The Maximum Dimensional Fault-Free Subcube Allocatable in Faulty Hypercube
|
|
- Nathaniel Gray
- 5 years ago
- Views:
Transcription
1 The Maximum Dimensional FaultFree Subcube Allocatable in Faulty Hypercube Hiroshi Masuyama Information and Knowledge Engineering, Tottori 0 Japan Toshihiko Sasama Graduate School, Tottori 0 Japan Hiroyuki Hashimoto Graduate School Tottori 0 Japan Abstrust The maximum dimensional subcube located in faulty hypercubes is studied in this paper. Most parallel algorithms can be formulated with the dimension n of the hypercube being a parameter of the algorithm. The reconfiguration problem in a hypercube reduces to finding the maximum dimensional faultfree subcube in the hypercube, that is, helps in achieving graceful and the most effective degradation of the system. Thai paper presents the maximum, number of faults on an n (n 2)subcube. key words: Hypercube, Fault Tolerance, Allocation, The Maximum Dimemional FaultFree Subcube 1 Introduction Different but related approaches to hypercube faulttolerance have been reported. Chang and Bhuyan [l] present,ed a modified subcube partitioning strategy to construct faultfree subcubes in a hypercube with faults. The technique selects a regular (n 1)cube and then the faulty node in the selected (n 1)cube is replaced with its corresponding nonfaulty node in the other (n 1)cube. They showed that [n/21 faults ca.n be tolerated in the worst case by the modified subcube partitioning technique while maintaining a faultfree (n 1)cube. Yang and Raghavendra [2] presented a distributed scheme for the reconfiguration of an embedded binary tree into a hypercube with faults. In this scheme, the faulty node in the selected binary tree is replaced with a nonfaulty node which is out of the tree and at Hamming Distance 1. Horng and Kleinrock [3] proposed a set of techniques to restore the regularity of a Boolean ncube network in the presence of node failures. The shortest path between any node pair in the modified faultfree network holds the shortest property also in the nchbe. Bruck et al. [] studied a technique to obtain tolerant partitions by which partitioned m cube S is guaranteed such that S conta,ins a connected component of 2m1 + 1 or more nonfaulty nodes. Most parallel algorithms can be formulated with the dimension n of the hypercube being a parameter of the algorithm []. Since a subcube is a subset of a hypercube which preserves the properties of hypercube, the reconfiguration problem in a faulty hypercube re duces to find the maximum dimensional faultfree subcube. B.Becker and H.U.Simon [] presented simple procedures to find a maximal dimension of a faultfree subcube. F.Ozgiiner and C.Aykanat [B] also presented a procedure to find the maximum dimensional faultfree subcube where the principle of inclusionexclusion is used. This procedure can always give the maximum dimension d, the number of faultfree dsubcubes, and the complete set of faultfree dsubcubes. Another algebraic technique, called ATARIC 11, was reported. ATARIC uses two algebraic operators # and $ to identify the maximum dimensional faultfree subcube. These presented procedures are all based on the given addresses of faulty nodes. In this paper, we will try to formulate the maximum dimension of a faultfree subcube located in a faulty hypercube when the number of faults is given. It will be assumed throughout this paper that all faults are static and are known. Both nodes and edges may be faulty. However, we will only consider node faults, as an edge fault can be tolerated by assuming that one of the node s incidence upon it is faulty. It will be assumed that faulty nodes can neither perform computation nor communication. 2 Any Dimensional Subcube Allocation The ncube network consists of 2 nodes, each of which are numbered from 0 to 2 1 by nbit binary numbers an1a,2... a0, called the address of the node. Any two nodes on an ncube are adjacent iff their addresses differ by exactly one bit. A subcube of dimension m, denoted by an msubcube, is addressed by a string of n symbols drawn from the set {0,1, *}, where * is a don t care symbol. Coordinate values 0 and 1 can be referred to as the fixed or bounded coordinates and * as a free coordinate. An msubcube on an ncube has (n m) bounded coordinates and m free coordinates. For example, in a cube, nodes 0000,0001,0010 and 0011 form a 2cube addressed by 0 0 ~. [Property 11: The number of faults on an n(> 3) (n 2)subcube is not over n. 0110/9 $ IEEE 220
2 Proof: We first assume any index represented in the binary system with n bits. Let f' be a set of indices which includes different kinds of ordered pairs (l,l),(l,o),(o,l) and (0,O) for every bit pair i and j (i # j ) in n (2 3) bits. Then, F is given in the following equation: F= {(anlan2an3... azalao), (Un]Qngang *..z2z]eo), (enlan2an3 ''.izzlco),... (cnlcnzcn3 '.. Uzalzr3), (izn1zn2izn3...e2zl'lao)} j means that there exists no faultfree (n2)subcube when F is assumed to be a set of faulty nodes on n cube. The existence of proves Property 1. Q.E.D. The hypercube we consider is assumed to be n 2 3, which is satisfied with the property mentioned in the above proof. Next, we will try to extend an faultfree (n 2) subcube allocation up to an arbitrary msubcuhe allocation. [Property 21: The number of faults on an n( 2 3) (n 3)subcube is not over (2n 1). Proof: In this proof, in order to evaluate faultfree (n 3)subcubes, the condition of faultfree n 2) subcube to exist on ncube is utilized. We wil r divide an ncube into two n 1)subcubes and discuss the minimum number o I faults such that there exists no faultfree (n 3)subcube in an (n 1)cube. Namely, we will show that 2n faults on an ncube are sufficient to exist exactly one fault in every (n 3)subcube. In Property 1, we have introduced a set F of faults such that there exists no faultfree (n 2)subcube on an ncube. We will apply n 1 + n in F to obtain a set Fnl of faults such that there exists no faultfree (n S)subcube in an (n 1)cube. Then, Fnl is given in the following equation: pn1 = { (an2an3 ' '. a]uo), (anzan3 ' ' ' also), (zn2an3 ' ' alzo),... (znzzn3.' ' alzf)), (zn2zn3 ' ' 'zlao)} We obtain ljnl 1 = n. Thus, if each (n 1)subcube includes at least n faults, then there not always exist one faultfree (n 3)subcube on ncube. In other words, 2n is the number of faults such that there exists at least one fault in every (n 3)subcube on an n cube. According to Property 1, we will discuss the lnumber of faultfree disjoint (n3)subcubes on an ncube when the number of faults is 2n or more. Assume that there are 2n faults on an ncube. On the condition that the number of faultfree (n 3)subcubes is zero on the ncube, we can consider only one case such that one (n 1)subcube includes n faults and the other includes n faults. That is, by applying Property 1 to an (n 1)cube, we obtain that there not always exists one faultfree (n 3)subcube in the both (n 1) cubes which has at least n faults in each. Therefore, Property 2 is proven. Q. E.D. [Property 31: The number of faults on an n dimensional hypercube on which there always exists at least one faultfree (n i 2)subcube is not over P(n i + 1) 1. Proof: We will prove that 2'(n i+ 1) is the number of faults such that there not always exists faultfree (n i 2)subcube on an ncube. By using Properties 1 and 2, we will obtain the number of faults such that all disjoint (n i 2)subcubes in each one of 2i disjoint (n i)subcubes are able to be not faultfree. The case of i = 0: An (n i = n)subcube is an ncube. From Property 1, we obtain that (n + 1) is the number of faults such that all (n i 2 = n 2) subcubes are able to be not faultfree on the ncube. Then, the address set of faulty nodes is F. The case of i = 1: Iin the proof of Property 2, we obtain that n is the inumber of faults such that all disjoint (n i 2 = 2 3)subcubes are able to be not faultfree in each (n i = n 1)subcube. Then, the address set of faulty nodes is obtained in the following discussion. The addresses of any 2l n 1)subcubes are obtained by rewriting address I UnlU,2...aj+1ajaj1...alal)) to (**...*1*...**) and (**...*O*...**), where * means don't care. Let n + n 1 be in F and alpply F to (n 1) bits with *. We obtain an address set of faulty nodes such that all disjoint (n 3)subcubes are able to be not faultfree in an (n 1)subcube (* *... * 1 *... * *). We can perform the same discussion in the case of another (n 1)subcube (* *... * 0 *... * *). The total number of faults in these two (n 1)subcubes is clearly twice n. The case of i 2 2: Let's evaluate the addresses of faulty nodes such that all (disjoint (n i 2)subcutbes are able to be not faultfree in any (n i)subcube. In the case of i = 1, we could induce the address set of faulty nodes from F by taking n 1 + n. In the case where all disjoint (n i 2)subcubes are able to be not faultfree in any (n 1')cube which is set i bits to fixed values, the address set of faulty nodes is induced by taking n i t n. Since the number of faulty nodes is (n i + 1) in each (n i)subcube, then we obtain 2"n i + 1). Q.E.D. Let us remember that, the minimum number of faults on an n(> 3)cube on which there always exists no faultfree (n m)subcube is the minimum number E of indices such that every E mbit binary numbers composed of m bits in each of E indices can cover all 2 binary numbers. 3 (n 2)Dimensional Subcube Allocat ion In this section, we will focus on faultfree (n 2) subcubes and try to bring the number 2*(n i+ 1) 1 presented in Property 3 close to the optimum value. Let be the minimum set of indices which includes different kinds of ordered pairs (1, l), (1,0),(0, l), and (0,O) for every bit pair i and j (i # j)in n(> 3) bits. Let Fk be F when n = IC. = {(a2alao),(a2~1~1), (i2alib), ( ~ ~ i a o ) } Since IF1 2, then F3 = F when n = 3. We can cal 221
3 culate F when n = in an exhaustive method. Now, we estimate the time complexity to calculate F with = 1 in this method. The calculation procedure is as follows : Select 1 indices which make a new combination in a set of 2" indices, and judge whether there exist different kinds of ordered pairs or not for every bit pair in the 1 indices. Therefore, the upper bound of the time complexity can be given as follows : M {(2"/2)2"/(//2)'((2" 1)/2pnl)}. 21' {(n 1)n/2} Then, the order of the upper bound of the time complexity is O(2'". 11'. n2). The time complexity to calculate F becomes tremendous as n becomes very large, but F can be calculated within the realistic range, that is, n 1. The calculated values of F when n 1 are shown in Table 1. When n = 1, the fact F # is calculated. Next, we will formalize an approximate value F( 2 F) of F. Let Fk and Fk be F and F when n = k, respectively. Fk can be calculated by using FkI( > k'). Since IF/ = is known in an exhaustive method, we get F = F = F. J.Bruck, et al. [] said in Corollary that F =. For n 2, we will calculate Fk without Fk. For the expression~l simplicity, we express one index by one row, and Fk with IFkI = 1 by a matrix with 1 rows and k columns. Fk can be expressed by using two 's, three f i t 's, and six &j's as shown in Fig.1 (a), (b), and (c), respectively. The point to express F k shown in Fig.1 (a), (b, and (c) is as follows : Since there always exist all kin d s of ordered pairs for every bit pair in one &I and there always exist only 2 ordered pairs (0,O) and (1,l) for every bit pair whose 2 bits are in different Fk's each other, we need the minimum number of indices to make 2 ordered pairs ( 1,O) and (0,l) for every bit pair whose 2 bits are in different Fk each other. These minimum numbers of required indices are 2, 3, and when the numbers of basic PkT's are 2, 3, and, respectively, as shown in Fig.l(a), (b), and (cb When mk' # k, in order to set n =, eliminate any its from every index with mk' bits. The important point is to select the combination lead to IFk I = minimum. The expressions of Fk shown in Fig.1 (a), (b), and (c) will be referred to as types 2&, 3fi), and fi1, respectively. Let us calculate F. =. By using type 2F3, we get F with six bit indices. <.lfgi.,fs with six bit indices can be obhined by eliminating any one bit from F. Let_ us next calculate Fg. By using type 3F3, we get Fg with seven 9bit indices. IF91 < 1Fgl. F with indices and F with indices can be eliminating any 2 bits and 1 bit, respectively, from every index in Fg. _Though F can be also obtained by using type 2F, b0t.h types 3F3 and 2F require indices. Any F k can obtained by extending this method. On condition that the number of required indices must be as _small aspossible, though single type 2F3,3F3,F3,2F, or 3F is adequate to express any F, for n 1, a hierarchical design by using several different types can be also introduced. From the above discussion, IFnI can be formalized. In the case where type mf3(m = 2,3,) is used, since 2"'.3a2."3(> n) = 3.2"'.3uz1."3(cu2 2 1), then types 2F3,3F3, and F3 must be used al,(a2 l), and 0 3 times, respectively. This fact leads to IFnI = + 2al+ 3(az 1) On the other hand, in the case where type mf is used, since 2a1.3aa."3(> n) =. 2a12 ' + 3"2 a3(012 a), then types 2F,3, and F must be used (a1 2),02, and 03, respectively. This fact leads to IFn I = + 2(al 2) The final formula of IFn I is defined as follows: For a1, az, and a3 given from 3 ~ < 2a1. 3a2. a3, lfnl = min( + 2a1 + 3a2 + a3 (for a2 2 I), +2((~1'2)+3a2+a3 (for a1 2 2)) I obtained from the above equation is presented IFn in Table 1. From the above discussion, we can present the following theorem without the proof. [Theorem 11: The number of faults on an n(2 3) (n 2)subcube is not over IFn/. We will present the other theorem. This theorem depends on the following easy lemmas. [Lemma 11: For all n 2, given at most 1 faulty Table.1 n I The number of required indices. () () () IF" I I employed type 2B 2B 3B or 2B 3% or 2Fi 3% g or 3B % or 3F 3 or 3i$ B F3 % B B 222
4 node in an (n 1)subcube, there exist two disjoint faultfree (n 2) and (n 3)subcubes which can take any dimensions. Proof: Obvious. pemma 21: For all n 2, given at most LIFrF;II.I/2J fau ty nodes in an (n 1)subcube, there exist two disjoint faultfree (n 3)subcubes. Proof: Obvious. The above two lemmas lead to that, given at most 1 and LIPn 1/21 faulty nodes in an (n 1) and the other n 1)subcubes respectively, there exist two (n 2)subcubes. [Theorem 21: For all n 2, given any set of F consisting of lfnl [lfnl/2] or fewer faulty nodes on an ncube, there exist at least two faultfree disjoint (n 2)subcube. Proof: lfnl is the minimum number of faulls on an ncube on which there always exists at least, one fault on every disjoint (n 2)subcube. Given IFn/ faulty nodes in an ncube, the distributions of the faulty nodes are classified into three types : Types 1, 2, and 3 are that the ncube has zero, one, and two or more faultfree disjoint (n 2)subcubes respectively. Since the last type satisfies this theorem, let us prove this theorem in the case of Types 1 and 2. Type 1 : On condition that an ncube has no fault free (n 2)subcube, the ncube has two (n 1) subcubes on which faults must be well bal anced in the faulty nodes distribution, t,hat is, one (n 1)subcube is occupied by [li; n1/21 faults and the other by llfn 1/21 faults. Therefore, if LIPn 1/21 faults are removed, then the distributions of the remaining (lfnl LIFnl/2J) faulty nodes can be classified into the following two cases : Every two disjoint (n 1) subcubes have one and L1pn1/2 faulty nodes respectively, and every two disjoint (!I 1)subcubes have zero and [IFn1/21 faulty nodes respectively. In the former case, this theorem can be proven by Lemmas 1 and 2. In the latter case, this theorem can be proven by the result that one (n 1)subcube becomes faultfree. Type 2 : On condition that an ncube ha3 only one faultfree (n 2)subcube, the ncube has two (n 1)subcubes on which IFn[ faults must be idso well balanced in the faulty nodes distribution. Therefore, if LlFn1/21 faults are removed, there always errist two disjoint (n 1)subcubes which have at most one and at most klfnl/21 faults respectively. In this case, the theorem can be also proven by Lemmas P and 2. Q.E.D. Fig.2 shows a cube which possesses two disjoint faultfree 3subcubes. Next, from a different angle, we will formalize a different approximate value F (1 p) of P. Let F be also a set of indices which include different kinds of ordered pairs (1,1>, (l,o), (0, l), and (0,O) of 2 different bits i and j for every pair i and j in n(> 3) bits, as shown in Fig.3 (a) and (b) where F is shown by a matrix in the same way as F. In this figure, F has Q indices whose bit len th is alcj where 1 j [(a 1)/21 1 in fa), [(a 1)/2] + 1 j cy 1 in (b). A set of indices in the square solid line in Fig.3 (a) always includes three kinds of ordered pairs (1, Ci), (0, l), and (0,O) for every bit pair, but not always includes 1,1>. Therefore, a special index ( ) is prepare for the lacked ordered pair (1,l). On the other hand, a set of indices in the square solid line in Fig.S(b) always includes three kinds of ordered pairs (1,0),(0, l), and (1,l) for every bit pair, brit not always includes (0,O). A special index ( ) is prepared for the lacked ordered pair (0,O). Notice that F in the case j = 1 conforms to F, and that there exists a bit complement relation between two F s in Fig.3 (a) and (b) The optimum F 223
5 is F defined by the minimum a. We will present the following property for F shown in Fig.3 (a). [Property 1: The optimum F is given by a on condition that (o1)c(r(a1)/211) is minimum but equal or greater than n. Proof: The optimum F is given by the minimum a which satisfies the condition alcj 2 n. The minimum a which makes alc, maximum is given on condition that l(a 1)/2 jl = minimum. Q.E.D. For n 1, IF I = lfnl. Therefore, F is the minimum set of indices which includes different kinds of ordered pair (1, l), (1, 0), (0, l), and (0,O) for every bit pair in n 1. Conclusion In this paper, the maximum dimension of faultfree subcube located in a faulty hypercube when the number of faults was given was formulated. This paper is leaving the formalization of the maximum number of faults located on an ncube on which there always exists at least one faultfree m(< n 2) subcube. The time complexity to calculate the maximum number in an exhaustive method is tremendous as n becomes large, then the formalization of the maximum number is significant. References [l] Y. Chang and L.N. Bhuyan, Fault Tolerant Subcube Allocation in Hypercubes, Proc. Int I Conf. on Parallel Processing, pp.i , [2] P.J. Yang and C.S. Raghavendra, Reconfiguration of Binary Trees in Faulty Hypercubes, Proc. th Int Parallel Processing Symp., pp.010, April [3] M. Horng and L. Kleinrock, FaultTolerant Routing with Regularity Restoration in Boolean ncube Interconnection Networks, Proc. IEEE Symp. on Parallel and Distributed Processing, pp., Dec [] J. Bruck et al., Tolerating Faults in Hypercubes Using Subcube Partitioning, IEEE Tkans. Comput., Vo1.1, No., pp.990, May [] B.Becker and H.U.Simon, How Robust is the n Cube?, Proc. 2th IEEE Symposium on Foundations of Computer Science, pp , Oct. 19. [] F.0zgiiner and C.Aykanat, A Reconfiguration Algorithm for Fault Tolerance in a Hypercube Multiprocessor, Information Processing Letters, Vo1.29, pp.22, Nov. 19. [] S.Rai and J.L.Trahan, ATARIC : An Algebraic Technique to Analyze Reconfiguration for Fault Tolerance in a Hypercube, Proc. 3rd IEEE Symposium on Parallel and Distributed Processing, pp., Dec [] J.Brruck et al., Embedding CubeConnected Cycles Graphs into Faulty Hypercubes, IEEE Trans. Comput., vo1.3, No.10, pp , Oct a 1 lj (a) R column vector with weight j a c ~ J column vectors with weight j aicj A (ha1) /2k 1 s j sa2)... a1 (b) a column vector with weight j I c J column vectors with weight j Fig.2 A cube which possesses two disjoint Fig.3 A method to make F. faultfree 3subcubes. 22
Edge-pancyclicity of Möbius cubes
Information Processing Letters 96 (25) 136 14 www.elsevier.com/locate/ipl Edge-pancyclicity of Möbius cubes Min Xu a,b, Jun-Ming Xu b, a Institute of Applied Mathematics, Academy of Mathematics and Systems
More informationHybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model
Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis
More informationAlgebraic Properties and Panconnectivity of Folded Hypercubes
Algebraic Properties and Panconnectivity of Folded Hypercubes Meijie Ma a Jun-Ming Xu b a School of Mathematics and System Science, Shandong University Jinan, 50100, China b Department of Mathematics,
More informationTight Bounds on the Diameter of Gaussian Cubes
Tight Bounds on the Diameter of Gaussian Cubes DING-MING KWAI AND BEHROOZ PARHAMI Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106 9560, USA Email: parhami@ece.ucsb.edu
More informationInadmissible Class of Boolean Functions under Stuck-at Faults
Inadmissible Class of Boolean Functions under Stuck-at Faults Debesh K. Das 1, Debabani Chowdhury 1, Bhargab B. Bhattacharya 2, Tsutomu Sasao 3 1 Computer Sc. & Engg. Dept., Jadavpur University, Kolkata
More informationARTICLE IN PRESS Theoretical Computer Science ( )
Theoretical Computer Science ( ) Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Conditional matching preclusion for hypercube-like
More informationEmbed Longest Rings onto Star Graphs with Vertex Faults
Embed Longest Rings onto Star Graphs with Vertex Faults Sun-Yuan Hsieh, Gen-Huey Chen Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, ROC and Chin-Wen
More informationEMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES
EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES NELSON CASTAÑEDA AND IVAN S. GOTCHEV Abstract. An important task in the theory of hypercubes is to establish the maximum integer f n such that for every set
More informationBiswapped Networks and Their Topological Properties
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Biswapped Networks and Their Topological Properties Wenjun Xiao, Weidong
More informationHypercube Network Fault Tolerance: A Probabilistic Approach
Journal of Interconnection Networks c World Scientific Publishing Company Hypercube Network Fault Tolerance: A Probabilistic Approach JIANER CHEN Department of Computer Science, Texas A&M University College
More informationConquering Edge Faults in a Butterfly with Automorphisms
International Conference on Theoretical and Mathematical Foundations of Computer Science (TMFCS-0) Conquering Edge Faults in a Butterfly with Automorphisms Meghanad D. Wagh and Khadidja Bendjilali Department
More informationPARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes
Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Ruo-Wei Hung, Shang-Ju Chan, and Chien-Chih Liao Abstract The presence of edge-disjoint Hamiltonian
More informationBipanconnectivity of Cartesian product networks
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 46 (2010), Pages 297 306 Bipanconnectivity of Cartesian product networks You Lu Jun-Ming Xu Department of Mathematics University of Science and Technology of
More informationOn the Embedding of a Class of Regular Graphs. Yu-Chee Tseng and Ten-Hwang Lai. Department of Computer and Information Science
On the Embedding of a lass of Regular Graphs in a Faulty Hypercube Yu-hee Tseng and Ten-Hwang Lai Department of omputer and Information Science The Ohio State University olumbus, Ohio 432 Tel: (64)292-583,
More informationarxiv: v1 [cs.gr] 25 Nov 2015
EMBEDDING OF HYPERCUBE INTO CYLINDER WEIXING JI, QINGHUI LIU, GUIZHEN WANG, AND ZHUOJIA SHEN arxiv:1511.07932v1 [cs.gr] 25 Nov 2015 Abstract. Task mapping in modern high performance parallel computers
More informationOn Detecting Multiple Faults in Baseline Interconnection Networks
On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,
More informationPARALLEL computing is important for speeding up
Two Edge-Disjoint Hamiltonian Cycles and Two-Equal Path Partition in Augmented Cubes Ruo-Wei Hung and Chien-Chih Liao Abstract The n-dimensional hypercube networ Q n is one of the most popular interconnection
More informationNode-to-set disjoint-path routing in perfect hierarchical hypercubes
Available online at www.sciencedirect.com Procedia Computer Science 4 (2011) 442 451 International Conference on Computational Science, ICCS 2011 Node-to-set disoint-path routing in perfect hierarchical
More informationPancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network
Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Jung-Sheng Fu Takming College, Taipei, TAIWAN jsfu@mail.takming.edu.tw Gen-Huey Chen Department of Computer Science and Information
More informationSequential Logic Optimization. Optimization in Context. Algorithmic Approach to State Minimization. Finite State Machine Optimization
Sequential Logic Optimization! State Minimization " Algorithms for State Minimization! State, Input, and Output Encodings " Minimize the Next State and Output logic Optimization in Context! Understand
More informationMAXIMAL VERTEX-CONNECTIVITY OF S n,k
MAXIMAL VERTEX-CONNECTIVITY OF S n,k EDDIE CHENG, WILLIAM A. LINDSEY, AND DANIEL E. STEFFY Abstract. The class of star graphs is a popular topology for interconnection networks. However it has certain
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationOn Locating-Dominating Codes in Binary Hamming Spaces
Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and
More informationDegradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #
Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine
More informationOn Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes
American Journal of Applied Sciences 5(11): 1605-1610, 2008 ISSN 1546-9239 2008 Science Publications On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes 1 Ioana Zelina, 2 Grigor Moldovan
More informationRelating Entropy Theory to Test Data Compression
Relating Entropy Theory to Test Data Compression Kedarnath J. Balakrishnan and Nur A. Touba Computer Engineering Research Center University of Texas, Austin, TX 7872 Email: {kjbala, touba}@ece.utexas.edu
More informationCHAPTER 12 Boolean Algebra
318 Chapter 12 Boolean Algebra CHAPTER 12 Boolean Algebra SECTION 12.1 Boolean Functions 2. a) Since x 1 = x, the only solution is x = 0. b) Since 0 + 0 = 0 and 1 + 1 = 1, the only solution is x = 0. c)
More informationNo.5 Node Grouping in System-Level Fault Diagnosis 475 identified under above strategy is precise in the sense that all nodes in F are truly faulty an
Vol.16 No.5 J. Comput. Sci. & Technol. Sept. 2001 Node Grouping in System-Level Fault Diagnosis ZHANG Dafang (± ) 1, XIE Gaogang (ΞΛ ) 1 and MIN Yinghua ( ΠΦ) 2 1 Department of Computer Science, Hunan
More informationCounting Two-State Transition-Tour Sequences
Counting Two-State Transition-Tour Sequences Nirmal R. Saxena & Edward J. McCluskey Center for Reliable Computing, ERL 460 Department of Electrical Engineering, Stanford University, Stanford, CA 94305
More informationarxiv: v1 [math.co] 27 Apr 2016
arxiv:1604.07895v1 [math.co] 27 Apr 2016 Fault-tolerance of balanced hypercubes with faulty vertices and faulty edges Mei-Mei Gu Department of Mathematics, Beijing Jiaotong University, Beijing 100044,
More informationDUAL-MODE COMBINATIONAL LOGIC FOR FUNCTION-INDEPENDENT FAULT TESTING
Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 21977 DUALMODE COMBINATIONAL LOGIC FOR FUNCTIONINDEPENDENT FAULT TESTING
More informationDISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS
DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS M. N. ELLINGHAM AND JUSTIN Z. SCHROEDER In memory of Mike Albertson. Abstract. A distinguishing partition for an action of a group Γ on a set
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More information3515ICT: Theory of Computation. Regular languages
3515ICT: Theory of Computation Regular languages Notation and concepts concerning alphabets, strings and languages, and identification of languages with problems (H, 1.5). Regular expressions (H, 3.1,
More informationMultiple-Edge-Fault Tolerance with Respect to Hypercubes
IEEE TRANSACTINS N ARAE AND DISTRIBUTED SYSTES, V. 8, N. 2, FEBRUARY 1997 187 ultiple-edge-fault Tolerance with Respect to Hypercubes Ting-Yi Sung, en-yang in, and Tung-Yang Ho Abstract revious works on
More informationThe super connectivity of shuffle-cubes
Information Processing Letters 96 (2005) 123 127 www.elsevier.com/locate/ipl The super connectivity of shuffle-cubes Jun-Ming Xu a,,minxu b, Qiang Zhu c a Department of Mathematics, University of Science
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationAll Good (Bad) Words Consisting of 5 Blocks
Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series
More informationDesign of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal
Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationAutomata and Languages
Automata and Languages Prof. Mohamed Hamada Software Engineering Lab. The University of Aizu Japan Mathematical Background Mathematical Background Sets Relations Functions Graphs Proof techniques Sets
More informationUniversal Algebra for Logics
Universal Algebra for Logics Joanna GRYGIEL University of Czestochowa Poland j.grygiel@ajd.czest.pl 2005 These notes form Lecture Notes of a short course which I will give at 1st School on Universal Logic
More informationARTICLE IN PRESS Discrete Applied Mathematics ( )
Discrete Applied Mathematics ( ) Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Forwarding index of cube-connected cycles Jun Yan a,
More informationIN THIS paper we investigate the diagnosability of stochastic
476 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 50, NO 4, APRIL 2005 Diagnosability of Stochastic Discrete-Event Systems David Thorsley and Demosthenis Teneketzis, Fellow, IEEE Abstract We investigate
More informationL(3, 2, 1)-LABELING FOR CYLINDRICAL GRID: THE CARTESIAN PRODUCT OF A PATH AND A CYCLE. Byeong Moon Kim, Woonjae Hwang, and Byung Chul Song
Korean J. Math. 25 (2017), No. 2, pp. 279 301 https://doi.org/10.11568/kjm.2017.25.2.279 L(3, 2, 1)-LABELING FOR CYLINDRICAL GRID: THE CARTESIAN PRODUCT OF A PATH AND A CYCLE Byeong Moon Kim, Woonjae Hwang,
More informationFIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES
FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES Jovan Dj. Golić Security Innovation, Telecom Italia Via Reiss Romoli 274, 10148 Turin, Italy (Submitted August 2004-Final Revision April 200) ABSTRACT
More informationSecurity in Locally Repairable Storage
1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider
More informationImproving the Height of Independent Spanning Trees on Folded Hyper-Stars
Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Sih-Syuan Luo 1 Jinn-Shyong Yang 2 Jou-Ming Chang 1, An-Hang Chen 1 1 Institute of Information and Decision Sciences, National Taipei
More informationNP-Completeness. Subhash Suri. May 15, 2018
NP-Completeness Subhash Suri May 15, 2018 1 Computational Intractability The classical reference for this topic is the book Computers and Intractability: A guide to the theory of NP-Completeness by Michael
More informationAnand Raghunathan MSEE 348
ECE 595Z: Digital VLSI Design Automation, Spring 2012 2012 Anand Raghunathan 1 ECE 595Z Digital Systems Design Automation Module 2 (Lectures 3-5) : Advanced Boolean Algebra Lecture 5 Anand Raghunathan
More informationMore Approximation Algorithms
CS 473: Algorithms, Spring 2018 More Approximation Algorithms Lecture 25 April 26, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 28 Formal definition of approximation
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable
More information3. Abstract Boolean Algebras
3. ABSTRACT BOOLEAN ALGEBRAS 123 3. Abstract Boolean Algebras 3.1. Abstract Boolean Algebra. Definition 3.1.1. An abstract Boolean algebra is defined as a set B containing two distinct elements 0 and 1,
More informationCollege Algebra. Chapter 5 Review Created by: Lauren Atkinson. Math Coordinator, Mary Stangler Center for Academic Success
College Algebra Chapter 5 Review Created by: Lauren Atkinson Math Coordinator, Mary Stangler Center for Academic Success Note: This review is composed of questions from the chapter review at the end of
More informationReview. EECS Components and Design Techniques for Digital Systems. Lec 06 Minimizing Boolean Logic 9/ Review: Canonical Forms
Review EECS 150 - Components and Design Techniques for Digital Systems Lec 06 Minimizing Boolean Logic 9/16-04 David Culler Electrical Engineering and Computer Sciences University of California, Berkeley
More informationThe Hypercube Graph and the Inhibitory Hypercube Network
The Hypercube Graph and the Inhibitory Hypercube Network Michael Cook mcook@forstmannleff.com William J. Wolfe Professor of Computer Science California State University Channel Islands william.wolfe@csuci.edu
More informationToday s Topics. Methods of proof Relationships to logical equivalences. Important definitions Relationships to sets, relations Special functions
Today s Topics Set identities Methods of proof Relationships to logical equivalences Functions Important definitions Relationships to sets, relations Special functions Set identities help us manipulate
More informationL2: Combinational Logic Design (Construction and Boolean Algebra)
L2: Combinational Logic Design (Construction and Boolean Algebra) Acknowledgements: Lecture material adapted from Chapter 2 of R. Katz, G. Borriello, Contemporary Logic Design (second edition), Pearson
More informationCHAPTER 3: THE INTEGERS Z
CHAPTER 3: THE INTEGERS Z MATH 378, CSUSM. SPRING 2009. AITKEN 1. Introduction The natural numbers are designed for measuring the size of finite sets, but what if you want to compare the sizes of two sets?
More informationOne-to-many node-disjoint paths in (n,k)-star graphs
One-to-many node-disjoint paths in (n,k)-star graphs Yonghong Xiang and Iain A. Stewart Department of Computer Science, Durham University, Science Labs, South Road, Durham DH1 3LE, U.K. e-mail: {yonghong.xiang,i.a.stewart}@durham.ac.uk
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationOn-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.
On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try
More informationConnectivity of Cayley Graphs: A Special Family
Connectivity of Cayley Graphs: A Special Family Joy Morris Department of Mathematics and Statistics Trent University Peterborough, Ont. K9J 7B8 January 12, 2004 1 Introduction Taking any finite group G,
More informationApproximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack
Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Hassene Aissi, Cristina Bazgan, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr
More informationRegular Sparse Crossbar Concentrators
Regular Sparse Crossbar Concentrators Weiming Guo and A. Yavuz Oruç Electrical Engineering Department College Park, MD 20742 ABSTRACT A bipartite concentrator is a single stage sparse crossbar switching
More informationCS 350 Algorithms and Complexity
CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationCS 350 Algorithms and Complexity
1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationHyper-Panconnectedness of the Locally Twisted Cube
Hyper-Panconnectedness of the Locally Twisted Cube Tzu-Liang Kung Department of Computer Science and Information Engineering Asia University, Wufeng, Taichung tlkung@asia.edu.tw Lih-Hsing Hsu and Jia-Jhe
More information2 Theory. 2.1 State Space Representation S 2 S 1 S 3
In the following sections we develop the theory, illustrate the technique by applying it to a sample system, and validate the results using the method of enumeration. Notations: A-state functional (acceptable)
More informationMODULAR CIRCUITS CHAPTER 7
CHAPTER 7 MODULAR CIRCUITS A modular circuit is a digital circuit that performs a specific function or has certain usage. The modular circuits to be introduced in this chapter are decoders, encoders, multiplexers,
More informationReduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance
Reduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance Tong-Yu Hsieh and Kuen-Jong Lee Department of Electrical Engineering National Cheng Kung University Tainan, Taiwan 70101
More informationLecture 2: Connecting the Three Models
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 2: Connecting the Three Models David Mix Barrington and Alexis Maciel July 18, 2000
More informationChapter 3: Proving NP-completeness Results
Chapter 3: Proving NP-completeness Results Six Basic NP-Complete Problems Some Techniques for Proving NP-Completeness Some Suggested Exercises 1.1 Six Basic NP-Complete Problems 3-SATISFIABILITY (3SAT)
More informationOptimization of Quadratic Forms: NP Hard Problems : Neural Networks
1 Optimization of Quadratic Forms: NP Hard Problems : Neural Networks Garimella Rama Murthy, Associate Professor, International Institute of Information Technology, Gachibowli, HYDERABAD, AP, INDIA ABSTRACT
More informationMutually Independent Hamiltonian Paths in Star Networks
Mutually Independent Hamiltonian Paths in Star Networks Cheng-Kuan Lin a, Hua-Min Huang a, Lih-Hsing Hsu b,, and Sheng Bau c, a Department of Mathematics National Central University, Chung-Li, Taiwan b
More informationSHUHONG GAO AND BETH NOVICK
FAULT TOLERANCE OF CAYLEY GRAPHS SHUHONG GAO AND BETH NOVICK Abstract. It is a difficult problem in general to decide whether a Cayley graph Cay(G; S) is connected where G is an arbitrary finite group
More informationTutorial on Mathematical Induction
Tutorial on Mathematical Induction Roy Overbeek VU University Amsterdam Department of Computer Science r.overbeek@student.vu.nl April 22, 2014 1 Dominoes: from case-by-case to induction Suppose that you
More informationA Fault-tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree
A Fault-tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree Peter, K K, Loh 1 and Zhang, Xinhua 1 School of Computer Engineering, Nanyang Technological University, Singapore Dept of Computer
More informationarxiv: v2 [math.gr] 17 Dec 2017
The complement of proper power graphs of finite groups T. Anitha, R. Rajkumar arxiv:1601.03683v2 [math.gr] 17 Dec 2017 Department of Mathematics, The Gandhigram Rural Institute Deemed to be University,
More informationEdge-counting vectors, Fibonacci cubes, and Fibonacci triangle
Publ. Math. Debrecen Manuscript (November 16, 2005) Edge-counting vectors, Fibonacci cubes, and Fibonacci triangle By Sandi Klavžar and Iztok Peterin Abstract. Edge-counting vectors of subgraphs of Cartesian
More informationEfficient Reassembling of Graphs, Part 1: The Linear Case
Efficient Reassembling of Graphs, Part 1: The Linear Case Assaf Kfoury Boston University Saber Mirzaei Boston University Abstract The reassembling of a simple connected graph G = (V, E) is an abstraction
More informationarb where a A, b B and we say a is related to b. Howdowewritea is not related to b? 2Rw 1Ro A B = {(a, b) a A, b B}
Functions Functions play an important role in mathematics as well as computer science. A function is a special type of relation. So what s a relation? A relation, R, from set A to set B is defined as arb
More informationFractional and circular 1-defective colorings of outerplanar graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 6() (05), Pages Fractional and circular -defective colorings of outerplanar graphs Zuzana Farkasová Roman Soták Institute of Mathematics Faculty of Science,
More informationWe showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true.
Dimension We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Lemma If a vector space V has a basis B containing n vectors, then any set containing more
More information(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2
Question 1 (a) Suppose A is the set of distinct letters in the word elephant, B is the set of distinct letters in the word sycophant, C is the set of distinct letters in the word fantastic, and D is the
More informationGray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ
Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Myung M. Bae Scalable POWERparallel Systems, MS/P963, IBM Corp. Poughkeepsie, NY 6 myungbae@us.ibm.com Bella Bose Dept. of Computer Science Oregon
More informationBoolean cubes EECS150. Mapping truth tables onto cubes. Simplification. The Uniting Theorem. Three variable example
EES5 Section 5 Simplification and State Minimization Fall 2 -cube X oolean cubes Visual technique for indentifying when the uniting theorem can be applied n input variables = n-dimensional "cube" Y 2-cube
More informationAnalysis and Optimization of Discrete Event Systems using Petri Nets
Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets
More informationPCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation
More informationPartial cubes: structures, characterizations, and constructions
Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes
More informationPart V. Intractable Problems
Part V Intractable Problems 507 Chapter 16 N P-Completeness Up to now, we have focused on developing efficient algorithms for solving problems. The word efficient is somewhat subjective, and the degree
More informationSection 1 (closed-book) Total points 30
CS 454 Theory of Computation Fall 2011 Section 1 (closed-book) Total points 30 1. Which of the following are true? (a) a PDA can always be converted to an equivalent PDA that at each step pops or pushes
More informationLinear Programming Bounds for Robust Locally Repairable Storage Codes
Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,
More informationParity Versions of 2-Connectedness
Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida
More informationSubcube Fault-Tolerance in Hypercubes
In Information and Computation 102 (1993), pp. 280 314. Subcube Fault-Tolerance in Hypercubes Niall Graham 1,2 Frank Harary 2 Computing Research Laboratory Department of Computer Science New Mexico State
More informationUnit 1A: Computational Complexity
Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if
More informationCanonicity and representable relation algebras
Canonicity and representable relation algebras Ian Hodkinson Joint work with: Rob Goldblatt Robin Hirsch Yde Venema What am I going to do? In the 1960s, Monk proved that the variety RRA of representable
More informationSynthesis of 2-level Logic Exact and Heuristic Methods. Two Approaches
Synthesis of 2-level Logic Exact and Heuristic Methods Lecture 7: Branch & Bound Exact Two Approaches Find all primes Find a complete sum Find a minimum cover (covering problem) Heuristic Take an initial
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationDisjoint Path Covers in Cubes of Connected Graphs
Disjoint Path Covers in Cubes of Connected Graphs Jung-Heum Park a, Insung Ihm b, a School of Computer Science and Information Engineering The Catholic University of Korea, Bucheon, Korea b Department
More information