Article
Computer Science, Theory & Methods
Baolei Cheng, Dajin Wang, Jianxi Fan
Summary: This survey provides a comprehensive collection of important works on ISTs and offers a historical perspective on the development of ISTs, serving as a useful reference for future research in this field.
ACM COMPUTING SURVEYS
(2023)
Article
Computer Science, Hardware & Architecture
Yifeng Wang, Baolei Cheng, Jianxi Fan, Yu Qian, Ruofan Jiang
Summary: In this paper, a general algorithm is proposed for the first time to establish the relationship between edge-disjoint spanning trees in an interconnection network and its line graph, leading to the discovery of more completely independent spanning trees. Furthermore, the lack of results regarding CISTs on line graphs is highlighted.
Article
Computer Science, Hardware & Architecture
Fu-Hsing Wang, Shuo- Wang
Summary: This paper proposes two linear time algorithms to solve the ISTs rooted at an arbitrary vertex for WK-recursive networks and WK-recursive pyramids separately. The performance of the algorithms is evaluated through analytical and experimental analysis of tree heights and average distances.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Engineering, Multidisciplinary
Kung-Jui Pai, Jinn-Shyong Yang, Guan-Yu Chen, Jou-Ming Chang
Summary: The existence of multiple completely independent spanning trees (CISTs) in a network has significant applications in fault-tolerant routing and secure message distribution. This paper proposes linear-time algorithms for constructing dual CISTs in dense Gaussian networks (DGNs) and evaluates the performance of protection routing in DGNs using simulation results.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Computer Science, Theory & Methods
Shih-Shun Kao, Ralf Klasing, Ling-Ju Hung, Chia-Wei Lee, Sun-Yuan Hsieh
Summary: The use of multiple independent spanning trees (ISTs) in networks provides advantages such as fault-tolerance and secure message distribution. This paper focuses on constructing ISTs in bubble-sort networks Bn and presents a non-recursive algorithm that can be fully parallelized. The algorithm solves an open problem from a previous paper and has an asymptotically optimal time complexity of O(n & BULL; n!).
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2023)
Article
Mathematics, Applied
Xia Hong, Wei Feng
Summary: For a graph G, if there exist k spanning trees T-1, T-2, ..., T-k, such that the paths from any two vertices u, v in these k trees are pairwise openly disjoint, then these k trees are completely independent. Hasunuma proved that there are two completely independent spanning trees in any 4-connected maximal planar graph, and the problem of deciding whether there exist two completely independent spanning trees in a given graph G is NP-complete. This paper investigates the number of completely independent spanning trees in some Cartesian product graphs.
Article
Mathematics
Kung-Jui Pai
Summary: This paper discusses the applications of edge-disjoint Hamiltonian cycles (EDHC) in locally twisted cubes (FLTQ) and crossed cubes (FCQ) with the center at the origin, including parallel data broadcasting and edge fault-tolerance in network communications. Three EDHCs are constructed in FLTQ(5) and FCQ(5) using the technique of edge exchange. It is proved that there are three EDHCs in FLTQ(n) and FCQ(n) when n≥6 based on their recursive structures. The data broadcasting performance of three EDHCs in FLTQ(n) and FCQ(n) is evaluated by simulation for 5≤n≤9, considering multiple faulty edges occurring randomly.
Article
Computer Science, Information Systems
Dun-Wei Cheng, Kai-Hsun Yao, Sun-Yuan Hsieh
Summary: The generalized recursive circulant networking can be widely applied in the design and implementation of interconnection networks, with processors connected through bidirectional, point-to-point communication channels. By applying the concept of shortest path routing to build independent spanning trees, this approach loosens previous research restrictions and extends results to a more general vertex setting using a specific algorithm to address constraint issues.
Article
Computer Science, Information Systems
Yi-Cheng Yang, Shih-Shun Kao, Ralf Klasing, Sun-Yuan Hsieh, Hsin-Hung Chou, Jou-Ming Chang
Summary: The concept of independent spanning trees has significant implications in graph theory, studying the applications of multiple spanning trees in networks, such as fault-tolerant transmission and secure message distribution in communication networks. This paper proposes a scheme for constructing independent spanning trees on a burnt pancake network and proves the correctness of the algorithm.
Article
Computer Science, Information Systems
Weibei Fan, Jianxi Fan, Zhijie Han, Peng Li, Yujie Zhang, Ruchuan Wang
Summary: This paper mainly studies the fault tolerant Hamiltonian properties of a faulty locally exchanged twisted cube, LeTQ(s, t) - (f(v) + f(e)), proving that for s > 2, t > 3, and s <= t, an LeTQ(s, t) can tolerate up to s - 1 faulty vertices and edges when embedding a Hamiltonian cycle. Furthermore, it is also proven that there is a Hamiltonian path between any two distinct fault-free vertices in a faulty LeTQ(s, t) with up to (s - 2) faulty vertices and edges. The results demonstrate that LeTQ(s, t) is (s - 1)-Hamiltonian and (s - 2)-Hamiltonian-connected, achieving optimal (s - 1)-fault-tolerant Hamiltonicity and (s - 2) fault-tolerant Hamiltonian connectivity.
FRONTIERS OF COMPUTER SCIENCE
(2021)
Article
Computer Science, Theory & Methods
Xiao-Yan Li, Wanling Lin, Ximeng Liu, Cheng-Kuan Lin, Kung-Jui Pai, Jou-Ming Chang
Summary: The paper investigates the construction of completely independent spanning trees (CISTs) in a server-centric data center network called BCube connected crossbars (BCCC) for fault-tolerant routing. The network offers good performance and reliability, with the fault-tolerant routing evaluated through simulation results.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2022)
Article
Mathematics, Applied
Xuenan Chang, Jicheng Ma, Da-Wei Yang
Summary: This paper investigates the symmetry of the locally twisted cube LTQ(n), proving that it is different from the hypercube Q(n). The results obtained in this study provide insights into the structure of LTQ(n) and generalize some previous works on this topic.
DISCRETE APPLIED MATHEMATICS
(2021)
Article
Computer Science, Hardware & Architecture
Yifeng Wang, Baolei Cheng, Yu Qian, Dajin Wang
Summary: This paper investigates the number of CISTs that can be constructed in the line graph of a complete graph and presents an algorithm for constructing the optimal number of CISTs. The findings have significant implications for assessing network robustness.
IEEE TRANSACTIONS ON COMPUTERS
(2022)
Article
Computer Science, Theory & Methods
Guo Chen, Baolei Cheng, Dajin Wang
Summary: This article discusses the importance and applications of constructing Completely Independent Spanning Trees (CISTs) in a network, especially in data center networks. It also introduces the augmented cube AQn as the underlying structure of a data center network and studies how to construct n-1 optimal CISTs in its logic graph L-AQDNn. Additionally, the relationship between the dimension of a hypercube-family network and the number of CISTs it can host is established for the first time.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2021)
Article
Mathematics, Applied
Xiaodong Chen, Qinghai Liu, Xiwu Yang
Summary: A graph G is a split graph if its vertex set V(G) can be partitioned into a clique D and an independent set I. In this paper, we prove that a Hamiltonian split graph with |D| > max{3, |I|} contains two completely independent spanning trees (CISTs). We also show that a Hamiltonian split graph with a toughness value r(G) > 1 contains two CISTs. As a corollary, we obtain that every 32-tough split graph contains two CISTs.
DISCRETE APPLIED MATHEMATICS
(2023)
Article
Mathematics, Applied
Jinn-Shyong Yang, Xiao-Yan Li, Sheng-Lung Peng, Jou-Ming Chang
Summary: The emerging data center network HSDC is a server-centric DCN that supports various cloud services and applications through the construction of independent spanning trees. This study focuses on establishing the vertex-symmetry of HSDC and modifying the algorithm for constructing ISTs to fit the requirements of HSDC. The algorithm developed can construct n ISTs in O(nN) time or parallelize the process in O(n) time using N processors, resulting in ISTs with a diameter about twice that of Q(n).
APPLIED MATHEMATICS AND COMPUTATION
(2022)
Article
Computer Science, Hardware & Architecture
Xiao-Yan Li, Wanling Lin, Jou-Ming Chang, Xiaohua Jia
Summary: This paper introduces RCube as a candidate topology for edge computing DCNs and proposes a multi-protection routing scheme to enhance fault-tolerance capability.
IEEE-ACM TRANSACTIONS ON NETWORKING
(2022)
Article
Computer Science, Hardware & Architecture
Kung-Jui Pai, Ro-Yu Wu, Sheng-Lung Peng, Jou-Ming Chang
Summary: This paper investigates the construction of multiple edge-disjoint Hamiltonian cycles (EDHCs) in a crossed cube network and evaluates the performance of data broadcasting. The results show that multiple EDHCs can be constructed in the crossed cube network, significantly improving the success rate and latency of edge fault-tolerant data broadcasting.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Mathematics, Applied
Mei-Mei Gu, Jou-Ming Chang
Summary: The neighbor connectivity and edge neighbor connectivity of a graph G refer to the minimum number of vertices and edges, respectively, that, when their closed neighborhoods are removed from G, result in an empty, complete, or disconnected graph. These two types of connectivity were derived from assessing the impact of subversion in spy networks caused by underground resistance movements. They currently provide more accurate measures of network reliability and fault-tolerance.
DISCRETE APPLIED MATHEMATICS
(2023)
Article
Computer Science, Hardware & Architecture
Wanling Lin, Xiao-Yan Li, Jou-Ming Chang, Xiaohua Jia
Summary: The rapid growth of data center networks (DCNs) is driven by the popularity of cloud computing, data explosion, and lower setup costs, resulting in more frequent component failures. DCNs require reliable operation and efficient routing algorithms for data transmission between servers, particularly fault-tolerant routing. Constructing independent spanning trees (CISTs) has been a focus for fault-tolerant routing, and BCube-based DCN (BDCN) provides a unified framework for consistent algorithm design. This study presents the first construction of multiple CISTs in DCNs with switch failures and evaluates the performance of fault-tolerant routing through experiments using standard metrics such as average path length (APL) and transmission failure rate (TFR).
IEEE TRANSACTIONS ON COMPUTERS
(2023)
Article
Computer Science, Theory & Methods
Mei-Mei Gu, Kung-Jui Pai, Jou-Ming Chang
Summary: This paper investigates the neighbor connectivity and edge neighbor connectivity of two hierarchical networks, namely hierarchical star network H Sn and complete cubic network CCn, which use Sn and Qn as building blocks. The results show that kappa NB(H Sn) = n-1 and lambda NB(H Sn) = n for n > 3, and kappa NB(CCn) = fn21 + 1 and lambda NB (CCn) = n + 1 for n > 2.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2023)
Article
Computer Science, Theory & Methods
Shu-Li Zhao, Jou-Ming Chang
Summary: This paper investigates the generalized connectivity on the divide-and-swap cube DSCn, which has a nice hierarchical structure and plentiful properties. The result kappa 4(DSCn) = d is obtained by constructing d internally disjoint trees connecting any four arbitrary vertices of DSCn, where d = log2 n > 1. As a result, kappa 3(DSCn) = d.
THEORETICAL COMPUTER SCIENCE
(2023)
Article
Mathematics, Applied
Shu-Li Zhao, Jou -Ming Chang, Heng-Zhe Li
Summary: The generalized connectivity is a parameter that measures the capability of connecting vertices in graph G and is a generalization of traditional connectivity. The pancake graph has desirable properties for designing interconnection networks. This paper determines that the generalized 4-connectivity of the pancake graph Pn is n-2, meaning there are (n-2) internally disjoint S-trees connecting any four arbitrary vertices x, y, z, and w, where S = {x, y, z, w}. As a corollary, the generalized 3-connectivity of the pancake graph Pn can be obtained directly.
DISCRETE APPLIED MATHEMATICS
(2023)
Article
Mathematics
Hongbin Zhuang, Jou-Ming Chang, Xiao-Yan Li, Fangying Song, Qinying Lin
Summary: This paper presents two different all-to-all broadcast algorithms for the Galaxyfly network, which adhere to the supernode-first rule and the router-first rule. Our performance evaluation validates their effectiveness, showing that the first algorithm achieves higher network channel utilization, while the second algorithm significantly reduces average collection time for routers from supernodes.
Article
Computer Science, Hardware & Architecture
Hongbin Zhuang, Xiao-Yan Li, Jou-Ming Chang, Cheng-Kuan Lin, Ximeng Liu
Summary: This article proposes the concept of the partitioned fault model and explores the fault tolerability of interconnection networks using novel indicators. The research results demonstrate the optimality of these indicators in terms of the number of edge faults tolerated.
IEEE TRANSACTIONS ON COMPUTERS
(2023)
Article
Computer Science, Information Systems
Shu-Li Zhao, Jou-Ming Chang
Summary: The article introduces the concepts of graph G and set S, defines S-tree and internally disjoint trees, and describes the definition of generalized r-connectivity and the characteristics of the folded divide-and-swap cube.
INFORMATION PROCESSING LETTERS
(2023)
Article
Computer Science, Theory & Methods
Hsin-Jung Lin, Shyue-Ming Tang, Kung-Jui Pai, Jou-Ming Chang
Summary: This paper investigates the problem of constructing a dual-CIST in the n-dimensional hierarchical folded cubic network HFQn. A recursive algorithm is proposed to construct a dual-CIST of HFQ(n) in O(22(n)) time for n=2, where the time required is the same scale as the number of vertices of HFQ(n). Also, the diameter of each constructed CIST is 4n + 1.
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE
(2023)
Article
Mathematics
Kung-Jui Pai
Summary: This paper discusses the applications of edge-disjoint Hamiltonian cycles (EDHC) in locally twisted cubes (FLTQ) and crossed cubes (FCQ) with the center at the origin, including parallel data broadcasting and edge fault-tolerance in network communications. Three EDHCs are constructed in FLTQ(5) and FCQ(5) using the technique of edge exchange. It is proved that there are three EDHCs in FLTQ(n) and FCQ(n) when n≥6 based on their recursive structures. The data broadcasting performance of three EDHCs in FLTQ(n) and FCQ(n) is evaluated by simulation for 5≤n≤9, considering multiple faulty edges occurring randomly.
Article
Computer Science, Theory & Methods
Hongbin Zhuang, Xiao-Yan Li, Jou-Ming Chang, Dajin Wang
Summary: This paper proposes an efficient fault-tolerant Hamiltonian path embedding algorithm for enhancing the fault-tolerant capacity of k-ary n-cubes. A new conditional fault model named Partitioned Edge Fault model (PEF model) is introduced. Experimental and comparative results show that the algorithm significantly improves the edge fault tolerance compared to known results.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2023)
Proceedings Paper
Computer Science, Theory & Methods
Ro-Yu Wu, Cheng-Chia Tseng, Ling-Ju Hung, Jou-Ming Chang
Summary: This paper presents an algorithm for generating all spanning trees of a fan graph and provides methods for ranking and unranking. The time and space complexities of these algorithms are analyzed.
COMBINATORIAL OPTIMIZATION (ISCO 2022)
(2022)
Article
Computer Science, Information Systems
Andre Nies, Frank Stephan
Summary: We investigate word automaticity for nilpotent groups of class 2 with prime exponent p. It is proven that the infinitely generated free group in this category is not word automatic. However, the infinite extra-special p-group Ep and an intermediate group Hp with an infinite center are both word automatic. Additionally, a method for demonstrating automaticity of central extensions of abelian groups via co-cycles is introduced.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Chik How Tan, Theo Fanuela Prabowo
Summary: This paper presents a new key recovery attack on a Hamming-metric code-based signature scheme proposed by SHMWW. The attack extends the statistical part of the attack proposed by ABDKPS. In addition to classifying the columns of the secret matrix, the attack also determines the entries of the identity columns of this matrix via statistical method. The attack has better time complexity and can recover the secret key in under 45 minutes with no more than 1500 signatures.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Julio Araujo, Victor Campos, Darlan Girao, Joao Nogueira, Antonio Salgueiro, Ana Silva
Summary: This paper studies the parameter hull number in a graph convexity called Cycle Convexity, which is motivated by related notions in Knot Theory. The authors define the interval function and investigate the properties and computational methods of the minimum convex set for a graph G.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Takuto Mitsunobu, Reiji Suda, Vorapong Suppakitpaisarn
Summary: The investigation on the approximation ratio of the longest processing time (LPT) scheduling algorithm has been conducted in various studies. While the ratio is known for identical processors, it remains unknown for processors with different speeds. This study provides a tight approximation ratio for three, four, and five processors, showing that the ratios are no larger than the lower bound provided by Gonzalez et al. (1977) [14]. The ratios are approximately 1.38, 1.43, and 1.46 for three, four, and five processors, respectively.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Nidia Obscura Acosta, Alexandru I. Tomescu
Summary: This paper presents a new linear-time checkable characterization of directed graphs with a unique Eulerian circuit. The characterization is based on a simple condition of when two edges must appear consecutively in all Eulerian circuits, in terms of cut nodes of the underlying undirected graph of G. Additionally, the paper proposes a method to compute all maximal safe walks appearing in all Eulerian circuits in linear time.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Dar-Li Yang, Yung-Tsung Hou, Wen-Hung Kuo
Summary: The research states that the single-machine makespan minimization problem can be solved as an assignment problem in O(n3) time. Subsequent research shows that if the job-dependent learning effects are correlated with the level of sophistication of the jobs and have a lower bound, the scheduling problem can be solved in O(nlogn) time by sequencing the jobs according to the shortest processing time rule. The SPT job sequence remains optimal when the job-dependent learning effects are inversely correlated with the level of sophistication and have an upper bound. The main results of the paper are correct, but there are errors in Corollary 1 and incomplete proofs for Proposition 1 and Corollary 1. This note provides a counter example for the latter case and a modified corollary. A lemma is presented to complete the proofs for Proposition 1 and Corollary 1. Finally, a simple algorithm is developed to solve the latter case in O(n2) time.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Maximilien Mackie
Summary: This research investigates encodings for modular arithmetic in the lambda-calculus. Two approaches are considered: adapting existing numeral systems and creating a new one. The focus of this paper is to provide original techniques for encoding modular arithmetic directly. A modular arithmetic numeral system is presented, complete with multiplication and an implementation of the Chinese remainder theorem, all without recursion i.e., without using fixed-point operators.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Yogesh Dahiya, K. Vignesh, Meena Mahajan, Karteek Sreenivasaiah
Summary: We demonstrate that polynomial-size constant-rank linear decision trees (LDTs) can be transformed into polynomial-size depth-2 threshold circuits LTF o LTF. An intermediate structure is polynomial-size decision lists that refer to a conjunction of a fixed number of linear threshold functions (LTFs); we prove that these are equivalent to polynomial-size exact linear decision lists (ELDLs), which query precise threshold functions (ELTFs).
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Bhisham Dev Verma, Rameshwar Pratap, Manoj Thakur
Summary: Count sketch is a popular sketching algorithm used for frequency estimation in data streams and pairwise inner product for real-valued vectors. This paper extends count sketch and introduces a higher-order count sketch algorithm, which compresses input tensors to approximate the queried features. It is shown that the higher-order count sketch can also closely approximate the pairwise inner product and provides a concentration analysis of the estimate.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Jean Lienardy, Frederic Lafitte
Summary: OCB3 is an authenticated encryption mode of operation that allows for associated data (AEAD), and it is known for its maturity and provable security. However, this note highlights a small flaw in the security proof of OCB3 that can result in a loss of security when using short nonces. This flaw has implications worse than nonce-repetition, as it compromises confidentiality and authenticity until the key is changed. Various approaches to fix this flaw in OCB3 are presented.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Majid Mirzanezhad
Summary: This paper proposes the first data structure for curves under the (continuous) Frechet distance in higher dimensions, which can efficiently report all curves with distances less than a given value to a query curve. For a given k value in the preprocessing stage, we propose a deterministic data structure that can answer (1 + epsilon)delta-ANNS queries in O (kd) query time, where D is the diameter of P.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Je Hong Park, Woo-Hwan Kim
Summary: This paper revisits Zhu et al.'s attack on a certificate-based proxy signature scheme proposed by Verma et al., and shows that the fundamental problem of Verma et al.'s scheme lies in its use of a weak ordinary signature scheme. Furthermore, the paper demonstrates that the attack against Verma et al.'s scheme can be similarly applied to the revised scheme, as they share many components using the weak signature.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Lluis Alemany-Puig, Juan Luis Esteban, Ramon Ferrer-i-Cancho
Summary: This study focuses on two variants of the Maximum Linear Arrangement problem, namely the planar variant for free trees and the projective variant for rooted trees. Linear time and space complexity algorithms are presented to solve these two problems. Additionally, properties of maximum projective and planar arrangements are proven, and it is shown that caterpillar trees maximize planar MaxLA among all trees of a fixed size, thereby generalizing a previous extremal result on trees.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Mislav Blazevic, Stefan Canzar, Khaled Elbassioni, Domagoj Matijevic
Summary: This paper studies the Tai mapping and anti Tai mapping problems between rooted labeled trees. For unordered trees, finding the maximum-weight Tai mapping is proven to be NP-complete. The paper provides an efficient algorithm for finding the maximum-weight anti Tai mapping and presents a polynomial computable lower bound for the optimal anti Tai mapping based on special conditions.
INFORMATION PROCESSING LETTERS
(2024)
Article
Computer Science, Information Systems
Xiaowei Li, Xiwen Lu
Summary: The facility location problem with maximum distance constraint is investigated and a (3,1)-approximation algorithm is proposed. The algorithm is compared with the previous one and is found to have lower memory requirements and is suitable for large-scale problems.
INFORMATION PROCESSING LETTERS
(2024)