1998
DOI: 10.1017/cbo9780511984068
|View full text |Cite
|
Sign up to set email alerts
|

Bipartite Graphs and their Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
283
0
2

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 339 publications
(296 citation statements)
references
References 0 publications
1
283
0
2
Order By: Relevance
“…Once delay assignment in a time slot is finished, the state vector for the succeeding time slot should reflect the propagation of the packets across the fiber delay lines, and remove the packets that leave the buffering section. The scheduling problem to be solved in one time slot can be expressed as a type matching problem in a bipartite graph [12]. The graph is constructed as follows: nN left side nodes, one for every input port.…”
Section: N Output Contention Vectorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Once delay assignment in a time slot is finished, the state vector for the succeeding time slot should reflect the propagation of the packets across the fiber delay lines, and remove the packets that leave the buffering section. The scheduling problem to be solved in one time slot can be expressed as a type matching problem in a bipartite graph [12]. The graph is constructed as follows: nN left side nodes, one for every input port.…”
Section: N Output Contention Vectorsmentioning
confidence: 99%
“…This algorithm obtains the matching of the maximum size, giving preference to the arcs destined to lower delay nodes, when performing path augmentation [12]. Unfortunately, the complexity of the most efficient algorithm known to date obtaining the optimum MSM solution of an N×N bipartite graph is O(mlog(m)), being m the number of edges [14].…”
Section: Switch Scheduler Designmentioning
confidence: 99%
“…It is well known (see, for example, Asratian et al [4]) that this number is the same as the permanent of the biadjacency matrix of that graph. The permanent of any n × n matrix M = [m ij ] of real numbers is defined as:…”
Section: A Metric For Infeasibility Attacksmentioning
confidence: 96%
“…2(b). Note that in this graph s 1 is connected to only t 1 and t 2 , and not to t 3 or t 4 , since the edges s 1 , t 3 and s 1 , t 4 were determined by the attack to be infeasible. The biadjacency matrix of this graph, a 0-1 matrix with a row for each input message and a column for each output message, is given in Fig.…”
Section: A Metric For Infeasibility Attacksmentioning
confidence: 99%
“…Every full-rank parity-check matrix H of a rate R = k/n LDPC block code can be interpreted as the biadjacency matrix [10] of a bipartite graph, the so-called Tanner graph, having two disjoint subsets V 0 and V 1 containing n and n−k vertices, respectively. The n vertices in V 0 are called symbol nodes, while the n − k vertices in V 1 are called constraint nodes.…”
Section: Graphs and Biadjacency Matricesmentioning
confidence: 99%