The Maximum Dimensional Fault-Free Subcube Allocatable in Faulty Hypercube

Size: px
Start display at page:

Download "The Maximum Dimensional Fault-Free Subcube Allocatable in Faulty Hypercube"

Transcription

1 The Maximum Dimensional FaultFree Subcube Allocatable in Faulty Hypercube Hiroshi Masuyama Information and Knowledge Engineering, Tottori 0 Japan Toshihiko Sasama Graduate School, Tottori 0 Japan Hiroyuki Hashimoto Graduate School Tottori 0 Japan Abstrust The maximum dimensional subcube located in faulty hypercubes is studied in this paper. Most parallel algorithms can be formulated with the dimension n of the hypercube being a parameter of the algorithm. The reconfiguration problem in a hypercube reduces to finding the maximum dimensional faultfree subcube in the hypercube, that is, helps in achieving graceful and the most effective degradation of the system. Thai paper presents the maximum, number of faults on an n (n 2)subcube. key words: Hypercube, Fault Tolerance, Allocation, The Maximum Dimemional FaultFree Subcube 1 Introduction Different but related approaches to hypercube faulttolerance have been reported. Chang and Bhuyan [l] present,ed a modified subcube partitioning strategy to construct faultfree subcubes in a hypercube with faults. The technique selects a regular (n 1)cube and then the faulty node in the selected (n 1)cube is replaced with its corresponding nonfaulty node in the other (n 1)cube. They showed that [n/21 faults ca.n be tolerated in the worst case by the modified subcube partitioning technique while maintaining a faultfree (n 1)cube. Yang and Raghavendra [2] presented a distributed scheme for the reconfiguration of an embedded binary tree into a hypercube with faults. In this scheme, the faulty node in the selected binary tree is replaced with a nonfaulty node which is out of the tree and at Hamming Distance 1. Horng and Kleinrock [3] proposed a set of techniques to restore the regularity of a Boolean ncube network in the presence of node failures. The shortest path between any node pair in the modified faultfree network holds the shortest property also in the nchbe. Bruck et al. [] studied a technique to obtain tolerant partitions by which partitioned m cube S is guaranteed such that S conta,ins a connected component of 2m1 + 1 or more nonfaulty nodes. Most parallel algorithms can be formulated with the dimension n of the hypercube being a parameter of the algorithm []. Since a subcube is a subset of a hypercube which preserves the properties of hypercube, the reconfiguration problem in a faulty hypercube re duces to find the maximum dimensional faultfree subcube. B.Becker and H.U.Simon [] presented simple procedures to find a maximal dimension of a faultfree subcube. F.Ozgiiner and C.Aykanat [B] also presented a procedure to find the maximum dimensional faultfree subcube where the principle of inclusionexclusion is used. This procedure can always give the maximum dimension d, the number of faultfree dsubcubes, and the complete set of faultfree dsubcubes. Another algebraic technique, called ATARIC 11, was reported. ATARIC uses two algebraic operators # and $ to identify the maximum dimensional faultfree subcube. These presented procedures are all based on the given addresses of faulty nodes. In this paper, we will try to formulate the maximum dimension of a faultfree subcube located in a faulty hypercube when the number of faults is given. It will be assumed throughout this paper that all faults are static and are known. Both nodes and edges may be faulty. However, we will only consider node faults, as an edge fault can be tolerated by assuming that one of the node s incidence upon it is faulty. It will be assumed that faulty nodes can neither perform computation nor communication. 2 Any Dimensional Subcube Allocation The ncube network consists of 2 nodes, each of which are numbered from 0 to 2 1 by nbit binary numbers an1a,2... a0, called the address of the node. Any two nodes on an ncube are adjacent iff their addresses differ by exactly one bit. A subcube of dimension m, denoted by an msubcube, is addressed by a string of n symbols drawn from the set {0,1, *}, where * is a don t care symbol. Coordinate values 0 and 1 can be referred to as the fixed or bounded coordinates and * as a free coordinate. An msubcube on an ncube has (n m) bounded coordinates and m free coordinates. For example, in a cube, nodes 0000,0001,0010 and 0011 form a 2cube addressed by 0 0 ~. [Property 11: The number of faults on an n(> 3) (n 2)subcube is not over n. 0110/9 $ IEEE 220

2 Proof: We first assume any index represented in the binary system with n bits. Let f' be a set of indices which includes different kinds of ordered pairs (l,l),(l,o),(o,l) and (0,O) for every bit pair i and j (i # j ) in n (2 3) bits. Then, F is given in the following equation: F= {(anlan2an3... azalao), (Un]Qngang *..z2z]eo), (enlan2an3 ''.izzlco),... (cnlcnzcn3 '.. Uzalzr3), (izn1zn2izn3...e2zl'lao)} j means that there exists no faultfree (n2)subcube when F is assumed to be a set of faulty nodes on n cube. The existence of proves Property 1. Q.E.D. The hypercube we consider is assumed to be n 2 3, which is satisfied with the property mentioned in the above proof. Next, we will try to extend an faultfree (n 2) subcube allocation up to an arbitrary msubcuhe allocation. [Property 21: The number of faults on an n( 2 3) (n 3)subcube is not over (2n 1). Proof: In this proof, in order to evaluate faultfree (n 3)subcubes, the condition of faultfree n 2) subcube to exist on ncube is utilized. We wil r divide an ncube into two n 1)subcubes and discuss the minimum number o I faults such that there exists no faultfree (n 3)subcube in an (n 1)cube. Namely, we will show that 2n faults on an ncube are sufficient to exist exactly one fault in every (n 3)subcube. In Property 1, we have introduced a set F of faults such that there exists no faultfree (n 2)subcube on an ncube. We will apply n 1 + n in F to obtain a set Fnl of faults such that there exists no faultfree (n S)subcube in an (n 1)cube. Then, Fnl is given in the following equation: pn1 = { (an2an3 ' '. a]uo), (anzan3 ' ' ' also), (zn2an3 ' ' alzo),... (znzzn3.' ' alzf)), (zn2zn3 ' ' 'zlao)} We obtain ljnl 1 = n. Thus, if each (n 1)subcube includes at least n faults, then there not always exist one faultfree (n 3)subcube on ncube. In other words, 2n is the number of faults such that there exists at least one fault in every (n 3)subcube on an n cube. According to Property 1, we will discuss the lnumber of faultfree disjoint (n3)subcubes on an ncube when the number of faults is 2n or more. Assume that there are 2n faults on an ncube. On the condition that the number of faultfree (n 3)subcubes is zero on the ncube, we can consider only one case such that one (n 1)subcube includes n faults and the other includes n faults. That is, by applying Property 1 to an (n 1)cube, we obtain that there not always exists one faultfree (n 3)subcube in the both (n 1) cubes which has at least n faults in each. Therefore, Property 2 is proven. Q. E.D. [Property 31: The number of faults on an n dimensional hypercube on which there always exists at least one faultfree (n i 2)subcube is not over P(n i + 1) 1. Proof: We will prove that 2'(n i+ 1) is the number of faults such that there not always exists faultfree (n i 2)subcube on an ncube. By using Properties 1 and 2, we will obtain the number of faults such that all disjoint (n i 2)subcubes in each one of 2i disjoint (n i)subcubes are able to be not faultfree. The case of i = 0: An (n i = n)subcube is an ncube. From Property 1, we obtain that (n + 1) is the number of faults such that all (n i 2 = n 2) subcubes are able to be not faultfree on the ncube. Then, the address set of faulty nodes is F. The case of i = 1: Iin the proof of Property 2, we obtain that n is the inumber of faults such that all disjoint (n i 2 = 2 3)subcubes are able to be not faultfree in each (n i = n 1)subcube. Then, the address set of faulty nodes is obtained in the following discussion. The addresses of any 2l n 1)subcubes are obtained by rewriting address I UnlU,2...aj+1ajaj1...alal)) to (**...*1*...**) and (**...*O*...**), where * means don't care. Let n + n 1 be in F and alpply F to (n 1) bits with *. We obtain an address set of faulty nodes such that all disjoint (n 3)subcubes are able to be not faultfree in an (n 1)subcube (* *... * 1 *... * *). We can perform the same discussion in the case of another (n 1)subcube (* *... * 0 *... * *). The total number of faults in these two (n 1)subcubes is clearly twice n. The case of i 2 2: Let's evaluate the addresses of faulty nodes such that all (disjoint (n i 2)subcutbes are able to be not faultfree in any (n i)subcube. In the case of i = 1, we could induce the address set of faulty nodes from F by taking n 1 + n. In the case where all disjoint (n i 2)subcubes are able to be not faultfree in any (n 1')cube which is set i bits to fixed values, the address set of faulty nodes is induced by taking n i t n. Since the number of faulty nodes is (n i + 1) in each (n i)subcube, then we obtain 2"n i + 1). Q.E.D. Let us remember that, the minimum number of faults on an n(> 3)cube on which there always exists no faultfree (n m)subcube is the minimum number E of indices such that every E mbit binary numbers composed of m bits in each of E indices can cover all 2 binary numbers. 3 (n 2)Dimensional Subcube Allocat ion In this section, we will focus on faultfree (n 2) subcubes and try to bring the number 2*(n i+ 1) 1 presented in Property 3 close to the optimum value. Let be the minimum set of indices which includes different kinds of ordered pairs (1, l), (1,0),(0, l), and (0,O) for every bit pair i and j (i # j)in n(> 3) bits. Let Fk be F when n = IC. = {(a2alao),(a2~1~1), (i2alib), ( ~ ~ i a o ) } Since IF1 2, then F3 = F when n = 3. We can cal 221

3 culate F when n = in an exhaustive method. Now, we estimate the time complexity to calculate F with = 1 in this method. The calculation procedure is as follows : Select 1 indices which make a new combination in a set of 2" indices, and judge whether there exist different kinds of ordered pairs or not for every bit pair in the 1 indices. Therefore, the upper bound of the time complexity can be given as follows : M {(2"/2)2"/(//2)'((2" 1)/2pnl)}. 21' {(n 1)n/2} Then, the order of the upper bound of the time complexity is O(2'". 11'. n2). The time complexity to calculate F becomes tremendous as n becomes very large, but F can be calculated within the realistic range, that is, n 1. The calculated values of F when n 1 are shown in Table 1. When n = 1, the fact F # is calculated. Next, we will formalize an approximate value F( 2 F) of F. Let Fk and Fk be F and F when n = k, respectively. Fk can be calculated by using FkI( > k'). Since IF/ = is known in an exhaustive method, we get F = F = F. J.Bruck, et al. [] said in Corollary that F =. For n 2, we will calculate Fk without Fk. For the expression~l simplicity, we express one index by one row, and Fk with IFkI = 1 by a matrix with 1 rows and k columns. Fk can be expressed by using two 's, three f i t 's, and six &j's as shown in Fig.1 (a), (b), and (c), respectively. The point to express F k shown in Fig.1 (a), (b, and (c) is as follows : Since there always exist all kin d s of ordered pairs for every bit pair in one &I and there always exist only 2 ordered pairs (0,O) and (1,l) for every bit pair whose 2 bits are in different Fk's each other, we need the minimum number of indices to make 2 ordered pairs ( 1,O) and (0,l) for every bit pair whose 2 bits are in different Fk each other. These minimum numbers of required indices are 2, 3, and when the numbers of basic PkT's are 2, 3, and, respectively, as shown in Fig.l(a), (b), and (cb When mk' # k, in order to set n =, eliminate any its from every index with mk' bits. The important point is to select the combination lead to IFk I = minimum. The expressions of Fk shown in Fig.1 (a), (b), and (c) will be referred to as types 2&, 3fi), and fi1, respectively. Let us calculate F. =. By using type 2F3, we get F with six bit indices. <.lfgi.,fs with six bit indices can be obhined by eliminating any one bit from F. Let_ us next calculate Fg. By using type 3F3, we get Fg with seven 9bit indices. IF91 < 1Fgl. F with indices and F with indices can be eliminating any 2 bits and 1 bit, respectively, from every index in Fg. _Though F can be also obtained by using type 2F, b0t.h types 3F3 and 2F require indices. Any F k can obtained by extending this method. On condition that the number of required indices must be as _small aspossible, though single type 2F3,3F3,F3,2F, or 3F is adequate to express any F, for n 1, a hierarchical design by using several different types can be also introduced. From the above discussion, IFnI can be formalized. In the case where type mf3(m = 2,3,) is used, since 2"'.3a2."3(> n) = 3.2"'.3uz1."3(cu2 2 1), then types 2F3,3F3, and F3 must be used al,(a2 l), and 0 3 times, respectively. This fact leads to IFnI = + 2al+ 3(az 1) On the other hand, in the case where type mf is used, since 2a1.3aa."3(> n) =. 2a12 ' + 3"2 a3(012 a), then types 2F,3, and F must be used (a1 2),02, and 03, respectively. This fact leads to IFn I = + 2(al 2) The final formula of IFn I is defined as follows: For a1, az, and a3 given from 3 ~ < 2a1. 3a2. a3, lfnl = min( + 2a1 + 3a2 + a3 (for a2 2 I), +2((~1'2)+3a2+a3 (for a1 2 2)) I obtained from the above equation is presented IFn in Table 1. From the above discussion, we can present the following theorem without the proof. [Theorem 11: The number of faults on an n(2 3) (n 2)subcube is not over IFn/. We will present the other theorem. This theorem depends on the following easy lemmas. [Lemma 11: For all n 2, given at most 1 faulty Table.1 n I The number of required indices. () () () IF" I I employed type 2B 2B 3B or 2B 3% or 2Fi 3% g or 3B % or 3F 3 or 3i$ B F3 % B B 222

4 node in an (n 1)subcube, there exist two disjoint faultfree (n 2) and (n 3)subcubes which can take any dimensions. Proof: Obvious. pemma 21: For all n 2, given at most LIFrF;II.I/2J fau ty nodes in an (n 1)subcube, there exist two disjoint faultfree (n 3)subcubes. Proof: Obvious. The above two lemmas lead to that, given at most 1 and LIPn 1/21 faulty nodes in an (n 1) and the other n 1)subcubes respectively, there exist two (n 2)subcubes. [Theorem 21: For all n 2, given any set of F consisting of lfnl [lfnl/2] or fewer faulty nodes on an ncube, there exist at least two faultfree disjoint (n 2)subcube. Proof: lfnl is the minimum number of faulls on an ncube on which there always exists at least, one fault on every disjoint (n 2)subcube. Given IFn/ faulty nodes in an ncube, the distributions of the faulty nodes are classified into three types : Types 1, 2, and 3 are that the ncube has zero, one, and two or more faultfree disjoint (n 2)subcubes respectively. Since the last type satisfies this theorem, let us prove this theorem in the case of Types 1 and 2. Type 1 : On condition that an ncube has no fault free (n 2)subcube, the ncube has two (n 1) subcubes on which faults must be well bal anced in the faulty nodes distribution, t,hat is, one (n 1)subcube is occupied by [li; n1/21 faults and the other by llfn 1/21 faults. Therefore, if LIPn 1/21 faults are removed, then the distributions of the remaining (lfnl LIFnl/2J) faulty nodes can be classified into the following two cases : Every two disjoint (n 1) subcubes have one and L1pn1/2 faulty nodes respectively, and every two disjoint (!I 1)subcubes have zero and [IFn1/21 faulty nodes respectively. In the former case, this theorem can be proven by Lemmas 1 and 2. In the latter case, this theorem can be proven by the result that one (n 1)subcube becomes faultfree. Type 2 : On condition that an ncube ha3 only one faultfree (n 2)subcube, the ncube has two (n 1)subcubes on which IFn[ faults must be idso well balanced in the faulty nodes distribution. Therefore, if LlFn1/21 faults are removed, there always errist two disjoint (n 1)subcubes which have at most one and at most klfnl/21 faults respectively. In this case, the theorem can be also proven by Lemmas P and 2. Q.E.D. Fig.2 shows a cube which possesses two disjoint faultfree 3subcubes. Next, from a different angle, we will formalize a different approximate value F (1 p) of P. Let F be also a set of indices which include different kinds of ordered pairs (1,1>, (l,o), (0, l), and (0,O) of 2 different bits i and j for every pair i and j in n(> 3) bits, as shown in Fig.3 (a) and (b) where F is shown by a matrix in the same way as F. In this figure, F has Q indices whose bit len th is alcj where 1 j [(a 1)/21 1 in fa), [(a 1)/2] + 1 j cy 1 in (b). A set of indices in the square solid line in Fig.3 (a) always includes three kinds of ordered pairs (1, Ci), (0, l), and (0,O) for every bit pair, but not always includes 1,1>. Therefore, a special index ( ) is prepare for the lacked ordered pair (1,l). On the other hand, a set of indices in the square solid line in Fig.S(b) always includes three kinds of ordered pairs (1,0),(0, l), and (1,l) for every bit pair, brit not always includes (0,O). A special index ( ) is prepared for the lacked ordered pair (0,O). Notice that F in the case j = 1 conforms to F, and that there exists a bit complement relation between two F s in Fig.3 (a) and (b) The optimum F 223

5 is F defined by the minimum a. We will present the following property for F shown in Fig.3 (a). [Property 1: The optimum F is given by a on condition that (o1)c(r(a1)/211) is minimum but equal or greater than n. Proof: The optimum F is given by the minimum a which satisfies the condition alcj 2 n. The minimum a which makes alc, maximum is given on condition that l(a 1)/2 jl = minimum. Q.E.D. For n 1, IF I = lfnl. Therefore, F is the minimum set of indices which includes different kinds of ordered pair (1, l), (1, 0), (0, l), and (0,O) for every bit pair in n 1. Conclusion In this paper, the maximum dimension of faultfree subcube located in a faulty hypercube when the number of faults was given was formulated. This paper is leaving the formalization of the maximum number of faults located on an ncube on which there always exists at least one faultfree m(< n 2) subcube. The time complexity to calculate the maximum number in an exhaustive method is tremendous as n becomes large, then the formalization of the maximum number is significant. References [l] Y. Chang and L.N. Bhuyan, Fault Tolerant Subcube Allocation in Hypercubes, Proc. Int I Conf. on Parallel Processing, pp.i , [2] P.J. Yang and C.S. Raghavendra, Reconfiguration of Binary Trees in Faulty Hypercubes, Proc. th Int Parallel Processing Symp., pp.010, April [3] M. Horng and L. Kleinrock, FaultTolerant Routing with Regularity Restoration in Boolean ncube Interconnection Networks, Proc. IEEE Symp. on Parallel and Distributed Processing, pp., Dec [] J. Bruck et al., Tolerating Faults in Hypercubes Using Subcube Partitioning, IEEE Tkans. Comput., Vo1.1, No., pp.990, May [] B.Becker and H.U.Simon, How Robust is the n Cube?, Proc. 2th IEEE Symposium on Foundations of Computer Science, pp , Oct. 19. [] F.0zgiiner and C.Aykanat, A Reconfiguration Algorithm for Fault Tolerance in a Hypercube Multiprocessor, Information Processing Letters, Vo1.29, pp.22, Nov. 19. [] S.Rai and J.L.Trahan, ATARIC : An Algebraic Technique to Analyze Reconfiguration for Fault Tolerance in a Hypercube, Proc. 3rd IEEE Symposium on Parallel and Distributed Processing, pp., Dec [] J.Brruck et al., Embedding CubeConnected Cycles Graphs into Faulty Hypercubes, IEEE Trans. Comput., vo1.3, No.10, pp , Oct a 1 lj (a) R column vector with weight j a c ~ J column vectors with weight j aicj A (ha1) /2k 1 s j sa2)... a1 (b) a column vector with weight j I c J column vectors with weight j Fig.2 A cube which possesses two disjoint Fig.3 A method to make F. faultfree 3subcubes. 22

Edge-pancyclicity of Möbius cubes

Edge-pancyclicity of Möbius cubes Information Processing Letters 96 (25) 136 14 www.elsevier.com/locate/ipl Edge-pancyclicity of Möbius cubes Min Xu a,b, Jun-Ming Xu b, a Institute of Applied Mathematics, Academy of Mathematics and Systems

More information

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis

More information

Algebraic Properties and Panconnectivity of Folded Hypercubes

Algebraic Properties and Panconnectivity of Folded Hypercubes Algebraic Properties and Panconnectivity of Folded Hypercubes Meijie Ma a Jun-Ming Xu b a School of Mathematics and System Science, Shandong University Jinan, 50100, China b Department of Mathematics,

More information

Tight Bounds on the Diameter of Gaussian Cubes

Tight Bounds on the Diameter of Gaussian Cubes Tight Bounds on the Diameter of Gaussian Cubes DING-MING KWAI AND BEHROOZ PARHAMI Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106 9560, USA Email: parhami@ece.ucsb.edu

More information

Inadmissible Class of Boolean Functions under Stuck-at Faults

Inadmissible Class of Boolean Functions under Stuck-at Faults Inadmissible Class of Boolean Functions under Stuck-at Faults Debesh K. Das 1, Debabani Chowdhury 1, Bhargab B. Bhattacharya 2, Tsutomu Sasao 3 1 Computer Sc. & Engg. Dept., Jadavpur University, Kolkata

More information

ARTICLE IN PRESS Theoretical Computer Science ( )

ARTICLE IN PRESS Theoretical Computer Science ( ) Theoretical Computer Science ( ) Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Conditional matching preclusion for hypercube-like

More information

Embed Longest Rings onto Star Graphs with Vertex Faults

Embed Longest Rings onto Star Graphs with Vertex Faults Embed Longest Rings onto Star Graphs with Vertex Faults Sun-Yuan Hsieh, Gen-Huey Chen Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, ROC and Chin-Wen

More information

EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES

EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES NELSON CASTAÑEDA AND IVAN S. GOTCHEV Abstract. An important task in the theory of hypercubes is to establish the maximum integer f n such that for every set

More information

Biswapped Networks and Their Topological Properties

Biswapped Networks and Their Topological Properties Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Biswapped Networks and Their Topological Properties Wenjun Xiao, Weidong

More information

Hypercube Network Fault Tolerance: A Probabilistic Approach

Hypercube Network Fault Tolerance: A Probabilistic Approach Journal of Interconnection Networks c World Scientific Publishing Company Hypercube Network Fault Tolerance: A Probabilistic Approach JIANER CHEN Department of Computer Science, Texas A&M University College

More information

Conquering Edge Faults in a Butterfly with Automorphisms

Conquering Edge Faults in a Butterfly with Automorphisms International Conference on Theoretical and Mathematical Foundations of Computer Science (TMFCS-0) Conquering Edge Faults in a Butterfly with Automorphisms Meghanad D. Wagh and Khadidja Bendjilali Department

More information

PARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes

PARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Ruo-Wei Hung, Shang-Ju Chan, and Chien-Chih Liao Abstract The presence of edge-disjoint Hamiltonian

More information

Bipanconnectivity of Cartesian product networks

Bipanconnectivity of Cartesian product networks AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 46 (2010), Pages 297 306 Bipanconnectivity of Cartesian product networks You Lu Jun-Ming Xu Department of Mathematics University of Science and Technology of

More information

On the Embedding of a Class of Regular Graphs. Yu-Chee Tseng and Ten-Hwang Lai. Department of Computer and Information Science

On the Embedding of a Class of Regular Graphs. Yu-Chee Tseng and Ten-Hwang Lai. Department of Computer and Information Science On the Embedding of a lass of Regular Graphs in a Faulty Hypercube Yu-hee Tseng and Ten-Hwang Lai Department of omputer and Information Science The Ohio State University olumbus, Ohio 432 Tel: (64)292-583,

More information

arxiv: v1 [cs.gr] 25 Nov 2015

arxiv: v1 [cs.gr] 25 Nov 2015 EMBEDDING OF HYPERCUBE INTO CYLINDER WEIXING JI, QINGHUI LIU, GUIZHEN WANG, AND ZHUOJIA SHEN arxiv:1511.07932v1 [cs.gr] 25 Nov 2015 Abstract. Task mapping in modern high performance parallel computers

More information

On Detecting Multiple Faults in Baseline Interconnection Networks

On Detecting Multiple Faults in Baseline Interconnection Networks On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,

More information

PARALLEL computing is important for speeding up

PARALLEL computing is important for speeding up Two Edge-Disjoint Hamiltonian Cycles and Two-Equal Path Partition in Augmented Cubes Ruo-Wei Hung and Chien-Chih Liao Abstract The n-dimensional hypercube networ Q n is one of the most popular interconnection

More information

Node-to-set disjoint-path routing in perfect hierarchical hypercubes

Node-to-set disjoint-path routing in perfect hierarchical hypercubes Available online at www.sciencedirect.com Procedia Computer Science 4 (2011) 442 451 International Conference on Computational Science, ICCS 2011 Node-to-set disoint-path routing in perfect hierarchical

More information

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Jung-Sheng Fu Takming College, Taipei, TAIWAN jsfu@mail.takming.edu.tw Gen-Huey Chen Department of Computer Science and Information

More information

Sequential Logic Optimization. Optimization in Context. Algorithmic Approach to State Minimization. Finite State Machine Optimization

Sequential Logic Optimization. Optimization in Context. Algorithmic Approach to State Minimization. Finite State Machine Optimization Sequential Logic Optimization! State Minimization " Algorithms for State Minimization! State, Input, and Output Encodings " Minimize the Next State and Output logic Optimization in Context! Understand

More information

MAXIMAL VERTEX-CONNECTIVITY OF S n,k

MAXIMAL VERTEX-CONNECTIVITY OF S n,k MAXIMAL VERTEX-CONNECTIVITY OF S n,k EDDIE CHENG, WILLIAM A. LINDSEY, AND DANIEL E. STEFFY Abstract. The class of star graphs is a popular topology for interconnection networks. However it has certain

More information

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139 Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report # Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine

More information

On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes

On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes American Journal of Applied Sciences 5(11): 1605-1610, 2008 ISSN 1546-9239 2008 Science Publications On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes 1 Ioana Zelina, 2 Grigor Moldovan

More information

Relating Entropy Theory to Test Data Compression

Relating Entropy Theory to Test Data Compression Relating Entropy Theory to Test Data Compression Kedarnath J. Balakrishnan and Nur A. Touba Computer Engineering Research Center University of Texas, Austin, TX 7872 Email: {kjbala, touba}@ece.utexas.edu

More information

CHAPTER 12 Boolean Algebra

CHAPTER 12 Boolean Algebra 318 Chapter 12 Boolean Algebra CHAPTER 12 Boolean Algebra SECTION 12.1 Boolean Functions 2. a) Since x 1 = x, the only solution is x = 0. b) Since 0 + 0 = 0 and 1 + 1 = 1, the only solution is x = 0. c)

More information

No.5 Node Grouping in System-Level Fault Diagnosis 475 identified under above strategy is precise in the sense that all nodes in F are truly faulty an

No.5 Node Grouping in System-Level Fault Diagnosis 475 identified under above strategy is precise in the sense that all nodes in F are truly faulty an Vol.16 No.5 J. Comput. Sci. & Technol. Sept. 2001 Node Grouping in System-Level Fault Diagnosis ZHANG Dafang (± ) 1, XIE Gaogang (ΞΛ ) 1 and MIN Yinghua ( ΠΦ) 2 1 Department of Computer Science, Hunan

More information

Counting Two-State Transition-Tour Sequences

Counting Two-State Transition-Tour Sequences Counting Two-State Transition-Tour Sequences Nirmal R. Saxena & Edward J. McCluskey Center for Reliable Computing, ERL 460 Department of Electrical Engineering, Stanford University, Stanford, CA 94305

More information

arxiv: v1 [math.co] 27 Apr 2016

arxiv: v1 [math.co] 27 Apr 2016 arxiv:1604.07895v1 [math.co] 27 Apr 2016 Fault-tolerance of balanced hypercubes with faulty vertices and faulty edges Mei-Mei Gu Department of Mathematics, Beijing Jiaotong University, Beijing 100044,

More information

DUAL-MODE COMBINATIONAL LOGIC FOR FUNCTION-INDEPENDENT FAULT TESTING

DUAL-MODE COMBINATIONAL LOGIC FOR FUNCTION-INDEPENDENT FAULT TESTING Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 21977 DUALMODE COMBINATIONAL LOGIC FOR FUNCTIONINDEPENDENT FAULT TESTING

More information

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS M. N. ELLINGHAM AND JUSTIN Z. SCHROEDER In memory of Mike Albertson. Abstract. A distinguishing partition for an action of a group Γ on a set

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

3515ICT: Theory of Computation. Regular languages

3515ICT: Theory of Computation. Regular languages 3515ICT: Theory of Computation Regular languages Notation and concepts concerning alphabets, strings and languages, and identification of languages with problems (H, 1.5). Regular expressions (H, 3.1,

More information

Multiple-Edge-Fault Tolerance with Respect to Hypercubes

Multiple-Edge-Fault Tolerance with Respect to Hypercubes IEEE TRANSACTINS N ARAE AND DISTRIBUTED SYSTES, V. 8, N. 2, FEBRUARY 1997 187 ultiple-edge-fault Tolerance with Respect to Hypercubes Ting-Yi Sung, en-yang in, and Tung-Yang Ho Abstract revious works on

More information

The super connectivity of shuffle-cubes

The super connectivity of shuffle-cubes Information Processing Letters 96 (2005) 123 127 www.elsevier.com/locate/ipl The super connectivity of shuffle-cubes Jun-Ming Xu a,,minxu b, Qiang Zhu c a Department of Mathematics, University of Science

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

All Good (Bad) Words Consisting of 5 Blocks

All Good (Bad) Words Consisting of 5 Blocks Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Automata and Languages

Automata and Languages Automata and Languages Prof. Mohamed Hamada Software Engineering Lab. The University of Aizu Japan Mathematical Background Mathematical Background Sets Relations Functions Graphs Proof techniques Sets

More information

Universal Algebra for Logics

Universal Algebra for Logics Universal Algebra for Logics Joanna GRYGIEL University of Czestochowa Poland j.grygiel@ajd.czest.pl 2005 These notes form Lecture Notes of a short course which I will give at 1st School on Universal Logic

More information

ARTICLE IN PRESS Discrete Applied Mathematics ( )

ARTICLE IN PRESS Discrete Applied Mathematics ( ) Discrete Applied Mathematics ( ) Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Forwarding index of cube-connected cycles Jun Yan a,

More information

IN THIS paper we investigate the diagnosability of stochastic

IN THIS paper we investigate the diagnosability of stochastic 476 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 50, NO 4, APRIL 2005 Diagnosability of Stochastic Discrete-Event Systems David Thorsley and Demosthenis Teneketzis, Fellow, IEEE Abstract We investigate

More information

L(3, 2, 1)-LABELING FOR CYLINDRICAL GRID: THE CARTESIAN PRODUCT OF A PATH AND A CYCLE. Byeong Moon Kim, Woonjae Hwang, and Byung Chul Song

L(3, 2, 1)-LABELING FOR CYLINDRICAL GRID: THE CARTESIAN PRODUCT OF A PATH AND A CYCLE. Byeong Moon Kim, Woonjae Hwang, and Byung Chul Song Korean J. Math. 25 (2017), No. 2, pp. 279 301 https://doi.org/10.11568/kjm.2017.25.2.279 L(3, 2, 1)-LABELING FOR CYLINDRICAL GRID: THE CARTESIAN PRODUCT OF A PATH AND A CYCLE Byeong Moon Kim, Woonjae Hwang,

More information

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES Jovan Dj. Golić Security Innovation, Telecom Italia Via Reiss Romoli 274, 10148 Turin, Italy (Submitted August 2004-Final Revision April 200) ABSTRACT

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Improving the Height of Independent Spanning Trees on Folded Hyper-Stars

Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Sih-Syuan Luo 1 Jinn-Shyong Yang 2 Jou-Ming Chang 1, An-Hang Chen 1 1 Institute of Information and Decision Sciences, National Taipei

More information

NP-Completeness. Subhash Suri. May 15, 2018

NP-Completeness. Subhash Suri. May 15, 2018 NP-Completeness Subhash Suri May 15, 2018 1 Computational Intractability The classical reference for this topic is the book Computers and Intractability: A guide to the theory of NP-Completeness by Michael

More information

Anand Raghunathan MSEE 348

Anand Raghunathan MSEE 348 ECE 595Z: Digital VLSI Design Automation, Spring 2012 2012 Anand Raghunathan 1 ECE 595Z Digital Systems Design Automation Module 2 (Lectures 3-5) : Advanced Boolean Algebra Lecture 5 Anand Raghunathan

More information

More Approximation Algorithms

More Approximation Algorithms CS 473: Algorithms, Spring 2018 More Approximation Algorithms Lecture 25 April 26, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 28 Formal definition of approximation

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable

More information

3. Abstract Boolean Algebras

3. Abstract Boolean Algebras 3. ABSTRACT BOOLEAN ALGEBRAS 123 3. Abstract Boolean Algebras 3.1. Abstract Boolean Algebra. Definition 3.1.1. An abstract Boolean algebra is defined as a set B containing two distinct elements 0 and 1,

More information

College Algebra. Chapter 5 Review Created by: Lauren Atkinson. Math Coordinator, Mary Stangler Center for Academic Success

College Algebra. Chapter 5 Review Created by: Lauren Atkinson. Math Coordinator, Mary Stangler Center for Academic Success College Algebra Chapter 5 Review Created by: Lauren Atkinson Math Coordinator, Mary Stangler Center for Academic Success Note: This review is composed of questions from the chapter review at the end of

More information

Review. EECS Components and Design Techniques for Digital Systems. Lec 06 Minimizing Boolean Logic 9/ Review: Canonical Forms

Review. EECS Components and Design Techniques for Digital Systems. Lec 06 Minimizing Boolean Logic 9/ Review: Canonical Forms Review EECS 150 - Components and Design Techniques for Digital Systems Lec 06 Minimizing Boolean Logic 9/16-04 David Culler Electrical Engineering and Computer Sciences University of California, Berkeley

More information

The Hypercube Graph and the Inhibitory Hypercube Network

The Hypercube Graph and the Inhibitory Hypercube Network The Hypercube Graph and the Inhibitory Hypercube Network Michael Cook mcook@forstmannleff.com William J. Wolfe Professor of Computer Science California State University Channel Islands william.wolfe@csuci.edu

More information

Today s Topics. Methods of proof Relationships to logical equivalences. Important definitions Relationships to sets, relations Special functions

Today s Topics. Methods of proof Relationships to logical equivalences. Important definitions Relationships to sets, relations Special functions Today s Topics Set identities Methods of proof Relationships to logical equivalences Functions Important definitions Relationships to sets, relations Special functions Set identities help us manipulate

More information

L2: Combinational Logic Design (Construction and Boolean Algebra)

L2: Combinational Logic Design (Construction and Boolean Algebra) L2: Combinational Logic Design (Construction and Boolean Algebra) Acknowledgements: Lecture material adapted from Chapter 2 of R. Katz, G. Borriello, Contemporary Logic Design (second edition), Pearson

More information

CHAPTER 3: THE INTEGERS Z

CHAPTER 3: THE INTEGERS Z CHAPTER 3: THE INTEGERS Z MATH 378, CSUSM. SPRING 2009. AITKEN 1. Introduction The natural numbers are designed for measuring the size of finite sets, but what if you want to compare the sizes of two sets?

More information

One-to-many node-disjoint paths in (n,k)-star graphs

One-to-many node-disjoint paths in (n,k)-star graphs One-to-many node-disjoint paths in (n,k)-star graphs Yonghong Xiang and Iain A. Stewart Department of Computer Science, Durham University, Science Labs, South Road, Durham DH1 3LE, U.K. e-mail: {yonghong.xiang,i.a.stewart}@durham.ac.uk

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins. On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try

More information

Connectivity of Cayley Graphs: A Special Family

Connectivity of Cayley Graphs: A Special Family Connectivity of Cayley Graphs: A Special Family Joy Morris Department of Mathematics and Statistics Trent University Peterborough, Ont. K9J 7B8 January 12, 2004 1 Introduction Taking any finite group G,

More information

Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack

Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Hassene Aissi, Cristina Bazgan, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr

More information

Regular Sparse Crossbar Concentrators

Regular Sparse Crossbar Concentrators Regular Sparse Crossbar Concentrators Weiming Guo and A. Yavuz Oruç Electrical Engineering Department College Park, MD 20742 ABSTRACT A bipartite concentrator is a single stage sparse crossbar switching

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity 1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

Hyper-Panconnectedness of the Locally Twisted Cube

Hyper-Panconnectedness of the Locally Twisted Cube Hyper-Panconnectedness of the Locally Twisted Cube Tzu-Liang Kung Department of Computer Science and Information Engineering Asia University, Wufeng, Taichung tlkung@asia.edu.tw Lih-Hsing Hsu and Jia-Jhe

More information

2 Theory. 2.1 State Space Representation S 2 S 1 S 3

2 Theory. 2.1 State Space Representation S 2 S 1 S 3 In the following sections we develop the theory, illustrate the technique by applying it to a sample system, and validate the results using the method of enumeration. Notations: A-state functional (acceptable)

More information

MODULAR CIRCUITS CHAPTER 7

MODULAR CIRCUITS CHAPTER 7 CHAPTER 7 MODULAR CIRCUITS A modular circuit is a digital circuit that performs a specific function or has certain usage. The modular circuits to be introduced in this chapter are decoders, encoders, multiplexers,

More information

Reduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance

Reduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance Reduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance Tong-Yu Hsieh and Kuen-Jong Lee Department of Electrical Engineering National Cheng Kung University Tainan, Taiwan 70101

More information

Lecture 2: Connecting the Three Models

Lecture 2: Connecting the Three Models IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 2: Connecting the Three Models David Mix Barrington and Alexis Maciel July 18, 2000

More information

Chapter 3: Proving NP-completeness Results

Chapter 3: Proving NP-completeness Results Chapter 3: Proving NP-completeness Results Six Basic NP-Complete Problems Some Techniques for Proving NP-Completeness Some Suggested Exercises 1.1 Six Basic NP-Complete Problems 3-SATISFIABILITY (3SAT)

More information

Optimization of Quadratic Forms: NP Hard Problems : Neural Networks

Optimization of Quadratic Forms: NP Hard Problems : Neural Networks 1 Optimization of Quadratic Forms: NP Hard Problems : Neural Networks Garimella Rama Murthy, Associate Professor, International Institute of Information Technology, Gachibowli, HYDERABAD, AP, INDIA ABSTRACT

More information

Mutually Independent Hamiltonian Paths in Star Networks

Mutually Independent Hamiltonian Paths in Star Networks Mutually Independent Hamiltonian Paths in Star Networks Cheng-Kuan Lin a, Hua-Min Huang a, Lih-Hsing Hsu b,, and Sheng Bau c, a Department of Mathematics National Central University, Chung-Li, Taiwan b

More information

SHUHONG GAO AND BETH NOVICK

SHUHONG GAO AND BETH NOVICK FAULT TOLERANCE OF CAYLEY GRAPHS SHUHONG GAO AND BETH NOVICK Abstract. It is a difficult problem in general to decide whether a Cayley graph Cay(G; S) is connected where G is an arbitrary finite group

More information

Tutorial on Mathematical Induction

Tutorial on Mathematical Induction Tutorial on Mathematical Induction Roy Overbeek VU University Amsterdam Department of Computer Science r.overbeek@student.vu.nl April 22, 2014 1 Dominoes: from case-by-case to induction Suppose that you

More information

A Fault-tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree

A Fault-tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree A Fault-tolerant Routing Strategy for Gaussian Cube Using Gaussian Tree Peter, K K, Loh 1 and Zhang, Xinhua 1 School of Computer Engineering, Nanyang Technological University, Singapore Dept of Computer

More information

arxiv: v2 [math.gr] 17 Dec 2017

arxiv: v2 [math.gr] 17 Dec 2017 The complement of proper power graphs of finite groups T. Anitha, R. Rajkumar arxiv:1601.03683v2 [math.gr] 17 Dec 2017 Department of Mathematics, The Gandhigram Rural Institute Deemed to be University,

More information

Edge-counting vectors, Fibonacci cubes, and Fibonacci triangle

Edge-counting vectors, Fibonacci cubes, and Fibonacci triangle Publ. Math. Debrecen Manuscript (November 16, 2005) Edge-counting vectors, Fibonacci cubes, and Fibonacci triangle By Sandi Klavžar and Iztok Peterin Abstract. Edge-counting vectors of subgraphs of Cartesian

More information

Efficient Reassembling of Graphs, Part 1: The Linear Case

Efficient Reassembling of Graphs, Part 1: The Linear Case Efficient Reassembling of Graphs, Part 1: The Linear Case Assaf Kfoury Boston University Saber Mirzaei Boston University Abstract The reassembling of a simple connected graph G = (V, E) is an abstraction

More information

arb where a A, b B and we say a is related to b. Howdowewritea is not related to b? 2Rw 1Ro A B = {(a, b) a A, b B}

arb where a A, b B and we say a is related to b. Howdowewritea is not related to b? 2Rw 1Ro A B = {(a, b) a A, b B} Functions Functions play an important role in mathematics as well as computer science. A function is a special type of relation. So what s a relation? A relation, R, from set A to set B is defined as arb

More information

Fractional and circular 1-defective colorings of outerplanar graphs

Fractional and circular 1-defective colorings of outerplanar graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 6() (05), Pages Fractional and circular -defective colorings of outerplanar graphs Zuzana Farkasová Roman Soták Institute of Mathematics Faculty of Science,

More information

We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true.

We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Dimension We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Lemma If a vector space V has a basis B containing n vectors, then any set containing more

More information

(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2

(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2 Question 1 (a) Suppose A is the set of distinct letters in the word elephant, B is the set of distinct letters in the word sycophant, C is the set of distinct letters in the word fantastic, and D is the

More information

Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ

Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Myung M. Bae Scalable POWERparallel Systems, MS/P963, IBM Corp. Poughkeepsie, NY 6 myungbae@us.ibm.com Bella Bose Dept. of Computer Science Oregon

More information

Boolean cubes EECS150. Mapping truth tables onto cubes. Simplification. The Uniting Theorem. Three variable example

Boolean cubes EECS150. Mapping truth tables onto cubes. Simplification. The Uniting Theorem. Three variable example EES5 Section 5 Simplification and State Minimization Fall 2 -cube X oolean cubes Visual technique for indentifying when the uniting theorem can be applied n input variables = n-dimensional "cube" Y 2-cube

More information

Analysis and Optimization of Discrete Event Systems using Petri Nets

Analysis and Optimization of Discrete Event Systems using Petri Nets Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

Partial cubes: structures, characterizations, and constructions

Partial cubes: structures, characterizations, and constructions Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes

More information

Part V. Intractable Problems

Part V. Intractable Problems Part V Intractable Problems 507 Chapter 16 N P-Completeness Up to now, we have focused on developing efficient algorithms for solving problems. The word efficient is somewhat subjective, and the degree

More information

Section 1 (closed-book) Total points 30

Section 1 (closed-book) Total points 30 CS 454 Theory of Computation Fall 2011 Section 1 (closed-book) Total points 30 1. Which of the following are true? (a) a PDA can always be converted to an equivalent PDA that at each step pops or pushes

More information

Linear Programming Bounds for Robust Locally Repairable Storage Codes

Linear Programming Bounds for Robust Locally Repairable Storage Codes Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,

More information

Parity Versions of 2-Connectedness

Parity Versions of 2-Connectedness Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida

More information

Subcube Fault-Tolerance in Hypercubes

Subcube Fault-Tolerance in Hypercubes In Information and Computation 102 (1993), pp. 280 314. Subcube Fault-Tolerance in Hypercubes Niall Graham 1,2 Frank Harary 2 Computing Research Laboratory Department of Computer Science New Mexico State

More information

Unit 1A: Computational Complexity

Unit 1A: Computational Complexity Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if

More information

Canonicity and representable relation algebras

Canonicity and representable relation algebras Canonicity and representable relation algebras Ian Hodkinson Joint work with: Rob Goldblatt Robin Hirsch Yde Venema What am I going to do? In the 1960s, Monk proved that the variety RRA of representable

More information

Synthesis of 2-level Logic Exact and Heuristic Methods. Two Approaches

Synthesis of 2-level Logic Exact and Heuristic Methods. Two Approaches Synthesis of 2-level Logic Exact and Heuristic Methods Lecture 7: Branch & Bound Exact Two Approaches Find all primes Find a complete sum Find a minimum cover (covering problem) Heuristic Take an initial

More information

Introduction to Kleene Algebras

Introduction to Kleene Algebras Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)

More information

Disjoint Path Covers in Cubes of Connected Graphs

Disjoint Path Covers in Cubes of Connected Graphs Disjoint Path Covers in Cubes of Connected Graphs Jung-Heum Park a, Insung Ihm b, a School of Computer Science and Information Engineering The Catholic University of Korea, Bucheon, Korea b Department

More information