69 results on '"Jianxi Fan"'
Search Results
2. Independent Spanning Trees in Networks – A Survey
- Author
-
Baolei Cheng, Dajin Wang, and Jianxi Fan
- Subjects
General Computer Science ,Theoretical Computer Science - Abstract
The problem of constructing independent spanning trees (ISTs) dates back to as early as late 1980s. Given a network G of a certain topology, the question is whether we can, as well as how to, construct a set of independent spanning trees in G . ISTs have proven to be of great importance in many network tasks. The past decade has seen a particularly remarkable increase in the literature on ISTs, manifesting a significant growth of interest. ISTs can be classified into edge-independent spanning trees (edge-ISTs), node-independent spanning trees (node-ISTs), and completely independent spanning trees (CISTs). For a network G , node-ISTs (edge-ISTs) rooted at u are a set of spanning trees rooted at u in G such that there are no common internal nodes (edges) between u and any other node among the paths in these spanning trees. If every node in a set of node-ISTs can act as a root node, the set of trees are called CISTs. This survey aims at bringing together important works on ISTs that have been reported in the literature. It provides a historical perspective of how the field has evolved, and can serve as an integrated useful resource of references for future research on ISTs.
- Published
- 2023
- Full Text
- View/download PDF
3. Connectivity and constructive algorithms of disjoint paths in dragonfly networks
- Author
-
Suying Wu, Jianxi Fan, Baolei Cheng, Jia Yu, and Yan Wang
- Subjects
General Computer Science ,Theoretical Computer Science - Published
- 2022
- Full Text
- View/download PDF
4. Structure fault tolerance of WK-recursive networks
- Author
-
Lantao You, Yuejuan Han, Jianxi Fan, and Dong Ye
- Subjects
General Computer Science ,Theoretical Computer Science - Published
- 2022
- Full Text
- View/download PDF
5. Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding
- Author
-
Jingya Zhou, Ling Liu, Wenqi Wei, and Jianxi Fan
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Computer Science - Machine Learning ,General Computer Science ,Computer Science - Social and Information Networks ,Machine Learning (cs.LG) ,Theoretical Computer Science - Abstract
Network representation learning (NRL) advances the conventional graph mining of social networks, knowledge graphs, and complex biomedical and physics information networks. Over dozens of network representation learning algorithms have been reported in the literature. Most of them focus on learning node embeddings for homogeneous networks, but they differ in the specific encoding schemes and specific types of node semantics captured and used for learning node embedding. This survey paper reviews the design principles and the different node embedding techniques for network representation learning over homogeneous networks. To facilitate the comparison of different node embedding algorithms, we introduce a unified reference framework to divide and generalize the node embedding learning process on a given network into preprocessing steps, node feature extraction steps and node embedding model training for a NRL task such as link prediction and node clustering. With this unifying reference framework, we highlight the representative methods, models, and techniques used at different stages of the node embedding model learning process. This survey not only helps researchers and practitioners to gain an in-depth understanding of different network representation learning techniques but also provides practical guidelines for designing and developing the next generation of network representation learning algorithms and systems.
- Published
- 2022
- Full Text
- View/download PDF
6. Reliability of augmented k-ary n-cubes under the extra connectivity condition
- Author
-
Xueli Sun, Jianxi Fan, Eminjan Sabir, Baolei Cheng, and Jia Yu
- Subjects
Hardware and Architecture ,Software ,Information Systems ,Theoretical Computer Science - Published
- 2023
- Full Text
- View/download PDF
7. Component conditional fault tolerance of hierarchical folded cubic networks
- Author
-
Xueli Sun, Jianxi Fan, Jia Yu, Zhao Liu, and Baolei Cheng
- Subjects
General Computer Science ,Vertex separator ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Integer ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,020201 artificial intelligence & image processing ,Component (group theory) ,Maximum size ,Undirected graph ,Mathematics - Abstract
For the sake of achieving higher reliability, conditional connectivity has gradually become well-known. Component connectivity, as a kind of conditional connectivity, is an extension of the classical connectivity. Given a simple and undirected graph G and a nonnegative integer r, the ( r + 1 ) -component connectivity of graph G, say c κ r + 1 ( G ) , is the minimum number of a vertex cut whose removal causes the surviving graph to have at least r + 1 components. Another basic parameter of reliability, diagnosability is often related to the number of components in the surviving graph. The ( r + 1 ) -component diagnosability, say c t r + 1 ( G ) , is the maximum size of fault sets subject to at least r + 1 components in the surviving graph, provided that all faulty vertices can be detected. A graph is t / k -diagnosable if all faulty vertices can be isolated into a set in which up to k vertices are fault-free, provided that the number of faulty vertices is at most t. As a two-level interconnection network, the hierarchical folded cubic network H F Q ( n ) possesses a great deal of nice properties. In this paper, we first show that the n-dimensional hierarchical folded cubic network is tightly super connected. Then, we explore that c κ r + 1 ( H F Q ( n ) ) = r ( n + 1 ) − ( r 2 ) + 1 ( n ≥ 4 , 1 ≤ r ≤ n − 4 ) , and obtain that c t r + 1 ( H F Q ( n ) ) = ( r + 1 ) n − ( r 2 ) + 2 ( n ≥ 4 , 1 ≤ r ≤ n − 4 ) under the PMC and MM* models. Last, we show that the hierarchical folded cubic network H F Q ( n ) is [ ( k + 1 ) n − ( k 2 ) + 2 ] / k -diagnosable, where n ≥ 4 and 1 ≤ k ≤ n − 4 .
- Published
- 2021
- Full Text
- View/download PDF
8. Node-to-set disjoint paths problem in cross-cubes
- Author
-
Xi Wang, Jia Yu, Jianxi Fan, and Shukui Zhang
- Subjects
Combinatorics ,Set (abstract data type) ,Hardware and Architecture ,Computer science ,Node (networking) ,Multiprocessing ,Hypercube ,Construct (python library) ,Disjoint sets ,Network topology ,Software ,Information Systems ,Theoretical Computer Science - Abstract
Hypercubes are popular topologies of massive multiprocessor systems due to their super properties. Cross-cubes are significant variations of hypercubes and they have smaller diameters and higher fault-tolerant capability than hypercubes at the same dimensions. In this paper, we construct node-to-set disjoint paths of an n-dimensional cross-cube, $$C_{n}$$ , whose maximum length is limited by $$2n-3$$ . Furthermore, we propose an $$O(N \text {log}^{2}N)$$ algorithm with a view to finding node-to-set disjoint paths of $$C_{n}$$ , where N is the node number of $$C_n$$ . And we also present the simulation results for the maximal length of disjoint paths obtained by our algorithm.
- Published
- 2021
- Full Text
- View/download PDF
9. Fault-Tolerant and Unicast Performances of the Data Center Network HSDC
- Author
-
Jingya Zhou, Baolei Cheng, Yan Wang, Jianxi Fan, and Hui Dong
- Subjects
010302 applied physics ,Discrete mathematics ,Correctness ,Computer science ,Dimension (graph theory) ,Hamming distance ,02 engineering and technology ,Logical graph ,01 natural sciences ,020202 computer hardware & architecture ,Theoretical Computer Science ,0103 physical sciences ,Shortest path problem ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Hypercube ,Unicast ,Software ,Information Systems - Abstract
In order to satisfy the rapidly increasing demand for data volume, large data center networks (DCNs) have been proposed. In 2019, Zhang et al. proposed a new highly scalable DCN architecture named HSDC (Highly Scalable Data Center Network), which can achieve greater incremental scalability. In this paper, we give the definition of the logical graph of HSDC, named $$H_n$$ , which can be treated as a compound graph of hypercube and complete graph of the same dimension. First, we prove that the connectivity and tightly super connectivity of $$H_n$$ are both n. Then, we give an O(n) shortest unicast algorithm to find a shortest path between any two distinct nodes in $$H_n$$ , and prove the correctness of this algorithm. In fact, we also prove that the length of the shortest path constructed by this algorithm is no more than $$2d+1$$ if $$d
- Published
- 2021
- Full Text
- View/download PDF
10. Constructing Node-Independent Spanning Trees in Augmented Cubes
- Author
-
Cheng-Kuan Lin, Jianxi Fan, Qiang Lyu, Baolei Cheng, Guo Chen, and Xiaoyan Li
- Subjects
Combinatorics ,Algebra and Number Theory ,Computational Theory and Mathematics ,Computer science ,Node (networking) ,Independent spanning trees ,Information Systems ,Theoretical Computer Science - Abstract
For a network, edge/node-independent spanning trees (ISTs) can not only tolerate faulty edges/nodes, but also be used to distribute secure messages. As important node-symmetric variants of the hypercubes, the augmented cubes have received much attention from researchers. The n-dimensional augmented cube AQn is both (2n ‒ 1)-edge-connected and (2n ‒ 1)-nodeconnected (n ≢ 3), thus the well-known edge conjecture and node conjecture of ISTs are both interesting questions in AQn. So far, the edge conjecture on augmented cubes was proved to be true. However, the node conjecture on AQn is still open. In this paper, we further study the construction principle of the node-ISTs by using the double neighbors of every node in the higher dimension. We prove the existence of 2k − 1 node-ISTs rooted at node 0 in A Q n ( 00...0 ︸ n−k )(n≥k≥4) by proposing an ingenious way of construction and propose a corresponding O(NlogN) time algorithm, where N = 2k is the number of nodes in A Q n ( 00...0 ︸ n−k ) .
- Published
- 2020
- Full Text
- View/download PDF
11. The reliability analysis of k-ary n-cube networks
- Author
-
Jianxi Fan, Jingya Zhou, Mengjie Lv, Baolei Cheng, Guo Chen, and Jia Yu
- Subjects
General Computer Science ,Computer science ,Intersection (set theory) ,Multiprocessing ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Measure (mathematics) ,Upper and lower bounds ,Theoretical Computer Science ,Development (topology) ,010201 computation theory & mathematics ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Fault model ,Algorithm ,Reliability (statistics) - Abstract
With the development of scalability and application of multiprocessor system, the components of the system possibly become faulty. It is desirable to know the reliability of the system. However, the exact reliability of a complicated network system is usually difficult to determine. A typical approach is to decompose the system into smaller ones based on a graph-theory model in which nodes are assumed to fail independently with known probabilities to measure the subsystem-based reliability, which is defined as the probability that a fault-free subsystem of a specific size is still available when the system has faults. In this paper, we use the probability fault model to establish upper and lower bounds on the subsystem-based reliability of k-ary n-cube networks, by taking into account the intersection of no more than five or four subgraphs. In addition, some numerical simulations of the subsystem-based reliability of k-ary n-cube networks are conducted.
- Published
- 2020
- Full Text
- View/download PDF
12. Fault-Tolerant Hamiltonicity and Hamiltonian Connectivity of BCube with Various Faulty Elements
- Author
-
Baolei Cheng, Jingya Zhou, Guijuan Wang, Cheng-Kuan Lin, and Jianxi Fan
- Subjects
Discrete mathematics ,Computer science ,020207 software engineering ,Fault tolerance ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Computer Science Applications ,Theoretical Computer Science ,Computational Theory and Mathematics ,Hardware and Architecture ,Server ,Theory of computation ,0202 electrical engineering, electronic engineering, information engineering ,Software ,Hamiltonian (control theory) ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
BCube is one kind of important data center networks. Hamiltonicity and Hamiltonian connectivity have significant applications in communication networks. So far, there have been many results concerning fault-tolerant Hamiltonicity and fault-tolerant Hamiltonian connectivity in some data center networks. However, these results only consider faulty edges and faulty servers. In this paper, we study the fault-tolerant Hamiltonicity and the fault-tolerant Hamiltonian connectivity of BCube(n, k) under considering faulty servers, faulty links/edges, and faulty switches. For any integers n ≥ 2 and k ≥ 0, let BCn,k be the logic structure of BCube(n, k) and F be the union of faulty elements of BCn,k. Let fv, fe, and fs be the number of faulty servers, faulty edges, and faulty switches of BCube(n, k), respectively. We show that BCn,k − F is fault-tolerant Hamiltonian if fv +fe + (n − 1)fs ≤ (n − 1)(k + 1) − 2 and BCn,k −F is fault-tolerant Hamiltonian-connected if fv + fe + (n − 1)fs ≤ (n − 1)(k + 1) − 3. To the best of our knowledge, this paper is the first work which takes faulty switches into account to study the fault-tolerant Hamiltonicity and the fault-tolerant Hamiltonian connectivity in data center networks.
- Published
- 2020
- Full Text
- View/download PDF
13. The Conditional-(g, d, k)-Connectivity and Conditional-(g, d, k)-edge-Connectivity on the Hypercubes*
- Author
-
Jianxi Fan, Lih-Hsing Hsu, Liang Ma, Cheng-Kuan Lin, and Yuan-Hsiang Teng
- Subjects
Combinatorics ,Algebra and Number Theory ,Computational Theory and Mathematics ,K-edge ,K connectivity ,Hypercube ,Information Systems ,Theoretical Computer Science ,Mathematics - Published
- 2020
- Full Text
- View/download PDF
14. The extra connectivity and extra diagnosability of regular interconnection networks
- Author
-
Mengjie Lv, Jingya Zhou, Baolei Cheng, Jianxi Fan, and Xiaohua Jia
- Subjects
Star network ,Interconnection ,General Computer Science ,Computer science ,Reliability (computer networking) ,0102 computer and information sciences ,02 engineering and technology ,Topology ,01 natural sciences ,Theoretical Computer Science ,010201 computation theory & mathematics ,Metric (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Time complexity - Abstract
Reliability assessment of interconnection networks is critical to the design of multiprocessor systems. Extra connectivity and extra diagnosability are two important metric parameters for the reliability evaluation of interconnection networks. In this paper, we first establish that the i-extra connectivities of regular networks with some conditions G n are ( i + 1 ) n − 2 i for i = 1 , 2 , where n ≥4, and then determine that the i-extra diagnosabilities of the networks under the PMC model and the MM* model are ( i + 1 ) n − i for i = 1 , 2 , where n ≥4. Furthermore, two polynomial time diagnostic algorithms of regular interconnection networks under the PMC and MM* model are described. Finally, the corresponding extra connectivities and extra diagnosabilities of some networks, including the star networks, the pancake networks and the burnt pancake networks, can be derived by our results.
- Published
- 2020
- Full Text
- View/download PDF
15. Reliability analysis of data center networks based on precise and imprecise diagnosis strategies
- Author
-
Cheng-Kuan Lin, Xiaoyan Li, Jianxi Fan, and Xiaohua Jia
- Subjects
Combinatorics ,General Computer Science ,Center (category theory) ,Time complexity ,Theoretical Computer Science ,Mathematics - Abstract
Fault tolerance and reliability are the crucial issues for data center networks (DCNs). Both the g-extra conditional diagnosis (g-ECD) precise strategy and the t / k -diagnosis imprecise strategy play essential role in the reliability of networks. For the data center network based on DCell structure D m , n , we prove that: 1) the g-ECD of D m , n under the MM⁎ model is ( g + 1 ) m + n − 1 with n ≥ 4 , m ≥ 3 , and 1 ≤ g ≤ min { n 4 , m − 2 } ; 2) D m , n is [ ( k + 1 ) ( m − 1 ) + n ] / k -diagnosable under the MM⁎ model with n ≥ 2 , m ≥ 2 , and 0 ≤ k ≤ n − 1 . Furthermore, for N-server DCN, we propose the first t / k -diagnosis algorithm on D m , n under the MM⁎ model, namely t / k - D m , n -DIAG with O ( N log N ) time complexity. Comparing with the traditional t-diagnosable algorithm by Ziwich and Duarte (2016) [11] , on D m , n , the t / k - D m , n -DIAG can identify the number of faulty vertices is almost k times larger than the t-diagnosable algorithm, where the time complexity of t-diagnosable algorithm is about O ( N ( log N ) 3 ) . These results provide a quantitative analysis for the reliability and availability evaluation of a large-scale DCN.
- Published
- 2020
- Full Text
- View/download PDF
16. A Parallel Algorithm to Construct Edge Independent Spanning Trees on the Line Graphs of Conditional Bijective Connection Networks
- Author
-
Zhiyong Pan, Baolei Cheng, Jianxi Fan, Yan Wang, and Xiajing Li
- Subjects
History ,General Computer Science ,Polymers and Plastics ,Business and International Management ,Industrial and Manufacturing Engineering ,Theoretical Computer Science - Published
- 2022
- Full Text
- View/download PDF
17. The t/m-diagnosis strategy of augmented k-ary n-cubes
- Author
-
Xueli Sun, Jianxi Fan, Baolei Cheng, and Yan Wang
- Subjects
General Computer Science ,Theoretical Computer Science - Published
- 2023
- Full Text
- View/download PDF
18. Constructing node-independent spanning trees on the line graph of the hypercube by an independent forest scheme
- Author
-
Cheng-Kuan Lin, Xiaoyan Li, Baolei Cheng, Jianxi Fan, and Xiaohua Jia
- Subjects
Spanning tree ,Conjecture ,Computer Networks and Communications ,Computer science ,Node (networking) ,020206 networking & telecommunications ,02 engineering and technology ,Upper and lower bounds ,Graph ,Theoretical Computer Science ,law.invention ,Combinatorics ,Distribution (mathematics) ,Artificial Intelligence ,Hardware and Architecture ,law ,Scheme (mathematics) ,Line graph ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Isomorphism ,Hypercube ,Software - Abstract
Due to the application in reliable communication, reliable broadcasting, secure message distribution, etc., node/edge-independent spanning trees (ISTs) have attracted much attention in the past twenty years. However, node/edge conjecture is still open for networks with node/edge-connectivity ≥ 5. So far, results have been obtained on a lot of special networks, but only a few results are reported on the line graphs of them. Hypercubes play important roles in parallel computing systems, and the line graphs of which have been recently adopted for the architectures of data center networks. Since the line graph of n -dimensional hypercube Q n , L ( Q n ) , is ( 2 n − 2 ) -regular, whether there exist 2 n − 2 node-ISTs rooted at any node on L ( Q n ) is an open question. In this paper, we focus on the problem of constructing node-ISTs on L ( Q n ) . Firstly, we point out that L ( Q n ) can be partitioned into 2 n − 1 complete graphs. Then, based on the complete graphs and n − 1 node-ISTs rooted at 0 on Q n − 1 0 , we obtain an “independent forest” containing 2 n − 2 trees on L ( Q n ) . Furthermore, we present an O ( N ) time algorithm to construct 2 n − 2 node-ISTs rooted at node [0, 2 n − 1 ] isomorphic to each other on L ( Q n ) based on the independent forest, where N = n × 2 n − 1 is the number of nodes on L ( Q n ) . In addition, we point out that the 2 n − 2 node-ISTs on L ( Q n ) is a new method to prove the node/edge-connectivity and the upper bound of ( 2 n − 2 ) -node/edge-wide-diameter of L ( Q n ) .
- Published
- 2019
- Full Text
- View/download PDF
19. The extra connectivity, extra conditional diagnosability and t/k-diagnosability of the data center network DCell
- Author
-
Jianxi Fan, Cheng-Kuan Lin, Baolei Cheng, Xiaoyan Li, and Xiaohua Jia
- Subjects
Set (abstract data type) ,Combinatorics ,General Computer Science ,business.industry ,Data center ,business ,Theoretical Computer Science ,Vertex (geometry) ,Mathematics - Abstract
Connectivity and diagnosability are two important metrics in evaluating the fault tolerability of a network. The g-extra connectivity and the g-extra conditional diagnosability are both defined under the restraint that every component of the network removing a faulty vertex set has at least g + 1 fault-free vertices. The t / k -diagnosability is an outstanding diagnosis strategy, in which the identified faulty vertex set is allowed to contain at most k fault-free vertices. As a well-known model for a large-scale data center network (DCN) with a server-centric structure, the m-dimensional DCell with n-port switches and t m , n servers, D m , n , has many desirable properties. In this paper, we first investigate the g-extra connectivity of D m , n for 0 ≤ g ≤ n − 1 . Based on this, we establish the g-extra conditional diagnosability of D m , n under the PMC model for 0 ≤ g ≤ n − 1 . Finally, we evaluate the t / k -diagnosability of D m , n under the PMC model for 1 ≤ k ≤ n − 1 .
- Published
- 2019
- Full Text
- View/download PDF
20. Optimally Embedding 3-Ary n-Cubes into Grids
- Author
-
Weibei Fan, Ruchuan Wang, Yuejuan Han, Jianxi Fan, Cheng-Kuan Lin, and Yan Wang
- Subjects
Square tiling ,Discrete mathematics ,Computer science ,Structure (category theory) ,020207 software engineering ,02 engineering and technology ,Load balancing (computing) ,Network topology ,Computer Science Applications ,Theoretical Computer Science ,Dilation (metric space) ,Computational Theory and Mathematics ,Hardware and Architecture ,Theory of computation ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,Software - Abstract
The 3-ary n-cube, denoted as $$ {Q}_n^3 $$ , is an important interconnection network topology proposed for parallel computers, owing to its many desirable properties such as regular and symmetrical structure, and strong scalability, among others. In this paper, we first obtain an exact formula for the minimum wirelength to embed $$ {Q}_n^3 $$ into grids. We then propose a load balancing algorithm for embedding $$ {Q}_n^3 $$ into a square grid with minimum dilation and congestion. Finally, we derive an O(N2) algorithm for embedding $$ {Q}_n^3 $$ into a gird with balanced communication, where N is the number of nodes in $$ {Q}_n^3 $$ . Simulation experiments are performed to verify the total wirelength and evaluate the network cost of our proposed embedding algorithm.
- Published
- 2019
- Full Text
- View/download PDF
21. A Cost-Efficient Approach to Storing Users’ Data for Online Social Networks
- Author
-
Cheng-Kuan Lin, Baolei Cheng, Jingya Zhou, and Jianxi Fan
- Subjects
Cost efficiency ,business.industry ,Computer science ,Distributed computing ,Big data ,Hash function ,Replication (computing) ,Computer Science Applications ,Theoretical Computer Science ,Computational Theory and Mathematics ,Hardware and Architecture ,Computer data storage ,Scalability ,business ,Software - Abstract
As users increasingly befriend others and interact online via their social media accounts, online social networks (OSNs) are expanding rapidly. Confronted with the big data generated by users, it is imperative that data storage be distributed, scalable, and cost-efficient. Yet one of the most significant challenges about this topic is determining how to minimize the cost without deteriorating system performance. Although many storage systems use the distributed key value store, it cannot be directly applied to OSN storage systems. And because users’ data are highly correlated, hash storage leads to frequent inter-server communications, and the high inter-server traffic costs decrease the OSN storage system’s scalability. Previous studies proposed conducting network partitioning and data replication based on social graphs. However, data replication increases storage costs and impacts traffic costs. Here, we consider how to minimize costs from the perspective of data storage, by combining partitioning and replication. Our cost-efficient data storage approach supports scalable OSN storage systems. The proposed approach co-locates frequently interactive users together by conducting partitioning and replication simultaneously while meeting load-balancing constraints. Extensive experiments are undertaken on two realworld traces, and the results show that our approach achieves lower cost compared with state-of-the-art approaches. Thus we conclude that our approach enables economic and scalable OSN data storage.
- Published
- 2019
- Full Text
- View/download PDF
22. Fault-tolerant hamiltonian cycles and paths embedding into locally exchanged twisted cubes
- Author
-
Zhijie Han, Yujie Zhang, Jianxi Fan, Ruchuan Wang, Weibei Fan, and Peng Li
- Subjects
Very-large-scale integration ,Discrete mathematics ,Interconnection ,General Computer Science ,Computer science ,020207 software engineering ,02 engineering and technology ,Hamiltonian path ,Measure (mathematics) ,Theoretical Computer Science ,Computer Science::Hardware Architecture ,symbols.namesake ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Overhead (computing) ,Embedding ,020201 artificial intelligence & image processing ,Hypercube ,Hamiltonian (control theory) ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
The foundation of information society is computer interconnection network, and the key of information exchange is communication algorithm. Finding interconnection networks with simple routing algorithm and high fault-tolerant performance is the premise of realizing various communication algorithms and protocols. Nowadays, people can build complex interconnection networks by using very large scale integration (VLSI) technology. Locally exchanged twisted cubes, denoted by (s + t + 1)-dimensional LeTQs,t, which combines the merits of the exchanged hypercube and the locally twisted cube. It has been proved that the LeTQs,t has many excellent properties for interconnection networks, such as fewer edges, lower overhead and smaller diameter. Embeddability is an important indicator to measure the performance of interconnection networks. We mainly study the fault tolerant Hamiltonian properties of a faulty locally exchanged twisted cube, LeTQs,t − (fv + fe), with faulty vertices fv and faulty edges fe. Firstly, we prove that an LeTQs,t can tolerate up to s − 1 faulty vertices and edges when embedding a Hamiltonian cycle, for s ⩾ 2, t ⩾ 3, and s ⩽ t. Furthermore, we also prove another result that there is a Hamiltonian path between any two distinct fault-free vertices in a faulty LeTQs,t with up to (s − 2) faulty vertices and edges. That is, we show that LeTQs,t is (s − 1)-Hamiltonian and (s − 2)-Hamiltonian-connected. The results are proved to be optimal in this paper with at most (s − 1)-fault-tolerant Hamiltonicity and (s − 2) fault-tolerant Hamiltonian connectivity of LeTQs,t.
- Published
- 2021
- Full Text
- View/download PDF
23. Hamiltonian cycle and path embeddings in 3-ary n-cubes based on K1,3-structure faults
- Author
-
Jianxi Fan, Cheng-Kuan Lin, Xiaohua Jia, and Yali Lv
- Subjects
Computer Networks and Communications ,Computer science ,Vertex connectivity ,Structure (category theory) ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Set (abstract data type) ,symbols.namesake ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Connectivity ,Hamiltonian path ,010201 computation theory & mathematics ,Hardware and Architecture ,Path (graph theory) ,symbols ,020201 artificial intelligence & image processing ,Isomorphism ,Cube ,Element (category theory) ,Software ,Hamiltonian (control theory) ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
The k -ary n -cube is one of the most attractive interconnection networks for parallel and distributed computing system. In this paper, we investigate hamiltonian cycle and path embeddings in 3-ary n -cubes Q n 3 based on K 1 , 3 -structure faults, which means each faulty element is isomorphic to any connected subgraph of a connected graph K 1 , 3 . We show that for two arbitrary distinct healthy nodes of a faulty Q n 3 , there exists a fault-free hamiltonian path connecting these two nodes if the number of faulty element is at most n − 2 and each faulty element is isomorphic to any connected subgraph of K 1 , 3 . We also show that there exists a fault-free hamiltonian cycle if the number of faulty element is at most n − 1 and each faulty element is isomorphic to any connected subgraph of K 1 , 3 . Then, we provide the simulation experiment to find a hamiltonian cycle and a hamiltonian path in structure faulty 3-ary n -cubes and verify the theoretical results. These results mean that the 3-ary n -cube Q n 3 can tolerate up to 4 ( n − 2 ) faulty nodes such that Q n 3 − V ( F ) is still hamiltonian and hamiltonian-connected, where F denotes the faulty set of Q n 3 .
- Published
- 2018
- Full Text
- View/download PDF
24. An efficient algorithm for embedding exchanged hypercubes into grids
- Author
-
Baolei Cheng, Ruchuan Wang, Guijuan Wang, Weibei Fan, Jianxi Fan, and Cheng-Kuan Lin
- Subjects
020203 distributed computing ,Interconnection ,Mathematics::Combinatorics ,Computer science ,Graph embedding ,Efficient algorithm ,High Energy Physics::Lattice ,02 engineering and technology ,Parallel computing ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,Grid ,Theoretical Computer Science ,Hardware and Architecture ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,Hypercube ,Software ,Information Systems - Abstract
Graph embedding is an important technology in simulating parallel structures and designing VLSI layout. Hypercube is one of the most significant interconnection networks in parallel computing systems. The exchanged hypercube is an important variant of the hypercube, which is obtained by systematically deleting edges from a hypercube. It not only retains several valuable and desirable properties of the hypercube, but also has lower hardware cost. In this paper, we first give an exact formula of minimum wirelength of exchanged hypercube layout into a grid. Furthermore, we propose an O(N) algorithm for embedding exchanged hypercube into a gird with load 1, expansion 1 and minimum wirelength and derive a linear layout of exchanged hypercube with minimum number of tracks and efficient layout areas. Finally, we present simulation experiments of our embedding algorithm on network overhead and total wirelength, which conduce to estimate the total wirelength and chip area.
- Published
- 2018
- Full Text
- View/download PDF
25. A Live Migration Algorithm for Containers Based on Resource Locality
- Author
-
Zhijie Han, Jianxi Fan, Peng Li, Ruchuan Wang, Jingya Zhou, and Weibei Fan
- Subjects
Computer science ,business.industry ,Distributed computing ,Locality ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Virtualization ,Theoretical Computer Science ,Resource (project management) ,Hardware and Architecture ,Control and Systems Engineering ,Virtual machine ,Modeling and Simulation ,Server ,Signal Processing ,Container (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer ,Information Systems ,Live migration - Abstract
With the wide application of cloud computing, the scale of cloud data center network is growing. The virtual machine (VM) live migration technology is becoming more crucial in cloud data centers for the purpose of load balance, and efficient utilization of resources. The lightweight virtualization technique has made virtual machines more portable, efficient and easier to management. Different from virtual machines, containers bring more lightweight, more flexible and more intensive service capabilities to the cloud. Researches on container migration is still in its infancy, especially live migration is still very immature. In this paper, we present the locality live migration model where we take into account the distance, available bandwidth and costs between containers. Furthermore, we conduct comprehensive experiments on a cluster. Extensive simulation results show that the proposed method improves the utilization of resources of servers, and also improves the balance of all kinds of resources on the physical machine.
- Published
- 2018
- Full Text
- View/download PDF
26. Optimizing cost for geo-distributed storage systems in online social networks
- Author
-
Baolei Cheng, Jingya Zhou, Jianxi Fan, Zhao Liu, and Juncheng Jia
- Subjects
Social graph ,General Computer Science ,business.industry ,Computer science ,Distributed computing ,Replica ,Big data ,020206 networking & telecommunications ,02 engineering and technology ,Theoretical Computer Science ,Modeling and Simulation ,Computer data storage ,Distributed data store ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data center ,Latency (engineering) ,business ,Data placement - Abstract
Globally distributed data centers provide an opportunity to deploy geo-distributed Online Social Networks (OSNs). For so big data generated by users, how to store them among those data centers is a key issue in the geo-distributed storage system. Today's popular OSN providers store users’ data in each deployed data center, so as to guarantee access latency. However, the full replication manner brings relatively high storage cost and traffic cost, which extremely increases the economic expenditure of OSN providers. Data placement based on social graph partitioning is an efficient way to minimize cost, but it requires the information of entire social graph and cannot fully guarantee latency. Recently, accomplished by partitioning replication is proposed to optimize cost as well as guarantee latency, but it has two drawbacks: (1) the separated manners of optimization cannot efficiently reduce the cost; (2) the placement of master replicas and slave replicas influence each other, and eventually reduces the optimization effects. In this paper, we explore an integrated manner of optimizing partitioning and replication simultaneously without distinguishing replica's role. We propose a lightweight replica placement (LRP) scheme, which conducts optimizations in a distributed manner and is well adapted to dynamic scenarios. Evaluations with two datasets from Twitter and Facebook show that LRP significantly reduces the cost compared with state-of-the-art schemes.
- Published
- 2018
- Full Text
- View/download PDF
27. BCDC: A High-Performance, Server-Centric Data Center Network
- Author
-
Jianxi Fan, Zhao Liu, Xi Wang, Cheng-Kuan Lin, and Jingya Zhou
- Subjects
020203 distributed computing ,business.industry ,Computer science ,020206 networking & telecommunications ,Cloud computing ,Fault tolerance ,02 engineering and technology ,Bottleneck ,Computer Science Applications ,Theoretical Computer Science ,Tree (data structure) ,Computational Theory and Mathematics ,Hardware and Architecture ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,Data center ,Performance improvement ,business ,Software ,Computer network - Abstract
The capability of the data center network largely decides the performance of cloud computing. However, the number of servers in the data center network becomes increasingly huge, because of the continuous growth of the application requirements. The performance improvement of cloud computing faces great challenges of how to connect a large number of servers in building a data center network with promising performance. Traditional tree-based data center networks have issues of bandwidth bottleneck, failure of single switch, etc. Recently proposed data center networks such as DCell, FiConn, and BCube, have larger bandwidth and better fault-tolerance with respect to traditional tree-based data center networks. Nonetheless, for DCell and FiConn, the fault-tolerant length of path between servers increases in case of failure of switches; BCube requires higher performance in switches when its scale is enlarged. Based on the above considerations, we propose a new server-centric data center network, called BCDC, based on crossed cube with excellent performance. Then, we study the connectivity of BCDC networks. Furthermore, we propose communication algorithms and fault-tolerant routing algorithm of BCDC networks. Moreover, we analyze the performance and time complexities of the proposed algorithms in BCDC networks. Our research will provide the basis for design and implementation of a new family of data center networks.
- Published
- 2018
- Full Text
- View/download PDF
28. Super spanning connectivity on WK-recursive networks
- Author
-
Jianxi Fan, Lantao You, and Yuejuan Han
- Subjects
Small diameter ,General Computer Science ,Degree (graph theory) ,Node (networking) ,Complete graph ,0102 computer and information sciences ,02 engineering and technology ,Disjoint sets ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,010201 computation theory & mathematics ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Mathematics - Abstract
The WK-recursive network has received much attention due to its many favorable properties such as small diameter, large connectivity, and high degree of scalability and expandability. In this paper, we consider the super spanning connectivity properties of the WK-recursive network. We use K ( d , t ) to denote the WK-recursive network of level t, each of which basic modules is a d-vertex complete graph, where d > 1 and t ≥ 1 . We prove that for any two distinct vertices μ and ν, there exist m node disjoint paths whose union covers all the vertices of K ( d , t ) for d ≥ 4 , t ≥ 1 and 1 ≤ m ≤ d − 1 . Since the connectivity of K ( d , t ) is d − 1 , the result is optimal in the worst case.
- Published
- 2018
- Full Text
- View/download PDF
29. Edge-independent spanning trees in augmented cubes
- Author
-
Jianxi Fan, Hong Shen, and Yan Wang
- Subjects
Discrete mathematics ,020203 distributed computing ,Spanning tree ,General Computer Science ,Distribution (number theory) ,Fault tolerance ,0102 computer and information sciences ,02 engineering and technology ,Independent spanning trees ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Broadcasting (networking) ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Hypercube ,Enhanced Data Rates for GSM Evolution ,Communications protocol ,Mathematics - Abstract
Edge-independent spanning trees (EISTs) have important applications in networks such as reliable communication protocols, one-to-all broadcasting, and secure message distribution, thus their designs in several classes of networks have been widely investigated. The n-dimensional augmented cube (AQn) is an important variant of the n-dimensional hypercube. It is (2n1)-regular, (2n1)-connected (n3), vertex-symmetric and has diameter of n/2. In this paper, by proposing an O(NlogN) algorithm that constructs 2n1 EISTs in AQn, where N is the number of nodes in AQn, we solve the EISTs problem for this class of graphs. Since AQn is (2n1)-regular, the result is optimal with respect to the number of EISTs constructed.
- Published
- 2017
- Full Text
- View/download PDF
30. Fault-tolerant embedding of complete binary trees in locally twisted cubes
- Author
-
Jianxi Fan, Xiaohua Jia, Zhao Liu, Baolei Cheng, and Jingya Zhou
- Subjects
Discrete mathematics ,Binary tree ,Computer Networks and Communications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Vertex (geometry) ,Combinatorics ,Set (abstract data type) ,Dilation (metric space) ,010201 computation theory & mathematics ,Artificial Intelligence ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Node (circuits) ,Hypercube ,Fault tolerant embedding ,Software ,Mathematics - Abstract
The complete binary tree is an important network structure for parallel and distributed computing, which has many nice properties and is often used to be embedded into other interconnection architectures. The locally twisted cube L T Q n is an important variant of the hypercube Q n . It has many better properties than Q n with the same number of edges and vertices. The main results obtained in this paper are: (1) The complete binary tree C B T n rooted at an arbitrary vertex of L T Q n can be embedded with dilation 2 and congestion 1 into L T Q n . (2) When there exists only one faulty node in L T Q n , both the dilation and congestion will become 2 after reconfiguring C B T n . (3) When there exist two faulty nodes in L T Q n , then both the dilation and congestion will become 3 after reconfiguring C B T n . (4) For any faulty set F of L T Q n with 2 < | F | ź 2 n - 1 , both the dilation and congestion will become 3 after reconfiguring C B T n under certain constraints. We prove that the complete binary tree can be embedded with dilation 2, congestion 1, expansion 1, and load 1 into Locally twisted cube.We present three effective algorithms for fault-tolerant embedding of complete binary trees in locally twisted cubes with respect to one faulty node, two faulty node, and any faulty set F of 2 < | F | ź 2 n - 1 nodes, respectively.
- Published
- 2017
- Full Text
- View/download PDF
31. Dynamic service deployment for budget‐constrained mobile edge computing
- Author
-
Juncheng Jia, Jin Wang, Jianxi Fan, and Jingya Zhou
- Subjects
Service (business) ,Mobile edge computing ,Computational Theory and Mathematics ,Computer Networks and Communications ,business.industry ,Software deployment ,Computer science ,Lyapunov optimization ,business ,Software ,Computer Science Applications ,Theoretical Computer Science ,Computer network - Published
- 2019
- Full Text
- View/download PDF
32. Vertex-disjoint paths in DCell networks
- Author
-
Xi Wang, Jianxi Fan, Xiaohua Jia, and Cheng-Kuan Lin
- Subjects
Discrete mathematics ,Computer Networks and Communications ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Disjoint sets ,01 natural sciences ,Upper and lower bounds ,Theoretical Computer Science ,Vertex (geometry) ,Combinatorics ,010201 computation theory & mathematics ,Artificial Intelligence ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Software ,Mathematics - Abstract
The DCell network is suitable for massively scalable data centers with high network capacity by only using commodity switches. In this paper, we construct n + k - 1 vertex-disjoint paths between every two distinct vertices of the DCell network. Their longest length is not greater than 2 k + 1 + 3 , where it was proved that the diameter of a k -dimensional DCell, D C e l l k , has an upper bound 2 k + 1 - 1 . Furthermore, we propose an O ( k 2 k ) algorithm for finding vertex-disjoint paths between every two distinct vertices in DCell networks. Finally, we give the simulation result of the maximal length of disjoint paths gotten by our algorithm. Construct n + k - 1 vertex-disjoint paths between every two distinct vertices of the DCell. Their longest length is not greater than 2 k + 1 + 3 , where it was proved that the diameter of a k -dimensional DCell, D C e l l k , has an upper bound 2 k + 1 - 1 .Propose an O ( k 2 k ) algorithm for finding vertex-disjoint paths between every two distinct vertices in DCell.Give the simulation result of the maximal length of disjoint paths gotten by our algorithm.
- Published
- 2016
- Full Text
- View/download PDF
33. Structure connectivity and substructure connectivity of hypercubes
- Author
-
Lili Zhang, Jianxi Fan, Cheng-Kuan Lin, and Dajin Wang
- Subjects
Discrete mathematics ,General Computer Science ,Vertex connectivity ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Substructure ,020201 artificial intelligence & image processing ,Hypercube ,Mathematics - Abstract
The connectivity of a network - the minimum number of nodes whose removal will disconnect the network - is directly related to its reliability and fault tolerability, hence an important indicator of the network's robustness. In this paper, we extend the notion of connectivity by introducing two new kinds of connectivity, called structure connectivity and substructure connectivity, respectively. Let H be a certain particular connected subgraph of G. The H-structure connectivity of graph G, denoted ? ( G ; H ) , is the cardinality of a minimal set of subgraphs F = { H 1 ' , H 2 ' , ? , H m ' } in G, such that every H i ' ? F is isomorphic to H, and F's removal will disconnect G. The H-substructure connectivity of graph G, denoted ? s ( G ; H ) , is the cardinality of a minimal set of subgraphs F = { J 1 , J 2 , ? , J m } , such that every J i ? F is a connected subgraph of H, and F's removal will disconnect G. In this paper, we will establish both ? ( Q n ; H ) and ? s ( Q n ; H ) for the hypercube Q n and H ? { K 1 , K 1 , 1 , K 1 , 2 , K 1 , 3 , C 4 } .
- Published
- 2016
- Full Text
- View/download PDF
34. Complete binary trees embeddings in Möbius cubes
- Author
-
Jianxi Fan, Zhao Liu, and Xiaohua Jia
- Subjects
Discrete mathematics ,Interconnection ,K-ary tree ,Binary tree ,Computer Networks and Communications ,Applied Mathematics ,05 social sciences ,050301 education ,0102 computer and information sciences ,01 natural sciences ,Random binary tree ,Theoretical Computer Science ,Combinatorics ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Dilation (morphology) ,Binary expression tree ,Hypercube ,Cube ,0503 education ,Mathematics - Abstract
We propose an approach to embed the complete binary tree into the n-dimensional Mbius cube Mn.We prove that the complete binary tree with 2n1 vertices can be embedded with dilation 1, congestion 1, load 1 into Mn and expansion tending to 1.The research result in this paper demonstrates that embeddability of the complete binary tree in the n-dimensional Mbius cube is superior to that in the n-dimensional hypercube. The complete binary tree as an important network structure has long been investigated for parallel and distributed computing, which has many nice properties and used to be embedded into other interconnection architectures. The Mbius cube Mn is an important variant of the hypercube Qn. It has many better properties than Qn with the same number of edges and vertices. In this paper, we prove that the complete binary tree with 2n1 vertices can be embedded with dilation 1, congestion 1, load 1 into Mn and expansion tending to 1.
- Published
- 2016
- Full Text
- View/download PDF
35. A cost-efficient resource provisioning algorithm for DHT-based cloud storage systems
- Author
-
Jianxi Fan, Jingya Zhou, and Juncheng Jia
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Provisioning ,02 engineering and technology ,Service provider ,Computer Science Applications ,Theoretical Computer Science ,Personal cloud ,Distributed hash table ,Data access ,Computational Theory and Mathematics ,Campus network ,020204 information systems ,Server ,Distributed data store ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Cloud storage ,Algorithm ,Software ,Computer network - Abstract
Personal cloud storage provides users with convenient data access services. Service providers build distributed storage systems by utilizing cloud resources with distributed hash table DHT, so as to enhance system scalability. Efficient resource provisioning could not only guarantee service performance, but help providers to save cost. However, the interactions among servers in a DHT-based cloud storage system depend on the routing process, which makes its execution logic more complicated than traditional multi-tier applications. In addition, production data centers often comprise heterogeneous machines with different capacities. Few studies have fully considered the heterogeneity of cloud resources, which brings new challenges to resource provisioning. To address these challenges, this paper presents a novel resource provisioning model for service providers. The model utilizes queuing network for analysis of both service performance and cost estimation. Then, the problem is defined as a cost optimization with performance constraints. We propose a cost-efficient algorithm to decompose the original problem into a sub-optimization one. Furthermore, we implement a prototype system on top of an infrastructure platform built with OpenStack. It has been deployed in our campus network. Based on real-world traces collected from our system and Dropbox, we validate the efficiency of our proposed algorithms by extensive experiments. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
- Full Text
- View/download PDF
36. IRIBE: Intrusion-resilient identity-based encryption
- Author
-
Minglei Shu, Huawei Zhao, Rong Hao, Jianxi Fan, and Jia Yu
- Subjects
021110 strategic, defence & security studies ,Information Systems and Management ,business.industry ,0211 other engineering and technologies ,02 engineering and technology ,computer.software_genre ,Encryption ,Computer security ,Computer Science Applications ,Theoretical Computer Science ,Multiple encryption ,Artificial Intelligence ,Control and Systems Engineering ,Probabilistic encryption ,0202 electrical engineering, electronic engineering, information engineering ,56-bit encryption ,40-bit encryption ,020201 artificial intelligence & image processing ,Link encryption ,Attribute-based encryption ,On-the-fly encryption ,business ,computer ,Software ,Mathematics - Abstract
In order to limit the damage of key exposure for identity-based encryption, we propose a new paradigm called intrusion-resilient identity-based encryption (IRIBE) in this paper. Compared with key-insulated identity-based encryption and forward-secure identity-based encryption, IRIBE can achieve a stronger level of security. In our proposed scheme, the ciphertexts in any other time periods are secure even after arbitrarily many compromises of the base and the user, as long as compromises do not happen simultaneously. Furthermore, the intruder cannot decrypt the ciphertexts pertaining to previous time periods, even if it compromises the base and the user simultaneously. Therefore, our IRIBE scheme can greatly enhance the security of identity-based encryption. We also formalize the definition and the security notions of this paradigm. The proposed scheme is proven secure in the standard model.
- Published
- 2016
- Full Text
- View/download PDF
37. An efficient algorithm to construct disjoint path covers of DCell networks
- Author
-
Xi Wang, Jianxi Fan, Xiaohua Jia, and Cheng-Kuan Lin
- Subjects
020203 distributed computing ,General Computer Science ,business.industry ,Cloud computing ,0102 computer and information sciences ,02 engineering and technology ,Path cover ,01 natural sciences ,Hamiltonian path ,Theoretical Computer Science ,Combinatorics ,symbols.namesake ,Cover (topology) ,Integer ,010201 computation theory & mathematics ,Server ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Data center ,business ,Mathematics - Abstract
Data center networks have been becoming more and more important with the development of cloud computing. For any two integers k ? 0 and n ? 2 , the k-dimensional DCell with n-port switches, D k , n , has been proposed for one of the most important data center networks as a server centric data center network structure. D k , n can support millions of servers with outstanding network capacity and provide good fault tolerance by only using commodity switches. A disjoint path cover has significant applications in data center networks. In this paper, we prove that D k , n is one-to-one r-disjoint path coverable for any integer 1 ? r ? n + k - 1 , except for D 1 , 2 . Moreover, we propose an O ( t k ) algorithm for finding a one-to-one r-disjoint path cover in D k , n for any integer 1 ? r ? n + k - 1 , where t k is the number of servers in D k , n .
- Published
- 2016
- Full Text
- View/download PDF
38. One-to-one disjoint path covers on alternating group graphs
- Author
-
Jianxi Fan, Lantao You, Xiaohua Jia, and Yuejuan Han
- Subjects
Discrete mathematics ,Disjoint path ,Combinatorics ,General Computer Science ,Integer ,Alternating group ,Node (circuits) ,Alternating group graph ,Theoretical Computer Science ,Mathematics - Abstract
The alternating group graph, denoted by AG n , is one of the popular interconnection networks, which has many attractive properties. In this paper, we prove that for any two distinct nodes µ and ?, there exist m node-disjoint paths for any integer n ? 3 with 1 ? m ? 2 n - 4 whose union covers all the nodes of AG n . For any node of AG n has exactly 2 n - 4 neighbors, 2 n - 4 is the maximum number of node-disjoint paths can be constructed in AG n .
- Published
- 2015
- Full Text
- View/download PDF
39. Embedding complete binary trees into parity cubes
- Author
-
Zhao Liu, Jianxi Fan, and Xiaohua Jia
- Subjects
Combinatorics ,Binary tree ,Hardware and Architecture ,Computer science ,Embedding ,Hypercube ,Cube ,Parity (mathematics) ,Software ,Information Systems ,Theoretical Computer Science ,Vertex (geometry) - Abstract
The complete binary tree as an important network structure has long been investigated for parallel and distributed computing, which has many nice properties and used to be embedded into other interconnection architectures. The parity cube is an important variant of the hypercube. It has many attractive features superior to those of the hypercube. In this paper, we prove that the complete binary tree with $$2^n-1$$ 2 n - 1 vertices can be embedded with dilation 1, congestion 1, load 1 into the $$n$$ n -dimensional parity cube $$PQ_n$$ P Q n and expansion tending to 1. Furthermore, we provide an $$O(NlogN)$$ O ( N l o g N ) algorithm to construct the complete binary tree with $$2^n-1$$ 2 n - 1 vertices in $$PQ_n$$ P Q n , where $$N$$ N denotes the number of vertices in $$PQ_n$$ P Q n and $$n\ge 1$$ n ? 1 .
- Published
- 2014
- Full Text
- View/download PDF
40. On the metric dimension of HDN
- Author
-
Dacheng Xu and Jianxi Fan
- Subjects
Combinatorics ,Computational Theory and Mathematics ,Injective metric space ,Discrete Mathematics and Combinatorics ,Fisher information metric ,Chebyshev distance ,Theoretical Computer Science ,Mathematics ,Intrinsic metric ,Metric dimension ,Word metric ,Metric k-center ,Convex metric space - Abstract
The concept of metric basis is useful for robot navigation. In graph G, a robot is aware of its current location by sending signals to obtain the distances between itself and the landmarks in G. Its position is determined uniquely in G if it knows its distances to sufficiently many landmarks. The metric basis of G is defined as the minimum set of landmarks such that all other vertices in G can be uniquely determined and the metric dimension of G is defined as the cardinality of the minimum set of landmarks. The major contribution of this paper is that we have partly solved the open problem proposed by Manuel et al. [9] , by proving that the metric dimension of HDN1 ( n ) and HDN2 ( n ) are either 3 or 4. However, the problem of finding the exact metric dimension of HDN networks is still open.
- Published
- 2014
- Full Text
- View/download PDF
41. Hamiltonian properties of honeycomb meshes
- Author
-
Jianxi Fan, Dacheng Xu, Shukui Zhang, Xiaohua Jia, and Xi Wang
- Subjects
TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Information Systems and Management ,Topology ,Network topology ,Hamiltonian path ,Mathematics::Numerical Analysis ,Computer Science Applications ,Theoretical Computer Science ,Vertex (geometry) ,Computer Science::Hardware Architecture ,symbols.namesake ,Computer Science::Graphics ,Artificial Intelligence ,Control and Systems Engineering ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,symbols ,Polygon mesh ,Networks on chip ,Hamiltonian (quantum mechanics) ,Software ,ComputingMethodologies_COMPUTERGRAPHICS ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
Meshes are widely used topologies for Networks on Chip (NoC). Honeycomb meshes have better topological properties than Meshes. In order to communicate efficiently in a linear or cyclic manner, it is benefited that there is a Hamiltonian path or Hamiltonian cycle in NoC. In this paper, we give a necessary and sufficient condition for the existence of Hamiltonian path between any pair of vertices in a honeycomb mesh and for the existence of Hamiltonian path in a honeycomb mesh with one faulty vertex. Besides, we give a systematic method to construct a Hamiltonian path in Honeycomb meshes.
- Published
- 2013
- Full Text
- View/download PDF
42. Independent spanning trees in crossed cubes
- Author
-
Jianxi Fan, Shukui Zhang, Baolei Cheng, and Xiaohua Jia
- Subjects
Discrete mathematics ,Information Systems and Management ,Conjecture ,Mathematics::History and Overview ,Fault tolerant broadcasting ,Independent spanning trees ,Graph ,Computer Science Applications ,Theoretical Computer Science ,Vertex (geometry) ,Combinatorics ,Artificial Intelligence ,Control and Systems Engineering ,Constructive algorithms ,Hypercube ,Cube ,Software ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
Multiple independent spanning trees (ISTs) can be used for data broadcasting in networks, which can provide advantageous performances, such as the enhancement of fault-tolerance, bandwidth, and security. However, there is a conjecture on the existence of ISTs in graphs: If a graph G is n-connected (n>=1), then there are n ISTs rooted at an arbitrary vertex in G. This conjecture has remained open for n>=5. The n-dimensional crossed cube CQ"n is a n-connected graph with various desirable properties, which is an important variant of the n-dimensional hypercube. In this paper, we study the existence and construction of ISTs in crossed cubes. We first give a proof of the existence of n ISTs rooted at an arbitrary vertex in CQ"n(n>=1). Then, we propose an O(Nlog^2N) constructive algorithm, where N=2^n is the number of vertices in CQ"n.
- Published
- 2013
- Full Text
- View/download PDF
43. Dimension-adjacent trees and parallel construction of independent spanning trees on crossed cubes
- Author
-
Jianxi Fan, Jin Wang, Baolei Cheng, and Xiaohua Jia
- Subjects
Discrete mathematics ,Computer Networks and Communications ,Dimension (graph theory) ,Parallel algorithm ,Independent spanning trees ,Tree (graph theory) ,Theoretical Computer Science ,Combinatorics ,Artificial Intelligence ,Hardware and Architecture ,Root vertex ,Cube ,Time complexity ,Software ,Mathematics - Abstract
Independent spanning trees (ISTs) have increasing applications in fault-tolerance, bandwidth, and security. In this paper, we study the problem of parallel construction of ISTs on crossed cubes. We first propose the definitions of dimension-adjacent walk and dimension-adjacent tree along with a dimension property of crossed cubes. Then, we consider the parallel construction of ISTs on crossed cubes. We show that there exist n general dimension-adjacent trees which are independent of the addresses of vertices in the n-dimensional crossed cube CQ"n. Based on n dimension-adjacent trees and an arbitrary root vertex, a parallel algorithm with the time complexity O(2^n) is proposed to construct n ISTs on CQ"n, where n>=1.
- Published
- 2013
- Full Text
- View/download PDF
44. Parallel construction of independent spanning trees and an application in diagnosis on Möbius cubes
- Author
-
Juncheng Jia, Jianxi Fan, Baolei Cheng, and Xiaohua Jia
- Subjects
Dependency (UML) ,Computer science ,Mathematics::History and Overview ,Parallel algorithm ,Construct (python library) ,Tree (graph theory) ,Theoretical Computer Science ,Vertex (geometry) ,Combinatorics ,Hardware and Architecture ,Hypercube ,Cube ,Algorithm ,Time complexity ,Software ,Information Systems - Abstract
Independent spanning trees (ISTs) on networks have applications to increase fault-tolerance, bandwidth, and security. Mobius cubes are a class of the important variants of hypercubes. A recursive algorithm to construct n ISTs on n-dimensional Mobius cube M n was proposed in the literature. However, there exists dependency relationship during the construction of ISTs and the time complexity of the algorithm is as high as O(NlogN), where N=2 n is the number of vertices in M n and n?2. In this paper, we study the parallel construction and a diagnostic application of ISTs on Mobius cubes. First, based on a circular permutation n?1,n?2,?,0 and the definitions of dimension-backbone walk and dimension-backbone tree, we propose an O(N) parallel algorithm, called PMCIST, to construct n ISTs rooted at an arbitrary vertex on M n . Based on algorithm PMCIST, we further present an O(n) parallel algorithm. Then we provide a parallel diagnostic algorithm with high efficiency to diagnose all the vertices in M n by at most n+1 steps, provided the number of faulty vertices does not exceed n. Finally, we present simulation experiments of ISTs and an application of ISTs in diagnosis on 0-M 4.
- Published
- 2013
- Full Text
- View/download PDF
45. A VoD System Model Based on BC Graphs
- Author
-
Jianxi Fan, Cheng-Kuan Lin, Xiaoqiang Chen, Zhao Liu, and Baolei Cheng
- Subjects
020203 distributed computing ,Interconnection ,Theoretical computer science ,Computer science ,Content distribution ,Distributed computing ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,Hypercube ,Independent spanning trees ,System model - Abstract
BC graphs are important interconnection networks, which include hypercubes, crossed cubes and other hypercube's variants. In this paper, we propose a new model, named BC-VoD model, to approach VoD system, which utilizes BC graphs. At the same time, we use independent spanning trees for content distribution. The simulation results show that this model has advantageous performance.
- Published
- 2016
- Full Text
- View/download PDF
46. An algorithm to construct independent spanning trees on parity cubes
- Author
-
He Huang, Yan Wang, Xiaohua Jia, and Jianxi Fan
- Subjects
Vertex (graph theory) ,Discrete mathematics ,Spanning tree ,General Computer Science ,Shortest-path tree ,Minimum spanning tree ,Theoretical Computer Science ,Distributed minimum spanning tree ,Combinatorics ,Reverse-delete algorithm ,Hypercube ,Algorithm ,Computer Science(all) ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics ,Minimum degree spanning tree - Abstract
Independent spanning trees have applications in networks such as reliable communication protocols, one-to-all broadcasting, reliable broadcasting, and secure message distribution. Thus, the designs of independent spanning trees in several classes of networks have been widely investigated. However, there is a conjecture on independent spanning trees: any n-connected graph has n independent spanning trees rooted at an arbitrary vertex. This conjecture still remains open for n>=5. In this paper, by proposing an algorithm to construct n independent spanning trees rooted at any vertex, we confirm the conjecture on n-dimensional parity cube PQ"n -- a variant of n-dimensional hypercube. Furthermore, we prove that all independent spanning trees rooted at an arbitrary vertex constructed by our construction method are isomorphic and the height of each tree is n+1 for any integer n>=2.
- Published
- 2012
- Full Text
- View/download PDF
47. Embedding meshes into twisted-cubes
- Author
-
Shukui Zhang, Xi Wang, Jianxi Fan, Jia Yu, and Xiaohua Jia
- Subjects
Discrete mathematics ,Information Systems and Management ,Computer Science Applications ,Theoretical Computer Science ,Combinatorics ,Dilation (metric space) ,Twisted cube ,Artificial Intelligence ,Control and Systems Engineering ,Embedding ,Polygon mesh ,Hypercube ,Software ,Integer (computer science) ,Mathematics - Abstract
The n-dimensional twisted-cube, TN"n, is a variation of the hypercube. In this paper, we study embedding of meshes into TN"n. We prove three major results in this paper: (1) For any integer n>=1, a 2x2^n^-^1 mesh can be embedded into TN"n with dilation 1 and expansion 1. (2) For any integer n>=4, an mxk(m>=3,k>=3) mesh cannot be embedded into TN"n with dilation 1. (3) For any integer n>=4, two node-disjoint 4x2^n^-^3 meshes can be embedded into TN"n with dilation 2 and expansion 1.
- Published
- 2011
- Full Text
- View/download PDF
48. The spined cube: A new hypercube variant with smaller diameter
- Author
-
Jianxi Fan, Wujun Zhou, Shukui Zhang, and Xiaohua Jia
- Subjects
Discrete mathematics ,Combinatorics ,Mathematics::Combinatorics ,Small diameter ,Signal Processing ,Bijection ,Hypercube ,Cube ,Graph ,Computer Science Applications ,Information Systems ,Theoretical Computer Science ,Mathematics - Abstract
Bijective connection graphs (in brief, BC graphs) are a family of hypercube variants, which contains hypercubes, twisted cubes, crossed cubes, Mobius cubes, locally twisted cubes, etc. It was proved that the smallest diameter of all the known n-dimensional bijective connection graphs (BC graphs) is @[email protected]?, given a fixed dimension n. An important question about the smallest diameter among all the BC graphs is: Does there exist a BC graph whose diameter is less than the known BC graphs such as crossed cubes, twisted cubes, Mobius cubes, etc., with the same dimension? This paper answers this question. In this paper, we find that there exists a kind of BC graphs called spined cubes and we prove that the n-dimensional spined cube has the diameter @?n/[email protected]?+3 for any integer n with n>=14. It is the first time in literature that a hypercube variant with such a small diameter is presented.
- Published
- 2011
- Full Text
- View/download PDF
49. Efficient unicast in bijective connection networks with the restricted faulty node set
- Author
-
Xiaohua Jia, Shukui Zhang, Jianxi Fan, Jia Yu, and Xin Liu
- Subjects
Discrete mathematics ,Information Systems and Management ,Constructive proof ,Node (networking) ,Measure (mathematics) ,Computer Science Applications ,Theoretical Computer Science ,Connection (mathematics) ,Combinatorics ,Artificial Intelligence ,Control and Systems Engineering ,Path (graph theory) ,Bijection ,Graph (abstract data type) ,Hypercube ,Software ,Mathematics - Abstract
The connectivity is an important criteria to measure the fault-tolerant performance of a graph. However, the connectivity based on the condition of the set of arbitrary faulty nodes is generally lower. In this paper, in order to heighten this measure, we introduce the restricted connectivity into bijective connection networks. First, we prove that the probability that all the neighbors of an arbitrary node becomes faulty in any n-dimensional bijective connection network X"n is very low when n becomes sufficient large. Then, we give a constructive proof that under the condition that each node of an n-dimensional bijective connection network X"n has at least one fault-free neighbor, its restricted connectivity is 2n-2, about half of the connectivity of X"n. Finally, by our constructive proof, we give an O(n) algorithm to get a reliable path of length at most n+3@?log"2|F|@?+1 between any two fault-free nodes in an n-dimensional bijective connection network. In particular, since the family of BC networks contains hypercubes, crossed cubes, Mobius cubes, etc., our algorithm is appropriate for these cubes.
- Published
- 2011
- Full Text
- View/download PDF
50. Forward-secure identity-based signature: Security notions and construction
- Author
-
Jianxi Fan, Jia Yu, Xiangguo Cheng, Fanyu Kong, Rong Hao, and Yangkui Chen
- Subjects
Scheme (programming language) ,Information Systems and Management ,Theoretical computer science ,Construct (python library) ,Computer security ,computer.software_genre ,Signature (logic) ,Computer Science Applications ,Theoretical Computer Science ,Digital signature ,Artificial Intelligence ,Control and Systems Engineering ,Forward secrecy ,Identity (object-oriented programming) ,computer ,Software ,Mathematics ,computer.programming_language - Abstract
The security of traditional identity-based signatures wholly depends on the security of secret keys. Exposure of secret keys requires reissuing all previously assigned signatures. This limitation becomes more obvious today as key exposure is more common with increasing use of mobile and unprotected devices. Under this background, mitigating the damage of key exposure in identity-based signatures is an important problem. To deal with this problem, we propose to integrate forward security into identity-based signatures. In this paper, we firstly formalize the definition and security notions for forward-secure identity-based signature scheme, and then construct an efficient scheme. All parameters in our scheme have, at most, log-squared complexity in terms of the total number of time periods. The scheme is provably secure without random oracles.
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.