (odd), for n 4, and d 4 (EPM[n]) 2n+ 3n/4 (2n+ (3n 1)/4 ), n is even (odd), for n 4. In [1], d 2 (PM[n]) =3n 1, and d 3 (PM[n]) 10n/3+6. Therefore, an EPM has smaller ω-wide-diameter than the pertinent PM. The ω-path transmission delay of a network is bounded below by its ω-wide diameter. The lower bound of d ω (EPM[n]) is still unknown. We are going to determine the lower bound of d ω (EPM[n]) and we claim that it is equal to its upper bound. If this is true, d ω (EPM[n]) can be eventually obtained. Acknowledgments. The authors would like to thank the National Science Council of the Republic of China for financially supporting this research under Contract No. NSC E References 1. Cao, F., Du, D.-Z., Hsu, D. F., Teng, S.-H.: Fault tolerance properties of pyramid networks. IEEE Transactions on Computers 48 (1999) Chen, Y.-C.: Pancycles and Hamiltonian connectedness of the pyramid network with one node or one edge fault. Master Report, Department of Computer Science and Information Engineering, National Chi Nan University (2003) 3. Chen, W.-M. Chen, G.-H. Hsu, D.-F.: Generalized diameters of the mesh of trees. Theory of Computing Systems 37 (2004)

7 386 H.-J. Hsieh and D.-R. Duh 4. Chen, Y.-C., Duh, D.-R., Hsieh, H.-J.: On the enhanced pyramid network. Proc. Int. Conf. on Parallel and Distributed Processing Techniques and Applications. Monte Carlo Resort, Las Vegas, Nevada, USA (2004) Cinque, L., Bongiovanni, G.: Parallel prefix computation on a pyramid computer. Pattern Recognition Letter 16 (1995) Cipher, R., Sanz, J. L. C.: SIMD architectures and algorithms for image processing and computer vision. IEEE Transactions on Acoustic, Speech, and Signal Processing 37 (1989) Hsieh, H.-J., Duh, D.-R., Shiau, J.-S.: A constant time shortest-path routing algorithm for pyramid networks. Proc. Int. Conf. on Parallel and Distributed Computing and Systems. MIT Cambridge, MA, USA (2004) Hsieh, H.-J., Duh, D.-R.: An Optimal Broadcasting Algorithm for Pyramid Networks. Proc. the 9th World Multiconference on Systemics, Cybernetics and Informatics. Orlando, Florida, USA (2005) Hsieh, H.-J., Duh, D.-R.: Containers in Enhanced Pyramid Networks. Technical Report, (2006) 10. Hsu, D. F.: Graph containers, information delay, and network vulnerability. Proc. Int. Conf. on Advanced Information Networking and Applications, Vol. 1. (2004) Jenq, J. F., Sahni, S.: Image shrinking and expanding on a pyramid. IEEE Transactions on Parallel and Distributed Systems 4 (1993) Omura, S., H. Zheng, Wada, K.: Neighborhood broadcasting in undirected de Bruijn and Kautz networks. IEICE Transactions on Information and Systems E-88-D (2005) Park, J.-H.: Two-dimensional ring-banyan network: a high-performance fault-tolerant switching network, Electronics Letters 42 (2006) Sarbazi-Azad, H., Ould-Khaoua, M., Mackenzie, L. M.: Algorithmic construction of Hamiltonians in pyramids. Information Processing Letters. Vol. 80. (2001) Shen, Z.: A routing algorithm for pyramid structures, Proc. ACM Symposium on Applied Computing, Las Vegas, Nevada, USA (2001) Wu, R.-Y.: Hamiltonicity of pyramid networks. Master Report, Department of Computer Science and Information Engineering, National Chi Nan University (2001) 17. Xu, J.: Topological structure and analysis of interconnection networks. Kluwer, Netherlands, (2002)

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.075 An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs Jung-Hwan Chang*

More information

Bipanconnectivity of Cartesian product networks

Bipanconnectivity of Cartesian product networks AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 46 (2010), Pages 297 306 Bipanconnectivity of Cartesian product networks You Lu Jun-Ming Xu Department of Mathematics University of Science and Technology of

More information

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Jung-Sheng Fu Takming College, Taipei, TAIWAN jsfu@mail.takming.edu.tw Gen-Huey Chen Department of Computer Science and Information

More information

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis

More information

Theoretical Computer Science. Fault-free longest paths in star networks with conditional link faults

Theoretical Computer Science. Fault-free longest paths in star networks with conditional link faults Theoretical Computer Science 410 (2009) 766 775 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Fault-free longest paths in star networks

More information

Hyper-Panconnectedness of the Locally Twisted Cube

Hyper-Panconnectedness of the Locally Twisted Cube Hyper-Panconnectedness of the Locally Twisted Cube Tzu-Liang Kung Department of Computer Science and Information Engineering Asia University, Wufeng, Taichung tlkung@asia.edu.tw Lih-Hsing Hsu and Jia-Jhe

More information

Algebraic Properties and Panconnectivity of Folded Hypercubes

Algebraic Properties and Panconnectivity of Folded Hypercubes Algebraic Properties and Panconnectivity of Folded Hypercubes Meijie Ma a Jun-Ming Xu b a School of Mathematics and System Science, Shandong University Jinan, 50100, China b Department of Mathematics,

More information

Mutually Independent Hamiltonian Paths in Star Networks

Mutually Independent Hamiltonian Paths in Star Networks Mutually Independent Hamiltonian Paths in Star Networks Cheng-Kuan Lin a, Hua-Min Huang a, Lih-Hsing Hsu b,, and Sheng Bau c, a Department of Mathematics National Central University, Chung-Li, Taiwan b

More information

Edge-pancyclicity of Möbius cubes

Edge-pancyclicity of Möbius cubes Information Processing Letters 96 (25) 136 14 www.elsevier.com/locate/ipl Edge-pancyclicity of Möbius cubes Min Xu a,b, Jun-Ming Xu b, a Institute of Applied Mathematics, Academy of Mathematics and Systems

More information

Constructing Independent Spanning Trees on Locally Twisted Cubes in Parallel

Constructing Independent Spanning Trees on Locally Twisted Cubes in Parallel Constructing Independent Spanning Trees on Locally Twisted Cubes in Parallel Yu-Huei Chang Jinn-Shyong Yang, Jou-Ming Chang Department of Information Management, National Taipei College of Business, Taipei,

More information

Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars

Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars Fu Hsing Wang 1 Jou Ming Chang 2 Yue Li Wang 1, 1 Department of Information Management, National Taiwan

More information

Improving the Height of Independent Spanning Trees on Folded Hyper-Stars

Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Sih-Syuan Luo 1 Jinn-Shyong Yang 2 Jou-Ming Chang 1, An-Hang Chen 1 1 Institute of Information and Decision Sciences, National Taipei

More information

On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes

On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes American Journal of Applied Sciences 5(11): 1605-1610, 2008 ISSN 1546-9239 2008 Science Publications On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes 1 Ioana Zelina, 2 Grigor Moldovan

More information

PARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes

PARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Ruo-Wei Hung, Shang-Ju Chan, and Chien-Chih Liao Abstract The presence of edge-disjoint Hamiltonian

More information

Conquering Edge Faults in a Butterfly with Automorphisms

Conquering Edge Faults in a Butterfly with Automorphisms International Conference on Theoretical and Mathematical Foundations of Computer Science (TMFCS-0) Conquering Edge Faults in a Butterfly with Automorphisms Meghanad D. Wagh and Khadidja Bendjilali Department

More information

National Taiwan University Taipei, 106 Taiwan 2 Department of Computer Science and Information Engineering

National Taiwan University Taipei, 106 Taiwan 2 Department of Computer Science and Information Engineering JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 907-919 (007) Short Paper Improved Modulo ( n + 1) Multiplier for IDEA * YI-JUNG CHEN 1, DYI-RONG DUH AND YUNGHSIANG SAM HAN 1 Department of Computer Science

More information

arxiv: v1 [math.co] 27 Apr 2016

arxiv: v1 [math.co] 27 Apr 2016 arxiv:1604.07895v1 [math.co] 27 Apr 2016 Fault-tolerance of balanced hypercubes with faulty vertices and faulty edges Mei-Mei Gu Department of Mathematics, Beijing Jiaotong University, Beijing 100044,

More information

ON THE EDGE-HYPER-HAMILTONIAN LACEABILITY OF BALANCED HYPERCUBES

ON THE EDGE-HYPER-HAMILTONIAN LACEABILITY OF BALANCED HYPERCUBES Discussiones Mathematicae Graph Theory 36 (2016) 805 817 doi:10.7151/dmgt.1908 ON THE EDGE-HYPER-HAMILTONIAN LACEABILITY OF BALANCED HYPERCUBES Jianxiang Cao, Minyong Shi School of Computer Science Communication

More information

All Good (Bad) Words Consisting of 5 Blocks

All Good (Bad) Words Consisting of 5 Blocks Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series

More information

Construction of Vertex-Disjoint Paths in Alternating Group Networks

Construction of Vertex-Disjoint Paths in Alternating Group Networks Construction of Vertex-Disjoint Paths in Alternating Group Networks (April 22, 2009) Shuming Zhou Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian 350108, P.R.

More information

Cycles in the cycle prefix digraph

Cycles in the cycle prefix digraph Ars Combinatoria 60, pp. 171 180 (2001). Cycles in the cycle prefix digraph F. Comellas a, M. Mitjana b a Departament de Matemàtica Aplicada i Telemàtica, UPC Campus Nord, C3, 08034 Barcelona, Catalonia,

More information

Adding Relations in the Same Level of a Linking Pin Type Organization Structure

Adding Relations in the Same Level of a Linking Pin Type Organization Structure Adding Relations in the Same Level of a Linking Pin Type Organization Structure Kiyoshi Sawada Abstract This paper proposes two models of adding relations to a linking pin type organization structure where

More information

MAXIMAL VERTEX-CONNECTIVITY OF S n,k

MAXIMAL VERTEX-CONNECTIVITY OF S n,k MAXIMAL VERTEX-CONNECTIVITY OF S n,k EDDIE CHENG, WILLIAM A. LINDSEY, AND DANIEL E. STEFFY Abstract. The class of star graphs is a popular topology for interconnection networks. However it has certain

More information

On Detecting Multiple Faults in Baseline Interconnection Networks

On Detecting Multiple Faults in Baseline Interconnection Networks On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,

More information

Embed Longest Rings onto Star Graphs with Vertex Faults

Embed Longest Rings onto Star Graphs with Vertex Faults Embed Longest Rings onto Star Graphs with Vertex Faults Sun-Yuan Hsieh, Gen-Huey Chen Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, ROC and Chin-Wen

More information

Biswapped Networks and Their Topological Properties

Biswapped Networks and Their Topological Properties Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Biswapped Networks and Their Topological Properties Wenjun Xiao, Weidong

More information

Enumeration of subtrees of trees

Enumeration of subtrees of trees Enumeration of subtrees of trees Weigen Yan a,b 1 and Yeong-Nan Yeh b a School of Sciences, Jimei University, Xiamen 36101, China b Institute of Mathematics, Academia Sinica, Taipei 1159. Taiwan. Theoretical

More information

PARALLEL computing is important for speeding up

PARALLEL computing is important for speeding up Two Edge-Disjoint Hamiltonian Cycles and Two-Equal Path Partition in Augmented Cubes Ruo-Wei Hung and Chien-Chih Liao Abstract The n-dimensional hypercube networ Q n is one of the most popular interconnection

More information

Information Theory and Statistics Lecture 2: Source coding

Information Theory and Statistics Lecture 2: Source coding Information Theory and Statistics Lecture 2: Source coding Łukasz Dębowski ldebowsk@ipipan.waw.pl Ph. D. Programme 2013/2014 Injections and codes Definition (injection) Function f is called an injection

More information

Computing and Communicating Functions over Sensor Networks

Computing and Communicating Functions over Sensor Networks Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]

More information

Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ

Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Myung M. Bae Scalable POWERparallel Systems, MS/P963, IBM Corp. Poughkeepsie, NY 6 myungbae@us.ibm.com Bella Bose Dept. of Computer Science Oregon

More information

BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs

BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs This paper was presented as part of the Mini-Conference at IEEE INFOCOM 011 BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs Deke Guo, Tao Chen, Dan Li, Yunhao Liu,

More information

α-acyclic Joins Jef Wijsen May 4, 2017

α-acyclic Joins Jef Wijsen May 4, 2017 α-acyclic Joins Jef Wijsen May 4, 2017 1 Motivation Joins in a Distributed Environment Assume the following relations. 1 M[NN, Field of Study, Year] stores data about students of UMONS. For example, (19950423158,

More information

Information Theory with Applications, Math6397 Lecture Notes from September 30, 2014 taken by Ilknur Telkes

Information Theory with Applications, Math6397 Lecture Notes from September 30, 2014 taken by Ilknur Telkes Information Theory with Applications, Math6397 Lecture Notes from September 3, 24 taken by Ilknur Telkes Last Time Kraft inequality (sep.or) prefix code Shannon Fano code Bound for average code-word length

More information

ARTICLE IN PRESS Theoretical Computer Science ( )

ARTICLE IN PRESS Theoretical Computer Science ( ) Theoretical Computer Science ( ) Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Conditional matching preclusion for hypercube-like

More information

One-to-many node-disjoint paths in (n,k)-star graphs

One-to-many node-disjoint paths in (n,k)-star graphs One-to-many node-disjoint paths in (n,k)-star graphs Yonghong Xiang and Iain A. Stewart Department of Computer Science, Durham University, Science Labs, South Road, Durham DH1 3LE, U.K. e-mail: {yonghong.xiang,i.a.stewart}@durham.ac.uk

More information

arxiv: v1 [math.co] 13 May 2016

arxiv: v1 [math.co] 13 May 2016 GENERALISED RAMSEY NUMBERS FOR TWO SETS OF CYCLES MIKAEL HANSSON arxiv:1605.04301v1 [math.co] 13 May 2016 Abstract. We determine several generalised Ramsey numbers for two sets Γ 1 and Γ 2 of cycles, in

More information

Disjoint Path Covers in Cubes of Connected Graphs

Disjoint Path Covers in Cubes of Connected Graphs Disjoint Path Covers in Cubes of Connected Graphs Jung-Heum Park a, Insung Ihm b, a School of Computer Science and Information Engineering The Catholic University of Korea, Bucheon, Korea b Department

More information

Tight Bounds on the Diameter of Gaussian Cubes

Tight Bounds on the Diameter of Gaussian Cubes Tight Bounds on the Diameter of Gaussian Cubes DING-MING KWAI AND BEHROOZ PARHAMI Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106 9560, USA Email: parhami@ece.ucsb.edu

More information

Hamiltonicity of hypercubes with a constraint of required and faulty edges

Hamiltonicity of hypercubes with a constraint of required and faulty edges J Comb Optim (2007) 14: 197 204 DOI 10.1007/s10878-007-9059-3 Hamiltonicity of hypercubes with a constraint of required and faulty edges Lih-Hsing Hsu Shu-Chung Liu Yeong-Nan Yeh Published online: 31 March

More information

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D). 1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting

More information

Graphs with Integer Matching Polynomial Roots

Graphs with Integer Matching Polynomial Roots Graphs with Integer Matching Polynomial Roots S. Akbari a, P. Csikvári b, A. Ghafari a, S. Khalashi Ghezelahmad c, M. Nahvi a a Department of Mathematical Sciences, Sharif University of Technology, Tehran,

More information

Testing Equality in Communication Graphs

Testing Equality in Communication Graphs Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected

More information

Graph Theory and Interconnection Networks

Graph Theory and Interconnection Networks Graph Theory and Interconnection Networks Lih-Hsing Hsu and Cheng-Kuan Lin @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa

More information

Completely Independent Spanning Trees in Some Regular Graphs

Completely Independent Spanning Trees in Some Regular Graphs Completely Independent Spanning Trees in Some Regular Graphs Benoit Darties, Nicolas Gastineau, Olivier Togni To cite this version: Benoit Darties, Nicolas Gastineau, Olivier Togni. Completely Independent

More information

Adding Relations in Multi-levels to an Organization Structure of a Complete Binary Tree Maximizing Total Shortening Path Length

Adding Relations in Multi-levels to an Organization Structure of a Complete Binary Tree Maximizing Total Shortening Path Length Adding Relations in Multi-levels to an Organization Structure of a Complete Binary Tree Maximizing Total Shortening Path Length Kiyoshi Sawada and Kazuyuki Amano Abstract This paper proposes a model of

More information

Particular Solutions for Boolean Algebra Systems.

Particular Solutions for Boolean Algebra Systems. Particular Solutions for Boolean Algebra Systems. Franco Sabino Stoianoff Lindstron Universidad Nacional de La Plata Email: stoianoff2@gmail.com Abstract Any system of big Boolean equations can be reduced

More information

Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph

Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph M. Lemańska a, J. A. Rodríguez-Velázquez b, Rolando Trujillo-Rasua c, a Department of Technical

More information

A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set

A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set Sayaka Kamei and Hirotsugu Kakugawa Tottori University of Environmental Studies Osaka University Dept. of

More information

HYPERCUBE ALGORITHMS FOR IMAGE PROCESSING AND PATTERN RECOGNITION SANJAY RANKA SARTAJ SAHNI Sanjay Ranka and Sartaj Sahni

HYPERCUBE ALGORITHMS FOR IMAGE PROCESSING AND PATTERN RECOGNITION SANJAY RANKA SARTAJ SAHNI Sanjay Ranka and Sartaj Sahni HYPERCUBE ALGORITHMS FOR IMAGE PROCESSING AND PATTERN RECOGNITION SANJAY RANKA SARTAJ SAHNI 1989 Sanjay Ranka and Sartaj Sahni 1 2 Chapter 1 Introduction 1.1 Parallel Architectures Parallel computers may

More information

Node-to-set disjoint-path routing in perfect hierarchical hypercubes

Node-to-set disjoint-path routing in perfect hierarchical hypercubes Available online at www.sciencedirect.com Procedia Computer Science 4 (2011) 442 451 International Conference on Computational Science, ICCS 2011 Node-to-set disoint-path routing in perfect hierarchical

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

The Restricted Edge-Connectivity of Kautz Undirected Graphs

The Restricted Edge-Connectivity of Kautz Undirected Graphs The Restricted Edge-Connectivity of Kautz Undirected Graphs Ying-Mei Fan College of Mathematics and Information Science Guangxi University, Nanning, Guangxi, 530004, China Jun-Ming Xu Min Lü Department

More information

No.5 Node Grouping in System-Level Fault Diagnosis 475 identified under above strategy is precise in the sense that all nodes in F are truly faulty an

No.5 Node Grouping in System-Level Fault Diagnosis 475 identified under above strategy is precise in the sense that all nodes in F are truly faulty an Vol.16 No.5 J. Comput. Sci. & Technol. Sept. 2001 Node Grouping in System-Level Fault Diagnosis ZHANG Dafang (± ) 1, XIE Gaogang (ΞΛ ) 1 and MIN Yinghua ( ΠΦ) 2 1 Department of Computer Science, Hunan

More information

Spanning trees with minimum weighted degrees

Spanning trees with minimum weighted degrees Spanning trees with minimum weighted degrees Mohammad Ghodsi Hamid Mahini Kian Mirjalali Shayan Oveis Gharan Amin S. Sayedi R. Morteza Zadimoghaddam Abstract Given a metric graph G, we are concerned with

More information

by applying two pairs of confocal cylindrical lenses

by applying two pairs of confocal cylindrical lenses Title:Design of optical circulators with a small-aperture Faraday rotator by applying two pairs of confocal Author(s): Yung Hsu Class: 2nd year of Department of Photonics Student ID: M0100579 Course: Master

More information

Paths and cycles in extended and decomposable digraphs

Paths and cycles in extended and decomposable digraphs Paths and cycles in extended and decomposable digraphs Jørgen Bang-Jensen Gregory Gutin Department of Mathematics and Computer Science Odense University, Denmark Abstract We consider digraphs called extended

More information

A Linear-Time Algorithm for the Terminal Path Cover Problem in Cographs

A Linear-Time Algorithm for the Terminal Path Cover Problem in Cographs A Linear-Time Algorithm for the Terminal Path Cover Problem in Cographs Ruo-Wei Hung Department of Information Management Nan-Kai Institute of Technology, Tsao-Tun, Nantou 54, Taiwan rwhung@nkc.edu.tw

More information

Approximability of Packing Disjoint Cycles

Approximability of Packing Disjoint Cycles Approximability of Packing Disjoint Cycles Zachary Friggstad Mohammad R. Salavatipour Department of Computing Science University of Alberta Edmonton, Alberta T6G 2E8, Canada zacharyf,mreza@cs.ualberta.ca

More information

Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform

Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang and Duan-Shin Lee Institute of Communications Engineering National Tsing Hua University

More information

1 Matchings in Non-Bipartite Graphs

1 Matchings in Non-Bipartite Graphs CS 598CSC: Combinatorial Optimization Lecture date: Feb 9, 010 Instructor: Chandra Chekuri Scribe: Matthew Yancey 1 Matchings in Non-Bipartite Graphs We discuss matching in general undirected graphs. Given

More information

XOR - XNOR Gates. The graphic symbol and truth table of XOR gate is shown in the figure.

XOR - XNOR Gates. The graphic symbol and truth table of XOR gate is shown in the figure. XOR - XNOR Gates Lesson Objectives: In addition to AND, OR, NOT, NAND and NOR gates, exclusive-or (XOR) and exclusive-nor (XNOR) gates are also used in the design of digital circuits. These have special

More information

CMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015

CMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015 NAME: CMPSCI 611 Advanced Algorithms Midterm Exam Fall 015 A. McGregor 1 October 015 DIRECTIONS: Do not turn over the page until you are told to do so. This is a closed book exam. No communicating with

More information

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers

More information

Hamiltonian cycles in circulant digraphs with jumps 2, 3, c [We need a real title???]

Hamiltonian cycles in circulant digraphs with jumps 2, 3, c [We need a real title???] Hamiltonian cycles in circulant digraphs with jumps,, c [We need a real title???] Abstract [We need an abstract???] 1 Introduction It is not known which circulant digraphs have hamiltonian cycles; this

More information

Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia

Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction

More information

Wide diameters of de Bruijn graphs

Wide diameters of de Bruijn graphs J Comb Optim (2007) 14: 143 152 DOI 10.1007/s10878-007-9066-4 Wide diameters of de Bruijn graphs Jyhmin Kuo Hung-Lin Fu Published online: 14 April 2007 Springer Science+Business Media, LLC 2007 Abstract

More information

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE International Journal of Applied Mathematics Volume 31 No. 18, 41-49 ISSN: 1311-178 (printed version); ISSN: 1314-86 (on-line version) doi: http://dx.doi.org/1.173/ijam.v31i.6 LIMITING PROBABILITY TRANSITION

More information

Asymptotic redundancy and prolixity

Asymptotic redundancy and prolixity Asymptotic redundancy and prolixity Yuval Dagan, Yuval Filmus, and Shay Moran April 6, 2017 Abstract Gallager (1978) considered the worst-case redundancy of Huffman codes as the maximum probability tends

More information

A Linear Programming Duality Approach to Analyzing Strictly Nonblocking d-ary Multilog Networks under General Crosstalk Constraints

A Linear Programming Duality Approach to Analyzing Strictly Nonblocking d-ary Multilog Networks under General Crosstalk Constraints A Linear Programming Duality Approach to Analyzing Strictly Nonblocking d-ary Multilog Networks under General Crosstalk Constraints Hung Q. Ngo, Anh Le, and Yang Wang Computer Science and Engineering,

More information

c 1999 Society for Industrial and Applied Mathematics

c 1999 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 1, No. 1, pp. 64 77 c 1999 Society for Industrial and Applied Mathematics OPTIMAL BOUNDS FOR MATCHING ROUTING ON TREES LOUXIN ZHANG Abstract. The permutation routing problem

More information

Perfect Dominating Sets in Gaussian Graphs

Perfect Dominating Sets in Gaussian Graphs Perfect Dominating Sets in Gaussian Graphs Carmen Martínez 1, Miquel Moretó 2 and Ramón Beivide 3. Abstract Gaussian Graphs are introduced and analyzed in this paper. The set of vertices of these Cayley

More information

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Sunghwan Kim, Jong-Seon No School of Electrical Eng. & Com. Sci. Seoul National University, Seoul, Korea Email: {nodoubt, jsno}@snu.ac.kr

More information

Single-Image-Based Rain and Snow Removal Using Multi-guided Filter

Single-Image-Based Rain and Snow Removal Using Multi-guided Filter Single-Image-Based Rain and Snow Removal Using Multi-guided Filter Xianhui Zheng 1, Yinghao Liao 1,,WeiGuo 2, Xueyang Fu 2, and Xinghao Ding 2 1 Department of Electronic Engineering, Xiamen University,

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters (009) 15 130 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: www.elsevier.com/locate/aml Spectral characterizations of sandglass graphs

More information

Online Packet Routing on Linear Arrays and Rings

Online Packet Routing on Linear Arrays and Rings Proc. 28th ICALP, LNCS 2076, pp. 773-784, 2001 Online Packet Routing on Linear Arrays and Rings Jessen T. Havill Department of Mathematics and Computer Science Denison University Granville, OH 43023 USA

More information

Bicyclic digraphs with extremal skew energy

Bicyclic digraphs with extremal skew energy Electronic Journal of Linear Algebra Volume 3 Volume 3 (01) Article 01 Bicyclic digraphs with extremal skew energy Xiaoling Shen Yoaping Hou yphou@hunnu.edu.cn Chongyan Zhang Follow this and additional

More information

Hamiltonian chromatic number of block graphs

Hamiltonian chromatic number of block graphs Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 21, no. 3, pp. 353 369 (2017) DOI: 10.7155/jgaa.00420 Hamiltonian chromatic number of block graphs Devsi Bantva 1 1 Lukhdhirji Engineering

More information

Consensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication Topologies

Consensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication Topologies Proceedings of the World Congress on Engineering and Computer Science Vol I WCECS, October 9-,, San Francisco, USA Consensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication

More information

A Short Proof of the VPN Tree Routing Conjecture on Ring Networks

A Short Proof of the VPN Tree Routing Conjecture on Ring Networks A Short Proof of the VPN Tree Routing Conjecture on Ring Networs Fabrizio Grandoni Voler Kaibel Gianpaolo Oriolo Martin Sutella January 15, 008 Abstract Only recently, Hurens, Keijsper, and Stougie proved

More information

arxiv: v2 [math.co] 7 Jan 2016

arxiv: v2 [math.co] 7 Jan 2016 Global Cycle Properties in Locally Isometric Graphs arxiv:1506.03310v2 [math.co] 7 Jan 2016 Adam Borchert, Skylar Nicol, Ortrud R. Oellermann Department of Mathematics and Statistics University of Winnipeg,

More information

Finding a longest common subsequence between a run-length-encoded string and an uncompressed string

Finding a longest common subsequence between a run-length-encoded string and an uncompressed string Journal of Complexity 24 (2008) 173 184 www.elsevier.com/locate/jco Finding a longest common subsequence between a run-length-encoded string and an uncompressed string J.J. Liu a, Y.L. Wang b,, R.C.T.

More information

Research Article On Counting and Embedding a Subclass of Height-Balanced Trees

Research Article On Counting and Embedding a Subclass of Height-Balanced Trees Modelling and Simulation in Engineering, Article ID 748941, 5 pages http://dxdoiorg/101155/2014/748941 Research Article On Counting and Embedding a Subclass of Height-Balanced Trees Indhumathi Raman School

More information

The Generalization of Quicksort

The Generalization of Quicksort The Generalization of Quicksort Shyue-Horng Shiau Chang-Biau Yang Ý Department of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung, Taiwan 804, Republic of China shiaush@cse.nsysu.edu.tw

More information

DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS

DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS JOEL BAKER Abstract. The goal of this expository paper is to introduce De Bruijn graphs and discuss their applications to fault tolerant

More information

arxiv: v1 [cs.gr] 25 Nov 2015

arxiv: v1 [cs.gr] 25 Nov 2015 EMBEDDING OF HYPERCUBE INTO CYLINDER WEIXING JI, QINGHUI LIU, GUIZHEN WANG, AND ZHUOJIA SHEN arxiv:1511.07932v1 [cs.gr] 25 Nov 2015 Abstract. Task mapping in modern high performance parallel computers

More information

Efficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem

Efficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem Efficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem Hsing-Yen Ann National Center for High-Performance Computing Tainan 74147, Taiwan Chang-Biau Yang and Chiou-Ting

More information

The super connectivity of shuffle-cubes

The super connectivity of shuffle-cubes Information Processing Letters 96 (2005) 123 127 www.elsevier.com/locate/ipl The super connectivity of shuffle-cubes Jun-Ming Xu a,,minxu b, Qiang Zhu c a Department of Mathematics, University of Science

More information

Part 2: Random Routing and Load Balancing

Part 2: Random Routing and Load Balancing 1 Part 2: Random Routing and Load Balancing Sid C-K Chau Chi-Kin.Chau@cl.cam.ac.uk http://www.cl.cam.ac.uk/~ckc25/teaching Problem: Traffic Routing 2 Suppose you are in charge of transportation. What do

More information

Time Synchronization

Time Synchronization Massachusetts Institute of Technology Lecture 7 6.895: Advanced Distributed Algorithms March 6, 2006 Professor Nancy Lynch Time Synchronization Readings: Fan, Lynch. Gradient clock synchronization Attiya,

More information

Approximation Algorithms for the Consecutive Ones Submatrix Problem on Sparse Matrices

Approximation Algorithms for the Consecutive Ones Submatrix Problem on Sparse Matrices Approximation Algorithms for the Consecutive Ones Submatrix Problem on Sparse Matrices Jinsong Tan and Louxin Zhang Department of Mathematics, National University of Singaproe 2 Science Drive 2, Singapore

More information

4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd

4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd 4.8 Huffman Codes These lecture slides are supplied by Mathijs de Weerd Data Compression Q. Given a text that uses 32 symbols (26 different letters, space, and some punctuation characters), how can we

More information

an author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)

More information

A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ

A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ NICOLAS FORD Abstract. The goal of this paper is to present a proof of the Nullstellensatz using tools from a branch of logic called model theory. In

More information

The maximum edge-disjoint paths problem in complete graphs

The maximum edge-disjoint paths problem in complete graphs Theoretical Computer Science 399 (2008) 128 140 www.elsevier.com/locate/tcs The maximum edge-disjoint paths problem in complete graphs Adrian Kosowski Department of Algorithms and System Modeling, Gdańsk

More information

Combinatorial Properties of Modified Chordal Rings Degree Four Networks

Combinatorial Properties of Modified Chordal Rings Degree Four Networks Journal of Computer Science 6 (3): 79-84, 00 ISSN 549-3636 00 Science Publications Combinatorial Properties of Modified Chordal Rings Degree Four Networks R.N. Farah,, M.Othman and 3 M.H. Selamat Laboratory

More information

Hamiltonian problem on claw-free and almost distance-hereditary graphs

Hamiltonian problem on claw-free and almost distance-hereditary graphs Discrete Mathematics 308 (2008) 6558 6563 www.elsevier.com/locate/disc Note Hamiltonian problem on claw-free and almost distance-hereditary graphs Jinfeng Feng, Yubao Guo Lehrstuhl C für Mathematik, RWTH

More information

General Methods for Algorithm Design

General Methods for Algorithm Design General Methods for Algorithm Design 1. Dynamic Programming Multiplication of matrices Elements of the dynamic programming Optimal triangulation of polygons Longest common subsequence 2. Greedy Methods

More information

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information