Author's Accepted Manuscript
Choosing a heuristic and root node for edge ordering in BDD-based network reliability analysis Yuchang Mo, Liudong Xing, Farong Zhong, Zhusheng Pan, Zhongyu Chen
www.elsevier.com/locate/ress
PII: DOI: Reference:
S0951-8320(14)00155-0 http://dx.doi.org/10.1016/j.ress.2014.06.025 RESS5085
To appear in:
Reliability Engineering and System Safety
Received date: 18 November 2013 Revised date: 18 June 2014 Accepted date: 26 June 2014 Cite this article as: Yuchang Mo, Liudong Xing, Farong Zhong, Zhusheng Pan, Zhongyu Chen, Choosing a heuristic and root node for edge ordering in BDDbased network reliability analysis, Reliability Engineering and System Safety, http: //dx.doi.org/10.1016/j.ress.2014.06.025 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting galley proof before it is published in its final citable form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Choosing a Heuristic and Root node for Edge Ordering in BDD-based Network Reliability Analysis Yuchang Moa, Liudong Xingb, Farong Zhonga, Zhusheng Pana, Zhongyu Chena a
Dept. of Computer Science & Technology, Zhejiang Normal University, China
b
Dept. of Electrical & Computer Engineering, University of Massachusetts, Dartmouth, USA E-mail:
[email protected],
[email protected],
[email protected],
[email protected],
[email protected]
Abstract: In the binary decision diagram (BDD)-based network reliability analysis, heuristics have been widely used to obtain a reasonably good ordering of edge variables. Orderings generated using different heuristics can lead to dramatically different sizes of BDDs, and thus dramatically different running times and memory usages for the analysis of the same network. Unfortunately, due to the nature of the ordering problem (i.e., being an NP-complete problem) no formal guidelines or rules are available for choosing a good heuristic or for choosing a high-performance root node to perform edge searching using a particular heuristic. In this work, we make novel contributions by proposing heuristic and root node selection methods based on the concept of boundary sets for the BDD-based network reliability analysis. Empirical studies show that the proposed selection methods can help to generate high-performance edge ordering for most of studied cases, enabling the efficient BDD-based reliability analysis of large-scale networks. The proposed methods are demonstrated on different types of networks, including square lattice networks, torus lattice networks and de Bruijn networks.
Key words: network reliability; binary decision diagram; edge ordering heuristic; lattice network, de Bruijn network.
1
Acronyms BDD
Binary Decision Diagrams
BFS
Breadth First Search
TSBS
Total Size of Boundary Set
IFBSH
Index of First Boundary Set Hit
DFS
Depth First Search
NDS
Network Driven Search
MP
Minimal Path
MC
Minimal Cut
UGF
Universal Generating Function
MCS
Monte Carlo Simulation
Notation G
network
V
node set of network G
ni
a node of node set V
s,t
terminal nodes
E
edge set of network G
ei
a edge of edge set G
O
an edge ordering on E
e(i)
the i-th edge in ordering O
Fi
boundary set of first i edges in ordering O
L
the maximum size of the boundary sets
hi
an edge ordering heuristic
H
an ordering heuristic library H ={h1, h2,…, }
Oni
ordering generated using root node ni∈V
Ohi
ordering generated using hi∈H 2
TSBS(O)
total size of boundary sets of an edge ordering O
IFBSH (O)
IFBSH measure of an edge ordering O
SelTSBS
TSBS-based selection method
SelIFBSH
IFBSH-based selection method
3
1. Introduction Networks are a widely-applied model for analyzing many complex systems such as physical, technological, social, biological and economical systems. Because networks usually display a high degree of tolerance to random failures and attacks due to redundant paths, network reliability analysis has been a challenging task for last three decades. Monte Carlo Simulations (MCS) have been applied for approximate network reliability analysis [1-5]. MCS is performed based on random samples of hazard intensities and corresponding network component responses. It has been shown that for highly reliable networks the crude MCS method is impractical, because the probability of network failure is a rare-event probability [1]. The research for efficient MCS-based algorithms for highly reliable networks has resulted in a number of variance reduction methods. Among the most prominent ones are conditional MCS approaches [2], approximate zero-variance importance sampling [3], and combinations of these two [4]. Refer to [5] for a survey of the MCS-based methods. The simulation-based approaches are often used for relatively large networks because their computational efficiency depends largely on the convergence of probability not the size of networks. However, statistical errors in the simulation-based approaches may result in slow convergence for achieving acceptable accuracy in low probability estimations and in parameter sensitivity calculations. On the other hand, the exact evaluation of network reliability is an NP-hard problem [6]. Numerous studies were devoted to analyze the network reliability based on minimal paths/cuts (MPs/MCs), where all the possibilities for which two specified nodes can communicate (or not communicate) are first enumerated (path/cut set search) and then the reliability expression is evaluated, resorting to different techniques, like inclusion-exclusion method [7, 8] or sum of disjoint products [9]. These traditional MPs/MCs based algorithms can have doubly exponential complexity and thus are not efficient for large-scale networks. Among the efforts to improve the computational efficiency of the traditional MPs/MCs based method, the recursive decomposition algorithm was proposed [10, 11], which integrates a shortest path search algorithm and a disjoint
4
path identification process to efficiently calculate the reliability of a node pair connection. In [12, 13] a matrix-based method was also developed, which calculates the probability of general system events with correlated system components based on efficient matrix manipulations and MC identification. In [14], Chang and Song integrated the methods of [10-13] for the reliability analysis of a real-world network, where a smaller number of non-minimal disjoint sets are identified to fully represent the network connectivity. Although the methods in [10-14] made improvement in the computational efficiency, they still need to deal with the exponentially increasing number of MPs/MCs to find the node-pair reliability/unreliability. As another approach, Levitin [15] proposed to evaluate the network reliability using universal generating functions (UGF)-based recursive procedure. This method has recently been improved by Yeh through some simplification techniques [16, 17]. A survey of recent developments of UGF based methods in the field of network reliability estimation can be found in [18]. The UGF based methods can improve the computational efficiency of MP/MC identification or inclusion-exclusion calculation, but they still suffer from computational inefficiency on large-scale networks. In the last few decades Binary Decision Diagrams (BDD), as an extraordinarily efficient data structure to represent and manipulate Boolean functions [19, 20], have been exploited to model and analyze the reliability of many different classes of systems, such as multi-state systems [21], dynamic systems [22, 23], phased-mission systems [24, 25]. Among these efforts, BDD-based approaches for the reliability analysis of large-scale network were proposed in [26-29] and they involve three main steps: 1) Order the network components by applying a good heuristic ordering approach, 2) Generate a BDD model from the probabilistic graph of the given network, and 3) Evaluate the BDD to obtain the network reliability. The algorithms to construct the BDD from the probabilistic graph of a given network in [26-29] can be classified into three classes. The first class of algorithms involves constructing an edge expansion diagram of a given network by recursively expanding edges of the source node for each sub-graph. The success path function and the equivalent BDD are then constructed by traversing the graph with the edge expansion diagram [26, 27]. The second class of algorithms is based on a suitable factorization algorithm [28], consisting in 5
pivoting along a complete sequence of edges and deriving the right sub-graph when the edge functions (i.e., the edge is contracted) and the left sub-graph when the edge fails (i.e., the edge is deleted). The third class of algorithms constructs the BDD recursively until the sink node is reached [29]. The BDDs of nodes along a path from source node to sink node are combined using logic AND operation. If a node possesses more than one outgoing edge, the BDDs of the paths starting from each edge are combined using logic OR operation. It is of great interest to generate BDDs as small as possible; the smaller the BDDs, the more efficient BDD construction and subsequent operations (e.g., enumeration of minimal cutsets, and reliability assessment) are. The size of a BDD modeling network reliability heavily depends on the chosen edge ordering. Empirical studies show that there is often a variation of several orders of magnitude between sizes of BDDs of the same network built using different orderings [30]. However, finding the best ordering for a relatively large network is an intractable task in theory [31]; heuristics have been used to obtained good orderings for BDD generation. The ordering heuristics commonly used to generate BDDs for computing network reliabilities are typically based on search schemes such as breadth-first search (BFS) [26-30], depth-first search (DFS) [30], and network-driven search (NDS) [32]. Some piecemeal performance comparisons between different heuristics have been made. For example, in [30], comparisons between BFS and DFS heuristics have been performed and it was found that the BFS heuristic outperforms the DFS heuristic for most of example networks under study. However, no formal guidelines or rules are available for selecting an adequate heuristic from the existing heuristic library. Different people can make different decisions on the heuristic selection, leading to dramatically different sized BDD models. For a specific example, consider the Boolean function f=x1x2+ x3x4 + … + x2n-1x2n. Using the variable ordering where all the variables with odd indices are before variables with even indices, i.e., x1
6
x1 1
x2 0
x3 1
x4 0
x5 x6 0
(a)
(b)
0
1
1
Fig.1. BDD for the function f=x1x2+ x3x4 + x5x6 using (a) bad ordering (b) good ordering Application of a heuristic to a network graph for generating variable ordering starts with the selection of a root node. As shown in [33], the sizes of BDD built using the same heuristic but different root nodes for the same network can also be dramatically different with a variation of several orders of magnitude. Empirical study was performed to study the relationship between the root node selection and efficiency of BDD analysis in [33]. But no formal guidelines exist for selecting a high-performance root node for a given ordering heuristic. In this work, we make novel contributions by proposing heuristic and root node selection methods for efficient BDD-based reliability analysis of networks with perfectly reliable nodes. Empirical studies of different types of undirected networks are conducted to illustrate the implementation and performance of the proposed selection methods. The rest of this paper is organized as follows: Section 2 introduces the mathematical background of the proposed selection methods. Section 3 reviews three widely-used edge ordering heuristics: BFS, DFS and NDS. Section 4 is devoted to the development of a boundary set-measure based selection method for choosing the ordering heuristic. Experimental data on applying the proposed selection method to lattice networks and de Bruijn networks are also presented. Section 5 presents boundary set measure-based selection methods for choosing high-performance root nodes. Finally, Section 6 gives conclusions and directions of our future work. 7
2. Mathematica M al backgroun nd Inn network reliability r anaalysis, a netw work is typiically modeleed using an undirected probabbilistic graph G= (V, E), with V as its nodde set and E V ×V as its eddge set. For coonvenience, we naame a node paair
as a edge ek. For example, thhe 3×3 lattice network in Fig.2 can be repressented by G = ({n0, n1, n2, n3, n4, n5, n6, n7, n8}, {e1, e2, e3, e4, e5, e6, e7, e8, e9, e10, e11, e12}). 0
1
1
3 3
4
6
7
9 11
7
2 5
4
8 6
2
5 10
12
8
Fig.2. A 3×3 lattice nettwork E Each edge ek of o the probabilistic graph G is subject to o failure withh a known proobability qk, 0≤qk≤1. ≤ pk =1- qk thhus represents the probabilityy that edge ek functions. Wee assume that all the edge failuree events are sttatistically inddependent andd all the nodess are perfectlyy reliable in thhis work. A subgraaph of G= (V, E) is also a graph g G’= (V’,, E’), with V’ V as its nodee set and E’ E∩(V’ E ×V’) as its edge e set. W now introoduce two graph We g operatioons: edge deeletion and eedge contracttion, which respecctively lead to subgraph G-k obtained by deleting edge ek from G and ssubgraph G*k obtained o by contraacting ek from m G (the nodee pair of ek arre merged intto one node). When edge ek fails the netwoork behavior iss equivalent to o G-k; when ek functions the network behaavior is equivaalent to G*k. Basedd on this deccomposition, the t reliability of network represented bby G can bee calculated recurssively using R(G)= R pi *R((G*k) + qi * R(G R -k)
(1)
S Suppose the contraction c o deletion opperation is appplied to edgges in the orrder of O= or e(1)
by the operations specified by the path from the root to the node. Further, two reduction rules (“deletion of useless nodes” and “merging isomorphic nodes”) can be applied to modify the binary spanning tree as a rooted acyclic graph, that is a BDD, which contains no node whose outgoing edges point to the same child node (referred to as a useless node) and which does not contain two distinct nodes e(i) and e(j) such that the subgraphs rooted at e(i) and e(j) are isomorphic. Fig.3. gives the binary spanning tree representing the whole contraction (left solid arrows) and deletion (right dashed arrows) process for all-terminal reliability of a complete graph K3 and its BDD
2
1
representation.
3
2
2 3
3
3
3
3
1
(a)
0
1
0
1
0
(b)
Fig.3. All-terminal reliability of complete graph K3 (a) Spanning tree (b) BDD model
The size of a BDD is defined to be the number of non-sink nodes, i.e., the number of created non-isomorphic subgraphs in it. The width of the BDD is defined to be the maximum among the numbers of non-sink nodes at each level. The depth of the BDD is |E|, i.e., the number of edges. Suppose Ek ={e(1), e(2),…, e(k-1)} and ¬Ek ={e(k), e(k+2),…, e(|E|)}. Then the subgraphs of G in the kth-level have the edge set ¬Ek. For example, the subgraphs of G in the top level (level 1) have the edge set ¬E1, and the subgraphs of G in the second level (level 2) have the edge set ¬E2. For k=1, 2,…, |E|, define Fk as the set of nodes incident to some edges both in Ek and ¬Ek. Fk is referred to as
9
a boundary set. For example, assume that the considered edge ordering of the 3×3 lattice network in Fig.2 is e1
the Bell number and calculated as BL = ∑ AL, j where AL,, called the Stirling number, is the number j=1
of partitions of j blocks that can be made with L elements. Theorem 2 [28]: For K-terminal network reliability, let L be the maximum size of the L
min(|K |, j )
j=1
l =0
boundary set. Then, the width of a BDD of a computation process is bounded by ∑ ( AL , j i ∑
⎛ j ⎞⎟ ⎜⎜ ⎟⎟) ⎜⎝ l ⎟⎠
.
As discussed above, the concept of boundary sets has been widely explored in the BDD construction process. However their application in edge ordering has not been fully studied. In this work, we make novel contributions by proposing heuristic and root node selection methods based on the concept of boundary sets and performing empirical studies on different types of undirected networks to illustrate the performance of the proposed selection methods.
3. Edge Ordering Heuristics The size of a BDD encoding the binary spanning tree heavily depends on the chosen edge ordering. However, the problem of finding the best ordering for a network has been proved to be a 10
NP-complete problem [31]. Thus, heuristics have been used to obtained good orderings for BDD generation. As stated in Section 1, the heuristic library used in this paper includes three widely-used edge ordering heuristics: DFS, BFS and NDS. 2.1 Heuristic #1 - DFS The DFS begins at a root node and explores as far as possible along each branch before backtracking. In the implementation, edge ordering with DFS uses a last-in-first-out stack data structure to store intermediate results as it traverses a network graph. Consider a 3×3 lattice network where all the network nodes are numbered in a left-right, top-down manner, starting with 0. Fig.4 illustrates the DFS ordering results on all the edges using node 0 as the root node. Note that the successors of the currently processed node are chosen according to the increasing numbers of the nodes during the DFS search process. For example, node 0 has two successor nodes 1 and 3, node 1 is processed before node 3.
Fig.4. Ordering results with DFS and node 0 being root node 2.2 Heuristic #2 - BFS A key difference between BFS and DFS is the order in which the discovered (adjacent) nodes are explored. The BFS begins at a root node and inspects all its successor nodes. Then for each of these successor nodes in turn, it inspects their successor nodes that remain unvisited, and so on. In the implementation, edge ordering with BFS uses a first-in-first-out queue data structure to store intermediate results as it traverses a network graph. Fig. 5 illustrates the BFS ordering results for a 3×3 lattice network using node 0 as the root node. The successors of the currently processed node are processed in the order of their increasing numbers.
11
Fig.5. Ordering results with BFS and node 0 being root node 2.3 Heuristic #3 - NDS The NDS heuristic was proposed and used by Dutuit, Rauzy and Signoret [32]. It follows the common-sense rule that “two variables that are dependent of each other should be close in ordering". The root node is selected first. The node selected next is the one that has the greatest number of adjacent nodes already indexed or the one that minimizes the sum of indices of its adjacent nodes in case of a tie. Each edge is ordered as soon as its two adjacent nodes are chosen. Fig. 6 illustrates the NDS ordering results for a 3×3 lattice network using node 0 as the root node.
Fig.6. Ordering results with NDS and node 0 being root node
4. Proposed Heuristic Selection Method A boundary set measure based selection method is developed in this section to choose the best heuristic from a given library of edge ordering heuristics for a network reliability problem. Applications of the proposed selection method to different types of network reliability problems are illustrated. 4.1 TSBS-based Selection Method We present a boundary set measure called TSBS for heuristic selection, which can be formally defined as follows:
12
Measure 1 (TSBS): The total size of boundary sets (TSBS) of an edge ordering O=e(1)
TSBS (O) = ∑ | Fi |
(2)
i =1
For example, assume that the edge ordering of the 3×3 lattice network in Fig.2 is O=e1
Fi
|Fi |
e1
{}
0
e2
{0,1}
2
e3
{0,1,2}
3
e4
{1,2,3}
3
e5
{2,3,4}
3
e6
{3,4,5}
3
e7
{3,4,5}
3
e8
{3,4,5}
3
e9
{4,5,6}
3
e 10
{5,6,7}
3
e 11
{6,7,8}
3
e 12
{7,8}
2
Sum
31
TSBS-based Heuristic Selection Method: Given an ordering heuristic library H={h1, h2,…, hL } and a network reliability problem. The TSBS based heuristic selection method can be expressed as follows:
SelTSBS ( H ) = hi ⇔ TSBS (Ohi ) = min {TSBS (Ohj ),1 ≤ j ≤| H |}
(3)
where the ordering generated by hi∈H is denoted as Ohi. In words, the selected ordering heuristic from H is the one that generates ordering leading to the minimum TSBS.
13
4.2 Applications and Performance Evaluation In this section we illustrate the performance of the proposed TSBS-based selection method on the reliability analysis of de Bruijn networks and lattice networks. The heuristic library considered in this work is H={DFS, BFS, NDS}. 4.2.1 De Bruijn Networks De Bruijn networks have applications in a variety of different areas [36, 37]. They allow to construct large networks of fixed degree and small diameter, and they can also be used to design dynamic networks. For example, nodes of a complex dynamic network such as Internet can organize themselves into a constant-degree logarithmic-diameter de Bruijn network. A de Bruijn graph or network of order n has 2n nodes labeled with a binary bit representation of length n of the numbers 0, 1, …, 2n-1. Two nodes are connected iff the label of one is the left- or right-shifted label of the other, or it is the left- or right-shifted label of the other and differs only in the first or last bit. As a result, there are 4 edges at each node, and there are totally 2n+1 edges in the network. Fig.7 illustrates a de Bruijn network of order 4.
Fig.7. An example de Bruijn networks of order 4
Empirical study is performed on the de Bruijn network of order 4 in Fig. 7 by following steps listed below: 1) Randomly select four root nodes: {1, 7, 10, 15}; 2) For each heuristic in the library {DFS, BFS, NDS} and root node in {1, 7, 10, 15}, generate an edge ordering Oi, 1≤i≤ 3*4=12, and then calculate the TSBS measure of this ordering TSBS(Oi) 14
(Table 2); 4) Randomly select eight terminal pairs: {(0, 5); (1, 13); (3, 6); (5, 7); (7, 9); (10, 13); (12, 14); (14, 15)} from the example network; 3) For each terminal-pair reliability problem, generate an equivalent BDD using each edge ordering Oi. Table 3 collects the BDD size data for all the combinations. Based on the collected experimental data in Table 2 and Table 3, it can be observed that for the de Bruijn network the smaller the TSBS value of an ordering heuristic, the smaller the BDD model generated using the corresponding ordering. The smallest BDD is generated by using the NDS heuristic and root node 1, which corresponds to the smallest TSBS value in Table 2. It is also observed that the NDS heuristic performs better than the BFS and DFS heuristics for all the cases.
Table 2. TSBS results for the de Bruijn network of order 4 Root node #
DFS
BFS
NDS
1
159
136
112
7
152
167
134
10
160
151
143
15
177
139
123
Table 3. BDD size data for the de Bruijn network of order 4 Root node#
1
7
10
15
heuristic
(0,5)
(1,13)
(3,6)
(5,7)
(7,9)
(10,13)
(12,14)
(14,15)
DFS
4507
8299
4155
7033
5896
5277
4944
3702
BFS
1626
1681
819
1044
1090
822
895
893
NDS
874
922
409
554
871
429
385
439
DFS
3599
6043
3435
4979
4063
3650
3660
3409
BFS
3267
2972
3717
4130
4581
2621
3349
4022
NDS
1022
776
1520
1741
1660
608
1547
1527
DFS
5505
7976
3490
4409
4051
3607
3574
2788
BFS
4537
2856
2321
4473
2956
3431
2018
2123
NDS
4481
2124
1746
4002
2649
2485
2085
2049
DFS
6816
11481
6521
9897
8087
6872
7052
3408
BFS
1306
1517
2221
2249
2341
1212
2224
2527
NDS
921
675
1456
1624
1546
523
1434
1458
15
4.2.2 Square Lattice Networks Square lattice networks have many applications in distributed parallel computation, distributed control and wired circuits such as CMOS circuits and CCD-based devices [38, 39]. Lattice networks can also be considered as an approximation for networks whose nodes are randomly located [40]. In the graph theory, a square lattice network is a graph whose nodes correspond to the points in the plane with integer coordinates, both x and y coordinates being in the same range 1, ..., n. Two nodes in a lattice network are connected by an edge whenever the corresponding points are at distance 1. In other words, it is a unit distance graph for the described point set. Fig. 8 shows a 5*5 two dimensional square lattice network. 0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Fig.8. The 5*5 two dimensional square lattice network
Similar empirical study for de Bruijn network is performed for the example square lattice network in Fig. 8, except the following parameters are different due to the random selection: 1) the selected four root nodes are {2, 7, 11, 18}; 2) the selected eight terminal pairs are {(0,1), (0,8), (0,12), (0,24), (10,17), (12,16), (14,19),(18,20)}. From the collected experimental data listed in Table 4 and Table 5, similar observation to that for the de Bruijn network can be made, that is, the smaller the TSBS value of an ordering heuristic, the smaller the BDD model generated using the corresponding ordering. The smallest BDD for the example 5*5 square lattice network is generated by using the BFS heuristic and root node 2, which corresponds to the smallest TSBS value in Table 4. Different from the de Bruijn network where 16
NDS is the best heuristic among the three, BFS performs the best for square lattice networks while the performance of NDS is comparable to that of BFS. While the combination of the BFS heuristic and root node 2 gives the best choice for the example network, we also observe from Table 4 and Table 5 that for root nodes 7 and 18, the TSBS generated for NDS is slightly smaller than that using BFS, but the BDD obtained by NDS is smaller than that by BFS for just 3 out of the 8 terminal pairs (root node 7) and for only one terminal pair (root node 18). This can be explained by the fact that the problem of finding the best ordering for BDD generation is an NP-complete problem. Our proposed measure-based selection method can be used to find a reasonable good heuristic for BDD generation, but we cannot guarantee or prove that the heuristic selected performs the best for all the case. Based on the data in Tables 4 and 5, the BDDs obtained by NDS and BFS actually have similar sizes when their TSBS values are very close, so choosing either NDS or BFS will not make much difference. Nevertheless, the TSBS generated using DFS is much higher than TSBS of NDS and BFS, so the BDD size generated using DFS is much larger than those generated using either NDS or BFS. The TSBS generated using BFS and root node 2 is much smaller than TSBS of NDS and BFS for root node 7, 11 and 18, so the BDD size generated using BFS and root node 2 is much smaller than those generated using either NDS or BFS with other root nodes. In summary, the proposed TSBS-based selection method can provide useful guidelines on choosing a good heuristic for BDD generation. Table 4. TSBS results for a 5*5 two dimensional square network Root node #
DFS
BFS
NDS
2
180
178
180
7
222
201
197
11
276
215
215
18
259
211
209
17
Table 5. BDD size data for a 5*5 two dimensional square network Root node #
2
7
11
18
Heuristic
(0,1)
(0,8)
(0,12)
(0,24)
(10,17)
(12,16)
(14,19)
(18,20)
DFS
1332
2327
1989
1965
1212
1093
811
1029
BFS
987
1571
1549
1425
850
1009
681
829
NDS
1129
1739
1681
1564
921
1041
741
879
DFS
5002
5827
7245
6220
4425
3728
2722
3195
BFS
1585
3396
3071
2710
1668
2159
1515
1663
NDS
1921
2911
2681
2759
1734
1854
1554
1692
DFS
15023
24669
18287
21165
14703
9484
9221
10644
BFS
2243
3770
5449
4338
3873
4127
2149
2890
NDS
3766
4393
6340
4959
4539
4096
2580
3125
DFS
7226
7298
8396
9702
8668
5505
4334
5684
BFS
1899
2993
2864
4028
3550
2448
2348
5145
NDS
1929
3120
3630
4313
3468
2941
3123
5839
4.2.3 Torus Lattice Networks Torus Lattice network is widely used as a network topology for connecting processing nodes in a parallel computer system. It can be visualized as a mesh interconnected with nodes arranged in a rectilinear array of D = 2, 3, or more dimensions, with processors connected to their nearest neighbors, and corresponding processors on opposite edges of the array connected. The lattice has the topology of a D dimensional torus and each node has 2D connections. A number of supercomputers on the TOP500 list use three dimensional torus networks, e.g. IBM's Blue Gene/L and Blue Gene/P, and the Cray XT3 [41]. IBM's Blue Gene/Q uses a five dimensional torus network. Fujitsu's K computer and the PRIMEHPC FX10 use a proprietary six dimensional torus interconnect called Tofu [42]. In a two dimensional torus network, the nodes are laid out in a two dimensional rectangular lattice of rows and columns, with each node connected to its 4 nearest neighbors, and corresponding nodes on opposite edges connected. The connection of opposite edges can be visualized by rolling 18
the rectangular array into a "tube" to connect two opposite edges and then bending the "tube" into a torus to connect the other two. In a three dimensional torus interconnect the nodes are imagined in a three dimensional lattice in the shape of a rectangular prism, with each node connected with its 6 neighbors, with corresponding nodes on opposing faces of the array connected. Higher dimensional arrays can not be directly visualized, but each higher dimension adds another pair of nearest neighbor connections to each node. Fig. 9 gives a 4*4 two dimensional torus network.
Fig.9. The 4*4 two dimensional torus network The empirical study for this 4*4 two dimensional torus network has the following parameters: 1) the randomly selected root nodes are {3, 5, 11, 13}; 2) the randomly selected terminal pairs are {(0, 1), (0, 6), (0, 11), (0, 15), (5, 6), (7, 8), (10, 12), (13, 15)}. Tables 6 and 7 present the results. Similar to de Bruijn and square lattice networks, the smaller the TSBS value of an ordering heuristic, the smaller the BDD model generated using the corresponding ordering for torus networks. The smallest BDD for the example torus network is generated by using the BFS heuristic for all the cases but with different root nodes.
Table 6. TSBS results for a 4*4 two dimensional torus network Root node #
DFS
BFS
NDS
3
195
173
190
5
196
173
190
11
227
173
190
13
197
173
190
19
Table 7. BDD size data for a 4*4 two dimensional torus network Root node #
heuristic
(0,1)
(0,6)
(0,11)
(0,15)
(5,6)
(7,8)
(10,12)
(13,15)
3
DFS
13691
23146
15422
18036
31273
27209
21582
17565
BFS
9397
9036
8956
11353
4709
8670
5976
7771
NDS
27302
23357
25857
24428
10661
17204
15019
15618
DFS
13634
26887
21284
18016
35024
22293
17841
17439
BFS
9575
9969
7737
7307
12742
4143
4444
6162
NDS
27302
22783
21973
21211
22301
12016
14010
15081
DFS
31244
42692
31077
36023
60249
37203
51852
36461
BFS
4828
5358
10792
7443
5385
12389
7911
8930
NDS
13267
14323
26280
15618
11314
32968
15867
16590
DFS
19739
22012
15785
18174
29895
26167
20717
17714
BFS
9541
6654
7122
5688
5363
5176
7835
9521
NDS
19239
14323
15341
14800
15531
14475
15867
25412
5
11
13
5. Proposed Root Node Selection A root node must be chosen before applying a selected heuristic to generate a good edge ordering. As shown in the examples of Section 4, the same heuristic with different root nodes produces different edge orderings, leading to dramatically different sizes of BDD model for the same network. Our recent work [33] shows that 1) though the terminal nodes are normally selected as the root node, they often have poor performance; 2) for square lattice networks, the high-performance root nodes are not randomly distributed; nodes located at the four corners of the lattice are better choices for being the root node than nodes located in the center area. To the best of our knowledge, however no formal method has been developed for guiding the root node selection. In this section selection methods are proposed for choosing a high-performance root node contributing to more efficient terminal-pair network reliability analysis.
5.1 TSBS-based Selection Method For most types of networks, such as De Bruijn networks and square lattice networks, different 20
TSBS values will be obtained for the same heuristic but with different root nodes, then the TSBS-based selection method can be applied to select the best performance root node. TSBS-based Root Node Selection Method: Given an ordering heuristic h and a terminal-pair reliability problem of network G= (V, E). The TSBS based root node selection method can be expressed as follows:
SelTSBS (V ) = ni ⇔ TSBS (Oni ) = min {TSBS (Onj ),1 ≤ j ≤| V |}
(4)
where the ordering generated by root node ni∈V using ordering heuristic h is denoted as Oni. In words, the selected root node from V is the one that generates ordering leading to the minimum value of TSBS. Now, we test the performance of the proposed TSBS-based root node selection methods on De Bruijn networks and square lattice networks. z
De Bruijn Networks
For the experimental data shown in Tables 2 and 3, the favorite heuristic of De bruijn networks is NDS. Since this heuristic can result in different TSBS measure values using different root nodes, we can simply use the TSBS based selection method for root node selection. Based on two arrays BestPerformance and WorstPerformance recording the results of performance comparison, our experiment protocol is designed as follows: 1) Generate a de Bruijn Network of order 4; 2) For each node ni of the total 16 nodes, a) Generate edge ordering Oi using the NDS heuristic and root node ni, b) Calculate TSBS measure of this ordering TSBS(Oi); 3) Sort all 16 TSBS(Oi) values in a non-decreasing order and use orderi to denote the position of Oi in the ordered list; 2
4) For each different terminal-pair reliability of total C16 =120 problems in the network with 16 nodes, a) Generate an equivalent BDD using each edge ordering Oi; 21
b) Collect the BDD size data; c) Find the smallest BDD and its ordering Oj, and increment BestPerformance [j] by one d) Find the largest BDD and its ordering Ok, and increment WorstPerformance [k] by one Part of the results in BestPerformance array is listed in Table 8. For each root node ni given in Row ‘#root node’, Row ‘Performance’ lists the number of smallest BDDs obtained by edge ordering Oi, which is generated using the NDS heuristic and root node ni. Row ‘TSBS(Oi)’ and ‘orderi’ lists the TSBS measure calculated using this ordering Oi and its index in the increased ordering list among all 16 TSBS(Oi). From the collected experimental data, it can be observed that: nodes with smaller orderi, i.e., smaller TSBS measure, can generate more number of smallest BDDs. For example, the best root node 0 can generate smallest BDD for 48 terminal-pair reliability problems out of total 120 problems as shown in the first column, and the value of its TSBS measure, TSBS(O0)=111, is also the smallest; the second largest number of smallest BDD generated by root node 8 is 34 as given in column “2nd_best” and its TSBS value, TSBS(O8)=112, is also the second smallest. Part of the results of WorstPerformance array is listed in Table 9. From the collected experimental data, it can be observed that: the first three worst nodes, 10, 3, and 12, can generate 65+36+18=119 largest BDDs out of total 120 cases, and their TSBS are also among the first three largest ones. Though the node with the largest TSBS is not guaranteed to always generate the largest BDDs, as the size data show, large TSBS values still provide a good guideline on identifying bad choices of root nodes.
Table 8. Part of the Results in BestPerformance array Best
2nd_Best
3rd_Best
#root node
0
8
13
Performance
48
34
15
orderi
1/16
2/16
7/16
TSBS(Oi)
111
112
122
22
Table 9. Part of the Results in WorstPerformance array
z
worst
2nd_worst
3rd_ worst
#root node
10
3
12
Performance
65
36
18
orderi
14/16
16/16
15/16
TSBS(Oi)
143
152
149
Square Lattice Networks
In previous experiments, we have shown that for de Bruijn networks the selection method using the TSBS measure can select an adequate root node for a given heuristic. To find if the same conclusion still holds for square lattice networks, the similar experiment protocol as for de Bruijn networks is implemented for the 5*5 two dimensional square lattice network, where the BFS heuristic is used. Part of the results in arrays BestPerformance and WorstPerformance is listed in Tables 10 and 11. The four BFS orderings calculated from root nodes 10, 24, 0, and 4 have the same smallest values of TSBS measure, thus their orders, order10, order24, order0, and order4 are all equal to 1. They together generate 83+74+69+62=228 smallest BDDs out of total 300 cases. On the other hand, the two BFS orderings calculated from root nodes 12, and 17 have the first two largest values of TSBS measure, and their orders orderi are order12=25 and order17=24. They together generate 242+57=299 largest BDDs out of total 300 cases. From the collected experimental data, it can be concluded that similar to de Bruijn networks, nodes with smaller TSBS measures are better choices for being the root node than nodes with large TSBS measure.
23
Table 10. Part of the Results in BestPerformance array Best
2nd_Best
3rd_Best
4th_Best
5th_Best
5th_Best
#root node
20
24
0
4
3
1
Performance
83
74
69
62
4
3
orderi
1/25
1/25
1/25
1/25
8/25
7/25
TSBS(Oi)
155
155
155
155
168
165
Table 11. Part of the Results in WorstPerformance array worst
2nd_worst
3rd_ worst
4th_ worst
5th_worst
5th_worst
#root node
12
17
13
22
11
18
Performance
242
57
0
0
1
0
orderi
25/25
24/25
23/25
21/25
21/25
20/25
TSBS(Oi)
274
249
223
215
215
211
5.2 IFBSH-based Selection Method There are some classes of networks, such as two dimensional torus networks, it can happen that the same TSBS value is obtained for the same heuristic but with different root nodes, as shown in Table 6. At this time, the TSBS-based selection method cannot work well for the root node selection. Another new measure based on the concept of boundary sets called IFBSH is proposed instead. Measure 2 (IFBSH): Given an ordering O and the terminal pair {s, t} of a network, the IFBSH (Index of First Boundary Set Hit) measure of this ordering, IFBSH(O), is the index of boundary set Fi, which includes at least one of the two terminal nodes:
IFBSH (O) = min{i | Fi ∩ {s, t} ≠ ∅}
(5)
According to the definition, the IFBSH measure of an ordering generated using a given root node will have different values for different terminal pairs of the same network. For example, consider
the
the
network
in
Fig.
2.
The
24
boundary
sets
of
a
given
ordering
O=e1
SelIFBSH (V ) = ni ⇔ IFBSH (Oni ) = max { IFBSH (Onj ),1 ≤ j ≤| V |}
(6)
where the ordering generated by root node ni∈V using ordering heuristic h is denoted as Oni. In words, the selected root node from V is the one that generates ordering leading to the maximum value of IFBSH. Now, we show the performance of IFBSH-based selection method on two dimensional torus networks. From the experimental data shown in Table 6 and 7, the favorite heuristic of two dimensional torus networks is BFS, and this heuristic will result in same TSBS measure values for different root nodes. Thus, the IFBSH based selection method instead of the TSBS based selection method should be used. Different from protocols used in the previous two subsections, the experiment protocol here is based on one matrix Performance recording the results of performance comparison. The following gives the details of the experiment protocol. 1) Generate a 4*4 two dimensional torus network; 2) For each different node ni of total 16 nodes, generate edge ordering Oi using the BFS heuristic and root node ni, 2
4) For each different terminal-pair reliability {s, t} of total C16 =120 problems, a) Calculate IFBSH measure of each edge ordering Oi, IFBSH(Oi), using terminal pair {s, t}; 25
b) Sort all 16 IFBSH(Oi) values in a non-increasing order and use orderi to denote the position of Oi in the ordered list; c) Generate an equivalent BDD using each edge ordering Oi, and collect the BDD size data; d) Sort all 16 BDD size values in a non-decreasing order and use BDDSizei to denote the position
of
the
BDD
generated
using
in
Oi
the
ordered
list;
increment
Performance[orderi][BDDSizei] by one.
Part of the results in Performance matrix for the best performance and worst performance are listed in Tables 12 and 13. For example, the first column of Table 12 shows that the orderings with the largest IFBSH values, orderx=1, can generate 58 smallest BDDs and 18 second smallest BDDs out of the total 120 cases. In Table 13, the last column shows that the ordering with smallest IFBSH value, orderx=16, can generate 106 largest BDDs out of the 120 cases, and the second last column shows the ordering with second smallest IFBSH values can generate the most second largest BDDs. From the collected experimental data, it can be concluded that the orderings generated using root nodes with larger values of the IFBSH measure are better choices for being the root node than nodes with smaller values of the IFBSH measure.
Table 12. Part of the Best Results in Performance matrix orderi
1
2
3
4
5
6
No. of Smallest BDDs
58
12
29
12
3
2
No. of 2nd Smallest BDDs
18
60
6
23
10
1
No. of 3rd Smallest BDDs
14
18
60
6
17
0
Table 13. Part of the Worst Results in Performance matrix orderi
11
12
13
14
15
16
No. of Largest BDDs
0
2
0
12
0
106
No. of 2nd Largest BDDs
4
0
12
0
104
0
No. of 3rd Largest BDDs
12
22
18
58
2
4
26
In this work, we give the priority to TSBS over IFBSH for selecting root node because the size of boundary sets has been theoretically shown to be closely related to BDD size by Theorems 1-2. The IFBSH is used as a secondary method only for networks where the selected heuristic results in the same TSBS measure values for different root nodes. For networks where different TSBS values are obtained with different root nodes, we actually found that the performance of the IFBSH method is not as favorable as what is achieved in two dimensional torus networks. Specifically, consider the de Bruijn Network of order 4. As shown in Table 8, the best root node 0 can generate smallest BDDs for 48 terminal-pair reliability problems out of total 120 problems; among these 48 problems,
only
16
largest/second-largest/third-largest
IFBSH
values
but
12
smallest/second-smallest/third-smallest IFBSH values out of total 48 cases are generated. Similarly, consider the 5*5 two dimensional square lattice network. As shown in Table 10, the best root node 20 using the BFS heuristic can generate smallest BDDs for 83 terminal-pair reliability problems out of total 300 problems. Among these 83 problems, only 31 largest/second largest/third largest IFBSH values but 23 smallest/second smallest/third smallest IFBSH values out of the total 83 cases are generated.
6. Conclusions and Future work In the BDD-based terminal-pair network reliability analysis, a network is encoded by a BDD. This encoding requires selecting a total order over all the edges of the network. The size of the BDD heavily depends on the chosen ordering. There is often a variation of several orders of magnitude between the sizes of BDDs built using different orderings. Several ordering heuristics, such as DFS, BFS and NDS, have been proposed in the literature for the network reliability analysis. They perform differently for different types of networks. In addition, the same heuristic can perform differently when different root nodes are used. Therefore, there is a need for the development of selection methods that can facilitate the selection of an adequate heuristic from a heuristic library and the selection of a high-performance root node to perform edge searching. The 27
main contribution of this paper is to construct such selection methods based on the concept of boundary sets, in particular, two new measures TSBS and IFBSH, and then test the performance of these methods using experiments on three types of widely-used networks. Experimental data revealed that the high-performance orderings and values of TSBS measure are correlated: heuristics resulting in smaller TSBS values typically achieve better performance in BDD generation. For the case where different TSBS measure values are calculated using the same heuristic but different root nodes, the TSBS based selection method can also be used to select a high-performance root node. Similar to the heuristic selection, root nodes resulting in smaller TSBS values are better choices. For the case where the same TSBS measure values are calculated using the same heuristic but different root nodes, the IFBSH based selection method can be used to select a high-performance root node and root nodes resulting in larger IFBSH values are better choices. One direction of our future work is to conduct performance studies of TSBS and IFBSH based selection methods using more general network structures, specifically, randomly generated networks and directed network graphs. We also plan to design different variants of BFS and NDS heuristics based on weight assignment of nodes and edges for better performance. As in most of network reliability studies, we have assumed perfectly reliable nodes in this work. In the real-world network systems, however, both nodes and edges can fail [27]. Thus, another direction of our future work is to extend the TSBS and IFBSH based selection methods to take into account the effect of imperfect nodes.
Acknowledgement This work was supported in part by the NSF of China under Grant No. 61272130, 61272007, U.S. NSF under Grant No. 1112947, the NSF of Zhejiang Province under Grant No. Y1100689.
References [1] I. B. Gertsbakh, Y. Shpungin. Models of Network Reliability: Analysis, Combinatorics, and Monte Carlo. Boca Raton, FL: CRC Press. 2010. 28
[2] H. Cancela, M. El Khadiri, and G. Rubino. “Rare Event Analysis by Monte Carlo Techniques in Static Models”. In Rare Event Simulation Using Monte Carlo Methods, edited by G. Rubino and B. Tuffin, Wiley. Chapter 7. 145–170. 2009. [3] P. L’Ecuyer, G. Rubino, S. Saggadi, and B. Tuffin, “Approximate zero-variance importance sampling for static network reliability estimation,” IEEE Trans. Rel., vol. 60, no. 3, pp. 590–604, Sep. 2011. [4] H. Cancela, P. L’Ecuyer, G. Rubino, and B. Tuffin. “Combination of Conditional Monte Carlo and Approximate Zero-Variance Importance Sampling for Network Reliability Estimation”. In Proceedings of the 2010 Winter Simulation Conference, Piscataway, New Jersey, 2010, December. 1263–1274. [5] Z. I. Botev, P. L’Ecuyer, G. Rubino, R. Simard, and B. Tuffin, “Static network reliability estimation via generalized splitting,” INFORMS J. Comput., vol. 25, no. 1, pp. 56–71, 2013. [6] C. J. Colbourn, The combinatorics of network reliability. NewYork: Oxford University Press, 1987. [7] Y. K. Lin, “Reliability evaluation for an information network with node failure under cost constraint,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 37, no. 2, pp. 180–188, Mar. 2007. [8] W. C. Yeh, “A greedy branch-and-bound inclusion–exclusion algorithm for calculating the exact multi-state network reliability,” IEEE Trans. Rel., vol. 57, no. 1, pp. 88–93, Mar. 2008. [9] W. C. Yeh, “An improved sum-of-disjoint-products technique for the symbolic network reliability analysis with known minimal paths,” Reliab. Eng. Syst. Saf., vol. 92, no. 2, pp. 260–268, Feb. 2007. [10] J. Li, J. He. “A recursive decomposition algorithm for network seismic reliability evaluation,” Earthquake Engineering & Structural Dynamics, 31, pp. 1525–1539. 2002. [11] Y. Kim, W.-H. Kang, “Network reliability analysis of complex systems using a non-simulation-based method,” Reliab. Eng. Syst. Saf., vol. 110, pp. 80–88, Feb. 2013.
29
[12] W.-H. Kang, J. Song, P. Gardoni, “Matrix-based system reliability method and applications to bridge networks,” Reliab. Eng. Syst. Saf., vol. 93, pp. 1584–1593, 2008. [13] J. Song, W.-H. Kang, “System reliability and sensitivity under statistical dependence by matrix-based system reliability method,” Structural Safety, 31, pp. 148–156, 2009. [14] L. Chang, J. Song, “Matrix-based system reliability analysis of urban infrastructure networks: a case study of MLGW natural gas network,” In Proceedings of the 5th China-Japan-US trilateral symposium on lifeline earthquake engineering. Haikou (China), 26-30, 2007. [15] G. Levitin, “Reliability Evaluation for Acyclic Consecutively Connected Networks with Multistate Elements,” Reliab. Eng. Syst. Saf., vol. 73, no. 2, pp. 137–143, 2001. [16] W. C. Yeh and Y. M. Yeh, “A novel label universal generating function method for evaluating the one-to-all subsets general multistate information network reliability,” IEEE Trans. Rel., vol. 60, no. 2, pp. 470–478, Jun. 2011. [17] W. C. Yeh, “An improved method for the multistate flow network reliability with unreliable nodes and the budget constraint based on path set,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 41, no. 2, pp. 350–355, Mar. 2011. [18] W. C. Yeh, “A Modified Universal Generating Function Algorithm for the Acyclic Binary-State Network Reliability,” IEEE Trans. Rel., vol. 61, no. 3, pp. 702-709, Sept. 2012. [19] S.B. Akers, “Binary Decision Diagrams,” IEEE Trans. Computer. C-27(6): 509-516,1978. [20] R. Bryant, “Graph Based Algorithms for Boolean Function Manipulation,” IEEE Trans. Computer., 35(8): 677-691, 1986. [21] R. Peng, H. Mo, M. Xie, and G. Levitin. “Optimal structure of multi-state systems with multi-fault coverage,” Reliab. Eng. Syst. Saf., vol. 119, pp. 18-25, Nov. 2013 [22] Q. Zhai, R. Peng, L. Xing, and J. Yang, "BDD-based Reliability Evaluation of k-out-of-(n+k) Warm Standby Systems Subject to Fault-Level Coverage," Proc IMechE, Part O, Journal of Risk and Reliability, Vol. 227, No. 5, pp. 540-548, October 2013.
30
[23] Y. Mo. “A multiple-valued decision-diagram-based approach to solve dynamic fault trees,” IEEE Trans. Rel., vol. 63, no. 1, pp. 81-93, Mar. 2014. [24] Y. Mo, L. Xing, and S.V. Amari. “A Multiple-Valued Decision Diagram Based Method for Efficient Reliability Analysis of Non-repairable Phased-Mission Systems,” IEEE Trans. Rel., vol. 63, no. 1, pp. 320-330, Mar. 2014. [25] L. Xing and G. Levitin, "BDD-Based Reliability Evaluation of Phased-Mission Systems with Internal/External Common-Cause Failures," Reliab. Eng. Syst. Saf., Vol. 112, pp. 145-153, April 2013 [26] F.M. Yeh, S.K. Lu, and S. Y. Kuo, “OBDD-based evaluation of k-terminal network reliability,” IEEE Trans. Reliability, vol. R-51, no. 4, 2002. [27] S.Y. Kuo, F.M. Yeh, and H.Y Lin, “Efficient and Exact Reliability Evaluation for Networks With Imperfect Vertices,” IEEE Trans. Rel., vol. 56, no. 2, pp. 288-300, 2007. [28] G. Hardy, C. Lucet, and N. Limnios, “K-Terminal Network Reliability Measures With Binary Decision Diagrams,” IEEE Trans. Rel., vol. 56 no. 3, pp.506 – 515, 2007. [29] X. Zang, H. Sun, and K. Trivedi. A BDD-based algorithm for reliability graph analysis. Technical report, Department of Electrical Engineering, Duke University, 2000. [30] S. Y. Kuo, S. K. Lu, and F. M. Yeh, “Determining terminal-pair network reliability based on edge expansion diagrams using OBDD,” IEEE Trans. Rel., vol. 48, no. 3, pp. 234–246, Sep. 1999. [31] S. J. Friedman and K. J. Supowit, "Finding the Optimal Variable Ordering for Binary Decision Diagrams," Proceedings of 24th ACM/IEEE Conf. Design Automation, pp. 348-356, 1987. [32] Y. Dutuit, A. Rauzy and J.P. Signoret, “Computing Network Reliability with Réséda and Aralia,” Proceedings of European Safety and Reliability Association Conference, ESREL'96, pp 1947–1952, 1996. [33] Z. Pan, Y.C. Mo, L. Xing and J. Han, “New insights into breadth-first search edge ordering of regular networks for terminal-pair reliability analysis,” Journal of Risk and Reliability, February 2014, vol. 228 no. 1, pp:83-92 31
[34] J. Carlier and C. Lucet, "A Decomposition Algorithm for Network Reliability Evaluation," Discrete Applied Mathematics, vol. 65, pp. 141-156, 1996. [35] H. Imai, K. Sekine, and K. Imai, “Computational investigations of all terminal network reliability via BDDs,” IEICE Transactions on Fundamentals vol. E82-A, no. 5, pp. 714–721, May 1999. [36] J.C. Bermond and P. Fraigniaud. “Broadcasting and gossiping in de Bruijn networks”. SIAM Journal on Computing, 23(1):212–225, 1994. [37] P. Fraigniaud and P. Gauron. “D2B: A De Bruijn based content-addressable network”. Theoretical Computer Science, 355(1):65-79, 2006. [38] G. Barrenetxea, B. Beferull-Lozano and M. Vetterli "Lattice networks: Capacity limits, optimal routing, and queueing behavior", IEEE/ACM Transactions on Network, vol. 14, no. 3, pp.492 -505 2006 [39] R. D'Andrea and G. E. Dullerud, “Distributed control design for spatially interconnected systems,” IEEE Transactions on Automatic Control, vol. 48, no. 9, pp. 1478–1495, Sep. 2003. [40] G. J. Pottie and W. J. Kaiser, “Wireless integrated network sensors,” Communications of the ACM, vol. 43, no. 5, 51-58, May 2000. [41] N. R. Adiga, M. A. Blumrich, D. Chen, P. Coteus, A. Gara, M. E. Giampapa, P. Heidelberger, S. Singh. “Blue Gene/L Torus Interconnection Network,” IBM Journal of Research and Development, Vol 45, No 2/3, pp:265, March–May 2005 [42] Fujitsu
Unveils
Post-K
Supercomputer.
fujitsu_unveils_post-k_supercomputer.html
32
http://www.hpcwire.com/hpcwire/2011-11-07/