Search For:

Displaying 1-5 out of 5 total
Efficient Routing and Sorting Schemes for de Bruijn Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By D. Frank Hsu, David S.L. Wei
Issue Date:November 1997
pp. 1157-1170
<p><b>Abstract</b>—We consider the problems of routing and sorting on a de Bruijn network. First, we show that any deterministic oblivious routing scheme for permutation routing on a <it>d</it>-ary de Bruijn network with N = d...
Isomorphism of Degree Four Cayley Graph and Wrapped Butterfly and Their Optimal Permutation Routing Algorithm
Found in: IEEE Transactions on Parallel and Distributed Systems
By David S.L. Wei, Felix P. Muga, Kshirasagar Naik
Issue Date:December 1999
pp. 1290-1298
<p><b>Abstract</b>—In this paper, we first show that the <it>degree four Cayley graph</it> proposed in a paper appearing in the January 1996 issue of <it>IEEE Transactions on Parallel and Distributed Systems</it> i...
Task Clustering and Scheduling for Distributed Memory Parallel Architectures
Found in: IEEE Transactions on Parallel and Distributed Systems
By Michael A. Palis, Jing-Chiou Liou, David S.L. Wei
Issue Date:January 1996
pp. 46-55
<p><b>Abstract</b>—This paper addresses the problem of scheduling parallel programs represented as directed acyclic task graphs for execution on distributed memory parallel architectures. Because of the high communication overhead in exis...
Enhancing Data Integrity and Privacy in the Cloud: An Agenda
Found in: Computer
By David S.L. Wei,San Murugesan,Sy-Yen Kuo,Kshirasagar Naik,Danny Krizanc
Issue Date:November 2013
pp. 87-90
To address users' security concerns, cloud service providers must implement strategies that enhance data integrity and privacy. New data auditing and encryption methods open a path toward these goals.
CSMA/CA MAC Protocol Design for Topology Controlled Ad Hoc Networks: A Cross Layer Approach
Found in: Computer Science and Information Engineering, World Congress on
By Wonseok Baek, C.-C. Jay Kuo, David S.L. Wei
Issue Date:April 2009
pp. 413-417
Most topology control algorithms proposed so far are mainly for the power savings with the variable transmission powers taking no account of the effect from the underlying MAC protocol. When topology control is adopted in wireless ad-hoc networks with the ...