{"title":"A Recursive Algorithm for Constructing Dual-CISTs in Hierarchical Folded Cubic Networks","authors":"Hsin-Jung Lin, Shyue-Ming Tang, Kung-Jui Pai, Jou-Ming Chang","doi":"10.1142/s0129054123500156","DOIUrl":null,"url":null,"abstract":"Let [Formula: see text] be a set of [Formula: see text] spanning trees in a graph [Formula: see text]. The [Formula: see text] spanning trees are called completely independent spanning trees (CISTs for short) if the paths joining every pair of vertices [Formula: see text] and [Formula: see text] in any two trees have neither vertex nor edge in common except for [Formula: see text] and [Formula: see text]. Particularly, [Formula: see text] is called a dual-CIST provided [Formula: see text]. For data transmission applications in reliable networks, the existence of a dual-CIST can provide a configuration of fault-tolerant routing called protection routing. This paper investigates the problem of constructing a dual-CIST in the [Formula: see text]-dimensional hierarchical folded cubic network [Formula: see text]. The network is a two-level network using folded hypercube [Formula: see text] as clusters to reduce the diameter, hardware overhead and improve the fault tolerance ability. We propose a recursive algorithm to construct a dual-CIST of [Formula: see text] in [Formula: see text] time for [Formula: see text], where the time required is the same scale as the number of vertices of [Formula: see text]. Also, the diameter of each constructed CIST is [Formula: see text].","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Foundations of Computer Science","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1142/s0129054123500156","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Let [Formula: see text] be a set of [Formula: see text] spanning trees in a graph [Formula: see text]. The [Formula: see text] spanning trees are called completely independent spanning trees (CISTs for short) if the paths joining every pair of vertices [Formula: see text] and [Formula: see text] in any two trees have neither vertex nor edge in common except for [Formula: see text] and [Formula: see text]. Particularly, [Formula: see text] is called a dual-CIST provided [Formula: see text]. For data transmission applications in reliable networks, the existence of a dual-CIST can provide a configuration of fault-tolerant routing called protection routing. This paper investigates the problem of constructing a dual-CIST in the [Formula: see text]-dimensional hierarchical folded cubic network [Formula: see text]. The network is a two-level network using folded hypercube [Formula: see text] as clusters to reduce the diameter, hardware overhead and improve the fault tolerance ability. We propose a recursive algorithm to construct a dual-CIST of [Formula: see text] in [Formula: see text] time for [Formula: see text], where the time required is the same scale as the number of vertices of [Formula: see text]. Also, the diameter of each constructed CIST is [Formula: see text].
设[公式:见文]为图[公式:见文]中的一组[公式:见文]生成树。如果在任意两棵树中,除了[公式:见文本]和[公式:见文本]之外,连接每一对顶点[公式:见文本]和[公式:见文本]的路径既没有共同的顶点也没有共同的边,那么[公式:见文本]生成树被称为完全独立生成树(简称cist)。特别是,[公式:见文]被称为双cist提供[公式:见文]。对于可靠网络中的数据传输应用,双cist的存在可以提供一种容错路由的配置,称为保护路由。本文研究了在[公式:见文]-维分层折叠三次网络[公式:见文]中构造双cist的问题。该网络采用折叠超立方体[公式:见文]作为簇,以减少直径、硬件开销和提高容错能力。我们提出了一种递归算法,在[Formula: see text]的[Formula: see text]时间中构造[Formula: see text]的双cist,所需时间与[Formula: see text]的顶点数相同。此外,每个构建的CIST的直径为[公式:见文本]。
期刊介绍:
The International Journal of Foundations of Computer Science is a bimonthly journal that publishes articles which contribute new theoretical results in all areas of the foundations of computer science. The theoretical and mathematical aspects covered include:
- Algebraic theory of computing and formal systems
- Algorithm and system implementation issues
- Approximation, probabilistic, and randomized algorithms
- Automata and formal languages
- Automated deduction
- Combinatorics and graph theory
- Complexity theory
- Computational biology and bioinformatics
- Cryptography
- Database theory
- Data structures
- Design and analysis of algorithms
- DNA computing
- Foundations of computer security
- Foundations of high-performance computing