2022
DOI: 10.1016/j.tcs.2021.12.016
|View full text |Cite
|
Sign up to set email alerts
|

Embedding algorithm of spined cube into grid structure and its wirelength computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…With the advancement of modern science and technology, the development of industry and the needs of future human development, modern civil engineering structures are developing in the direction of large-scale, spatial, and complex. These large complex structures, such as bridges, dams, high-rise buildings, offshore structures, and large-span space grid structures, etc., after being put into use in a complex service environment, it is faced with the problem of structural damage accumulation under the influence of design load changes and various sudden external factors [ 1 ]. Therefore, if the damage to the structure cannot be found in time and effective measures are taken to deal with it, it will lead to structural damage; it can even lead to catastrophic consequences, causing threats or even losses to the life and property of the country and the people.…”
Section: Introductionmentioning
confidence: 99%
“…With the advancement of modern science and technology, the development of industry and the needs of future human development, modern civil engineering structures are developing in the direction of large-scale, spatial, and complex. These large complex structures, such as bridges, dams, high-rise buildings, offshore structures, and large-span space grid structures, etc., after being put into use in a complex service environment, it is faced with the problem of structural damage accumulation under the influence of design load changes and various sudden external factors [ 1 ]. Therefore, if the damage to the structure cannot be found in time and effective measures are taken to deal with it, it will lead to structural damage; it can even lead to catastrophic consequences, causing threats or even losses to the life and property of the country and the people.…”
Section: Introductionmentioning
confidence: 99%
“…The second embedding scheme is the lex embedding widely used in many works. 13,20,39 By lex embedding what we mean is that, the guest graph attains maximum subgraph when the vertices are ordered lexicographically. The last embedding scheme is the random embedding 33 denoted by rand, where the random bijection rand ∶ V(G) → V(H), with the condition that rand ≠ 𝜙 or lex.…”
Section: Simulation Experimentsmentioning
confidence: 99%
“…Until then only approximations were given in the form of bounds 10,15,17 . Here are few works which are concerned about optimizing the layout for the considered embedding: complete Josephus cube into tree related architectures, 8 balanced complete multipartite graphs onto cartesian product between {Path, Cycle} and trees, 18 balanced complete multipartite graphs onto grids and tree related structures, 19 spined cube into grid, 20 complete bipartite graph into sibling tree, 21 augmented cube into tree related and windmill structures, 9 fault tolerance mapping of ternary N$$ N $$‐cube onto chips, 4 hierarchical cube into linear array and k$$ k $$‐rooted complete binary trees, 5 hierarchical folded cubes into linear arrays and complete binary trees, 1 circular layout of hypercube, 12 hypercube into certain trees, 6 locally twisted cube into grid, 13 familiar graphs onto hypercube, 7 hypercube into cylinder, 14 and 3‐Ary n$$ n $$‐cube into grid 22 …”
Section: Introductionmentioning
confidence: 99%
“…The computational cost of a parallel computing system is heavily dominated by the communication cost of the underlying network, which decides the overall performance of the system. This fact clearly emphasizes the significance of network topology and its efficient structural designs [6,30]. The topological structure of the underlying network can be modeled as a graph where vertices correspond to processors, memory modules or switches, and edges correspond to communication links.…”
Section: Introductionmentioning
confidence: 99%
“…The diameter of SQ n is only ⌈ n 3 ⌉ + 3, which is less than many known variants such as crossed cubes, twisted cubes, Möbius cubes, etc. The spined cube has attracted the attention of many researchers, and its various properties such as embedability [6], reliability [11], the shortest-path routing [28] have been investigated.…”
Section: Introductionmentioning
confidence: 99%