- ATALLAH, M. J. 1988. On multidimensional arrays of processors. IEEE Trans. Comput. 37, 10 (Oct.), 1306-1309. Google ScholarDigital Library
- BENEg, V.E. 1965. Mathematical Theory of Connecting Networks and Telephone Traffic. Academic Press, Orlando, Fla.Google Scholar
- BHATT, S. N., CHUNG, F. R. K., HONG, J.-W., LEIGHTON, F. T., AND ROSENBERG, A. L. 1996. Optimal simulations by butterfly-like networks. J. ACM 43, 2 (Mar.), 293-330. Google ScholarDigital Library
- BHATT, S. N., CHUNG, F. R. K., LEIGHTON, F. T., AND ROSENBERG, A. L. 1986. Optimal simulations of tree machines. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (Oct.). IEEE, New York.Google ScholarDigital Library
- BHATT, S. N., AND IPSEN, I. 1988. Embedding trees in the hypercube. Tech. Rep. RR-443. Yale Univ. New Haven, Conn. Google ScholarDigital Library
- COLE, R. J., MAGGS, B. M., AND SITARAMAN, R. K. 1996. On the benefit of supporting virtual channels in wormhole routers. In Proceedings of the 8th Annual ACM Symposium on Parallel Algorithms and Architectures (Padua, Italy, June 24-26). ACM, New York, pp. 131-141. Google ScholarDigital Library
- FELLOWS, M.R. 1985. Encoding graphs in graphs. Ph.D. dissertation, Department of Computer Science. Univ. California, San Diego, San Diego, Calif.Google Scholar
- FISHBURN, J. P., AND FINKEL, R.A. 1982. Quotient networks. IEEE Trans. Comput. C-31, 4 (Apr.). 288 -295.Google ScholarDigital Library
- GREENBERG, D. S., HEATH, L. S., AND ROSENBERG, A.L. 1990. Optimal embeddings of butterflylike graphs in the hypercube. Math. Syst. Theory 23, 61-77.Google ScholarCross Ref
- HOLY, D., AND LEISERSON, C.E. 1980. A layout for the shuffle-exchange network. In Proceedings ~of the 1980 International Conference on Parallel Processing (Aug.). IEEE, New York, pp. 329-336.Google Scholar
- KLEITMAN, D. J., LEIGHTON, F. T., LEPLEY, M., AND MILLER, G. L. 1981. New layouts for the shuffle-exchange graph. In Proceedings of the 13th Annual ACM Symposium on Theory of Computing (Milwaukee, Wisc., May 11-13). ACM, New York, pp. 278-292. Google ScholarDigital Library
- KRUSKAL, C. P., RUDOLPH, L., AND SNIR, M. 1988. A complexity theory of efficient parallel algorithms. In Proceedings of the 15th International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 317. Springer-Verlag, New York, pp. 333-346. Google ScholarDigital Library
- LEIGHTON, F. T., LEPLEY, M., AND MILLER, G.L. 1984. Layouts for the shuffle-exchange graph based on the complex plane diagram. SIAM J. Algebraic Disc. Meth. 5, 2 (June). 202-215. Google ScholarDigital Library
- LEIGHTON, F. T., MAGGS, B. M., RANADE, A. G., AND RAO, S.B. 1994. Randomized routing and sorting on fixed-connection networks. J. Algorithms 17, 1 (July). 157-205. Google ScholarDigital Library
- LEIGHTON, F. T., AND MILLER, G.L. 1981. Optimal layouts for small shuffle-exchange graphs. In VLSI 81-Very Large Scale Integration, J. Gray, ed. Academic Press, New York, NY.Google Scholar
- LEIGHTON, T., MAGGS, B., AND RAO, S. 1988. Universal packet routing algorithms. In Proceedings of the 29th Annual Symposium on Foundations of Computer Science (Oct.). IEEE, New York, pp. 256-271.Google ScholarCross Ref
- MEYER AUF DER HEIDE, F. 1983. Efficiency of universal parallel computers. Acta Inf. 19, 269-296.Google ScholarDigital Library
- MEYER AUF DER HEIDE, F. 1986. Efficient simulations among several models of parallel computers. SIAM J. Comput. 15, 1 (Feb.), 106-119. Google ScholarDigital Library
- MEYER AUF DER HEIDE, F., AND WANKA, R. 1989. Time-optimal simulations of networks by universal parallel computers. In Proceedings of the 6th Symposium on Theoretical Aspects of Computer Science. pp. 120-131. Google ScholarDigital Library
- LEWIS II, P. M., STEARNS, R. E., AND HARTMANIS, J. 1965. Memory bounds for recognition of context-free and context-sensitive languages. In Proceedings of the IEEE Symposium on Circuit Theory and Logical Design. IEEE, New York, pp. 191-202.Google ScholarDigital Library
- PAPADIMITRIOU, C. H., AND YANNAKAKIS, M. 1988. Towards an architecture-independent analysis of parallel algorithms. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing (Chicago, Ill., May 2-4). ACM, New York, pp. 510-513. Google ScholarDigital Library
- PATERSON, M. S., RUZZO, W. L., AND SNYDER, L. 1981. Bound on minimax edge length for complete binary trees. In Proceedings of the 13th Annual ACM Symposium on Theory of Computing (Milwaukee, Wisc., May 11-13). ACM, New York, pp. 293-299. Google ScholarDigital Library
- PIPPENGER, N. 1982. Telephone switching networks. In Proceedings of Symposia in Applied Mathematics, vol. 26. American Mathematical Society, Providence, R.I., pp. 101-133.Google Scholar
- PIPPENGER, N. 1984. Parallel communication with limited buffers. In Proceedings of the 25th ~Annual Symposium on Foundations of Computer Science (Oct.). IEEE, New York, pp. 127-136.Google ScholarDigital Library
- RAGHUNATHAN, A., AND SARAN, n. 1988. Is the shuffle-exchange better than the butterfly? Unpublished manuscript.Google Scholar
- REIF, J. n., AND VALIANT, L.G. 1987. A logarithmic time sort for linear size networks. J. ACM 34, 1 (Jan.). 60-76. Google ScholarDigital Library
- SEKANINA, M. 1960. On an ordering of the set of vertices of a connected graph. Publications of the Faculty of Science, University of Brno 412, 137-142.Google Scholar
- STEINBERG, D., AND RODEH, M. 1981. A layout for the shuffle-exchange network with ~(N2/log3/2 N) area. IEEE Trans. Comput. C-30, 12 (Dec.). 977-982.Google ScholarDigital Library
- WAKSMAN, A. 1968. A permutation network. J. ACM 15, 1 (Jan.). 159-163. Google ScholarDigital Library
- WISE, D.S. 1981. Compact layouts of Banyan/FFT networks. In CMU Conference on VLSI Systems and Computations, H. T. Kung, B. Sproull, and G. Steele, eds. Computer Science Press, Rockville, Md., pp. 186-195.Google ScholarCross Ref
Index Terms
- Work-preserving emulations of fixed-connection networks
Recommendations
Work-preserving emulations of fixed-connection networks
STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computingIn this paper, we study the problem of emulating TG steps of an NG-node guest network on an NH-node host network. We call an emulation work-preserving if the time required by the host, TH, is Ο(TGNG/NH) because then both the guest and host networks ...
Worst-Case Diagnosis Completeness in Regular Graphs under the PMC Model
System-level diagnosis aims at the identification of faulty units in a system by the analysis of the system syndrome, that is, the outcomes of a set of interunit tests. For any given syndrome, it is possible to produce a correct (although possibly ...
Comments