• Articles • Previous Articles     Next Articles

Mapping Between 2-D Meshes of the Same Size

Peng Guoqiang;   

  1. Huazhong University of Science and Technology, Wuhan 430074;
  • Online:1997-09-10 Published:1997-09-10

Given two 2-D meshes 1171 and MZ of sizes si x t; where si≤ti(i=1, 2) and s1 x fl=s2 x t2, embedding Ml to MZ with minimum dilation is……….

Key words: oblivious function evaluation; oblivious polynomial evaluation; secure multiparty computation; distributed; information security;



[1] Akers S B, Harel D, Krishnamurthy B. The star graph: An attractive alternative to the n-cube. In Int'l. Conf. Parallel Processing, 1987, pp.393-400.

[2] Hong J W, Mehlhorn K, Rosenberg A L. Cost tradeoffs in graph embeddings. J. ACM, 1983 30(4): 709-728.

[3] Chen C Y R, Chung Y C. Embedding networks with ring connections in hypercube machines. In Int'l. Conf. Parallel Processing, 1990, Vo1.3, pp.327-334. ……….
[1] Louis Cianciullo and Hossein Ghodosi. Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results [J]. Journal of Computer Science and Technology, 2022, 37(2): 443-458.
[2] Li-De Xue, Ya-Jun Liu, Wei Yang, Wei-Lin Chen, and Liu-Sheng Huang. A Blockchain-Based Protocol for Malicious Price Discrimination [J]. Journal of Computer Science and Technology, 2022, 37(1): 266-276.
[3] Yu-Wei Wu, Qing-Gang Wang, Long Zheng, Xiao-Fei Liao, Hai Jin, Wen-Bin Jiang, Ran Zheng, Kan Hu. FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated Data Centers [J]. Journal of Computer Science and Technology, 2021, 36(5): 1051-1070.
[4] Songjie Niu, Dongyan Zhou. SOOP: Efficient Distributed Graph Computation Supporting Second-Order Random Walks [J]. Journal of Computer Science and Technology, 2021, 36(5): 985-1001.
[5] Songjie Niu, Shimin Chen. TransGPerf: Exploiting Transfer Learning for Modeling Distributed Graph Computation Performance [J]. Journal of Computer Science and Technology, 2021, 36(4): 778-791.
[6] Yun-Cong Zhang, Xiao-Yang Wang, Cong Wang, Yao Xu, Jian-Wei Zhang, Xiao-Dong Lin, Guang-Yu Sun, Gong-Lin Zheng, Shan-Hui Yin, Xian-Jin Ye, Li Li, Zhan Song, Dong-Dong Miao. Bigflow: A General Optimization Layer for Distributed Computing Frameworks [J]. Journal of Computer Science and Technology, 2020, 35(2): 453-467.
[7] André Brinkmann, Kathryn Mohror, Weikuan Yu, Philip Carns, Toni Cortes, Scott A. Klasky, Alberto Miranda, Franz-Josef Pfreundt, Robert B. Ross, Marc-André Vef. Ad Hoc File Systems for High-Performance Computing [J]. Journal of Computer Science and Technology, 2020, 35(1): 4-26.
[8] Marc-André Vef, Nafiseh Moti, Tim Süß, Markus Tacke, Tommaso Tocci, Ramon Nou, Alberto Miranda, Toni Cortes, André Brinkmann. GekkoFS—A Temporary Burst Buffer File System for HPC Applications [J]. Journal of Computer Science and Technology, 2020, 35(1): 72-91.
[9] Robert B. Ross, George Amvrosiadis, Philip Carns, Charles D. Cranor, Matthieu Dorier, Kevin Harms, Greg Ganger, Garth Gibson, Samuel K. Gutierrez, Robert Latham, Bob Robey, Dana Robinson, Bradley Settlemyer, Galen Shipman, Shane Snyder, Jerome Soumagne, Qing Zheng. Mochi: Composing Data Services for High-Performance Computing Environments [J]. Journal of Computer Science and Technology, 2020, 35(1): 121-144.
[10] Chong Wang, Nasro Min-Allah, Bei Guan, Yu-Qi Lin, Jing-Zheng Wu, Yong-Ji Wang. An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion [J]. Journal of Computer Science and Technology, 2019, 34(6): 1351-1365.
[11] Jun-Hua Fang, Peng-Peng Zhao, An Liu, Zhi-Xu Li, Lei Zhao. Scalable and Adaptive Joins for Trajectory Data in Distributed Stream System [J]. Journal of Computer Science and Technology, 2019, 34(4): 747-761.
[12] Yang Hong, Yang Zheng, Fan Yang, Bin-Yu Zang, Hai-Bing Guan, Hai-Bo Chen. Scaling out NUMA-Aware Applications with RDMA-Based Distributed Shared Memory [J]. Journal of Computer Science and Technology, 2019, 34(1): 94-112.
[13] Shuai-Bing Lu, Jie Wu, Huan-Yang Zheng, Zhi-Yi Fang. On Maximum Elastic Scheduling in Cloud-Based Data Center Networks for Virtual Machines with the Hose Model [J]. Journal of Computer Science and Technology, 2019, 34(1): 185-206.
[14] Quan-Qing Xu, Wei-Ya Xi, Khai Leong Yong, Chao Jin. CRL: Efficient Concurrent Regeneration Codes with Local Reconstruction in Geo-Distributed Storage Systems [J]. Journal of Computer Science and Technology, 2018, 33(6): 1140-1151.
[15] Zhimin Gao, Lei Xu, Lin Chen, Xi Zhao, Yang Lu, Weidong Shi. CoC: A Unified Distributed Ledger Based Supply Chain Management System [J]. , 2018, 33(2): 237-248.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZHANG Wensong; JIN Shiyao; WU Quanyuan;. LinuxDirector: A Connection Director for Scalable Internet Services[J]. , 2000, 15(6): 560 -571 .
[2] Xiao-Ming Sun. Preface[J]. , 2012, 27(4): 667 .
[3] You-Ming Qiao (乔友明), Jayalal Sarma M.N., and Bang-Sheng Tang (唐邦晟). On Isomorphism Testing of Groups with Normal Hall Subgroups[J]. , 2012, 27(4): 687 -701 .
[4] Gong-Qing Wu, Lei Li, Li Li, Xindong Wu. Web News Extraction via Tag Path Feature Fusion Using DS Theory[J]. , 2016, 31(4): 661 -672 .
[5] You-Xi Wu, Dong Liu, He Jiang. Length-Changeable Incremental Extreme Learning Machine[J]. , 2017, 32(3): 630 -643 .
[6] Chun-Yang Ruan, Ye Wang, Jiangang Ma, Yanchun Zhang, Xin-Tian Chen. Adversarial Heterogeneous Network Embedding with Metapath Attention Mechanism[J]. Journal of Computer Science and Technology, 2019, 34(6): 1217 -1229 .
[7] Feng-Juan Gao, Yu Wang, Lin-Zhang Wang, Zijiang Yang, Xuan-Dong Li. Automatic Buffer Overflow Warning Validation[J]. Journal of Computer Science and Technology, 2020, 35(6): 1406 -1427 .
[8] Ding-Huang Hu, De-Zun Dong, Yang Bai, Shan Huang, Ze-Jia Zhou, Zi-Hao Wei, Xiang-Ke Liao. Harmonia: Explicit Congestion Notification and Credit-Reservation Transport Converged Congestion Control in Datacenters[J]. Journal of Computer Science and Technology, 2021, 36(5): 1071 -1086 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved