We consider the problem of constructing virtual path layouts for an ATM network consisting of a complete networkKn of n processors in which a certain number of links may fail. Our main goal is to construct layouts which tolerate any configuration of up to f layouts and have a least possible congestion. First, we study the minimal congestion of 1- hop f-tolerant layouts in Kn. For any positive integer f we give upper and lower bounds on this minimal congestion and construct f-tolerant layouts with congestion corresponding to the upper bounds. Our results are based on a precise analysis of the diameter of the network Kn[F] which results from Kn by deleting links from a set F of bounded size. Next we study the minimal congestion of h-hop f-tol...
This paper considers the problem of designing ATM networks that are nonblocking with respect to virt...
AbstractThe purpose of designing an optimal and fault tolerant communication network is to achieve a...
An embedding of a guest network GN into a host network HN is to find a suitable bijective function b...
In this paper we deal with the problem of designing virtual path layouts in ATM networks when the ho...
In ATM networks messages are transmitted through virtual paths. Packets are routed along virtual pat...
AbstractThis paper presents some algorithmic results concerning virtual path layouts for the one-to-...
AbstractWe study a routing problem which occurs in high-speed (ATM) networks, termed the “rooted vir...
We study virtual path layouts in ATM networks. Packets are routed along virtual paths in the network...
AbstractIn this paper we deal with the problem of designing virtual path layouts in ATM networks whe...
AbstractIn this paper, we present a new model that combines quality of service and mobility aspects ...
In this paper we consider the problem of constructing ATM layouts for wireless networks in which mob...
In this paper we present a new model able to combine quality of service (QoS) and mobility aspects i...
International audienceMotivated by Asynchronous Transfer Mode (ATM) in telecommunication networks, w...
Fast and efficient communications are essential to the success of large-scale multiprocessor paralle...
When a connection is established in an ATM network, resources are allocated to guarantee an appropri...
This paper considers the problem of designing ATM networks that are nonblocking with respect to virt...
AbstractThe purpose of designing an optimal and fault tolerant communication network is to achieve a...
An embedding of a guest network GN into a host network HN is to find a suitable bijective function b...
In this paper we deal with the problem of designing virtual path layouts in ATM networks when the ho...
In ATM networks messages are transmitted through virtual paths. Packets are routed along virtual pat...
AbstractThis paper presents some algorithmic results concerning virtual path layouts for the one-to-...
AbstractWe study a routing problem which occurs in high-speed (ATM) networks, termed the “rooted vir...
We study virtual path layouts in ATM networks. Packets are routed along virtual paths in the network...
AbstractIn this paper we deal with the problem of designing virtual path layouts in ATM networks whe...
AbstractIn this paper, we present a new model that combines quality of service and mobility aspects ...
In this paper we consider the problem of constructing ATM layouts for wireless networks in which mob...
In this paper we present a new model able to combine quality of service (QoS) and mobility aspects i...
International audienceMotivated by Asynchronous Transfer Mode (ATM) in telecommunication networks, w...
Fast and efficient communications are essential to the success of large-scale multiprocessor paralle...
When a connection is established in an ATM network, resources are allocated to guarantee an appropri...
This paper considers the problem of designing ATM networks that are nonblocking with respect to virt...
AbstractThe purpose of designing an optimal and fault tolerant communication network is to achieve a...
An embedding of a guest network GN into a host network HN is to find a suitable bijective function b...