首页 > 最新文献

International Journal of Computer Mathematics: Computer Systems Theory最新文献

英文 中文
Reliability and conditional diagnosability of hyper bijective connection networks 超双射连接网络的可靠性和条件可诊断性
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-02 DOI: 10.1080/23799927.2020.1720825
Guanqin Lian, Shuming Zhou, E. Cheng, Jiafei Liu, Gaolin Chen, Zhendong Gu
The g-extra connectivity and diagonalisability are two important metrics to fault-tolerance and robustness of a multiprocessor system whose network structure is modelled by a graph. In this work, we explore the reliability of a newly proposed network called hyper bijective connection networks (HBC, for short), which is an extension of the family of the well-known interconnection networks, such as hypercube and its variants. We prove that 2-extra vertex connectivity and 3-extra vertex connectivity of n-dimensional HBC are 3n + m−6 for and and 4n + m−8 for and , respectively. Using its desirable fault-tolerance, we show that the conditional diagonalizabilities of n-dimensional HBC under the PMC model are m + 4n−7 (resp., 4n−5) for and (resp., m = 3 and ) and its conditional diagonalizability under MM model is m + 3n−6 for and .
网络结构采用图建模的多处理机系统的g-extra连通性和可对角性是衡量系统容错性和鲁棒性的两个重要指标。在这项工作中,我们探讨了一种新提出的称为超双射连接网络(简称HBC)的网络的可靠性,它是众所周知的互连网络家族的延伸,如超立方体及其变体。证明了n维HBC的2-额外顶点连通性和3-额外顶点连通性分别为3n + m−6和4n + m−8。利用其良好的容错性,我们证明了PMC模型下n维HBC的条件可对角性为m + 4n−7 (p < 0.05)。, 4n−5);, m = 3和),且在MM模型下其条件对角性为m + 3n−6。
{"title":"Reliability and conditional diagnosability of hyper bijective connection networks","authors":"Guanqin Lian, Shuming Zhou, E. Cheng, Jiafei Liu, Gaolin Chen, Zhendong Gu","doi":"10.1080/23799927.2020.1720825","DOIUrl":"https://doi.org/10.1080/23799927.2020.1720825","url":null,"abstract":"The g-extra connectivity and diagonalisability are two important metrics to fault-tolerance and robustness of a multiprocessor system whose network structure is modelled by a graph. In this work, we explore the reliability of a newly proposed network called hyper bijective connection networks (HBC, for short), which is an extension of the family of the well-known interconnection networks, such as hypercube and its variants. We prove that 2-extra vertex connectivity and 3-extra vertex connectivity of n-dimensional HBC are 3n + m−6 for and and 4n + m−8 for and , respectively. Using its desirable fault-tolerance, we show that the conditional diagonalizabilities of n-dimensional HBC under the PMC model are m + 4n−7 (resp., 4n−5) for and (resp., m = 3 and ) and its conditional diagonalizability under MM model is m + 3n−6 for and .","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"11 1","pages":"25 - 47"},"PeriodicalIF":0.8,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75207419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of s-extremal optimal unimodular lattices in dimension 52 52维s极值最优非模格的构造
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-12-05 DOI: 10.1080/23799927.2020.1755367
M. Harada
An s-extremal optimal unimodular lattice in dimension 52 is constructed for the first time. This lattice is constructed from a certain self-dual -code by Construction A. In addition, as neighbours of the lattice, two more s-extremal optimal unimodular lattices are constructed.
首次构造了52维的s极值最优单模格。构造a从一个特定的自对偶码构造了这个格。此外,作为格的邻居,构造了另外两个s极值最优非模格。
{"title":"Construction of s-extremal optimal unimodular lattices in dimension 52","authors":"M. Harada","doi":"10.1080/23799927.2020.1755367","DOIUrl":"https://doi.org/10.1080/23799927.2020.1755367","url":null,"abstract":"An s-extremal optimal unimodular lattice in dimension 52 is constructed for the first time. This lattice is constructed from a certain self-dual -code by Construction A. In addition, as neighbours of the lattice, two more s-extremal optimal unimodular lattices are constructed.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"1962 1","pages":"87 - 91"},"PeriodicalIF":0.8,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91315785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient secret key agreement protocol based on random noise without beacons 一种高效的无信标随机噪声密钥协议
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-10-02 DOI: 10.1080/23799927.2019.1671903
Albert Guan
ABSTRACT Computationally lightweight and unconditionally secure key agreement protocols are very useful for secure communication in public networks, especially for sensors with limited computing resources. In 2017, Guan and Tseng proposed a key agreement protocol which is computationally lightweight and unconditionally secure. In their protocol, it was assumed that the two communicating nodes can receive random bit string from a beacon node. Random bit string plays an important role in the generation of secret keys. With the advancement of hardware and software technologies, sensors may be able to generate good random strings. In this paper, we consider the case that the sensor nodes can generate random bit strings for secret keys. Therefore, no beacon nodes are required. The results of this study show that a key agreement protocol can be much more effective and efficient in the case that the communicating nodes can generate good random bit strings.
计算轻量级和无条件安全的密钥协商协议对于公共网络中的安全通信非常有用,特别是对于计算资源有限的传感器。2017年,Guan和Tseng提出了一种计算轻量级且无条件安全的密钥协议。在他们的协议中,假设两个通信节点可以从信标节点接收随机位串。随机位串在密钥生成中起着重要的作用。随着硬件和软件技术的进步,传感器可能会产生好的随机字符串。在本文中,我们考虑了传感器节点可以为密钥生成随机位串的情况。因此,不需要信标节点。研究结果表明,当通信节点能够生成良好的随机比特串时,密钥协议的有效性和效率将大大提高。
{"title":"An efficient secret key agreement protocol based on random noise without beacons","authors":"Albert Guan","doi":"10.1080/23799927.2019.1671903","DOIUrl":"https://doi.org/10.1080/23799927.2019.1671903","url":null,"abstract":"ABSTRACT Computationally lightweight and unconditionally secure key agreement protocols are very useful for secure communication in public networks, especially for sensors with limited computing resources. In 2017, Guan and Tseng proposed a key agreement protocol which is computationally lightweight and unconditionally secure. In their protocol, it was assumed that the two communicating nodes can receive random bit string from a beacon node. Random bit string plays an important role in the generation of secret keys. With the advancement of hardware and software technologies, sensors may be able to generate good random strings. In this paper, we consider the case that the sensor nodes can generate random bit strings for secret keys. Therefore, no beacon nodes are required. The results of this study show that a key agreement protocol can be much more effective and efficient in the case that the communicating nodes can generate good random bit strings.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"37 2","pages":"171 - 184"},"PeriodicalIF":0.8,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/23799927.2019.1671903","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72475759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-fault-tolerant pancyclicity of 2-tree-generated networks 二树生成网络的边容错泛环性
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-10-02 DOI: 10.1080/23799927.2019.1694997
Mohamad Abdallah
ABSTRACT Jwo et al. introduced the alternating group graph as an interconnection network topology for computing systems. A graph is pancyclic if it contains cycles of all possible lengths. P-Y Tsai et al. showed that the alternating group graph is pancyclic, and remains pancyclic after the deletion of 2n−6 edges. In this paper we consider a class of Cayley graphs introduced by Cheng et al. that are generated by certain 3-cycles on the alternating group . These graphs are generalizations of the alternating group graph . We look at the case when the 3-cycles form a ‘tree-like structure’, and analyse the pancyclicity of these graphs. We prove that this family of Cayley graphs is -edge-fault-tolerant pancyclic.
Jwo等人介绍了交替组图作为计算系统互连网络拓扑。如果一个图包含了所有可能长度的环,那么它就是环。P-Y Tsai等证明了交替群图是泛环的,并且在删除2n−6条边后仍然是泛环的。本文考虑由Cheng等人引入的一类Cayley图,该类图是由交替群上的某些3环生成的。这些图是交替群图的推广。我们看看当3个环形成一个“树状结构”的情况,并分析这些图的泛环性。证明了这组Cayley图是-边容错全环。
{"title":"Edge-fault-tolerant pancyclicity of 2-tree-generated networks","authors":"Mohamad Abdallah","doi":"10.1080/23799927.2019.1694997","DOIUrl":"https://doi.org/10.1080/23799927.2019.1694997","url":null,"abstract":"ABSTRACT Jwo et al. introduced the alternating group graph as an interconnection network topology for computing systems. A graph is pancyclic if it contains cycles of all possible lengths. P-Y Tsai et al. showed that the alternating group graph is pancyclic, and remains pancyclic after the deletion of 2n−6 edges. In this paper we consider a class of Cayley graphs introduced by Cheng et al. that are generated by certain 3-cycles on the alternating group . These graphs are generalizations of the alternating group graph . We look at the case when the 3-cycles form a ‘tree-like structure’, and analyse the pancyclicity of these graphs. We prove that this family of Cayley graphs is -edge-fault-tolerant pancyclic.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"115 1","pages":"140 - 150"},"PeriodicalIF":0.8,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80315169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solution of Boolean equations via atomic decomposition into independent switching equations 解布尔方程通过原子分解成独立的开关方程
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-10-02 DOI: 10.1080/23799927.2019.1700396
A. Balamesh, A. Rushdi
ABSTRACT This paper considers the problem of solving a system of Boolean equations over a finite (atomic) Boolean algebra other than the two-valued one, referred to herein as a ‘big’ Boolean algebra. The paper suggests the replacement of this system of equations by a single Boolean equation, and then proposes a novel method for solving this equation by using its atomic decomposition into several independent switching equations. This method has many advantages including the efficient derivation of a complete compact listing of all particular solutions in a form similar to the recently developed permutative additive form, but obtained in a more direct fashion without using parameters. Many detailed examples are used to illustrate the proposed new method. The examples demonstrate how the consistency condition might force a collapse of the underlying Boolean algebra into a subalgebra, and also how to list a huge number of particular solutions in a very small space.
摘要:本文考虑在有限(原子)布尔代数上求解布尔方程组的问题,而非二值布尔代数,这里称为“大”布尔代数。本文提出了用单个布尔方程代替该方程组,并提出了将该方程组的原子分解为多个独立的开关方程来求解该方程组的新方法。该方法具有许多优点,包括以类似于最近开发的置换加性形式的形式有效地推导所有特解的完全紧表,但以更直接的方式获得而不使用参数。用许多详细的实例来说明所提出的新方法。这些示例演示了一致性条件如何将底层布尔代数分解为子代数,以及如何在非常小的空间中列出大量的特解。
{"title":"Solution of Boolean equations via atomic decomposition into independent switching equations","authors":"A. Balamesh, A. Rushdi","doi":"10.1080/23799927.2019.1700396","DOIUrl":"https://doi.org/10.1080/23799927.2019.1700396","url":null,"abstract":"ABSTRACT This paper considers the problem of solving a system of Boolean equations over a finite (atomic) Boolean algebra other than the two-valued one, referred to herein as a ‘big’ Boolean algebra. The paper suggests the replacement of this system of equations by a single Boolean equation, and then proposes a novel method for solving this equation by using its atomic decomposition into several independent switching equations. This method has many advantages including the efficient derivation of a complete compact listing of all particular solutions in a form similar to the recently developed permutative additive form, but obtained in a more direct fashion without using parameters. Many detailed examples are used to illustrate the proposed new method. The examples demonstrate how the consistency condition might force a collapse of the underlying Boolean algebra into a subalgebra, and also how to list a huge number of particular solutions in a very small space.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"71 1","pages":"185 - 203"},"PeriodicalIF":0.8,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83613407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effect of fuzziness on the stability of inertial neural networks with mixed delay via non-reduced-order method 用非降阶方法研究模糊性对混合时滞惯性神经网络稳定性的影响
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-10-02 DOI: 10.1080/23799927.2019.1685006
C. Aouiti, El Abed Assali
ABSTRACT In this paper, without transforming the original inertial neural networks into the first-order differential equation by some variable substitutions, fuzziness, time-varying and distributed delays are introduced into inertial networks and the existence, the uniqueness and the asymptotic stability for the neural networks are investigated. The existence of a unique equilibrium point is proved by using inequality techniques, and the properties of an M-matrix. By finding a new Lyapunov–Krasovskii functional, some sufficient conditions are derived ensuring the asymptotic stability. Finally, three numerical examples with simulation are presented to show the effectiveness of our theoretical results.
在不将原有的惯性神经网络通过变量替换转化为一阶微分方程的情况下,将模糊性、时变时滞和分布时滞引入惯性网络,研究了该类神经网络的存在性、唯一性和渐近稳定性。利用不等式技术和m -矩阵的性质证明了唯一平衡点的存在性。通过寻找新的Lyapunov-Krasovskii泛函,得到了保证渐近稳定的充分条件。最后,给出了三个数值仿真实例,验证了理论结果的有效性。
{"title":"Effect of fuzziness on the stability of inertial neural networks with mixed delay via non-reduced-order method","authors":"C. Aouiti, El Abed Assali","doi":"10.1080/23799927.2019.1685006","DOIUrl":"https://doi.org/10.1080/23799927.2019.1685006","url":null,"abstract":"ABSTRACT In this paper, without transforming the original inertial neural networks into the first-order differential equation by some variable substitutions, fuzziness, time-varying and distributed delays are introduced into inertial networks and the existence, the uniqueness and the asymptotic stability for the neural networks are investigated. The existence of a unique equilibrium point is proved by using inequality techniques, and the properties of an M-matrix. By finding a new Lyapunov–Krasovskii functional, some sufficient conditions are derived ensuring the asymptotic stability. Finally, three numerical examples with simulation are presented to show the effectiveness of our theoretical results.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"79 10","pages":"151 - 170"},"PeriodicalIF":0.8,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/23799927.2019.1685006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72487743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A cryptographic application of the Thurston norm 瑟斯顿范数的密码学应用
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-08-09 DOI: 10.1080/23799927.2020.1716074
Ramón Flores, Delaram Kahrobaei, T. Koberda
We discuss some applications of 3-manifold topology to cryptography. In particular, we propose a public-key and a symmetric-key cryptographic scheme based on the Thurston norm on the first cohomology of hyperbolic manifolds.
讨论了三流形拓扑在密码学中的一些应用。特别地,我们提出了一个基于双曲流形第一上同调上瑟斯顿范数的公钥和对称密钥加密方案。
{"title":"A cryptographic application of the Thurston norm","authors":"Ramón Flores, Delaram Kahrobaei, T. Koberda","doi":"10.1080/23799927.2020.1716074","DOIUrl":"https://doi.org/10.1080/23799927.2020.1716074","url":null,"abstract":"We discuss some applications of 3-manifold topology to cryptography. In particular, we propose a public-key and a symmetric-key cryptographic scheme based on the Thurston norm on the first cohomology of hyperbolic manifolds.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"73 6","pages":"15 - 24"},"PeriodicalIF":0.8,"publicationDate":"2019-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/23799927.2020.1716074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72371343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perceptual video encryption using orthogonal matrix 基于正交矩阵的感知视频加密
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-07-25 DOI: 10.1080/23799927.2019.1645210
S. Alhassan, M. M. Iddrisu, M. I. Daabo
ABSTRACT In this paper, the properties of rotation matrices are employed to construct special orthogonal matrices that are used to encrypt and decrypt video with varying perceptibility. Square orthogonal matrices of varying sides are formulated as cipher key matrices. The encryption algorithm uses these matrices to encrypt plain video into cipher video and transmit while the decryption algorithm uses the transpose of the cipher key matrices to recover the original video at the other end of the communication channel. Degradation in visual quality is controlled by varying cipher key dimension and the number of repetitions. Barring any noise in the communication channel, the proposed method retrieves the original video free of any error. Analysis of results show that the proposed method is key sensitive and resistant to chosen/known plain-text attacks.
摘要本文利用旋转矩阵的性质构造了特殊的正交矩阵,用于对具有可变感知性的视频进行加密和解密。将变边方形正交矩阵表示为密码密钥矩阵。加密算法使用这些矩阵将明文视频加密为密码视频并传输,解密算法使用密码密钥矩阵的转置在通信信道的另一端恢复原始视频。视觉质量的下降由不同的密钥尺寸和重复次数来控制。该方法排除了通信信道中存在的噪声,恢复了无误差的原始视频。分析结果表明,该方法对密钥敏感,能够抵抗已知/选择的明文攻击。
{"title":"Perceptual video encryption using orthogonal matrix","authors":"S. Alhassan, M. M. Iddrisu, M. I. Daabo","doi":"10.1080/23799927.2019.1645210","DOIUrl":"https://doi.org/10.1080/23799927.2019.1645210","url":null,"abstract":"ABSTRACT In this paper, the properties of rotation matrices are employed to construct special orthogonal matrices that are used to encrypt and decrypt video with varying perceptibility. Square orthogonal matrices of varying sides are formulated as cipher key matrices. The encryption algorithm uses these matrices to encrypt plain video into cipher video and transmit while the decryption algorithm uses the transpose of the cipher key matrices to recover the original video at the other end of the communication channel. Degradation in visual quality is controlled by varying cipher key dimension and the number of repetitions. Barring any noise in the communication channel, the proposed method retrieves the original video free of any error. Analysis of results show that the proposed method is key sensitive and resistant to chosen/known plain-text attacks.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"66 1","pages":"129 - 139"},"PeriodicalIF":0.8,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89279981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Randomization of approximate bilinear computation for matrix multiplication 矩阵乘法近似双线性计算的随机化
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-05-17 DOI: 10.1080/23799927.2020.1861104
Osman Asif Malik, Stephen Becker
ABSTRACT We present a method for randomizing formulas for bilinear computation of matrix products which does not increase the leading order complexity of the computation. We consider the implications of such randomization when there are two sources of error. The first source is due to the computation formula itself only being approximately correct. Such formulas come up when numerically searching for faster matrix multiplication algorithms. The second source is due to using floating point arithmetic. This kind of error is especially important when computing on low precision hardware like GPUs. Our theoretical results and numerical experiments indicate that our method can improve performance when the two kinds of error are present individually, as well as when they are present at the same time.
摘要提出了一种不增加计算复杂度的矩阵乘积双线性计算随机化公式的方法。当有两个误差来源时,我们考虑这种随机化的含义。第一个原因是由于计算公式本身只是近似正确的。在数值搜索更快的矩阵乘法算法时,会出现这样的公式。第二个来源是由于使用浮点运算。当在像gpu这样的低精度硬件上进行计算时,这种错误尤其重要。理论和数值实验结果表明,无论这两种误差单独存在还是同时存在,我们的方法都能提高性能。
{"title":"Randomization of approximate bilinear computation for matrix multiplication","authors":"Osman Asif Malik, Stephen Becker","doi":"10.1080/23799927.2020.1861104","DOIUrl":"https://doi.org/10.1080/23799927.2020.1861104","url":null,"abstract":"ABSTRACT We present a method for randomizing formulas for bilinear computation of matrix products which does not increase the leading order complexity of the computation. We consider the implications of such randomization when there are two sources of error. The first source is due to the computation formula itself only being approximately correct. Such formulas come up when numerically searching for faster matrix multiplication algorithms. The second source is due to using floating point arithmetic. This kind of error is especially important when computing on low precision hardware like GPUs. Our theoretical results and numerical experiments indicate that our method can improve performance when the two kinds of error are present individually, as well as when they are present at the same time.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"1 1","pages":"54 - 93"},"PeriodicalIF":0.8,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78539308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The (t, k)-diagnosability of shuffle-cubes under PMC model PMC模型下洗牌立方体的(t, k)-可诊断性
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-04-03 DOI: 10.1080/23799927.2019.1625949
Jin'e Li, Limei Lin, Yanze Huang, Hui Yu, Riqing Chen
ABSTRACT System-level diagnosis aims to identify faulty processors in a multiprocessor system by analysing the test results among the processors. The -diagnosis requires to identify and repair at least k faulty processors in each iteration until that all t faulty processors are found where . It is one of the most important system-level diagnosis strategies. Meanwhile, shuffle-cube , a variant of hypercube for multiprocessor systems, has some good combinatorial properties and fault-tolerant properties. In this paper, we propose a -diagnosis algorithm for n-dimensional shuffle-cube , and then we show that is -diagnosable. Moreover, we prove that the proposed algorithm can identify at most faulty nodes under the condition that it can identify at least n faulty nodes in each iteration.
系统级诊断旨在通过分析多处理器之间的测试结果来识别多处理器系统中的故障处理器。-诊断要求在每次迭代中识别并修复至少k个故障处理器,直到找到所有t个故障处理器。它是最重要的系统级诊断策略之一。同时,作为多处理机系统超立方体的一种变体,shuffle-cube具有良好的组合特性和容错性。本文提出了一种n维洗牌立方体的诊断算法,并证明了该算法是可诊断的。此外,我们证明了该算法在每次迭代中至少能识别出n个故障节点的条件下,可以识别出最多的故障节点。
{"title":"The (t, k)-diagnosability of shuffle-cubes under PMC model","authors":"Jin'e Li, Limei Lin, Yanze Huang, Hui Yu, Riqing Chen","doi":"10.1080/23799927.2019.1625949","DOIUrl":"https://doi.org/10.1080/23799927.2019.1625949","url":null,"abstract":"ABSTRACT System-level diagnosis aims to identify faulty processors in a multiprocessor system by analysing the test results among the processors. The -diagnosis requires to identify and repair at least k faulty processors in each iteration until that all t faulty processors are found where . It is one of the most important system-level diagnosis strategies. Meanwhile, shuffle-cube , a variant of hypercube for multiprocessor systems, has some good combinatorial properties and fault-tolerant properties. In this paper, we propose a -diagnosis algorithm for n-dimensional shuffle-cube , and then we show that is -diagnosable. Moreover, we prove that the proposed algorithm can identify at most faulty nodes under the condition that it can identify at least n faulty nodes in each iteration.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"58 1","pages":"111 - 126"},"PeriodicalIF":0.8,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82290736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Computer Mathematics: Computer Systems Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1