4.3 Article

Conditional edge-fault pancyclicity of augmented cubes

Journal

THEORETICAL COMPUTER SCIENCE
Volume 510, Issue -, Pages 94-101

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.tcs.2013.09.010

Keywords

Augmented cubes; Pancyclicity; Fault-tolerant embedding; Faulty edges; Interconnection network

Funding

  1. National Nature Science Foundation of China [11231008, 11171020, 11371052, 11271012]

Ask authors/readers for more resources

The augmented cube AQ(n) proposed by Choudum and Sunitha [7], is a variation of the hypercube Q(n) and possesses many superior properties that the hypercube does not contain. In this paper, we show that, any n-dimensional augmented cube with at most 4n - 12 faulty edges contains cycles of lengths from 3 to 2(n) under the condition that every node is incident with at least two fault-free edges, where n >= 3. Ma et al. [21] obtained the same result but with the number of faulty edges up to 2n - 3. Our result improves Ma et al.'s result in terms of the number of fault-tolerant edges. (C) 2013 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Mathematics

Existence of regular 3-polytopes of order 2n

Dong-Dong Hou, Yan-Quan Feng, Dimitri Leemans

JOURNAL OF GROUP THEORY (2019)

Article Computer Science, Theory & Methods

On Regular Polytopes of 2-Power Order

Dong-Dong Hou, Yan-Quan Feng, Dimitri Leemans

DISCRETE & COMPUTATIONAL GEOMETRY (2020)

Article Mathematics

On groups all of whose Haar graphs are Cayley graphs

Yan-Quan Feng, Istvan Kovacs, Da-Wei Yang

JOURNAL OF ALGEBRAIC COMBINATORICS (2020)

Article Mathematics, Applied

The h-restricted connectivity of balanced hypercubes

Dongqin Cheng

Summary: This paper investigates the restricted connectivity of n-dimensional balanced hypercubes and proves the minimum cardinality of the vertex set under certain conditions.

DISCRETE APPLIED MATHEMATICS (2021)

Article Computer Science, Theory & Methods

Hamiltonian Cycles Passing Through Prescribed Edges in Locally Twisted Cubes

Dongqin Cheng

Summary: This paper proves that in an n-dimensional locally twisted cube LTQ(n), if a set of edges P contains at most n-1 edges, then LTQ(n) contains a Hamiltonian cycle passing through every edge of P, where n >= 4. Additionally, LTQ(3) has a Hamiltonian cycle passing through at most one prescribed edge.

JOURNAL OF INTERCONNECTION NETWORKS (2022)

Article Computer Science, Theory & Methods

Extra Connectivity and Structure Connectivity of 2-Dimensional Torus Networks

Dongqin Cheng

Summary: This paper investigates the connectivity of a specific structure of 2-dimensional torus networks. The results determine the additional connectivity, structure connectivity, and substructure connectivity of the networks under different conditions. These findings are important for assessing the fault-tolerance of the networks.

INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE (2022)

Article Computer Science, Theory & Methods

Embedding mutually edge-disjoint cycles into locally twisted cubes

Dongqin Cheng

Summary: This paper investigates the properties of the n-dimensional locally twisted cube LT Q(n). It is proved that for any node x in LT Q(n), there exist multiple edge-disjoint cycles that intersect with each LT Q(n-2)(alpha beta).

THEORETICAL COMPUTER SCIENCE (2022)

Article Mathematics, Applied

Two disjoint cycles of various lengths in alternating group graph

Dongqin Cheng

Summary: The alternating group graph has been extensively studied in recent years due to its many desirable properties. This paper proves that the n-dimensional alternating group graph is panyclic with a specific disjoint-cycle-cover property for n >= 4.

APPLIED MATHEMATICS AND COMPUTATION (2022)

Article Computer Science, Hardware & Architecture

Star structure connectivity of cayley graphs generated by transposition trees

Kaige Pan, Dongqin Cheng

Summary: This paper introduces the definitions of structure connectivity and substructure connectivity, and investigates star structure and star substructure connectivity of Cayley graphs generated by transposition trees.

JOURNAL OF SUPERCOMPUTING (2023)

Article Computer Science, Theory & Methods

The generalized 4-connectivity of folded hypercube

Heqin Liu, Dongqin Cheng

Summary: This paper discusses the generalized 4-connectivity of FQ(n) and proves that kappa(4)(FQ(n)) is equal to n when n is greater than or equal to 7.

INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY (2022)

Article Computer Science, Hardware & Architecture

Structure Fault Tolerance of Exchanged Hypercube

Heqin Liu, Dongqin Cheng

Summary: In this paper, we introduce a variant of hypercube called exchanged hypercubeEH(s,t), which is obtained by removing some links from a (s+t+1)-dimensional hypercube. This graph retains many excellent properties, leading to extensive studies on its reliability and fault tolerance. By combining the concepts of structure connectivity and substructure connectivity, we establish the P(k)-path, C(2l-)-cycle, and K(1,r)-star structure connectivity and substructure connectivity ofEH(s,t) under certain conditions. Furthermore, we determine kappa(s)(EH(s,t);C-4) for 5 <= s <= t and provide an upper bound for kappa(EH(s,t);C-4) for 4 <= s <= t.

COMPUTER JOURNAL (2023)

Article Mathematics, Applied

The generalized 4-connectivity of locally twisted cubes

Dongqin Cheng

Summary: This paper investigates a variant of the locally twisted cube called n-dimensional locally twisted cube and proves that its generalized 4-connectivity is n-1. This result is significant for evaluating the fault-tolerance of networks.

JOURNAL OF APPLIED MATHEMATICS AND COMPUTING (2023)

Article Computer Science, Interdisciplinary Applications

Edge-disjoint trees passing through prescribed vertices in bubble-sort star graphs

Dongqin Cheng

Summary: This paper investigates the application of edge-disjoint trees in large-scale networks and proves the existence of at least two edge-disjoint trees passing through any given four vertices. The result is optimal.

JOURNAL OF COMPUTATIONAL SCIENCE (2023)

Article Mathematics

The Generalized 3-Connectivity and 4-Connectivity of Crossed Cube

Heqin Liu, Dongqin Cheng

Summary: The generalized connectivity is a new criterion for measuring the fault tolerance of networks. The n-dimensional crossed cube network CQ(n) is considered as an attractive alternative to hypercube network due to its many good properties. The results of the generalized 3-connectivity and generalized 4-connectivity of CQ(n) are kappa(3)(CQ(n)) = kappa(4)(CQ(n)) = n - 1, where n >= 2.

DISCUSSIONES MATHEMATICAE GRAPH THEORY (2022)

Article Mathematics, Applied

Fault-free Hamiltonian cycle including given edges in folded hypercubes with faulty edges

Dongqin Cheng

DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS (2020)

Article Computer Science, Theory & Methods

Revisiting maximum satisfiability and related problems in data streams

Hoa T. Vu

Summary: This paper addresses the maximum satisfiability problem in the data stream model. It presents algorithms that achieve approximations to the optimum value and corresponding Boolean assignments in sublinear space complexity. The paper also discusses related problems and provides approximation algorithms and space complexity for them.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Distributed half-integral matching and beyond

Sameep Dahal, Jukka Suomela

Summary: This research demonstrates that finding a maximal fractional matching in distributed graph algorithms requires the use of fine-grained fractional values, and gives a specific characterization of the small value requirements, with a denominator of at least 2d. It also provides a new algorithm to meet these requirements.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

The computational complexity of Holant problems on 3-regular graphs

Peng Yang, Yuan Huang, Zhiguo Fu

Summary: This paper investigates the computational complexity classification of Holant problems on 3-regular graphs and provides corresponding conclusions.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

The energy complexity of diameter and minimum cut computation in bounded-genus networks

Yi-Jun Chang

Summary: This paper investigates the energy complexity of distributed graph problems in multi-hop radio networks. Recent studies have shown that some problems can be solved with energy-efficient algorithms, while others require significant energy consumption. To improve energy efficiency, this paper focuses on bounded-genus graphs and proposes corresponding algorithms.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Algorithms for 2-club cluster deletion problems using automated generation of branching rules

Dekel Tsur

Summary: This paper proposes algorithms for 2-CLUB CLUSTER VERTEX DELETION and 2-CLUB CLUSTER EDGE DELETION problems. The algorithms have running times of O*(3.104k) and O*(2.562k) respectively, and were obtained using automated generation of branching rules. These results improve upon previous algorithms for the same problems.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

An approximation algorithm for diversity-aware fair k-supplier problem

Xianrun Chen, Sai Ji, Chenchen Wu, Yicheng Xu, Yang Yang

Summary: This paper introduces the diversity-aware fair k-supplier problem and presents an efficient 5-approximation algorithm to address the fairness and over-representation issues in facility selection.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Computational complexity of jumping block puzzles

Masaaki Kanzaki, Yota Otachi, Giovanni Viglietta, Ryuhei Uehara

Summary: Sliding block puzzles play a crucial role in computational complexity, with their complexity varying depending on the rules and set of pieces. In this study, we explore the computational complexities of jumping block puzzles, a newer concept in the puzzle community. We analyze different variants of these puzzles based on real puzzles and a natural model, and determine their complexities. Our findings show that these puzzles are generally PSPACE-complete, with additional cases being NP-complete or solvable in polynomial-time.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Popular critical matchings in the many-to-many setting

Meghana Nasre, Prajakta Nimbhorkar, Keshav Ranjan, Ankita Sarkar

Summary: This paper studies the many-to-many bipartite matching problem with two-sided preferences and two-sided lower quotas. By defining the concept of critical matching, the goal is to find a popular matching in the set of critical matchings, and an efficient algorithm is proposed to compute a popular matching of the largest size.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Space efficient algorithm for solving reachability using tree decomposition and separators

Rahul Jain, Raghunath Tewari

Summary: To solve the reachability problem is to determine if there is a path between two vertices in a graph. This paper studies space-efficient algorithms that run in polynomial time to decide reachability. An algorithm is presented that solves reachability in directed graphs using O(n log n) space.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

A tour of general Hanoi graphs

Daniel Berend, Liat Cohen, Omrit Filtser

Summary: The Tower of Hanoi puzzle has been a fascination for mathematicians and theoretical computer scientists for over a century. By using graph theory, we can study connectivity, shortest paths, and other properties of the Hanoi puzzle. Additionally, the Hanoi graphs are related to interesting structures such as the Sierpinski gasket and Gray codes.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Selfish bin packing with punishment

Ling Gai, Weiwei Zhang, Zhao Zhang

Summary: This paper studies the problem of selfish bin packing with punishment. Different types of punishments are considered, and it is shown that punishment based on the result can achieve better performance with an upper bound of approximately 1.48 compared to the optimal solution.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Gradient complexity and non-stationary views of differentially private empirical risk minimization

Di Wang, Jinhui Xu

Summary: This paper studies the problem of Differentially Private Empirical Risk Minimization (DP-ERM) with both convex and non-convex loss functions. Several new methods are proposed for DP-ERM with smooth convex loss functions, achieving near-optimal expected excess risks while reducing gradient complexity. For DP-ERM with non-convex loss functions, both low and high dimensional spaces are explored, and utility measurements are introduced using different norms and error bounds. The paper reveals that certain non-convex loss functions can be reduced to a level similar to convex loss functions.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Weights of formal languages based on geometric series with an application to automatic grading

Florian Bruse, Maurice Herwig, Martin Lange

Summary: This paper presents a weight measure for formal languages based on the summands of a geometric series discounted by the fraction of words of certain length in the language. It shows that this weight measure is computable for regular languages. As an application, a distance metric between languages is derived as the weight of their symmetric difference, which can be used in automatic grading of standard exercises in formal language theory classes.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

Almost disjoint paths and separating by forbidden pairs

Oliver Bachtler, Tim Bergner, Sven O. Krumke

Summary: By studying the almost disjoint paths problem and the separating by forbidden pairs problem, this paper reveals that they have an unbounded duality gap and analyzes their complexity. In addition, for a fixed value of k, an efficient algorithm is proposed to solve the ADP problem.

THEORETICAL COMPUTER SCIENCE (2024)

Article Computer Science, Theory & Methods

From multivalued to Boolean functions: Preservation of soft nested canalization

Elisabeth Remy, Paul Ruet

Summary: This paper studies the extension of the nested canalization property to multivalued functions and investigates the effect of the Van Ham mapping on this property. The study finds that the Van Ham mapping transforms softly nested canalizing multivalued functions into nested canalization Boolean functions, a property that is also relevant in the modeling of gene regulatory networks.

THEORETICAL COMPUTER SCIENCE (2024)