Optimal Path Embedding in Crossed Cubes

advertisement
1190
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 16, NO. 12,
DECEMBER 2005
Optimal Path Embedding in Crossed Cubes
Jianxi Fan, Xiaola Lin, and Xiaohua Jia, Senior Member, IEEE
Abstract—The crossed cube is an important variant of the hypercube. The n-dimensional crossed cube has only about half diameter,
wide diameter, and fault diameter of those of the n-dimensional hypercube. Embeddings of trees, cycles, shortest paths, and
Hamiltonian paths in crossed cubes have been studied in literature. Little work has been done on the embedding of paths except
shortest paths, and Hamiltonian paths in crossed cubes. In this paper, we study optimal embedding of paths of different lengths
n
between any two nodes in crossed cubes. We prove that paths of all lengths between dnþ1
2 e þ 1 and 2 1 can be embedded between
any two distinct nodes with a dilation of 1 in the n-dimensional crossed cube. The embedding of paths is optimal in the sense that the
dilation of the embedding is 1. We also prove that dnþ1
2 e þ 1 is the shortest possible length that can be embedded between arbitrary two
distinct nodes with dilation 1 in the n-dimensional crossed cube.
Index Terms—Crossed cube, graph embedding, optimal embedding, interconnection network, parallel computing system.
æ
1
I
INTRODUCTION
networks play an important role in
parallel computing systems. An interconnection network
can be represented by a graph G ¼ ðV ; EÞ, where V
represents the node set and E represents the edge set. In
this paper, we use graphs and interconnection networks
(networks for short) interchangeably.
Graph embedding is a technique in parallel computing
that maps a guest graph into a host graph (usually an
interconnection network). There are many applications of
graph embedding, such as architecture simulation, processor
allocation, VLSI chip design, etc. Architecture simulation is
the simulation of one architecture by another. This can be
modeled as a graph embedding, which embeds the guest
architecture (represented as a graph) into the host architecture, where the nodes of the graph represent the processors
and the edges of the graph represent the communication links
between the processors [22], [25], [33], [34]. In parallel
computing, a large process is often decomposed into a set of
small subprocesses that can execute in parallel with communications among these subprocesses. According to these
communication relations among these subprocesses, a graph
can be obtained, in which the nodes in the graph represent the
subprocesses and the edges of the graph represent the
communication links between these subprocesses [8]. Thus,
the problem of allocating these subprocesses into a parallel
computing systems can be again modeled as a graph
embedding problem. The problem of laying out circuits on
VLSI chips can also be reduced to graph embedding problems
[3], [30], [31].
Graph embedding can be formally defined as: Given two
graphs G1 ¼ ðV1 ; E1 Þ and G2 ¼ ðV2 ; E2 Þ, an embedding from
NTERCONNECTION
. J. Fan and X. Jia are with the Department of Computer Science, City
University of Hong Kong, 83 Tat Chee Avenue, Kowloon, Hong Kong.
E-mail: {Fanort, csjia}@cityu.edu.hk.
. X. Lin is with the College of Information Science and Technology, Sun Yatsen University, Guangzhou, China. E-mail: issxlin@zsu.edu.cn.
Manuscript received 26 Aug. 2004; revised 17 Dec. 2004; accepted 20 Mar.
2005; published online 20 Oct. 2005.
For information on obtaining reprints of this article, please send e-mail to:
tpds@computer.org, and reference IEEECS Log Number TPDS-0213-0804.
1045-9219/05/$20.00 ß 2005 IEEE
G1 to G2 is an injective mapping : V1 ! V2 . We call G1 the
guest graph and G2 the host graph. An important performance metric of embedding is dilation. The dilation of
embedding is defined as
dilðG1 ; G2 ; Þ ¼ maxfdistðG2 ; ðuÞ; ðvÞÞjðu; vÞ 2 E1 g;
where distðG2 ; ðuÞ; ðvÞÞ denotes the distance between the
two nodes ðuÞ and ðvÞ in G2 . The smaller the dilation of
an embedding is, the shorter the communication delay that
the graph G2 simulates the graph G1 .
has the
Embedding
from G1 to G2 is optimal if
smallest dilation among all the embeddings from G1 to G2 .
Clearly, dilðG1 ; G2 ; Þ 1. When dilðG1 ; G2 ; Þ ¼ 1,
is
surely optimal and G1 is a subgraph of G2 in this case.
Finding the optimal embedding of graphs is NP-hard.
Most of the works on graph embedding consider paths,
trees, meshes, and cycles as guest graphs because they are
the architectures widely used in parallel computing systems
[1], [2], [6], [16], [19], [20], [21], [22], [23], [25], [32], [33], [34].
In this paper, we will study the path embedding problem.
Some special paths take important roles in parallel computing. A shortest path (routing) between two nodes in an
interconnection network is an optimal communication path
in terms of delay. Edge-disjoint paths between two nodes
are fundamental of routing in high-speed networks [5], [26],
while node-disjoint paths are significant for fault-tolerant
routing [17], [18]. A longest path—Hamiltonian path can be
used in dual-path and multipath multicast routing algorithms to alleviate congestion or avoid deadlock incurred by
traditionally tree-based multicast algorithms in parallel
computing systems [4], [27], [28]. This paper addresses the
issue of path embedding in crossed cubes, which takes
paths as guest graphs and crossed cubes as host graphs.
The crossed cube is an important variant of the
hypercube [9]. It has drawn a great deal of attention [7],
[9], [10], [11], [12], [14], [15], [23], [24], [25], [33]. It has the
same node number and edge number as the hypercube with
the same dimension, but has only about half the diameter
[7], [9], wide diameter [7], and fault diameter [7] of those of
the hypercube. Embedding of shortest paths, Hamiltonian
paths, cycles, and trees as guest graphs into crossed cubes
Published by the IEEE Computer Society
FAN ET AL.: OPTIMAL PATH EMBEDDING IN CROSSED CUBES
were studied in literature [7], [9], [23], [25], [33]. In [7], [9],
Efe and Chang et al., respectively, provided an embedding
of shortest paths (i.e., shortest routing algorithms) between
any two nodes in the n-dimensional crossed cube. They also
showed that cycles of all lengths from 4 to 2n can be
embedded into the n-dimensional crossed cube. Huang et al.
gave fault-tolerant Hamiltonian path embedding in [23].
Yang et al. further provided fault-tolerant cycle embedding
in the n-dimensional crossed cube [33]. In the case of tree
embedding, Kulasinghe and Bettayeb gave a perfect result.
They proved that a complete binary tree of 2n 1 nodes can
be embedded into the n-dimensional crossed cube [25]. All
these embeddings in crossed cubes have dilations 1 and,
thus, they are all optimal.
There is little work reported on path embedding in
crossed cubes in literature. The most notable work on path
embedding in crossed cubes is the shortest path embedding
(shortest routing) [7], [9] and the Hamiltonian path
embedding [23]. In this paper, we will discuss the optimal
embedding of paths of different lengths between any two
nodes in crossed cubes. The original contributions of this
paper are as follows:
For any two distinct nodes x and y in the n-dimensional
crossed cube, and any integer l with dnþ1
2 eþ1l
2n 1, a path of length l can be embedded between x and y
with a dilation of 1 in the n-dimensional crossed cube. The
embedding is optimal in the sense that its dilation is 1.
2. There exist two distinct nodes x and y in the
n-dimensional crossed cube such that no path of length
dnþ1
2 e can be embedded between x and y with a dilation of
1 in the n-dimensional crossed cube. This conclusion
demonstrates that dnþ1
2 e þ 1 is the shortest possible length
that can be embedded between arbitrary two distinct nodes
with a dilation of 1 in the n-dimensional crossed cube.
In interconnection networks, the Hamilton-connectivity
(i.e., any two distinct nodes are connected by a Hamiltonian
path) is an important property. The results obtained in this
paper show a stronger connectivity for crossed cubes. We
prove that, in the n-dimensional crossed cube, any two
distinct nodes are connected not only by a Hamiltonian
path, but also by many other paths of consecutive lengths.
This property is not well-known in the existing interconnection networks.
The rest of this paper is organized as follows: Section 2
provides the preliminaries. Section 3 discusses embedding
n
paths of lengths from dnþ1
2 e þ 1 through 2 1 in the
n-dimensional crossed cube. Section 4 proves that the
existence of two nodes that no path of length dnþ1
2 e can be
embedded between these two nodes with a dilation of 1 in the
n-dimensional crossed cube. In Section 5, we give conclusions.
1.
2
PRELIMINARIES
Let V ðGÞ and EðGÞ denote the node set and the edge set of a
graph G, respectively. Given V 0 V ðGÞ, the subgraph
induced by V 0 in G is denoted by G½V 0 . A path P between
node u and node v in G is denoted by P : u ¼ uð0Þ ;
uð1Þ ; . . . ; uðkÞ ¼ v. Nodes u and v are the two end nodes of
path P . The length of path P is denoted by lenðP Þ. Path P can
also be denoted by: u ¼ uð0Þ ; uð1Þ ; . . . ; uði1Þ ; P1 ; uðjþ1Þ ; uðjþ2Þ ;
. . . ; uðkÞ ¼ v, where the path P1 is called a subpath of P between
1191
uðiÞ and uðjÞ , i.e., uðiÞ ; uðiþ1Þ ; . . . ; uðjÞ (i j). The path P1 ,
starting from uðiÞ and ending with uðjÞ , can be denoted by
pathðP ; uðiÞ ; uðjÞ Þ. For the path P , if u ¼ v (k 3), then P is a
cycle. If ðx; yÞ is an edge in a cycle C, we use C ðx; yÞ to
denote the path after deleting the edge ðu; vÞ in C.
Let distðG; x; yÞ denote the distance between two nodes x
and y of G. The diameter of G is defined as diamðGÞ ¼
maxfdistðG; x; yÞjx; y 2 V ðGÞ; x 6¼ yg.
If x is a node in the path P , then we denote it as x 2 P .
Otherwise, it is denoted as x 2
= P . Similarly, if ðx; yÞ is an
edge in the path P , then we denote it as ðx; yÞ 2 P .
Otherwise, it is denoted as ðx; yÞ 2
= P . IfTV 0 V ðGÞ and no
0
node in V is in P , then we write as V 0 P ¼ ;.
A binary string x of length n is denoted by xn1 xn2
. . . x1 x0 , where xn1 is the most significant bit and x0 is the
least significant bit. The ith bit xi of x can also be written as
bitðx; iÞ. The complement of xi is denoted by xi . Letting z be
a binary string of length k, the binary string of length ik
obtained by concatenating one by one i strings z is denoted
by zi .
The n-dimensional crossed cube (denoted by CQn ) is an
n-regular graph that contains 2n nodes and n2n1 edges.
Every node of CQn is identified by a unique binary string,
which is also called address, of length n. In this paper, we
would not distinguish between nodes and their binary
addresses. The n-dimensional crossed cube can be recursively defined as follows [9], [25].
Definition 1. Two binary strings, x ¼ x1 x0 and y ¼ y1 y0 , of
length two are said to be pair related (denoted by x y) if and
only if ðx; yÞ 2 fð00; 00Þ; ð10; 10Þ; ð01; 11Þ; ð11; 01Þg.
Definition 2. CQ1 is the complete graph on two nodes whose
addresses are 0 and 1. CQn consists of two subcubes CQ0n1
and CQ1n1 . The most significant bit of the addresses of the
nodes of CQ0n1 and CQ1n1 are 0 and 1, respectively. The
nodes u ¼ un1 un2 . . . u1 u0 and v ¼ vn1 vn2 . . . v1 v0 , where
un1 ¼ 0 and vn1 ¼ 1, are joined by an edge in CQn if and
only if
1.
2.
un2 ¼ vn2 if n is even, and
u2iþ1 u2i v2iþ1 v2i , for 0 i < bn1
2 c.
Given x; y 2 V ðCQn Þ, 0 i n 1 and n 1, if xj ¼ yj
for all j 2 fi þ 1; i þ 2; . . . ; n 1g, bitðx; iÞ ¼ bitðy; iÞ and
ðx; yÞ 2 EðCQn Þ, then we write as x i y. By Definition 2, if
ðx; yÞ 2 EðCQn Þ, then there exists an i such that 0 i n 1
and x i y, and for any j with 0 j n 1, there exists w 2
V ðCQn Þ such that x j w. If k 1, n 2, and y is a binary string
of length k, let V 0 ¼ fyxjx is a binary string of length n kg.
The subgraph induced by V 0 in CQn , i.e., CQn ½V 0 , is written as
CQynk . Obviously, by Definition 2, CQynk is isomorphic to
CQnk .
In Fig. 1, Fig. 1a, and Fig. 1b are two different drawings
of CQ3 ; Fig. 1c is CQ4 . We can easily find the symmetric
property of CQ3 .
In [9], Efe gave an Oðn2 Þ algorithm to find a shortest path
between any two distinct nodes in CQn . In [7], Chang et al.
improved this algorithm. They gave an OðnÞ algorithm,
which we call CSH algorithm, to get more shortest paths
between any two distinct nodes in CQn . CSH algorithm
introduces definitions of distance-preserving pair related and
1192
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 16, NO. 12,
DECEMBER 2005
Furthermore, Chang et al. proved an important result as
follows:
distðCQn ; u; vÞ ¼ ðu; vÞ:
This result will be used in the proofs of this paper.
For details on the CSH algorithm, see [7].
3
EMBEDDING PATHS OF LENGTHS FROM dnþ1
2 eþ1
n
TO 2 1
In this section, we will prove that paths of lengths from
n
dnþ1
2 e þ 1 through 2 1 can be embedded between any two
distinct nodes with a dilation of 1 in CQn for n 3. In other
words, there exists paths of all lengths from dnþ1
2 e þ 1 through
2n 1 between any two distinct nodes in CQn for n 3. The
following lemma shows the diameter of CQn .
Lemma 1 [7], [9]. If n 1, then diamðCQn Þ ¼ dnþ1
2 e.
Fig. 1. (a) and (b) Two different drawings of CQ3 . (c) CQ4 .
pair related distance. These two definitions are iterated as
follows [7]:
Let u and v be two distinct nodes in CQn . The ith double
bit of nodes u is defined as a 2-bit string u2iþ1 u2i for
0 i bn2 c 1, and as simply a single bit u2i for i ¼ bn2 c and
n odd. Bit l is called the most significant differing bit between
u and v if us ¼ vs for all s with l þ 1 s n 1 and ul 6¼ vl .
Let i ¼ b2l c be called the most significant differing double bit. A
function on u; v is defined as follows:
j ðu; vÞ ¼ 0 for all j i þ 1;
2 if u2i þ1 u2i ¼ v2i þ1 v2i ;
i ðu; vÞ ¼
1 otherwise:
Further, for j i 1, j ðu; vÞ can be defined using the
notion of distance-preserving pair related (abbreviated as d.p.
pair related) as follows:
In fact, arbitrarily selecting two distinct nodes in CQn , we
n
. Thus, in this problem, we have to
have jV ðCQ
2n n Þjn ¼ 2nþ1
consider 2 ð2 d 2 e 1Þ paths of all lengths from dnþ1
2 eþ
1 through 2n 1 between x and y in CQn . Even given a little
integer n ¼ 10, one has to consider more than 108 paths
between x and y. This is not realistic. In order to simplify the
proof, we adopt the induction on the dimension n of the
crossed cube to prove this result in Theorem 1. Before
beginning this proof, we need to give some preliminary
lemmas. The following lemma is on the existence of a special
cycle of length 4.
Lemma 2. If n 3 and x n1 y for x; y 2 V ðCQn Þ, letting x 1 u
and y 1 v, then ðu; vÞ 2 EðCQn Þ and, thus, C : x; u; v; y; x is a
cycle of length 4 that contains the edge ðx; yÞ in CQn .
Proof. Let x ¼ 0xn2 . . . x1 x0 , y ¼ 1yn2 . . . y1 y0 . Then, by the
definition of the crossed cube, we have ðx1 x0 ; y1 y0 Þ 2
fð00; 00Þ; ð10; 10Þ; ð01; 11Þ; ð11; 01Þg. In fact, we need only
verify the truth of the lemma for ðx1 x0 ; y1 y0 Þ 2 fð00;
00Þ; ð01; 11Þg. That is easy and, therefore, omitted.
u
t
Definition 3. u2jþ1 u2j and v2jþ1 v2j , for j i 1, are distancepreserving pair related if one of the following conditions holds:
Pbn1
2 c
1. ðu2jþ1 u2j ; v2jþ1 v2j Þ 2 fð01; 01Þ; ð11; 11Þg and k¼jþ1
k ðu; vÞ is even,
Pbn1
2 c
2. ðu2jþ1 u2j ; v2jþ1 v2j Þ 2 fð01; 11Þ; ð11; 01Þg and k¼jþ1
k ðu; vÞ is odd, and
3. ðu2jþ1 u2j ; v2jþ1 v2j Þ 2 fð00; 00Þ; ð10; 10Þg.
To find the embedding of paths of lengths from dnþ1
2 eþ1
to 2n 1, three special cases need to be dealt with
separately. The three special cases are when n is odd and:
1) distðCQn ; x; yÞ ¼ dnþ1
2 e and n 5; 2) distðCQn ; x; yÞ ¼
e
1
and
n
5;
3) distðCQn ; x; yÞ ¼ dnþ1
dnþ1
2
2 e 2 and
n 7. The results for the three cases are given, respectively,
in Lemmas 3, 4, and 7. They will be used in the proof of
Theorem 1.
We write u2jþ1 u2j d:p:
v2jþ1 v2j if u2jþ1 u2j and v2jþ1 v2j are
d.p. pair related, and u2jþ1 u2j d:p:
6 v2jþ1 v2j otherwise.
Then, j ðu; vÞ for j i 1 is recursively defined as
follows:
0 if u2jþ1 u2j d:p:
v2jþ1 v2j ;
j ðu; vÞ ¼
1 otherwise:
Lemma 3. If n 5 and n is odd, x ¼ 0xn2 . . . x1 x0 2 V ðCQ0n1 Þ
and y ¼ 1yn2 . . . y1 y0 2 V ðCQ1n1 Þ with xn2 xn3 d:p:
yn2
yn3 and xn2 xn3 d:p:
y
y
,
and
distðCQ
;
x;
yÞ
¼
dnþ1
n2
n3
n
2 e,
nþ1
then there exists a path of length d 2 e þ 1 between x and y in
CQn .
The pair related distance between u and v is defined,
denoted by ðu; vÞ, as
bn1
2 c
ðu; vÞ ¼
X
j¼0
j ðu; vÞ:
n1
n
Proof. Notice that dnþ1
2 e 1 ¼ b 2 c ¼ b 2 c. By the definition of
function i ðu; vÞ, we have i ðx; yÞ ¼ 1, i ¼ 0; 1; . . . ; dnþ1
2 e
1. For x1 x0 and y1 y0 , we need only deal with the cases that
x1 x0 ¼ y1 y0 , x1 x0 ¼ y1 y0 , x1 x0 ¼ y1 y0 , and x1 x0 ¼ y1 y0 .
Case 1. x1 x0 ¼ y1 y0 . We have the cases as below.
Case 1.1. x1 x0 2 f01; 11g. Then, y1 y0 2 f10; 00g. Let
x 0 u 1 v. Then, bitðv; 1Þbitðv; 0Þ ¼ y1 y0 2 f10; 00g. Therefore, 0 ðv; yÞ ¼ 0. Obviously, i ðv; yÞ ¼ i ðx; yÞ ¼ 1 for
FAN ET AL.: OPTIMAL PATH EMBEDDING IN CROSSED CUBES
nþ1
i 2 f1; 2; . . . ; dnþ1
2 e 1g and, thus, distðCQn ; v; yÞ ¼ d 2 e
1. By using the CSH algorithm, we can get a shortest
path P between v and y in CQn and distðCQn ; x; yÞ ¼
dist ðCQn ; u; yÞ 6¼ distðCQn ; z; yÞ for every node z in P .
T
So, fx; ug P ¼ ;. Then,
x; u; P
is a path of length dnþ1
2 e þ 1 between x and y in CQn .
Case 1.2. x1 x0 2 f10; 00g. Then, y1 y0 2 f01; 11g. Exchanging the position of x and y, this case is actually
reduced to Case 1.1.
Case 2. x1 x0 ¼ y1 y0 . We have the following cases.
Case 2.1. x1 x0 2 f00; 10g. Then, y1 y0 2 f10; 00g. Let x 0 u
n2 0
v w. Then, bitðw; 1Þbitðw; 0Þ ¼ y1 y0 2 f00; 10g and 0
ðw; yÞ ¼ dnþ1
ðw; yÞ ¼ 0. Clearly, i ðw; yÞ ¼ i ðx; yÞ ¼ 1
2 e2
nþ1
for i 2 f0; 1; . . . ; dnþ1
2 e 1g f0; d 2 e 2g. As a result,
distðCQn ; w; yÞ ¼ dnþ1
2 e 2. By using CSH algorithm, we
can get a shortest path P , whose length is dnþ1
2 e 2,
between w and y in CQn . We can easily verify that for any
z 2 P and z0 2 fx; u; vg, distðCQn ; z; yÞ 6¼ distðCQn ; z0 ; yÞ.
T
Therefore, fx; u; vg P ¼ ;. Then,
x; u; v; P
is a path of length dnþ1
2 e þ 1 between x and y in CQn .
Case 2.2. x1 x0 2 f01; 11g. Then, y1 y0 2 f11; 01g. Let
x n2 u 0 v and w 0 y. Then,
bitðv; 1Þbitðv; 0Þ ¼ bitðw; 1Þbitðw; 0Þ
¼ x1 x0 ¼ y1 y0 2 f10; 00g:
ðv; wÞ ¼ 0 and
It can be easily verify that 0 ðv; wÞ ¼ dnþ1
2 e2
nþ1
i ðv; wÞ ¼ i ðx; yÞ ¼ 1 f o r i 2 f0; 1; . . . ; d 2 e 1g f0;
dnþ1
2 e 2g. By using the CSH algorithm, we can construct
a shortest path P 0 , whose length is dnþ1
2 e 2, between v
and w in CQn . By the CSH algorithm, for any z 2 P 0 , we
have
bitðz; 1Þbitðz; 0Þ ¼ bitðu; 1Þbitðu; 0Þ ¼ bitðv; 1Þbitðv; 0Þ
¼ bitðw; 1Þbitðw; 0Þ ¼ x1 x0 ¼ y1 y0 2 f10; 00g:
T
Therefore, z 2
= fx; y; ug. That is, fx; y; ug P 0 ¼ ;. Then,
x; u; P 0 ; y
is a path of length dnþ1
2 e þ 1 between x and y in CQn .
Case 3. x1 x0 ¼ y1 y0 . If x1 x0 2 f00; 10g, then let
y 1 u n2 v 0 w. Otherwise, x1 x0 2 f01; 11g, let x 1 u0 n2
v0 0 w0 . Similar to Case 2.1, we can construct a path of
length dnþ1
2 e þ 1 between x and y in CQn .
Case 4. x1 x0 ¼ y1 y0 . Then, x1 x0 2 f01; 11g; ðx1 x0 ; y1 y0 Þ
Pdnþ1
2 e1
2 fð01; 01Þ; ð11; 11Þg, and k¼1
k ðx; yÞ is odd. Let x 0 u,
0
y v. Then, bitðu; 1Þbitðu; 0Þ ¼ bitðv; 1Þ bitðv; 0Þ 2 f00; 10g,
0 ðu; vÞ ¼ 0, and distðCQn ; u; vÞ ¼ dnþ1
2 e 1. By using the
CSH algorithm, we can get a shortest path P , whose length
is dnþ1
2 e 1, between u and v in CQn . By the CSH algorithm,
for any z 2 P , we have bitðz; 1Þbitðz; 0Þ ¼ bitðu; 1Þbitðu; 0Þ
2 f00; 10g and, thus, x1 x0 ¼ y1 y0 6¼ bitðz; 1Þbitðz; 0Þ. As a
T
sequence, fx; yg P ¼ ;. Then,
1193
x; P ; y
is a path of length dnþ1
u
2 e þ 1 between x and y in CQn . t
Lemma 4. If n 5 and n is odd, x ¼ 0xn2 . . . x1 x0 2 V ðCQ0n1 Þ
and y ¼ 1yn2 . . .y1 y0 2 V ðCQ1n1 Þ with xn2 xn3 d:p:
yn2 yn3
nþ1
and xn2 xn3 d:p:
yn2 yn3 , and distðCQn ; x; yÞ ¼ d 2 e 1,
nþ1
then there is a path of length d 2 e þ 1 between x and y in CQn .
Proof. We separately consider the two cases that 0 ðx; yÞ ¼ 1
and 0 ðx; yÞ ¼ 0.
Case 1. 0 ðx; yÞ ¼ 1. Since i ðx; yÞ ¼ 1 for i 2 fdnþ1
e1;
2P
bn1
nþ1
2 c
d 2 e 2g, dnþ1
e
¼
diamðCQ
Þ
>
distðCQ
;
x;
yÞ
¼
n
n
k¼0
2
k ðx; yÞ 3. Considering that n is odd, n 7. We consider
the cases as below.
Case 1.1. x1 x0 2 f00; 10g. Then, y1 y0 2 fx1 0; x1 1; x1 1g.
Case 1.1.1. y1 y0 ¼ x1 0. Let y 0 u 1 v 0 w. Then, 0 ðx; wÞ ¼
0 and i ðx; wÞ ¼ i ðx; yÞ for i 2 f1; 2; . . . ; dnþ1
2 e 1g. Thus,
e
2.
By
using
the
CSH
algorithm,
distðCQn ; x; wÞ ¼ dnþ1
2
we can get a shortest path P between x and w in CQn .
Similar T
to the proof in Lemma 3, we can deduce that
fy; u; vg P ¼ ;. Then,
P ; v; u; y
is a path of length dnþ1
2 e þ 1 between x and y in CQn .
Case 1.1.2. y1 y0 ¼ x1 1. Let y 1 u 0 v 1 w. Then, similar to
Case 1.1.1, we can construct a shortest path P 0 between x
and w in CQn and by using the path P 0 we can get a path
of length dnþ1
2 e þ 1 between x and y in CQn .
Case 1.1.3. y1 y0 ¼ x1 1. Let y 1 u n2 v 0 z 1 w. Then,
0 ðx; wÞ ¼ dnþ1
ðx; wÞ ¼ 0 and i ðx; wÞ ¼ i ðx; yÞ for i 2
2 e2
f0; 1; . . . ; dnþ1
e1gf0;
dnþ1
2
2 e2g. Thus, distðCQn ; x; wÞ
nþ1
¼ d 2 e 3. By using CSH algorithm, we can get a
shortest path P 00 between x and w in CQn and we can
T
deduce that fy; u; v; zg P 00 ¼ ;. Then,
P ; z; v; u; y
dnþ1
2 e
þ 1 between x and y in CQn .
is a path of length
Case 1.2. x1 x0 2 f01; 11g. Then, y1 y0 2 f00; 10; 01; 11g.
In fact, exchanging the position of x and y, the case for
y1 y0 2 f00; 10g can be reduced to Case 1.1. So, we only
consider the cases for y1 y0 2 f01; 11g. For y1 y0 2 f01; 11g,
let y 0 u 1 v 0 w. Similar to the proof in Lemma 3, we can
construct a path of length dnþ1
2 e þ 1 between x and y in CQn .
C as e 2 . 0 ðx; yÞ ¼ 0. T h e n, i ðx; yÞ ¼ 1 f o r i 2
f1; 2; . . . ; dnþ1
2 e 1g. We deal with the following cases.
Case 2.1. x1 x0 2 f00; 10g. Let y 1 u n2 v 1 w. Then,
0 ðx; wÞ ¼ dnþ1
ðx; wÞ ¼ 0 and i ðx; wÞ ¼ 1 for i 2 f0; 1;
2 e2
nþ1
. . . ; d 2 e 1g f0; dnþ1
2 e 2g. Thus, distðCQn ; x; wÞ ¼
dnþ1
e
2.
By
using
the
CSH algorithm, we can get a
2
shortest path P between x and w in CQn and we can
T
deduce that fy; u; vg P ¼ ;. Then,
P ; v; u; y
is a path of length dnþ1
2 e þ 1 between x and y in CQn .
Case 2.2. x1 x0 2 f01; 11g. Let x 1 u, y 1 v. Then,
0 ðu; vÞ ¼ 0 ðx; yÞ ¼ 0. Let P 0 : u ¼ z0 ; z1 ; . . . ; zk ¼ v be a
shortest path got by using CSH algorithm between u and v
in CQn . Supposing that zi1 ji zi for i 2 f1; 2; . . . ; kg, we will
1194
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 16, NO. 12,
DECEMBER 2005
Fig. 2. A path of length dnþ1
2 e þ 1 between x and y in CQ , where a straight line represents an edge and a curve line represents a path between two
nodes.
prove x 2
= P 0 . Since 0 ðu; vÞ ¼ 0, by the CSH algorithm, j16¼
1 and, thus, x 6¼ z1 . Further, for 2 i k, by the CSH
algorithm, distðCQn ; u; zi Þ ¼ distðCQn ; z0 ; zi Þ ¼ i 2 >
1 ¼ distðCQn ; z0 ; xÞ. Therefore, x 6¼ zi for i 2 f2; 3; . . . ; kg.
= fz0 ; z1 ;
And, it is clear that x 6¼ z0 ¼ u. To sum up, x 2
= P 0 . Similarly, we can prove y 2
= P 0.
. . . ; zk g. That is, x 2
Thus,
x; P 0 ; y
u
is a path of length dnþ1
2 e þ 1 between x and y in CQn . t
The proof of Lemma 7 need to use the following lemma:
Lemma 5. If n 3, x n1 y for x; y 2 V ðCQn Þ, letting
x 0 u n1 v 0 w 1 z and y 0 u0 n1 v0 0 w0 1 z0 , then z ¼ y, z0 ¼ x,
and C : x; u; v; w; y; x and C 0 : y; u0 ; v0 ; w0 ; x; y are the two
cycles of length 5 that contain the edge ðx; yÞ in CQn .
= fv; wg.
Furthermore, u 2
= fv0 ; w0 g and u0 2
Proof. Le t x ¼ 0xn2 . . . x1 x0 , y ¼ 1yn2 . . . y1 y0 . Then,
ðx1 x0 ; y1 y0 Þ 2 fðx1 0; x1 0Þ; ðx1 1; x1 1Þg. By Definition 2, we
can verify that z ¼ y, z0 ¼ x, and C : x; u; v; w; y; x and C 0 :
y; u0 ; v0 ; w0 ; x; y are the two cycles of length 5 that contain
the edge ðx; yÞ in CQn . Further, if ðx1 x0 ; y1 y0 Þ ¼ ðx1 0; x1 0Þ,
then bitðu; 1Þbitðu; 0Þ ¼ x1 1, bitðv0 ; 1Þbitðv0 ; 0Þ ¼ x1 1, and
bitðw0 ; 1Þbitðw0 ; 0Þ ¼ x1 0, while if ðx1 x0 ; y1 y0 Þ ¼ ðx1 1; x1 1Þ,
then bitðu; 1Þbitðu; 0Þ ¼ x1 0, bitðv0 ; 1Þbitðv0 ; 0Þ ¼ x1 0, and
bitðw0 ; 1Þbitðw0 ; 0Þ ¼ x1 1. Thus, u 2
= fv0 ; w0 g. Similarly, we
= fv; wg.
u
t
can also verify that u0 2
The following lemma will also be used in the proof of
Lemma 7 and Theorem 1.
Lemma 6 [15]. If n 2, for any ðx; yÞ 2 EðCQn Þ and any
integer l with 4 l 2n , there exists a cycle C of length l in
CQn such that ðx; yÞ is in C.
Lemma 7. If n 7 and n is odd, x ¼ 0xn2 . . . x1 x0 2
V ðCQ0n1 Þ and y ¼ 1yn2 . . .y1 y0 2 V ðCQ1n1 Þ with xn2 xn3
d:p:
d:p:
yn2 yn3 and xn2 xn3 yn2 yn3 , and distðCQn ; x; yÞ
nþ1
¼ d 2 e 2, then there is a path of length dnþ1
2 e þ 1 between x
and y in CQn .
Proof. Let x n1 z. Then, z 2 V ðCQ1n1 Þ, dnþ1e1 ðz; yÞ ¼ 0, and
2
1
i ðz; yÞ ¼ i ðx; yÞ, i ¼ 0; 1; . . . ; dnþ1
2 e 2. Hence, distðCQn1 ;
nþ1
z; yÞ ¼ d 2 e 3 1 and, thus, y 6¼ z. Without loss of
generality, we assume that x 2 V ðCQ000
n3 Þ (similarly prove
in other cases ). Then z 2 V ðCQ100
Þ
and
y 2 V ðCQ110
n3
n3 Þ. Let
0 n1 0 1 0
0 0 n1 0 0 0 1 0
z u
v w x and x u
v w z . By the conditions in
the lemma, we can easily verify that yn2 ¼ bitðu; n 2Þ
¼ bitðv0 ; n 2Þ ¼ bitðw0 ; n 2Þ. Therefore, y 2
= fu; v0 ; w0 g.
0
0
By Lemma 5, we have x ¼ x and z ¼ z and, thus, C :
z; u; v; w; x; z and C 0 : x; u0 ; v0 ; w0 ; z; x are two cycles of
length 5 in CQn such that u 2
= fv0 ; w0 g and u0 2
= fv; wg (see
1
Fig. 2a). Since distðCQn1 ; z; yÞ ¼ dnþ1
e
3
1,
we may let
2
P be a path of length dnþ1
e
3
between
z
and
y
in CQ1n1 .
2
Note that P is also a shortest path between z and y in
CQ1n1 . We deal with the following cases.
Case 1. u 2
= P . Then,
x; w; v; u; P
dnþ1
2 e
þ 1 between x and y in CQn (see
is a path of length
Fig. 2b).
Case 2. u 2 P . Since ðz; uÞ 2 EðCQ1n1 Þ and P is a
shortest path between z and y in CQ1n1 , P must be:
= P . Otherwise, P
z; u; . . . ; y. We can further claim that w0 2
must be z; u; . . . ; w0 ; . . . ; y. Thus, lenðpathðP ; z; w0 ÞÞ > 1.
On the other hand, since P is a shortest path between z
and y in CQ1n1 , the subpath between z and w0 in P must
be a shortest path between z and w0 in CQ1n1 .
FAN ET AL.: OPTIMAL PATH EMBEDDING IN CROSSED CUBES
Considering that ðz; w0 Þ 2 EðCQ1n1 Þ, the length of the
subpath between z and w0 in P should be 1. So, we obtain
a contradiction. Thus, we have the following cases:
= P . Then,
Case 2.1. v0 2
x; u0 ; v0 ; w0 ; P
is a path of length dnþ1
2 e þ 1 between x and y in CQn (see
Fig. 2c).
Case 2.2. v0 2 P . Then, P is z; u; . . . ; v0 ; . . . ; y. Since
= EðCQ1n1 Þ (Otherwise, z; v0 ; w0 ; z is a cycle of
ðz; v0 Þ 2
length 3 in CQ1n1 , but there is no cycle of length 3 in CQn
for all n 1, which can be proved similar to the proof of
Lemma 5 in [13]), z; w0 ; v0 is a shortest path between z and
v0 in CQ1n1 . Thus, distðCQ1n1 ; z; v0 Þ ¼ 2. Considering that
P is a shortest path between z and y in CQ1n1 , the
subpath between z and v0 in P must be a shortest path
between z and v0 in CQ1n1 . Therefore, lenðpathðP ; z; v0 ÞÞ
¼ 2. Since ðz; uÞ 2 EðCQ1n1 Þ, ðu; v0 Þ 2 V ðCQ1n1 Þ (See
Fig. 2d). Let P 0 ¼ pathðP ; v0 ; yÞ. Then, lenðP 0 Þ ¼ dnþ1
2 e
5. Thus,
x; w; v; u; z; w0 ; P 0
is a path of length dnþ1
u
2 e þ 1 between x and y in CQn . t
Further, Lemma 8 shows a property on distancepreserving pair related, which will be used in the proof
of Theorem 1.
Lemma 8. If n 3 and n is odd, x ¼ 0xn2 . . . x1 x0 2
V ðCQ0n1 Þ and y ¼ 1yn2 . . . y1 y0 2 V ðCQ1n1 Þ, u n1 x, and
v n1 y such that bitðv; n2Þ 6¼ bitðx; n 2Þ and bitðu; n 2Þ
d:p:
6¼ bitðy; n2Þ, then xn2 xn3 d:p:
yn2 yn3 and xn2 xn3 yn2 yn3 .
Proof. According to the definition of function , we can
easily claim that ðxn2 xn3 ; yn2 yn3 Þ 2 fð00; 10Þ; ð10; 00Þ;
ð01; 01Þ; ð11; 11Þg. We can easily verify xn2 xn3 d:p:
yn2 yn3 and xn2 xn3 d:p:
u
t
yn2 yn3 .
So far, we have introduced a series of lemmas. Now, let us
give a proof that there exists paths of all lengths from dnþ1
2 eþ1
through 2n 1 between any two distinct nodes in CQn for
n 3. Even with the the help of these lemmas, we point out,
we still have to deal with many cases in this proof.
Theorem 1. If n 3, for any x; y 2 V ðCQn Þ, x 6¼ y, and any
n
integer l, dnþ1
2 e þ 1 l 2 1, there exists a path of length
l between x and y in CQn .
Proof. we use induction on n.
We can easily verify the truth of the theorem for n ¼ 3.
Suppose that the theorem holds for 3 n 1, we
will prove that the theorem holds for n ¼ ( 4).
When n ¼ , for any x; y 2 V ðCQ Þ, x 6¼ y, and any
integer l with dþ1
2 e þ 1 l 2 1, without loss generality, we separately identify the two cases that both x
and y are in CQ01 , and x and y are, respectively, in
CQ01 and CQ11 to construct a path of length l in CQ .
First, we consider the case that both x and y are in
CQ01 . In this case, we further deal with the following
cases according to the value of l:
1195
1
1. By the induction
Case 1. dþ1
2 eþ1l2
hypothesis, there exist paths of lengths d2e þ 1, d2e þ 2,
. . . , 21 1 between x and y in CQ01 . Noticing that
d2e þ 1 dþ1
2 e þ 1, there exist paths of lengths l between
x and y in CQ01 and, thus, in CQ .
l1
Case 2. 21 l 2 1. Let l1 ¼ dl1
2 e, l2 ¼ b 2 c.
Then, d2e þ 1 22 1 l2 l1 21 1 and l1 þ l2 ¼
l 1. By the induction hypothesis, there exists a path P1
of length l1 between x and y in CQ01 . Select an edge
ðu; vÞ in P1 (see Fig. 3a). Let u0 1 u and v0 1 v. Then,
u0 ; v0 2 V ðCQ11 Þ and u0 6¼ v0 . By the induction hypothesis, there exists a path P2 of length l2 between u0 and v0
in CQ11 . Then,
pathðP1 ; x; uÞ; P2 ; pathðP1 ; v; yÞ
is a path of length l1 þ l2 þ 1 ¼ l between x and y in CQ .
Next, we consider the case that x in CQ01 and y in
CQ11 . In this case, we further deal with two cases
according to whether x and y are adjacent as follows:
Case 1. ðx; yÞ 2 EðCQ Þ. By Lemma 6, for any l0 with
4 l0 2 , there exists a cycle C of length l0 that contains
the edge ðx; yÞ in CQ . So, for any l00 with 3 l00 2 1,
there is a path C ðx; yÞ of length l00 between x and y in CQ .
Since 4, dþ1
2 e þ 1 4. Thus, there exists a path of
length l with dþ1
2 e þ 1 l 2 1 between x and y in CQ .
Case 2. ðx; yÞ 2
= EðCQ Þ. We have the following cases
according to the range of l.
1
. Let z 1 x. Then, z 2
Case 2.1. dþ1
2 eþ1l2
1
0
V ðCQ1 Þ and z 6¼ y. Let l ¼ l 1. We deal with the
following cases:
0
Case 2.1.1. is even. Then, d2e þ 1 ¼ dþ1
2 el 1
1. By the induction hypothesis, there exists a path
2
P of length l0 between z and y in CQ11 . Thus,
x; P
1
is a path of length l0 þ 1 ¼ l with dþ1
2 eþ1l2
between x and y in CQ .
1
;
Case 2.1.2. is odd. Then, 5. For dþ1
2 eþ2 l 2
þ1
0
1
d 2e þ 1 ¼ d 2 e þ 1 l 2
1. Similar to Case 2.1.1,
we can get a path of length l0 þ 1 ¼ l between x and y in
CQ . In order to show that there exists a path of length
1
y. Then, v 2
l ¼ dþ1
2 e þ 1 between x and y in CQ , let v
0
V ðCQ1 Þ and v 6¼ x. We consider the following cases:
Case 2.1.2.1. bitðv; 2Þ ¼ bitðx; 2Þ or bitðz; 2Þ
¼ bitðy; 2Þ. Then, there exists an i 2 f0; 1g such that
1i
fv; xg V ðCQ0i
2 Þ or fz; yg V ðCQ2 Þ. Without loss of
generality, we assume that there exists an i 2 f0; 1g such
that fv; xg V ðCQ0i
2 Þ. By the induction hypothesis, there
exists a path P of length d1
2 e þ 1 between x and v in
CQ0i
.
Thus,
2
P; y
þ1
is a path of length d1
2 e þ 2 ¼ d 2 e þ 1 between x and y
in CQ .
Case 2.1.2.2. bitðv; 2Þ 6¼ bitðx; 2Þ and bitðz; 2Þ
6¼ bitðy; 2Þ. By Lemma 8, we have x2 x3 d:p
y2 y3
and x2 x3 d:p:
y
y
.
Considering
that
diamðCQ
Þ ¼
2 3
e
for
1,
we
deal
with
the
following
cases:
dþ1
2
1196
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 16, NO. 12,
DECEMBER 2005
Fig. 3. A path of length l between x and y in CQ , where a straight line represents an edge and a curve line represents a path between two nodes.
þ1
Case 2.1.2.2.1. dþ1
2 e 2 distðCQ ; x; yÞ d 2 e. If
þ1
distðCQ ; x; yÞ ¼ d 2 e 2, we can deduce 6¼ 5. Supposing on the contrary that ¼ 5, distðCQ ; x; yÞ ¼ d5þ1
2 e
=
2 ¼ 1. Hence, ðx; yÞ 2 EðCQ Þ, contradictory to ðx; yÞ 2
EðCQ Þ. So, we have 7 if distðCQ ; x; yÞ ¼ dþ1
2 e 2.
By Lemma 7, there exists a path of length dþ1
2 eþ1
between x and y in CQ for distðCQ ; x; yÞ ¼ dþ1
2 e 2.
þ1
e;
d
e
1g,
by
Lemma
3 and
For ðCQ ; x; yÞ 2 fdþ1
2
2
e
þ
1
between
Lemma 4, there exists a path of length dþ1
2
x and y in CQ .
Case 2.1.2.2.2. 2 distðCQ ; x; yÞ dþ1
2 e 3. Notice
þ1
1
that b1
c
¼
d
e
1.
Since
z
x,
we
have
d þ1
ðz; yÞ
2
2
2 e1
¼ 0; dþ1e2 ðz; yÞ ¼ dþ1e2 ðx; yÞ ¼ 1. Therefore, i ðz; yÞ ¼
2
2
1
i ðx; yÞ for i ¼ 0; 1; . . . ; dþ1
2 e 3 and 1 distðCQ1 ; z; yÞ
þ1
d 2 e 4. Let P be a shortest path obtained using the
CSH algorithm between z and y in CQ11 . Then,
lenðP Þ ¼ distðCQ11 ; z; yÞ. By Lemma 2, there exists a
cycle x; u; w; z; x of length 4 that contains the edge ðx; zÞ
in CQ . The following proof will separately discuss
according to whether w 2 P .
1
If w 2
= P . Let m ¼ dþ1
2 e distðCQ1 ; z; yÞ. Then,
þ1
1
1. By Lemma 6, there exists
4md 2 e12
a cycle C of length m that contains the edge ðx; uÞ in
CQ01 (see Fig. 3b). Thus,
C ðx; uÞ; w; P
is a path of length ðm 1Þ þ 2 þ distðCQ11 ; z; yÞ ¼
dþ1
2 e þ 1 between x and y in CQ .
Otherwise, since P is a shortest path between z and y in
CQ11 , pathðP ; z; wÞ is a shortest path in CQ11 . And,
considering that ðz; wÞ 2 V ðCQ11 Þ, P must be z; w; . . . ; y.
Let P 0 ¼ pathðP ; w; yÞ. Then, lenðP 0 Þ ¼ distðCQ11 ; z; yÞ 1.
1
0
Let m0 ¼ dþ1
2 e distðCQ1 ; z; yÞ þ 2. Then, 6 m þ1
1
1. By Lemma 6, there exists a cycle C 0
d 2 e þ1 2
of length m0 that contains the edge ðx; uÞ in CQ01 (see
Fig. 3c). Thus,
C 0 ðx; uÞ; P 0
is a path of length ðm0 1Þ þ 1 þ ðdistðCQ11 ; z; yÞ 1Þ ¼
dþ1
2 e þ 1 between x and y in CQ .
Case 2.2. 21 þ 1 l 2 1. By Definition 2, we can
select u 2 V ðCQ01 Þ fxg, v 2 V ðCQ11 Þ fyg such that
l1
ðu; vÞ 2 EðCQ Þ. Let l1 ¼ dl1
2 e, l2 ¼ b 2 c. Then, d2e þ 1 2
1
l2 l1 2
1 and l1 þ l2 ¼ l 1. By the in2
duction hypothesis, there exist a path P1 of length l1
between x and u in CQ01 and a path P2 of length l2
between v and y in CQ11 (see Fig. 3d). Then,
P1 ; P2
is a path of length l1 þ l2 þ 1 ¼ l between x and y in CQ .t
u
The similar result was obtained independently by
Yang et al. in [35]. However, the result in [35] deduces the
existence of paths of lengths greater than or equal to
nþ1
dnþ1
2 e þ 2, but does not include d 2 e þ 1.
4
NONEXISTENCE OF EMBEDDING PATHS
LENGTHS dnþ1
2 e
OF
In Section 3, we have given the embedding of paths of
n
length from dnþ1
2 e þ 1 through 2 1 between any two
distinct nodes with a dilation of 1 in CQn . The following
theorem will prove that dnþ1
2 e þ 1 is the shortest possible
length that can be embedded between arbitrary two distinct
nodes with a dilation of 1 in CQn .
Theorem 2. If n 2, then there exists two nodes x, y 2 V ðCQn Þ
such that x 6¼ y and there is no path of length dnþ1
2 e between x
and y in CQn .
FAN ET AL.: OPTIMAL PATH EMBEDDING IN CROSSED CUBES
1197
Proof. The theorem obviously holds for n ¼ 2. Selecting
x ¼ 001, y ¼ 111 for n ¼ 3 and selecting x ¼ 0001, y ¼
1101 for n ¼ 4, we can easily verify the truth of the
theorem for n ¼ 3; 4 also. For n 5, we separately deal
with two cases as follows:
Case 1. dnþ1
. . . x1 x0 ¼
2 e is even. Select x ¼ xn1 xn2
Pbn1
n1
n
2 c
0 1, y ¼ yn1 yn2 . . . y1 y0 ¼ 1 . Then,
i¼1 i ðx; yÞ ¼
dnþ1
e1
is
odd.
By
the
definition
of
function
,
0 ðx; yÞ ¼ 0.
2
Suppose that there exists a path P of length dnþ1
2 e
between x and y in CQn . Let P be x ¼ xð0Þ , xð1Þ , . . . ,
nþ1
ðkÞ ðkÞ
ðkÞ ðkÞ
xðd 2 eÞ ¼ y, where xðkÞ ¼ xn1 xn2 . . . x1 x0 k ¼ 0; 1; for
ð0Þ j1 ð1Þ
. . . ; dnþ1
x . We can claim that j1 2
= f0; 1g.
2 e, and x
Supposing on the contrary that j1 2 f0; 1g, then we have
0 ðxð1Þ ; yÞ ¼ 1 and i ðxð1Þ ; yÞ ¼ i ðx; yÞ for i ¼ 1; 2; . . . ; bn1
2 c
Pbn1
Pbn1
ð1Þ
nþ1
2 c
2 c
and, thus,
ðx
;
yÞ
¼
ðx;
yÞ
¼
d
e
1.
i
i
i¼1
i¼1
2
So, the length of P is greater than
ð1Þ
distðCQn ; x ; yÞ ¼
n1
bX
2 c
i ðxð1Þ ; yÞ
i¼0
¼
n1
bX
2 c
i ðxð1Þ ; yÞ þ 0 ðxð1Þ ; yÞ ¼
i¼1
nþ1
;
2
contradictory to that the length of P is dnþ1
2 e.
Further, if n is odd, then j1 6¼ n 1. Otherwise, we have
ðxð1Þ ; yÞ ¼ 0, bn1
ðxð1Þ ; yÞ ¼ 2, and i ðxð1Þ ; yÞ ¼ 1 for
bn1
2 c
2 c1
n1
i ¼ 0; 1; . . . ; b 2 c 2. Similar to the above discussion, we
can deduce that the length of P is greater than dnþ1
2 e, a
contradiction.
Moreover, if j1 2 f2; 3; . . . ; 2bn1
we can claim
2 c 1g,
Pbn1
2 c
that j1 is not odd and if j1 is even, then
i ðxð0Þ ; yÞ is
j
i¼ 21 þ1
odd. Otherwise, we have i ðxð1Þ ; yÞ ¼ i ðx; yÞ for i ¼ 1; 2;
ð1Þ
. . . ; bn1
2 c and 0 ðx ; yÞ ¼ 1. Thus, we can get the same
contradiction as the above discussion.
In summary, j1 satisfies one of the two conditions as
follows:
Pbn1
2 c
1. j1 is even with 2 j1 2bn1
j
2 c 1 and
i¼ 21 þ1
ð0Þ
i ðx ; yÞ is odd;
2. j1 2 fn 1; n 2g and n is even.
By the definition of function , we have the following
conclusions:
If j1 satisfies the condition 1, then j1 ðxð1Þ ; yÞ ¼
ð1Þ 2 ð1Þ
0 ðxð1Þ ; yÞ ¼ 0; bn1
ðxð1Þ ; yÞ ¼ 2 with xn1 xn2 ¼ 00
2 c
ð1Þ
if n is even, bn1
ðxð1Þ ; yÞ ¼ 1 with xn1 ¼ 0 if n is
2 c
ð1Þ
ð1Þ
odd, and i ðxð1Þ ; yÞ ¼ 1 with x2iþ1 x2i ¼ 00 for
j1
i 2 f0; 1; 2; . . . ; bn1
2 c 1g f0; 2 g.
b. If j1 satisfies the condition 2, then 0 ðxð1Þ ; yÞ ¼ 0,
ð1Þ ð1Þ
bj1 cðxð1Þ ; yÞ ¼ 1 with xn1 xn2 2 f01;10g, and i ðxð1Þ ;
2
ð1Þ
ð1Þ
yÞ ¼ 1 with x2iþ1 x2i ¼ 00 for i 2 f0; 1; 2; . . . ; bn1
2 c
1g f0g.
Now, we separately deal with the following cases:
a.
n1
nþ1
Case 1.1. n is odd. Then, bn1
2 c ¼ 2 ¼ d 2 e 1. We
assume that k ðx
ðmÞ
; yÞ ¼ 0 for k ¼
0; j21 ; j22
; . . . ; j2m
with
Fig. 4. k0 ¼ maxfi < bn1
cji ðxðmÞ ; yÞ ¼ 1g and k00 ¼ maxfi < k0 ji ðxðmÞ ;
Pbn1c 2
yÞ ¼ 0g, where i¼k2 00 þ1 i ðxðmÞ ; yÞ is odd.
1mb
n1
c1
2
and for the even integers jl with 2 jl n 2 and
ðmÞ
1 l m, bn1
ðxðmÞ ; yÞ ¼ 1 with xn1 ¼ 0, and i0 ðxðmÞ ; yÞ
2 c
ðmÞ
ðmÞ
¼ 1 with x2i0 þ1 x2i0 ¼ 00 for i0 2 f0; 1; . . . ; bn1
2 c1g
f0; j21 ; j22 ; . . . ; j2m g. Let xðmÞ jmþ1 xðmþ1Þ , A ¼ f0; 1; j1 ; j1 þ
1; j2 ; j2 þ 1; . . . ; jm ; jm þ 1g and B ¼ fjjj is odd with 2 S
j n 2 and j1 ðxðmÞ ; yÞ ¼ 1g fjjj is even with 2 j 2
Pbn1c
n 2, j ðxðmÞ ; yÞ ¼ 1; and i¼2jþ1 i ðxðmÞ ; yÞ is eveng. We
2
S S2
will prove that jmþ1 2
= A B fn 1g as follows:
S S
Supposing on the contrary that jmþ1 2 A B fn 1g,
we have the following cases:
Case 1.1.1. jmþ1 2 A. By the definition of function , we
have bjmþ1 c ðxðmþ1Þ ; yÞ ¼ 1, i0 ðxðmþ1Þ ; yÞ ¼ 1 for i0 2 f0; 1;
2
j1 j2
jm
ðmþ1Þ
; yÞ ¼ 0 for k 2
. . . ; bn1
2 cg f0; 2 ; 2 ; . . . ; 2 g, and k ðx
ðmþ1Þ
; yÞ ¼
f0; j21 ; j22 ; . . . ; j2m g fbjmþ1
2 cg. Then, distðCQn ; x
Pbn1
c
ðmþ1Þ
nþ1
2
; yÞ ¼ d 2 e m. Thus, the length of P is
i¼0 i ðx
greater than or equal to lenðpathðP ; xð0Þ ; xðmþ1Þ ÞÞ þdist
nþ1
ðCQn ; xðmþ1Þ ; yÞ ¼ ðm þ 1Þ þ ðdnþ1
2 e mÞ ¼ d 2 e þ 1, con-
tradictory to that the length of P is dnþ1
2 e.
Case 1.1.2. jmþ1 2 B. By the definition of function , we
j1
have i0 ðxðmþ1Þ ; yÞ ¼ 1 for i0 2 f0; 1; . . . ; bn1
2 cg f0; 2 ,
j2
jm
j
0
ðmÞ
; yÞ ¼ 0, and 0 i < b mþ1
2 ; . . . ; 2 g. Let k ¼ maxfiji ðx
2 cg.
Pbn1
j1 j2
jm
0
ðmþ1Þ
2 c
Then, k 2 f0; 2 ; 2 ; . . . ; 2 g and
; yÞ ¼
i¼k0 þ1 i ðx
Pbn1
ðmÞ
ðmþ1Þ
ðmþ1Þ
2 c
0
ðx
;
yÞ.
Thus,
ðx
;yÞ
¼
1
and
ðx
; yÞ
k
k
i¼k0 þ1 i
j1 j2
jm
0
¼ 0 for k 2 f0; 2 ; 2 ; . . . ; 2 g fk g. Similar to Case 1.1.1, we
can conclude that the length of P is greater than or equal to
nþ1
dnþ1
2 e þ 1, contradictory to that the length of P is d 2 e.
Case 1.1.3. jmþ1 ¼ n 1. Let k0 ¼ maxfi < bn1
2 cj
ðmÞ
ðmÞ
i ðxðmÞ ; yÞ ¼ 1g (see Fig. 4). Then, x2k0 þ1 x2k0 ¼ 00 and
ðmÞ
ðmÞ
k ðxðmþ1Þ ; yÞ ¼ k ðxðmÞ ; yÞ ¼ 0 with x2kþ1 x2k ¼ 01 for k ¼
ðmþ1Þ
0
; yÞ ¼ 2.
k0 þ 1; k0 þ 2; . . . ; bn1
2 c 1 and, thus, k ðx
Further, let k00 ¼ maxfi < k0 ji ðxðmÞ ;yÞ ¼ 0g. Then,i0ðxðmþ1Þ ;
ðmÞ
ðmÞ
yÞ ¼ i0 ðxðmÞ ; yÞ ¼ 1 with x2i0 þ1 x2i0 ¼ 00 for i0 ¼ k00 þ 1;
Pbn1c
Pbn1c
k00 þ2; . . . ; k0 1 and, thus, i¼k2 00 þ1 i ðxðmþ1Þ ; yÞ ¼ i¼k2 00 þ1
Pbn1c
i ðxðmÞ ; yÞ. Obviously, if i¼k2 00 þ1 i ðxðmÞ ; yÞ is odd, then
ðmÞ
ðmÞ
ðmÞ
ðmÞ
x2k00 þ1 x2k00 ¼ 01; otherwise, x2k00 þ1 x2k00 ¼ 11. Without loss
Pbn1c
of generality, supposing that i¼k2 00 þ1 i ðxðmÞ ; yÞ is odd,
ðmÞ
ðmÞ
then x2k00 þ1 x2k00 ¼ 01. So, k00 ðxðmþ1Þ ; yÞ ¼ 1. Further, we
have i ðxðmþ1Þ ; yÞ ¼ i ðxðmÞ ; yÞ for i ¼ 0; 1; . . . ; k00 1.
Similar to the discussion in Case 1.1.1, the length of P is
1198
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
greater than or equal to lenðP ; xð0Þ ; xðmþ1Þ Þ þ distðCQn ;
nþ1
xðmþ1Þ ; yÞ ¼ ðm þ 1Þ þ ðdnþ1
2 e mÞ¼ d 2 e þ 1, contradicnþ1
tory to that the length of P is d 2 e.
To sum up, jmþ1 is such an even integer that 2 jmþ1 Pbn1
ðmÞ
ðmÞ
2 c
i ðxðmÞ ; yÞ is odd with xjmþ1 þ1 xjmþ1 ¼ 00.
n 2 and
jmþ1
i¼
2
þ1
According to the definition of function , we have
ðmþ1Þ
n1
; yÞ
k ðxðmþ1Þ ; yÞ ¼ 0 for k 2 f0; j21 ; j22 ; . . . ; jmþ1
2 g; b 2 c ðx
ðmþ1Þ
¼ 1 with xn1
ðmþ1Þ ðmþ1Þ
with x2iþ1 x2i
¼ 0, and i ðxðmþ1Þ ; yÞ ¼ i ðxðmÞ ; yÞ ¼ 1
¼ 00 for i 2 f0; 1; . . . ; bn1
2 c 1g f0;
j1 j2
2 ; 2
; . . . ; jmþ1
2 g.
According to the above discussion, we have
n1
n1
n1
xðb 2 c1Þ ¼ 0ð01Þb 2 c and, thus, ðxðb 2 c1Þ ; yÞ 2 EðCQn Þ.
nþ1
ðdnþ1
2 e2Þ ; yÞ
Noticing that bn1
2 c ¼ d 2 e 1, we have x
nþ1
ðdnþ1
e2Þ
ðd
e1Þ
2 EðCQn Þ. Further, since ðx 2
;x 2
Þ 2 P and
nþ1
nþ1
nþ1
xðd 2 e1Þ ; yÞ 2 P , there exists a cycle y, xðd 2 e2Þ , xðd 2 e1Þ ,
y in CQn , whose length is 3, which contradicts to that there
is no cycle of length 3 in CQn (the method of proof is similar
to that of proof for Lemma 5 in [13]).
nþ1
Case 1.2. n is even. Then, bn1
2 c ¼ d 2 e 2. We
assume that one of the following two conditions holds:
1.
k ðxðmÞ ; yÞ ¼ 0 for k 2 f0; j21 ; j22 ; . . . ; j2m g with 1 ðmþ1Þ ðmþ1Þ
x2iþ1 x2i
jl n 3 and 1 l m and l 6¼ k , bn1
ðx
2 c
2.
ðmÞ
; yÞ ¼
ðmÞ ðmÞ
2 with xn1 xn2 ¼ 00, and i0 ðxðmÞ ; yÞ ¼ 1 with
ðmÞ
ðmÞ
x2i0 þ1 x2i0 ¼ 00 for i0 2 f0; 1; . . . , bn1
2 c 1g f0;
j1 j2
jm
2 , 2 , . . . , 2 g.
j
j
k ðxðmÞ ; yÞ ¼ 0 for k 2 f0; j21 ; j22 ; . . . ; jk20 1 ; k20 þ1 ; k20 þ2 ;
ðx
ðmÞ
and i0 ðxðmÞ ; yÞ ¼ 1 with x2i0 þ1 x2i0 ¼ 00 for
n1
c 1g
i0 2 f0; 1; . . . ; b
2
j1 j2
jk0 1 jk0 þ1 jk0 þ2
jm
0; ; ; . . . ;
;
;
;...;
;
2 2
2
2
2
2
where 1 k0 m.
Let xðmÞ jmþ1 xðmþ1Þ . We deal with the following
cases.
Case 1.2.1. Case 1 holds. Let A0 ¼ f0; 1; j1 ; j1 þ 1; j2 ;
0
j2 þ 1; . . . ; jm ; jm þ 1g and B ¼ fjjj is odd with 2 j S
n 3 and j1 ðxðmÞ ; yÞ ¼ 1g fjjj is even with 2 j n 2
Pbn1c
3; j ðxðmÞ ; yÞ ¼ 1; and i¼2jþ1 i ðxðmÞ ; yÞis eveng. Then, si2
milar to the discussion in Case 1.1.1 and Case 1.1.2, we
S
= A0 B0 . So, jmþ1 satisfies one of the following
have jmþ1 2
two cases.
Case 1.2.1.1. jmþ1 is such an even integer that 2 Pbn1
ðmÞ
2 c
i ðxðmÞ ; yÞ is odd with xjm þ1
jmþ1 n 3 and
jmþ1
i¼
2
þ1
xjm ¼ 00. Then, we have k ðxðmþ1Þ ; yÞ ¼ 0 for k 2 f0;
j1 j2
2 ; 2
j2
2
; . . . ; jmþ1
2 g.
2
ðmþ1Þ ðmþ1Þ
; yÞ ¼ 1 with xn1 xn2 2 f10; 01g, k ðxðmþ1Þ ; yÞ ¼
ðmþ1Þ ðmþ1Þ
with x2iþ1 x2i
1g f0; j21 ,
j2
2
ðmÞ
ðmÞ
¼ x2iþ1 x2i ¼ 00 for i 2 f0; 1; . . . ; bn1
2 c
, . . . ; j2m g.
Case 1.2.2. Case 2 holds. Let A0 ¼ f0; 1; j1 ; j1 þ 1; . . . ;
jk0 1 ; jk0 1 þ1; jk0þ1 ; jk0 þ1 þ 1; jk0 þ2 ; jk0 þ2 þ 1; . . . ; jm ; jm þ 1g
and B0 ¼ fjjj is odd with 2 j n 3 and j1 ðxðmÞ ; yÞ
2
S
¼ 1g fjjj is even with 2 j n 3, j ðxðmÞ ; yÞ ¼ 1; and
2
Pbn1
2 c
ðxðmÞ ; yÞ is even g. Then, similar to the discussion
i¼2j þ1 i
S
= A0 B0 .
in Case 1.1.1 and Case 1.1.2, we have jmþ1 2
= fn 1; n 2g. SupposFurther, we can show that jmþ1 2
ing on the contrary that jmþ1 2 fn 1; n 2g, we have
ðmþ1Þ ðmþ1Þ
xn1 xn2
ðmþ1Þ ðmþ1Þ
2 f00; 11g. If xn1 xn2
¼ 11, similar to the
discuss in Case 1.1.3, we can obtain a contradiction. If
ðmþ1Þ ðmþ1Þ
xn1 xn2
¼ 00, we have bn1
ðxðmþ1Þ ; yÞ ¼ 2 and
2 c
i ðxðmþ1Þ ; yÞ¼ i ðxðmÞ ; yÞ for i ¼ 0; 1 . . . ; bn1
2 c 1. Hence,
bn1
2 c
distðCQn ; x
ðmþ1Þ
; yÞ ¼
X
bn1
2 c
i ðx
ðmþ1Þ
; yÞ ¼
i¼0
¼d
X
i ðxðmÞ ; yÞ þ 1
i¼0
nþ1
e m:
2
As a result, the length of P is larger than or equal to
lenðP ; xð0Þ ; xðmþ1Þ Þ þ distðCQn ; xðmþ1Þ ; yÞ
nþ1
nþ1
e mÞ ¼ d
e þ 1;
¼ ðm þ 1Þ þ ðd
2
2
2
ðmÞ
,
ðmÞ
with jk0 2 fn1; n2g and xn1 xn2 2 f10; 01g,
2
j1
2
0 for k 2 f0; j21 ; j22 ; . . . ; j2m g, and i ðxðmþ1Þ ; yÞ ¼ i ðxðmÞ ; yÞ
integers jk with 2 jk n3, bjk0 c ðxðmÞ ; yÞ ¼ 1
ðmÞ
ðmÞ
Case 1.2.1.2. jmþ1 2 fn1; n 2g. Then, we have bjmþ1 c
ðmþ1Þ
. . . ; j2m g with 1 m bn1
2 c 1 and the even
ðmÞ
ðmÞ
DECEMBER 2005
¼ x2iþ1 x2i ¼ 00
for i 2 f0; 1; . . . , bn1
2 cg f0;
m bn1
2 c 1 and the even integers jl with 2 0
VOL. 16, NO. 12,
ðmþ1Þ
; . . . ; jmþ1
; yÞ¼ i ðxðmÞ ; yÞ with
2 g and i ðx
contradictory to that the length of P is dnþ1
2 e. Then, jmþ1
must be such an even integer that 2 jmþ1 n 3 and
Pbn1
ðmÞ
ðmÞ
2 c
i ðxðmÞ ; yÞ is odd with xjm þ1 xjm ¼ 00. Further,
jmþ1
i¼
2
þ1
we have k ðxðmþ1Þ ; yÞ ¼ 0 for k 2 f0; j21 ; j22 ; jk20 1 ;
jk0 þ1
2
;
jk0 þ2
2
;
ðmþ1Þ
j
; yÞ
. . . ; jmþ1
2 g; b k0 c ðx
¼ 1 with jk0 2 fn 1; n 2g and
ðmþ1Þ ðmþ1Þ
xn1 xn2
2 f10; 01g , and i ðxðmþ1Þ ; yÞ ¼
2
¼
ðmÞ ðmÞ
xn1 xn2
ðmþ1Þ ðmþ1Þ
i ðxðmÞ ; yÞ ¼ 1 with x2iþ1 x2i
ðmÞ
ðmÞ
¼ x2iþ1 x2i ¼ 00 for i 2
j
j
jmþ1
j1 j2 jk0 1
k0 þ1
k0 þ2
f0; 1; . . . ; bn1
2 c 1g f0; 2 ; 2 ; 2 , 2 ; 2 ; . . . ; 2 g.
According to the above discussion, we have
n1
n1
n1
ðbn1
x 2 cÞ 2 f01ð01Þb 2 cþ1 ; 10ð01Þb 2 cþ1 g and, thus, ðxðb 2 cÞ ;
nþ1
yÞ 2 EðCQn Þ. Noticing that bn1
2 c ¼ d 2 e2, we have
nþ1
nþ1
nþ1
ðxðd 2 e2Þ ; yÞ 2 EðCQn Þ. Further, since ðxðd 2 e2Þ ; xðd 2 e1Þ Þ
nþ1
nþ1
2 P and ðxðd 2 e1Þ ; yÞ 2 P , we get a cycle y, xðd 2 e2Þ ,
nþ1
xðd 2 e1Þ , y in CQn , whose is length 3, a contradiction.
Case 2. dnþ1
2 e is odd. Select x ¼ xn1 xn2 . . . x1 x0 ¼
0n1 1, y ¼ yn1 yn2 . . . y1 y0 ¼ 1n2 01. Similar to Case 1, we
can prove that there is no a path of length dnþ1
2 e between x
u
and y in CQn when n 5. Thus, the proof is omitted. t
FAN ET AL.: OPTIMAL PATH EMBEDDING IN CROSSED CUBES
This theorem shows that dnþ1
2 e þ 1 is the shortest possible
length that can be embedded between arbitrary two distinct
nodes with a dilation of 1 in the n-dimensional crossed cube,
which implies that this range of path lengths is optimal.
5
CONCLUSIONS
In this paper, we have studied embedding of paths of
different lengths between any two nodes in crossed cubes.
We have proven that paths of all lengths between dnþ1
2 eþ1
and 2n 1 can be embedded between any two distinct
nodes with a dilation of 1 in the n-dimensional crossed
cubes. We have also proven that dnþ1
2 e þ 1 is the shortest
possible length that can be embedded between arbitrary
two distinct nodes with a dilation of 1 in the n-dimensional
crossed cube. The embedding of paths is optimal in the
sense that its dilation is 1.
ACKNOWLEDGMENTS
The authors would like to thank the anonymous referees for
their valuable comments. Their suggestions are very helpful
to revise the paper. This research is partially supported by
Hong Kong grants CERG under No. 9040816 and No. 9040909.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
L. Auletta, A.A. Rescigno, and V. Scarano, “Embedding Graphs
onto the Supercube,” IEEE Trans. Computers, vol. 44, no. 4, pp. 593597, Apr. 1995.
M.M. Bae and B. Bose, “Edge Disjoint Hamiltonian Cycles in k-Ary
n-Cubes and Hypercubes,” IEEE Trans. Computers, vol. 52, no. 10,
pp. 1271-1284, Oct. 2003.
S.L. Bezrukov, J.D. Chavez, L.H. Harper et al., “The Congestion of
n-Cube Layout on a Rectangular Grid,” Discrete Math., vol. 213,
nos. 1-3, pp. 13-19, Feb. 2000.
R.V. Boppana, S. Chalasani, and C.S. Raghavendra, “Resource
Deadlock and Performance of Wormhole Multicast Routing
Algorithms,” IEEE Trans. Parallel and Distributed Systems, vol. 9,
no. 6, pp. 535-549, June 1998.
A. Broder, F. Frieze, and E. Upfal, “Existence and Construction of
Edge-Disjoint Paths on Expander Graphs,” SIAM J. Computing,
vol. 23, pp. 976-989, 1994.
M.Y. Chan and S.-J. Lee, “Fault-Tolerant Embedding of Complete
Binary Trees in Hypercubes,” IEEE Trans. Parallel and Distributed
Systems, vol. 4, no. 3, pp. 277-288, Mar. 1993.
C.-P. Chang, T.-Y. Sung, and L.-H. Hsu, “Edge Congestion and
Topological Properties of Crossed Cubes,” IEEE Trans. Parallel and
Distributed Systems, vol. 11, no. 1, pp. 64-80, Jan. 2000.
V. Chaudhary and J.K. Aggarwal, “Generalized Mapping of
Parallel Algorithms onto Parallel Architectures,” Proc. Int’l Conf.
Parallel Processing, pp. 137-141, Aug. 1990.
K. Efe, “A Variation on the Hypercube with Lower Diameter,”
IEEE Trans. Computers, vol. 40, no. 11, pp. 1312-1316, Nov. 1991.
K. Efe, “The Crossed Cube Architecture for Parallel Computing,”
IEEE Trans. Parallel and Distributed Systems, vol. 3, no. 5, pp. 513524, Sept.-Oct. 1992.
K. Efe, P.K. Blachwell, W. Slough, and T. Shiau, “Topological
Properties of the Crossed Cube Architecture,” Parallel Computing,
vol. 20, pp. 1763-1775, 1994.
J. Fan, “Diagnosability of Crossed Cubes under the Comparison
Diagnosis Model,” IEEE Trans. Parallel and Distributed Systems,
vol. 13, no. 10, pp. 1099-1104, Oct. 2002.
J. Fan, “Diagnosability of the Möobius Cubes,” IEEE Trans. Parallel
and Distributed Systems, vol. 9, no. 9, pp. 923-929, Sept. 1998.
J. Fan and X. Lin, “The t=k-Diagnosability of the BC Graphs,” IEEE
Trans. Computers, vol. 53, no. 2, pp. 176-184, Feb. 2005.
J. Fan, X. Lin, and X. Jia, “Node-Pancyclicity and EdgePancyclicity of Crossed Cubes,” Information Processing Letters,
vol. 93, pp. 133-138, Feb. 2005.
1199
[16] J.-S. Fu, “Fault-Tolerant Cycle Embedding in the Hypercube,”
Parallel Computing, vol. 29, no. 6, pp. 821-832, June 2003.
[17] Q.-P. Gu and S. Peng, “Optimal Algorithms for Node-to-Node
Fault Tolerant Routing in Hypercubes,” Computer J., vol. 39, no. 7,
pp. 626-629, July 1996.
[18] Q.-P. Gu and S. Peng, “Unicast in Hypercubes with Large Number
of Faulty Nodes,” IEEE Trans. Parallel and Distributed Systems,
vol. 10, no. 10, pp. 964-975, Oct. 1999.
[19] S.-Y. Hsieh, G.-H. Chen, and C.-W. Ho, “Longest Fault-Free Paths
in Star Graphs with Edge Faults,” IEEE Trans. Computers, vol. 50,
no. 9, pp. 960-971, Sept. 2001.
[20] S.-Y. Hsieh, G.-H. Chen, and C.-W. Ho, “Longest Fault-Free Paths
in Star Graphs with Vertex Faults,” Theoretical Computer Science,
vol. 262, nos. 1-2, pp. 215-227, 2001.
[21] S.-Y. Hsieh, C.-W. Ho, and G.-H. Chen, “Fault-Free Hamiltonian
Cycles in Faulty Arrangement Graphs,” IEEE Trans. Parallel and
Distributed Systems, vol. 10, no. 3, pp. 223-237, Mar. 1999.
[22] H.-C. Hsu, T.-K. Li, J.J.M. Tan, and L.-H. Hsu, “Fault Hamiltonicity and Fault Hamiltonian Connectivity of the Arrangement
Graphs,” IEEE Trans. Computers, vol. 53, no. 1, pp. 39-53, Jan. 2004.
[23] W.-T. Huang, Y.-C. Chuang, J.M. Tan, and L.-H. Hsu, “On the
Fault-Tolerant Hamiltonicity of Faulty Crossed Cubes,” IEICE
Trans. Fundamentals, vol. E85-A, no. 6, pp. 1359-1370, June 2002.
[24] P. Kulasinghe, “Connectivity of the Crossed Cube,” Information
Processing Letters, vol. 61, pp. 221-226, July 1997.
[25] P. Kulasinghe and S. Bettayeb, “Embedding Binary Trees into
Crossed Cubes,” IEEE Trans. Computers, vol. 44, no. 7, pp. 923-929,
July 1995.
[26] J. Kzeinberg and E. Tardos, “Disjoint Paths in Densely Embedded
Graphs,” Proc. 36th Ann. Symp. Foundations of Computer Science,
pp. 52-61, Oct. 1995.
[27] X. Lin, P.K. Mckinley, and L.M. Ni, “Deadlock-Free Multicast
Wormhole Routing in 2D Mesh Multicomputers,” IEEE Trans.
Parallel and Distributed Systems, vol. 5, no. 8, pp. 793-804, Aug.
1994.
[28] X. Lin and L.M. Ni, “Deadlock-Free Multicast Wormhole Routing
in Multicomputer Networks,” Proc. 18th Ann. Int’l Symp. Computer
Architecture, pp. 116-125, 1991.
[29] R.-S. Lo and G.-H. Chen, “Embedding Hamiltonian Paths in
Faulty Arrangement Graphs with the Backtracking Method,” IEEE
Trans. Parallel and Distributed Systems, vol. 12, no. 2, pp. 209-222,
Feb. 2001.
[30] A. Matsubayashi, “VLSI Layout of Trees into Grids of Minimum
Width,” IEICE Trans. Fundamentals, vol. E87-A, no. 5, pp. 10591069, May 2004.
[31] A. Patel, A. Kusalik, and C. McCrosky, “Area-Efficient VLSI
Layouts for Binary Hypercubes,” IEEE Trans. Computers, vol. 49,
no. 2, pp. 160-169, Feb. 2000.
[32] Y.-C. Tseng, S.-H. Chang, and J.-P. Sheu, “Fault-Tolerant Ring
Embedding in a Star Graph with Both Link and Node Failures,”
IEEE Trans. Parallel and Distributed Systems, vol. 8, no. 12, pp. 11851195, Dec. 1997.
[33] M.-C. Yang, T.-K. Li, J.J.M. Tan, L.-H. Hsu, “Fault-Tolerant CycleEmbedding of Crossed Cubes,” Information Processing Letters,
vol. 88, no. 4, pp. 149-154, Nov. 2003.
[34] P.-J. Yang, S.-B. Tien, and C.S. Raghavendra, “Embedding of Rings
and Meshes onto Faulty Hypercubes Using Free Dimensions,”
IEEE Trans. Computers, vol. 43, no. 5, pp. 608-613, May 1994.
[35] X. Yang and G. Megson, “On the Path-Connectivity, VertexPancyclicity, and Edge-Pancyclicity of Crossed Cubes,”
manuscript.
Jianxi Fan received the BS and MS degrees in
computer science from Shandong Normal University and Shandong University, China, in 1988
and 1991, respectively. He became a lecturer,
an associate professor, and a professor in 1994,
1997, and 2002, respectively, in the College of
Information Engineering at Qingdao University,
China. He visited the Department of Computer
Science, City University of Hong Kong, Hong
Kong, from April 2003 to October 2003. He is
currently a PhD candidate in the Department of Computer Science, City
University of Hong Kong, Hong Kong. His research interests include
interconnection networks, design and analysis of algorithms, graph
theory, etc.
1200
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
Xiaola Lin received the BS and MS degrees in
computer science from Peking University, Beijing, China, and the PhD degree in computer
science from Michigan State University, East
Lansing, Michigan. He is currently a professor of
computer science at Sun Yat-sen University,
Guangzhou, China. His research interests include parallel and distributed computing and
computer networks.
VOL. 16, NO. 12,
DECEMBER 2005
Xiaohua Jia received the BS, BSc (1984), and
MEng (1987) degrees from the University of
Science and Technology of China, and received
the DSc (1991) degree in information science
from the University of Tokyo, Japan. He is
currently a professor in the Department of
Computer Science at the City University of Hong
Kong, adjunct with the School of Computing,
Wuhan University, China. His research interests
include distributed systems, computer networks,
WDM optical networks, Internet technologies, and mobile computing. He
is a senior member of the IEEE.
. For more information on this or any other computing topic,
please visit our Digital Library at www.computer.org/publications/dlib.
Download