首页 > 最新文献

Parallel Process. Lett.最新文献

英文 中文
Reliability Evaluation of Data Center Network DCell 数据中心网络DCell可靠性评估
Pub Date : 2018-12-01 DOI: 10.1142/S0129626418500159
Mengjie Lv, Shuming Zhou, Xueli Sun, Guanqin Lian, Jiafei Liu
With the rapid development of cloud computing, many large-scale data centers are being built to provide increasingly popular online application services, such as search, e-mails, WeChat, and microblog, etc. The reliability of a massive data center network is the likelihood that it performs its expected functions consistently well under the given conditions within a specified time interval. A typical approach to measure the reliability of the system is to count the mean time to failure (MTTF), which shows the time that the appearance of a certain number of faulty subsystem costs. The higher the MTTF, the more reliable the system is. In this paper, we explore the reliability of data center network DCell when it is decomposed into smaller ones along the last dimension under server (node) failure model and link failure model, respectively.
随着云计算的快速发展,许多大型数据中心正在建设中,以提供越来越流行的在线应用服务,如搜索、电子邮件、微信、微博等。大型数据中心网络的可靠性是指它在给定的条件下,在指定的时间间隔内始终如一地执行其预期功能的可能性。衡量系统可靠性的一种典型方法是计算平均故障间隔时间(MTTF),它显示了出现一定数量的故障子系统所花费的时间。MTTF值越高,系统越可靠。本文分别在服务器(节点)故障模型和链路故障模型下,对数据中心网络DCell沿最后一个维度分解为较小的DCell时的可靠性进行了研究。
{"title":"Reliability Evaluation of Data Center Network DCell","authors":"Mengjie Lv, Shuming Zhou, Xueli Sun, Guanqin Lian, Jiafei Liu","doi":"10.1142/S0129626418500159","DOIUrl":"https://doi.org/10.1142/S0129626418500159","url":null,"abstract":"With the rapid development of cloud computing, many large-scale data centers are being built to provide increasingly popular online application services, such as search, e-mails, WeChat, and microblog, etc. The reliability of a massive data center network is the likelihood that it performs its expected functions consistently well under the given conditions within a specified time interval. A typical approach to measure the reliability of the system is to count the mean time to failure (MTTF), which shows the time that the appearance of a certain number of faulty subsystem costs. The higher the MTTF, the more reliable the system is. In this paper, we explore the reliability of data center network DCell when it is decomposed into smaller ones along the last dimension under server (node) failure model and link failure model, respectively.","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Importance of Applying Security Practices in Wireless Communication: Bluetooth Low Energy and RFID 在无线通信中应用安全实践的重要性:低功耗蓝牙和射频识别
Pub Date : 2018-09-01 DOI: 10.1142/S012962641850010X
Joseph Tassone, Mike Biocchi
Security is a concept which people recognize as important, yet regularly ignore for reasons such as cost or design constraints. The world is quickly shifting towards the wireless with phenomena akin to the Internet of Thing (IoT) accelerating this progression. Technologies like Bluetooth Low Energy and Radio Frequency Identification are greatly entwined with this trend, and research has been made into reinforcing protection methods. However, security is a choice made by the designer and more often than not is given decreased priority. With the improved creativity and sophistication of malicious exploits this is becoming far less acceptable. Theft of data is trivial for a user with the correct skillset and will be successful without proper defences. Further research needs to be done in the field, and encouraging consistent security practices is an appropriate start.
安全性是一个人们认为很重要的概念,但由于成本或设计限制等原因经常被忽略。世界正在迅速转向无线,类似物联网(IoT)的现象加速了这一进程。低功耗蓝牙(Bluetooth Low Energy)、射频识别(Radio Frequency Identification)等技术与这一趋势密切相关,并对加强保护方法进行了研究。然而,安全性是由设计者做出的选择,通常被赋予的优先级较低。随着恶意攻击的创造性和复杂性的提高,这种情况变得越来越难以接受。对于拥有正确技能的用户来说,窃取数据是微不足道的,如果没有适当的防御措施,窃取数据就会成功。需要在该领域进行进一步的研究,鼓励一致的安全实践是一个适当的开始。
{"title":"The Importance of Applying Security Practices in Wireless Communication: Bluetooth Low Energy and RFID","authors":"Joseph Tassone, Mike Biocchi","doi":"10.1142/S012962641850010X","DOIUrl":"https://doi.org/10.1142/S012962641850010X","url":null,"abstract":"Security is a concept which people recognize as important, yet regularly ignore for reasons such as cost or design constraints. The world is quickly shifting towards the wireless with phenomena akin to the Internet of Thing (IoT) accelerating this progression. Technologies like Bluetooth Low Energy and Radio Frequency Identification are greatly entwined with this trend, and research has been made into reinforcing protection methods. However, security is a choice made by the designer and more often than not is given decreased priority. With the improved creativity and sophistication of malicious exploits this is becoming far less acceptable. Theft of data is trivial for a user with the correct skillset and will be successful without proper defences. Further research needs to be done in the field, and encouraging consistent security practices is an appropriate start.","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"91 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113970481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Convolution and Deep Learning in Gomoku Game Artificial Intelligence 卷积和深度学习在围棋游戏人工智能中的应用
Pub Date : 2018-09-01 DOI: 10.1142/S0129626418500111
Peizhi Yan, Yi Feng
Gomoku is an ancient board game. The traditional approach to solving the Gomoku game is to apply tree search on a Gomoku game tree. Although the rules of Gomoku are straightforward, the game tree complexity is enormous. Unlike many other board games such as chess and Shogun, the Gomoku board state is more intuitive. That is to say, analyzing the visual patterns on a Gomoku game board is fundamental to play this game. In this paper, we designed a deep convolutional neural network model to help the machine learn from the training data (collected from human players). Based on this original neural network model, we made some changes and get two variant neural networks. We compared the performance of the original neural network with its variants in our experiments. Our original neural network model got 69% accuracy on the training data and 38% accuracy on the testing data. Because the decision made by the neural network is intuitive, we also designed a hard-coded convolution-based Gomoku evaluation function to assist the neural network in making decisions. This hybrid Gomoku artificial intelligence (AI) further improved the performance of a pure neural network-based Gomoku AI.
围棋是一种古老的棋盘游戏。求解Gomoku博弈的传统方法是对Gomoku博弈树进行树搜索。尽管《Gomoku》的规则很简单,但游戏树的复杂性却是巨大的。与象棋和幕府将军等许多其他棋盘游戏不同,Gomoku的棋盘状态更直观。也就是说,分析《Gomoku》棋盘上的视觉模式是玩这款游戏的基础。在本文中,我们设计了一个深度卷积神经网络模型来帮助机器从训练数据中学习(从人类玩家那里收集)。在此基础上,对原有的神经网络模型进行了改进,得到了两种不同的神经网络。我们在实验中比较了原始神经网络与其变体的性能。我们的原始神经网络模型在训练数据上的准确率为69%,在测试数据上的准确率为38%。由于神经网络的决策是直观的,我们还设计了一个硬编码的基于卷积的Gomoku评价函数来辅助神经网络进行决策。这种混合Gomoku人工智能(AI)进一步提高了基于纯神经网络的Gomoku人工智能的性能。
{"title":"Using Convolution and Deep Learning in Gomoku Game Artificial Intelligence","authors":"Peizhi Yan, Yi Feng","doi":"10.1142/S0129626418500111","DOIUrl":"https://doi.org/10.1142/S0129626418500111","url":null,"abstract":"Gomoku is an ancient board game. The traditional approach to solving the Gomoku game is to apply tree search on a Gomoku game tree. Although the rules of Gomoku are straightforward, the game tree complexity is enormous. Unlike many other board games such as chess and Shogun, the Gomoku board state is more intuitive. That is to say, analyzing the visual patterns on a Gomoku game board is fundamental to play this game. In this paper, we designed a deep convolutional neural network model to help the machine learn from the training data (collected from human players). Based on this original neural network model, we made some changes and get two variant neural networks. We compared the performance of the original neural network with its variants in our experiments. Our original neural network model got 69% accuracy on the training data and 38% accuracy on the testing data. Because the decision made by the neural network is intuitive, we also designed a hard-coded convolution-based Gomoku evaluation function to assist the neural network in making decisions. This hybrid Gomoku artificial intelligence (AI) further improved the performance of a pure neural network-based Gomoku AI.","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Matching Preclusion for the Shuffle-Cubes 洗牌方块的匹配排除
Pub Date : 2018-09-01 DOI: 10.1142/S0129626418500123
Sai Antantapantula, Christopher Melekian, E. Cheng
The matching preclusion number of a graph is the minimum number of edges whose deletion results in a graph that has neither perfect matchings nor almost perfect matchings. A graph is maximally matched if its matching preclusion number is equal to its minimum degree, and is super matched if the matching preclusion number can only be achieved by deleting all edges incident to a single vertex. In this paper, we determine the matching preclusion number and classify the optimal matching preclusion sets for the shuffle-cube graphs, a variant of the well-known hypercubes.
图的匹配排除数是图的最小边数,删除这些边会导致图既不存在完美匹配,也不存在几乎完美匹配。如果图的匹配排除数等于图的最小度,则图为最大匹配;如果图的匹配排除数只能通过删除与单个顶点相关的所有边来实现,则图为超级匹配。本文确定了超立方体图的一种变体——洗牌立方体图的匹配排除数,并分类了最优匹配排除集。
{"title":"Matching Preclusion for the Shuffle-Cubes","authors":"Sai Antantapantula, Christopher Melekian, E. Cheng","doi":"10.1142/S0129626418500123","DOIUrl":"https://doi.org/10.1142/S0129626418500123","url":null,"abstract":"The matching preclusion number of a graph is the minimum number of edges whose deletion results in a graph that has neither perfect matchings nor almost perfect matchings. A graph is maximally matched if its matching preclusion number is equal to its minimum degree, and is super matched if the matching preclusion number can only be achieved by deleting all edges incident to a single vertex. In this paper, we determine the matching preclusion number and classify the optimal matching preclusion sets for the shuffle-cube graphs, a variant of the well-known hypercubes.","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116486044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Data Layout Transformations in the ExaStencils Code Generator ExaStencils代码生成器中的自动数据布局转换
Pub Date : 2018-09-01 DOI: 10.1142/S0129626418500093
Stefan Kronawitter, S. Kuckuk, H. Köstler, C. Lengauer
Performance optimizations should focus not only on the computations of an application, but also on the internal data layout. A well-known problem is whether a struct of arrays or an array of structs results in a higher performance for a particular application. Even though the switch from the one to the other is fairly simple to implement, testing both transformations can become laborious and error-prone. Additionally, there are more complex data layout transformations, such as a color splitting for multi-color kernels in the domain of stencil codes, that are manually difficult. As a remedy, we propose new flexible layout transformation statements for our domain-specific language ExaSlang that support arbitrary affine transformations. Since our code generator applies them automatically to the generated code, these statements enable the simple adaptation of the data layout without the need for any other modifications of the application code. This constitutes a big advance in the ease of testing and evaluating different memory layout schemes in order to identify the best.
性能优化不仅应该关注应用程序的计算,还应该关注内部数据布局。一个众所周知的问题是,对于特定的应用程序,是数组结构体还是结构体数组带来更高的性能。尽管从一种转换到另一种转换相当容易实现,但是测试这两种转换可能会变得费力且容易出错。此外,还有更复杂的数据布局转换,例如在模板代码领域中对多色核进行颜色分割,这些都是手动难以实现的。作为补救措施,我们为领域特定的语言ExaSlang提出了新的灵活的布局转换语句,它支持任意仿射转换。由于我们的代码生成器自动将它们应用于生成的代码,因此这些语句可以简单地调整数据布局,而无需对应用程序代码进行任何其他修改。这在测试和评估不同的内存布局方案以确定最佳方案方面是一个很大的进步。
{"title":"Automatic Data Layout Transformations in the ExaStencils Code Generator","authors":"Stefan Kronawitter, S. Kuckuk, H. Köstler, C. Lengauer","doi":"10.1142/S0129626418500093","DOIUrl":"https://doi.org/10.1142/S0129626418500093","url":null,"abstract":"Performance optimizations should focus not only on the computations of an application, but also on the internal data layout. A well-known problem is whether a struct of arrays or an array of structs results in a higher performance for a particular application. Even though the switch from the one to the other is fairly simple to implement, testing both transformations can become laborious and error-prone. Additionally, there are more complex data layout transformations, such as a color splitting for multi-color kernels in the domain of stencil codes, that are manually difficult. As a remedy, we propose new flexible layout transformation statements for our domain-specific language ExaSlang that support arbitrary affine transformations. Since our code generator applies them automatically to the generated code, these statements enable the simple adaptation of the data layout without the need for any other modifications of the application code. This constitutes a big advance in the ease of testing and evaluating different memory layout schemes in order to identify the best.","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Graph Connectivity in Log Steps Using Label Propagation 使用标签传播的日志步骤中的图连通性
Pub Date : 2018-08-20 DOI: 10.1142/S0129626421500213
Paul Burkhardt
The fastest deterministic algorithms for connected components take logarithmic time and perform superlinear work on a Parallel Random Access Machine (PRAM). These algorithms maintain a spanning forest by merging and compressing trees, which requires pointer-chasing operations that increase memory access latency and are limited to shared-memory systems. Many of these PRAM algorithms are also very complicated to implement. Another popular method is “leader-contraction” where the challenge is to select a constant fraction of leaders that are adjacent to a constant fraction of non-leaders with high probability, but this can require adding more edges than were in the original graph. Instead we investigate label propagation because it is deterministic, easy to implement, and does not rely on pointer-chasing. Label propagation exchanges representative labels within a component using simple graph traversal, but it is inherently difficult to complete in a sublinear number of steps. We are able to overcome the problems with label propagation for graph connectivity. We introduce a surprisingly simple framework for deterministic, undirected graph connectivity using label propagation that is easily adaptable to many computational models. It achieves logarithmic convergence independently of the number of processors and without increasing the edge count. We employ a novel method of propagating directed edges in alternating direction while performing minimum reduction on vertex labels. We present new algorithms in PRAM, Stream, and MapReduce. Given a simple, undirected graph [Formula: see text] with [Formula: see text] vertices, [Formula: see text] edges, our approach takes O(m) work each step, but we can only prove logarithmic convergence on a path graph. It was conjectured by Liu and Tarjan (2019) to take [Formula: see text] steps or possibly [Formula: see text] steps. Our experiments on a range of difficult graphs also suggest logarithmic convergence. We leave the proof of convergence as an open problem.
在并行随机存取机(PRAM)上,连接组件的最快确定性算法需要对数时间和超线性工作。这些算法通过合并和压缩树来维护生成林,这需要指针跟踪操作,这会增加内存访问延迟,并且仅限于共享内存系统。这些PRAM算法中的许多实现起来也非常复杂。另一种流行的方法是“领导者收缩”,其中的挑战是选择一个恒定比例的领导者,这些领导者与一个恒定比例的非领导者有高概率相邻,但这可能需要添加比原始图更多的边。相反,我们研究标签传播,因为它是确定性的,易于实现,并且不依赖于指针跟踪。标签传播使用简单的图遍历交换组件内的代表性标签,但在次线性的步骤中完成它本身就很困难。我们能够克服图连通性的标签传播问题。我们引入了一个非常简单的框架,用于使用标签传播的确定性无向图连接,该框架很容易适应许多计算模型。它独立于处理器数量实现对数收敛,并且不增加边缘计数。在对顶点标签进行最小约简的同时,我们采用了一种新的方法在交替方向上传播有向边。我们在PRAM, Stream和MapReduce中提出了新的算法。给定一个简单的无向图[公式:见文],有[公式:见文]顶点,[公式:见文]边,我们的方法每一步需要O(m)次工作,但我们只能证明路径图的对数收敛性。Liu和Tarjan(2019)推测采取[公式:见文]步骤或可能采取[公式:见文]步骤。我们在一系列复杂图上的实验也表明对数收敛。我们把收敛性的证明作为一个开放的问题。
{"title":"Graph Connectivity in Log Steps Using Label Propagation","authors":"Paul Burkhardt","doi":"10.1142/S0129626421500213","DOIUrl":"https://doi.org/10.1142/S0129626421500213","url":null,"abstract":"The fastest deterministic algorithms for connected components take logarithmic time and perform superlinear work on a Parallel Random Access Machine (PRAM). These algorithms maintain a spanning forest by merging and compressing trees, which requires pointer-chasing operations that increase memory access latency and are limited to shared-memory systems. Many of these PRAM algorithms are also very complicated to implement. Another popular method is “leader-contraction” where the challenge is to select a constant fraction of leaders that are adjacent to a constant fraction of non-leaders with high probability, but this can require adding more edges than were in the original graph. Instead we investigate label propagation because it is deterministic, easy to implement, and does not rely on pointer-chasing. Label propagation exchanges representative labels within a component using simple graph traversal, but it is inherently difficult to complete in a sublinear number of steps. We are able to overcome the problems with label propagation for graph connectivity. We introduce a surprisingly simple framework for deterministic, undirected graph connectivity using label propagation that is easily adaptable to many computational models. It achieves logarithmic convergence independently of the number of processors and without increasing the edge count. We employ a novel method of propagating directed edges in alternating direction while performing minimum reduction on vertex labels. We present new algorithms in PRAM, Stream, and MapReduce. Given a simple, undirected graph [Formula: see text] with [Formula: see text] vertices, [Formula: see text] edges, our approach takes O(m) work each step, but we can only prove logarithmic convergence on a path graph. It was conjectured by Liu and Tarjan (2019) to take [Formula: see text] steps or possibly [Formula: see text] steps. Our experiments on a range of difficult graphs also suggest logarithmic convergence. We leave the proof of convergence as an open problem.","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126821970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online Matching in Regular Bipartite Graphs 正则二部图的在线匹配
Pub Date : 2018-06-01 DOI: 10.1142/S0129626418500081
Lali Barrière, X. Muñoz, Janosch Fuchs, Walter Unger
In an online problem, the input is revealed one piece at a time. In every time step, the online algorithm has to produce a part of the output, based on the partial knowledge of the input. Such decisions are irrevocable, and thus online algorithms usually lead to nonoptimal solutions. The impact of the partial knowledge depends strongly on the problem. If the algorithm is allowed to read binary information about the future, the amount of bits read that allow the algorithm to solve the problem optimally is the so-called advice complexity. The quality of an online algorithm is measured by its competitive ratio, which compares its performance to that of an optimal offline algorithm. In this paper we study online bipartite matchings focusing on the particular case of bipartite matchings in regular graphs. We give tight upper and lower bounds on the competitive ratio of the online deterministic bipartite matching problem. The competitive ratio turns out to be asymptotically equal to the known randomized competitive ratio. Afterwards, we present an upper and lower bound for the advice complexity of the online deterministic bipartite matching problem.
在在线问题中,输入一次显示一块。在每一个时间步,在线算法必须根据输入的部分知识产生一部分输出。这样的决定是不可撤销的,因此在线算法通常导致非最优解。部分知识的影响很大程度上取决于问题。如果允许算法读取有关未来的二进制信息,那么允许算法以最佳方式解决问题的读取位数就是所谓的建议复杂度。在线算法的质量是通过其竞争比来衡量的,竞争比是将其性能与最优的离线算法进行比较。本文研究了正则图的在线二部匹配问题,重点讨论了正则图中二部匹配的特殊情况。给出了在线确定性二部匹配问题的竞争比的紧上界和下界。竞争比渐近等于已知的随机竞争比。然后,给出了在线确定性二部匹配问题建议复杂度的上界和下界。
{"title":"Online Matching in Regular Bipartite Graphs","authors":"Lali Barrière, X. Muñoz, Janosch Fuchs, Walter Unger","doi":"10.1142/S0129626418500081","DOIUrl":"https://doi.org/10.1142/S0129626418500081","url":null,"abstract":"In an online problem, the input is revealed one piece at a time. In every time step, the online algorithm has to produce a part of the output, based on the partial knowledge of the input. Such decisions are irrevocable, and thus online algorithms usually lead to nonoptimal solutions. The impact of the partial knowledge depends strongly on the problem. If the algorithm is allowed to read binary information about the future, the amount of bits read that allow the algorithm to solve the problem optimally is the so-called advice complexity. The quality of an online algorithm is measured by its competitive ratio, which compares its performance to that of an optimal offline algorithm. In this paper we study online bipartite matchings focusing on the particular case of bipartite matchings in regular graphs. We give tight upper and lower bounds on the competitive ratio of the online deterministic bipartite matching problem. The competitive ratio turns out to be asymptotically equal to the known randomized competitive ratio. Afterwards, we present an upper and lower bound for the advice complexity of the online deterministic bipartite matching problem.","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128982148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Remark on Rainbow 6-Cycles in Hypercubes 超立方体中彩虹6环的一个注解
Pub Date : 2018-06-01 DOI: 10.1142/S012962641850007X
Chen Hao, Weihua Yang
We call an edge-coloring of a graph [Formula: see text] a rainbow coloring if the edges of [Formula: see text] are colored with distinct colors. For every even positive integer [Formula: see text], let [Formula: see text] denote the minimum number of colors required to color the edges of the [Formula: see text]-dimensional cube [Formula: see text], so that every copy of [Formula: see text] is rainbow. Faudree et al. [6] proved that [Formula: see text] for [Formula: see text] or [Formula: see text]. Mubayi et al. [8] showed that [Formula: see text]. In this note, we show that [Formula: see text]. Moreover, we obtain the number of 6-cycles of [Formula: see text].
如果图形的边缘用不同的颜色着色,我们称其为彩虹着色[公式:见文]。对于每一个偶数正整数[公式:见文],让[公式:见文]表示为[公式:见文]维立方体[公式:见文]的边缘上色所需的最小颜色数,使[公式:见文]的每个副本都是彩虹。Faudree等人[6]证明了[公式:见文]对于[公式:见文]或[公式:见文]。Mubayi等[8]表明[公式:见正文]。在本文中,我们展示了[公式:见文本]。进而得到[公式:见文]的6圈数。
{"title":"A Remark on Rainbow 6-Cycles in Hypercubes","authors":"Chen Hao, Weihua Yang","doi":"10.1142/S012962641850007X","DOIUrl":"https://doi.org/10.1142/S012962641850007X","url":null,"abstract":"We call an edge-coloring of a graph [Formula: see text] a rainbow coloring if the edges of [Formula: see text] are colored with distinct colors. For every even positive integer [Formula: see text], let [Formula: see text] denote the minimum number of colors required to color the edges of the [Formula: see text]-dimensional cube [Formula: see text], so that every copy of [Formula: see text] is rainbow. Faudree et al. [6] proved that [Formula: see text] for [Formula: see text] or [Formula: see text]. Mubayi et al. [8] showed that [Formula: see text]. In this note, we show that [Formula: see text]. Moreover, we obtain the number of 6-cycles of [Formula: see text].","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Half Cleaner Lemma: Constructing Efficient Interconnection Networks from Sorting Networks 半清洁引理:从分类网络构建高效互连网络
Pub Date : 2018-04-01 DOI: 10.1142/S0129626418500019
Tripti Jain, K. Schneider
In general, efficient non-blocking interconnection networks can be derived from sorting networks, and to this end, one may either follow the merge-based or the radix-based sorting paradigm. Both pa...
一般来说,高效的非阻塞互连网络可以从排序网络中派生出来,为此,人们可以遵循基于合并或基于基数的排序范式。两个爸爸…
{"title":"The Half Cleaner Lemma: Constructing Efficient Interconnection Networks from Sorting Networks","authors":"Tripti Jain, K. Schneider","doi":"10.1142/S0129626418500019","DOIUrl":"https://doi.org/10.1142/S0129626418500019","url":null,"abstract":"In general, efficient non-blocking interconnection networks can be derived from sorting networks, and to this end, one may either follow the merge-based or the radix-based sorting paradigm. Both pa...","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast Approximate Evaluation of Parallel Overhead from a Minimal Set of Measured Execution Times 基于最小执行时间集的并行开销快速近似评估
Pub Date : 2018-04-01 DOI: 10.1142/S0129626418500032
S. Höfinger, T. Ruh, Ernst J. Haunschmid
Porting scientific key algorithms to HPC architectures requires a thorough understanding of the subtle balance between gain in performance and introduced overhead. Here we continue the development ...
将科学的关键算法移植到HPC架构中,需要对性能增益和引入的开销之间的微妙平衡有透彻的理解。这里我们继续发展…
{"title":"Fast Approximate Evaluation of Parallel Overhead from a Minimal Set of Measured Execution Times","authors":"S. Höfinger, T. Ruh, Ernst J. Haunschmid","doi":"10.1142/S0129626418500032","DOIUrl":"https://doi.org/10.1142/S0129626418500032","url":null,"abstract":"Porting scientific key algorithms to HPC architectures requires a thorough understanding of the subtle balance between gain in performance and introduced overhead. Here we continue the development ...","PeriodicalId":422436,"journal":{"name":"Parallel Process. Lett.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128954361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Parallel Process. Lett.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1