complete binary tree
Recently Published Documents


TOTAL DOCUMENTS

50
(FIVE YEARS 5)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 178 (3) ◽  
pp. 187-202
Author(s):  
Micheal Arockiaraj ◽  
J. Nancy Delaila ◽  
Jessie Abraham

In any interconnection network, task allocation plays a major role in the processor speed as fair distribution leads to enhanced performance. Complete multipartite networks serve well for this purpose as the task can be split into different partites which improves the degree of reliability of the network. Such an allocation process in the network can be done by means of graph embedding. The optimal wirelength of a graph embedding helps in the distribution of deterministic algorithms from the guest graph to other host graphs in order to incorporate its unique deterministic properties on that chosen graph. In this paper, we propose an algorithm to compute the optimal wirelength of balanced complete multipartite graphs onto the Cartesian product of trees with path and cycle. Moreover, we derive the closed formulae for wirelengths in specific trees like (1-rooted) complete binary tree and sibling graphs.


2020 ◽  
Vol 3 (2) ◽  
pp. 70
Author(s):  
Emily L Casinillo ◽  
Leomarich F Casinillo

<p>Let G=(V(G), E(G)) be a connected graph where V(G) is a finite nonempty set called vertex-set of G, and  E(G) is a set of unordered pairs {u, v} of distinct elements from  V(G) called the edge-set of G. If  is a connected acyclic graph or a connected graph with no cycles, then it is called a tree graph. A binary tree Tl with l levels is complete if all levels except possibly the last are completely full, and the last level has all its nodes to the left side. If we form a path on each level of a full and complete binary tree, then the graph is now called full and complete binary planar graph and it is denoted as Bn, where n is the level of the graph. This paper introduced a new planar graph which is derived from binary tree graphs. In addition, a combinatorial formula for counting its vertices, faces, and edges that depends on the level of the graph was developed.</p>


2020 ◽  
Vol 18 (1) ◽  
pp. 1-10
Author(s):  
A. D. GBADEBO ◽  
A. T. AKINWALE ◽  
S. AKINLEYE

The task of storing items to allow for fast access to an item given its key is an ubiquitous problem in many organizations. Treap as a method uses key and priority for searching in databases. When the keys are drawn from a large totally ordered set, the choice of storing the items is usually some sort of search tree. The simplest form of such tree is a binary search tree. In this tree, a set X of n items is stored at the nodes of a rooted binary tree in which some item y ϵ X is chosen to be stored at the root of the tree. Heap as data structure is an array object that can be viewed as a nearly complete binary tree in which each node of the tree corresponds to an element of the array that stores the value in the node. Both algorithms were subjected to sorting under the same experimental environment and conditions. This was implemented by means of threads which call each of the two methods simultaneously. The server keeps records of individual search time which was the basis of the comparison. It was discovered that treap was faster than heap sort in sorting and searching for elements using systems with homogenous properties.    


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 147513-147522
Author(s):  
Wu Zhijun ◽  
Li Changliang ◽  
Sha Yongpeng

Cryptography ◽  
2018 ◽  
Vol 2 (4) ◽  
pp. 33 ◽  
Author(s):  
Ziyuan Hu ◽  
Shengli Liu ◽  
Kefei Chen ◽  
Joseph Liu

An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem. To solve this problem, IBE scheme with revocation (namely revocable IBE scheme) has been proposed. Apart from those lattice-based IBE, most of the existing schemes are based on decisional assumptions over pairing-groups. In this paper, we propose a revocable IBE scheme based on a weaker assumption, namely Computational Diffie-Hellman (CDH) assumption over non-pairing groups. Our revocable IBE scheme is inspired by the IBE scheme proposed by Döttling and Garg in Crypto2017. Like Döttling and Garg’s IBE scheme, the key authority maintains a complete binary tree where every user is assigned to a leaf node. To adapt such an IBE scheme to a revocable IBE, we update the nodes along the paths of the revoked users in each time slot. Upon this updating, all revoked users are forced to be equipped with new encryption keys but without decryption keys, thus they are unable to perform decryption any more. We prove that our revocable IBE is adaptive IND-ID-CPA secure in the standard model. Our scheme serves as the first revocable IBE scheme from the CDH assumption. Moreover, we extend our scheme to support Decryption Key Exposure Resistance (DKER) and also propose a server-aided revocable IBE to decrease the decryption workload of the receiver. In our schemes, the size of updating key in each time slot is only related to the number of newly revoked users in the past time slot.


2018 ◽  
Vol E101.D (1) ◽  
pp. 142-151 ◽  
Author(s):  
Yuki YAMAGISHI ◽  
Kazuo AOYAMA ◽  
Kazumi SAITO ◽  
Tetsuo IKEDA

Sign in / Sign up

Export Citation Format

Share Document