2005
DOI: 10.1007/11549468_102
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Bufferless Routing on Leveled Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2006
2006
2007
2007

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The bufferless efficiency ρ B (N, G) is the maximum possible value of the Q-bufferless efficiency over all batch problems, ρ B (N, G) = sup Q ρ B (Q; N, G). Our result shows that the bufferless efficiency is poly-logarithmicaly bounded, ρ B (N, G) = O(log 3 (n + N )), where n is the size of G. An interesting problem is to determine tighter asymptotic upper bounds as well as lower bounds for the bufferless efficiency for specific as well as arbitrary networks (for example, it is shown in [21] that the bufferless efficiency for leveled networks is only O(log(n + N ))).…”
Section: Main Resultmentioning
confidence: 95%
See 1 more Smart Citation
“…The bufferless efficiency ρ B (N, G) is the maximum possible value of the Q-bufferless efficiency over all batch problems, ρ B (N, G) = sup Q ρ B (Q; N, G). Our result shows that the bufferless efficiency is poly-logarithmicaly bounded, ρ B (N, G) = O(log 3 (n + N )), where n is the size of G. An interesting problem is to determine tighter asymptotic upper bounds as well as lower bounds for the bufferless efficiency for specific as well as arbitrary networks (for example, it is shown in [21] that the bufferless efficiency for leveled networks is only O(log(n + N ))).…”
Section: Main Resultmentioning
confidence: 95%
“…This enables us to control the positions of the packets and implicitly obtain the aforementioned paths P and a collision-free schedule on them. Hot-potato algorithms have been extensively studied for a variety of architectures such as the mesh and torus [7,9,10,14,16,18,19,20,25,26,29,30,31,39,48], hypercubes [13,15,26,28,42], trees [23,46], vertex-symmetric networks [36], and leveled networks [12,17,21]. Typically, by allowing packets to deviate slightly from their pre-selected paths, one obtains delivery times that are within poly-logarithmic factors of optimal.…”
Section: Batch Problemsmentioning
confidence: 99%