AbstractWe consider two shellings of the boundary of the hypercube equivalent if one can be transformed into the other by an isometry of the cube. We observe that a class of indecomposable permutations, bijectively equivalent to standard double occurrence words, may be used to encode one representative from each equivalence class of the shellings of the boundary of the hypercube. These permutations thus encode the shelling types of the boundary of the hypercube. We construct an adjacent transposition Gray code for this class of permutations. This construction can be implemented in constant amortized time. Our result is a signed variant of King’s result showing that there is a transposition Gray code for indecomposable permutations
Abstract—Kulkarni and Kiyavash recently introduced a new method to establish upper bounds on the siz...
Due to its attractive topological properties, the hypercube multiprocessor has emerged as one of the...
This paper proposes extensions of two previous schemes as well as a novel scheme called the sniffin...
AbstractWe consider two shellings of the boundary of the hypercube equivalent if one can be transfor...
A (cyclic) Gray code is a (cyclic) sequence of all n-bit strings in which consecutive strings differ...
Both Gray code and binary code are frequently used in mapping arrays into hypercube architectures. W...
The term binary combinatorial Gray code refers to a list of binary words such that the Hamming dista...
The term binary combinatorial Gray code refers to a list of binary words such that the Hamming dista...
Graphs and AlgorithmsA (cyclic) n-bit Gray code is a (cyclic) ordering of all 2(n) binary strings of...
Robert Sedgewick [5] lists various Gray codes for the permutations in Sn including the classical alg...
Various researchers have shown that the binary n- cube (or hypercube) can embed any r-ary m-cubes, ...
In previous works, some of the authors have proposed a canonical form of Gray Codes (GCs) in N-cubes...
We present a linear algebraic formulation for a class of index transformations such as Gray code enc...
Hypercubes, meshes and tori are well known interconnection networks for parallel computers. The sets...
We present an optimal greedy algorithm which returns a Gray-code labeling of the nodes of an n-dimen...
Abstract—Kulkarni and Kiyavash recently introduced a new method to establish upper bounds on the siz...
Due to its attractive topological properties, the hypercube multiprocessor has emerged as one of the...
This paper proposes extensions of two previous schemes as well as a novel scheme called the sniffin...
AbstractWe consider two shellings of the boundary of the hypercube equivalent if one can be transfor...
A (cyclic) Gray code is a (cyclic) sequence of all n-bit strings in which consecutive strings differ...
Both Gray code and binary code are frequently used in mapping arrays into hypercube architectures. W...
The term binary combinatorial Gray code refers to a list of binary words such that the Hamming dista...
The term binary combinatorial Gray code refers to a list of binary words such that the Hamming dista...
Graphs and AlgorithmsA (cyclic) n-bit Gray code is a (cyclic) ordering of all 2(n) binary strings of...
Robert Sedgewick [5] lists various Gray codes for the permutations in Sn including the classical alg...
Various researchers have shown that the binary n- cube (or hypercube) can embed any r-ary m-cubes, ...
In previous works, some of the authors have proposed a canonical form of Gray Codes (GCs) in N-cubes...
We present a linear algebraic formulation for a class of index transformations such as Gray code enc...
Hypercubes, meshes and tori are well known interconnection networks for parallel computers. The sets...
We present an optimal greedy algorithm which returns a Gray-code labeling of the nodes of an n-dimen...
Abstract—Kulkarni and Kiyavash recently introduced a new method to establish upper bounds on the siz...
Due to its attractive topological properties, the hypercube multiprocessor has emerged as one of the...
This paper proposes extensions of two previous schemes as well as a novel scheme called the sniffin...