2015
DOI: 10.1016/j.amc.2015.06.081
|View full text |Cite
|
Sign up to set email alerts
|

A Fast Parallel Algorithm for Constructing Independent Spanning Trees on Parity Cubes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…We set the edge (marked with a blue X) from used to unused and use another edge (marked with a blue arrow) to traverse c. Hence, the triangle shape is retained. For example, in Figures 8,9, and 10, the frame nodes of T 5, 3 1 , T 5,3 2 , and T 5,3 3 are indicated by ellipses with blue borders.…”
Section: A Buildframe Functionmentioning
confidence: 99%
See 2 more Smart Citations
“…We set the edge (marked with a blue X) from used to unused and use another edge (marked with a blue arrow) to traverse c. Hence, the triangle shape is retained. For example, in Figures 8,9, and 10, the frame nodes of T 5, 3 1 , T 5,3 2 , and T 5,3 3 are indicated by ellipses with blue borders.…”
Section: A Buildframe Functionmentioning
confidence: 99%
“…For example, S 5,3 has four trees and three germs: 541 in T 5, 3 1 , 542 in T 5,3 2 , and 543 in T This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.…”
Section: Recursive Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…, S k have optimal height. Observe that if equality in (4) or equality in (5) for bipartite graphs holds for all vertices (up to the root vertex) in LDPs, then LDPs have optimal height. See examples on Figure 4(b) and on Figure 3.…”
Section: Level-disjoint Partitions Of Optimal Heightmentioning
confidence: 99%
“…Furthermore, it is useful for security reasons to avoid two messages meeting at a vertex at the same time, if untrustworthy vertex is able to decode secret information from having access to more messages at the same time. Similarly, an algorithm for secure message distribution with even more restricted condition when different messages can arrive in the same vertex only via distinct paths is proposed in [5]. The condition (b) can be useful for example in streaming context when every message needs to be sent immediately without delay.…”
Section: Introductionmentioning
confidence: 99%