{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T06:10:23Z","timestamp":1698127823025},"reference-count":4,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T00:00:00Z","timestamp":1160524800000},"content-version":"vor","delay-in-days":5184,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Networks"],"published-print":{"date-parts":[[1992,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A chordal ring is a degree\u20103 regular graph with <jats:italic>n<\/jats:italic> vertices on a ring and <jats:italic>n<\/jats:italic>\/2 chords determined by a parameter <jats:italic>h<\/jats:italic>. Chordal rings are attractive as topologies for computer networks due to their simple structures and short diameters. In this work, we study the reliabilities of chordal rings assuming each edge can independently fail with probability <jats:italic>p<\/jats:italic>. For <jats:italic>p<\/jats:italic> small, the usual criterion to measure the reliability of a network is its line\u2010connectivity. We show that all chordal rings have the same line\u2010connectivity and the same super line\u2010connectivity. We analyze the reliabilities of chordal rings by using the recently developed notions of isolated and nonisolated cutsets and list the optimal choices of <jats:italic>h<\/jats:italic> for <jats:italic>n<\/jats:italic> \u2264 30.<\/jats:p>","DOI":"10.1002\/net.3230220506","type":"journal-article","created":{"date-parts":[[2007,5,12]],"date-time":"2007-05-12T12:48:46Z","timestamp":1178974126000},"page":"487-501","source":"Crossref","is-referenced-by-count":6,"title":["Reliabilities of chordal rings"],"prefix":"10.1002","volume":"22","author":[{"given":"X. D.","family":"Hu","sequence":"first","affiliation":[]},{"given":"F. K.","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,11]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1981.1675777"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1137\/0607011"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230120404"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0269964800002072"}],"container-title":["Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnet.3230220506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/net.3230220506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T01:34:07Z","timestamp":1698111247000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/net.3230220506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,8]]},"references-count":4,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1992,8]]}},"alternative-id":["10.1002\/net.3230220506"],"URL":"https:\/\/doi.org\/10.1002\/net.3230220506","archive":["Portico"],"relation":{},"ISSN":["0028-3045","1097-0037"],"issn-type":[{"value":"0028-3045","type":"print"},{"value":"1097-0037","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,8]]}}}