{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:36:49Z","timestamp":1761975409294},"reference-count":24,"publisher":"World Scientific Pub Co Pte Lt","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2014,4]]},"abstract":"<jats:p> Generalized cubes are a subclass of hypercube-like networks that are employed by a number of parallel algorithms. Linear array is common topology of multicomputer system. So congestion is very useful to improve algorithm performance for implementing generalized cube communication pattern on linear array. This paper addresses the congestion of generalized cube communication patterns embedding into linear array topology. For this purpose, the maximum m-induced subgraph of generalized cube is determined firstly, which is very important for discussing the congestion. Then an embedding scheme is described, and the congestion is shown to attain the minimum, which guarantees the optimality of the proposed scheme. <\/jats:p>","DOI":"10.1142\/s0129054114500130","type":"journal-article","created":{"date-parts":[[2014,7,25]],"date-time":"2014-07-25T05:48:52Z","timestamp":1406267332000},"page":"263-273","source":"Crossref","is-referenced-by-count":7,"title":["THE CONGESTION OF GENERALIZED CUBE COMMUNICATION PATTERN IN LINEAR ARRAY NETWORK"],"prefix":"10.1142","volume":"25","author":[{"given":"JING","family":"ZHANG","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing 400044, P. R. China"}]},{"given":"XIAOFAN","family":"YANG","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing 400044, P. R. China"},{"name":"School of Electronic and Information Engineering, Southwest University, Chongqing, 400715, P. R. China"}]},{"given":"CUI","family":"YU","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing 400044, P. R. China"}]},{"given":"LI","family":"HE","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing 400044, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2014,7,24]]},"reference":[{"key":"p_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(03)00257-6"},{"issue":"1","key":"p_3","first-page":"64","volume":"11","author":"Chang C.-P.","year":"2000","journal-title":"IEEE Transactions on"},{"key":"p_4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.01.013"},{"issue":"5","key":"p_5","first-page":"647","volume":"44","author":"Cull P.","year":"1995","journal-title":"IEEE Transactions on"},{"issue":"11","key":"p_6","first-page":"46","volume":"472","author":"Dong Q.","year":"2012","journal-title":"Theoretical Computer Science"},{"issue":"5","key":"p_7","first-page":"513","volume":"3","author":"Efe K.","year":"1992","journal-title":"IEEE Transactions on"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(01)00256-3"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.08.012"},{"key":"p_10","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-007-9024-7"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.12.011"},{"issue":"12","key":"p_12","first-page":"1190","volume":"16","author":"Fan J.","year":"2005","journal-title":"IEEE Transactions on"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(03)00058-9"},{"issue":"7","key":"p_14","first-page":"923","volume":"44","author":"Kulasinghe P.","year":"1995","journal-title":"IEEE Transactions on"},{"issue":"2","key":"p_15","first-page":"452","volume":"61","author":"Lai P.-L.","year":"2012","journal-title":"IEEE Transactions on"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2009.07.007"},{"key":"p_17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.10.022"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2013.02.027"},{"key":"p_21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2008.07.014"},{"key":"p_22","first-page":"800","author":"Vaidya A. S.","year":"1993","journal-title":"Proceedings of the Fifth IEEE Symposium on, IEEE ("},{"key":"p_23","doi-asserted-by":"publisher","DOI":"10.1080\/17445760903225700"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2004.02.002"},{"key":"p_26","doi-asserted-by":"publisher","DOI":"10.1080\/0020716042000301752"},{"key":"p_27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2005.03.004"},{"key":"p_28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2011.10.024"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054114500130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T17:54:29Z","timestamp":1565200469000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054114500130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":24,"journal-issue":{"issue":"03","published-online":{"date-parts":[[2014,7,24]]},"published-print":{"date-parts":[[2014,4]]}},"alternative-id":["10.1142\/S0129054114500130"],"URL":"https:\/\/doi.org\/10.1142\/s0129054114500130","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]}}}