Koorde: A simple degree-optimal distributed hash table
MF Kaashoek, DR Karger - Peer-to-Peer Systems II: Second International …, 2003 - Springer
Koorde is a new distributed hash table (DHT) based on Chord 15 and the de Bruijn graphs
2. While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O …
2. While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O …
Methods and problems of communication in usual networks
P Fraigniaud, E Lazard - Discrete Applied Mathematics, 1994 - Elsevier
This paper is a survey of existing methods of communication in usual networks. We
particularly study the complete network, the ring, the torus, the grid, the hypercube, the cube …
particularly study the complete network, the ring, the torus, the grid, the hypercube, the cube …
Spanning trees: A survey
K Ozeki, T Yamashita - Graphs and Combinatorics, 2011 - Springer
In this paper, we give a survey of spanning trees. We mainly deal with spanning trees having
some particular properties concerning a hamiltonian properties, for example, spanning trees …
some particular properties concerning a hamiltonian properties, for example, spanning trees …
D2B: A de Bruijn based content-addressable network
P Fraigniaud, P Gauron - Theoretical Computer Science, 2006 - Elsevier
We show that the de Bruijn graph is appropriate for maintaining dynamic connections, eg,
between the members of a P2P application who join and leave the system at their …
between the members of a P2P application who join and leave the system at their …
The hyper-debruijn networks: Scalable versatile architecture
E Ganesan, DK Pradhan - IEEE Transactions on parallel and …, 1993 - ieeexplore.ieee.org
Both Hypercube and deBruijn networks possess desirable properties. It should be
understood, though, that some of the attractive features of one are not found in the other. The …
understood, though, that some of the attractive features of one are not found in the other. The …
[图书][B] A powerful heuristic for telephone gossiping
R Beier, JF Sibeyn - 2000 - Citeseer
A refined heuristic for computing schedules for gossiping in the telephone model is
presented. The heuristic is fast: for a network with n nodes and m edges, requiring R rounds …
presented. The heuristic is fast: for a network with n nodes and m edges, requiring R rounds …
[HTML][HTML] Independent spanning trees with small depths in iterated line digraphs
T Hasunuma, H Nagamochi - Discrete Applied Mathematics, 2001 - Elsevier
We show that the independent spanning tree conjecture on digraphs is true if we restrict
ourselves to line digraphs. Also, we construct independent spanning trees with small depths …
ourselves to line digraphs. Also, we construct independent spanning trees with small depths …
Choosing a heuristic and root node for edge ordering in BDD-based network reliability analysis
Y Mo, L Xing, F Zhong, Z Pan, Z Chen - Reliability Engineering & System …, 2014 - Elsevier
Abstract In the Binary Decision Diagram (BDD)-based network reliability analysis, heuristics
have been widely used to obtain a reasonably good ordering of edge variables. Orderings …
have been widely used to obtain a reasonably good ordering of edge variables. Orderings …
Disjoint rooted spanning trees with small depths in deBruijn and Kautz graphs
Z Ge, SL Hakimi - SIAM Journal on Computing, 1997 - SIAM
The problem of broadcasting long messages on store-and-forward communication networks,
where a processor (node) can send and receive messages simultaneously to and from all its …
where a processor (node) can send and receive messages simultaneously to and from all its …
Bandwidth Optimal Pipeline Schedule for Collective Communication
L Zhao, A Krishnamurthy - arXiv preprint arXiv:2305.18461, 2023 - arxiv.org
We present a strongly polynomial-time algorithm to generate bandwidth optimal
allgather/reduce-scatter on any network topology, with or without switches. Our algorithm …
allgather/reduce-scatter on any network topology, with or without switches. Our algorithm …