Skip to main content

Research Repository

Advanced Search

Outputs (329)

Hamiltonian cycles through prescribed edges in k-ary n-cubes. (2011)
Presentation / Conference Contribution
Stewart, I. (2011). Hamiltonian cycles through prescribed edges in k-ary n-cubes. In W. Wang, X. Zhu, & D. Du (Eds.), Combinatorial Optimization and Applications. COCOA 2011 (82-97). https://doi.org/10.1007/978-3-642-22616-8_8

We prove that if P is a set of at most 2n − 1 edges in a k-ary n-cube, where k ≥ 4 and n ≥ 2, then there is a Hamiltonian cycle on which every edge of P lies if, and only if, the subgraph of the k-ary n-cube induced by the edges of P is a vertex-disj... Read More about Hamiltonian cycles through prescribed edges in k-ary n-cubes..

Color image edge detection based on quantity of color information and implementation on the GPU. (2011)
Presentation / Conference Contribution
Zhao, J., Xiang, Y., Dawson, L., & Stewart, I. (2011). Color image edge detection based on quantity of color information and implementation on the GPU. In T. Gonzalez (Ed.), Proceeding (757) Parallel and Distributed Computing and Systems - 2011, December 14 – 16, 2011, Dallas, USA (116-123). https://doi.org/10.2316/p.2011.757-077

In this paper, we present a new method for quantifying color information so as to detect edges in color images. Our method uses the volume of a pixel in the HSI color space, allied with noise reduction, thresholding and edge thinning. We implement ou... Read More about Color image edge detection based on quantity of color information and implementation on the GPU..

Node-to-node disjoint paths in k-ary n-cubes with faulty edges. (2012)
Presentation / Conference Contribution
Xiang, Y., Stewart, I., & Madelaine, F. (2012). Node-to-node disjoint paths in k-ary n-cubes with faulty edges. In 2011 IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS 2011). Proceedings of a meeting held 7-9 December 2011, Tainan, Taiwan (181-187). https://doi.org/10.1109/icpads.2011.85

Let u and v be any two given nodes in a k-ary n-cube Qnk with at most 2n-2 faulty edges. Suppose that the number of healthy links incident with u is no more than that of v, and denote this number by m. In this paper, we show that there are m mutually... Read More about Node-to-node disjoint paths in k-ary n-cubes with faulty edges..

Pancyclicity in faulty k-ary 2-cubes (2009)
Presentation / Conference Contribution
Xiang, Y., & Stewart, I. (2009). Pancyclicity in faulty k-ary 2-cubes. In Proceedings of the 21st IASTED International Conference on Parallel and Distributed Computing and Systems PDCS, 2-4 November, Cambridge, Massachusetts (77-84)

We prove that a k-ary 2-cube $Q_k^2$ with 3 faulty edges but where every vertex is incident with at least 2 healthy edges is bipancyclic, if k ≥ 3, and k-pancyclic, if k ≥ 5 is odd (these results are optimal).

Pancyclicity and panconnectivity in augmented k-ary n-cubes (2009)
Presentation / Conference Contribution
Xiang, Y., & Stewart, I. (2009). Pancyclicity and panconnectivity in augmented k-ary n-cubes. In 15th International Conference on Parallel and Distributed Systems, ICPADS, 8-11 December 2009, Shenzhen, China ; proceedings (308-315). https://doi.org/10.1109/icpads.2009.45

The augmented k-ary n-cube AQ_{n,k} is a recently proposed interconnection network that incorporates an extension of a k-ary n-cube Q_n^k inspired by the extension of a hypercube Q_n to the augmented hypercube AQ_n (as developed by Choudom and Sunita... Read More about Pancyclicity and panconnectivity in augmented k-ary n-cubes.

Frameworks for logically classifying polynomial-time optimisation problems (2010)
Presentation / Conference Contribution
Gate, J., & Stewart., I. (2010). Frameworks for logically classifying polynomial-time optimisation problems. In F. Ablayev, & E. F. Mayr (Eds.), 5th International Computer Science Symposium in Russia, CSR 2010, 16-20 June 2010, Kazan, Russia ; proceedings (120-131). https://doi.org/10.1007/978-3-642-13182-0_12

We show that a logical framework, based around a fragment of existential second-order logic formerly proposed by others so as to capture the class of polynomially-bounded P-optimisation problems, cannot hope to do so, under the assumption that P ≠ NP... Read More about Frameworks for logically classifying polynomial-time optimisation problems.

A general algorithm for detecting faults under the comparison diagnosis model (2010)
Presentation / Conference Contribution
Stewart, I. (2010). A general algorithm for detecting faults under the comparison diagnosis model. In 2010 IEEE International Symposium on Parallel and Distributed Processing IPDPS, 19-23 April 2010, Atlanta GA, ; proceedings (1-9). https://doi.org/10.1109/ipdps.2010.5470369

We develop a widely applicable algorithm to solve the fault diagnosis problem in certain distributed-memory multiprocessor systems in which there are a limited number of faulty processors. In particular, we prove that if the underlying graph G = (V,E... Read More about A general algorithm for detecting faults under the comparison diagnosis model.

The computational complexity of the parallel knock-out problem (2006)
Presentation / Conference Contribution
Broersma, H., Johnson, M., Paulusma, D., & Stewart, I. (2006). The computational complexity of the parallel knock-out problem. In LATIN 2006 : theoretical informatics: : 7th Latin American symposium, Valdivia, Chile, March 20-24, 2006 : proceedings (250-261). https://doi.org/10.1007/11682462_26

We consider computational complexity questions related to parallel knock-out schemes for graphs. In such schemes, in each round, each remaining vertex of a given graph eliminates exactly one of its neighbours. We show that the problem of whether, for... Read More about The computational complexity of the parallel knock-out problem.

Physical-layer Jammer Detection in Multi-hop IoT Networks (2023)
Journal Article
Abdollahi, M., Malekinasab, K., Tu, W., & Bag-Mohammadi, M. (2023). Physical-layer Jammer Detection in Multi-hop IoT Networks. IEEE Internet of Things Journal, https://doi.org/10.1109/JIOT.2023.3291997

The presence of a jammer in an IoT network severely degrades all communication efforts between adjacent wireless devices. The situation is getting worse due to retransmission attempts made by affected devices. Therefore, jammers must be detected or l... Read More about Physical-layer Jammer Detection in Multi-hop IoT Networks.

GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment (2023)
Journal Article
Ahmad, H., & Aujla, G. S. (2023). GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment. Computers and Electrical Engineering, 109, https://doi.org/10.1016/j.compeleceng.2023.108747

With cloud-hosted web applications becoming ubiquitous, the security risks presented for user personal data that is migrated to the cloud are at an all-time high. When using a cloud-hosted web application, users only ever interact with web interfaces... Read More about GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment.

An accurate RSS/AoA-based localization method for internet of underwater things (2023)
Journal Article
Pourkabirian, A., Kooshki, F., Anisi, M. H., & Jindal, A. (2023). An accurate RSS/AoA-based localization method for internet of underwater things. Ad Hoc Networks, 145, Article 103177. https://doi.org/10.1016/j.adhoc.2023.103177

Localization is an important issue for Internet of Underwater Things (IoUT) since the performance of a large number of underwater applications highly relies on the position information of underwater sensors. In this paper, we propose a hybrid localiz... Read More about An accurate RSS/AoA-based localization method for internet of underwater things.

Health Monitoring and Diagnosis for Geo-Distributed Edge Ecosystem in Smart City (2023)
Journal Article
Wen, W., Demirbaga, U., Singh, A., Jindal, A., Batth, R. S., Zhang, P., & Aujla, G. S. (2023). Health Monitoring and Diagnosis for Geo-Distributed Edge Ecosystem in Smart City. IEEE Internet of Things Journal, 10(21), 18571-18578. https://doi.org/10.1109/jiot.2023.3247640

With the increasing number of Internet of Things (IoT) devices being deployed and used in daily life, the load on computational devices has grown exponentially. This situation is more prevalent in smart cities where such devices are used for autonomo... Read More about Health Monitoring and Diagnosis for Geo-Distributed Edge Ecosystem in Smart City.

Termination of amnesiac flooding (2023)
Journal Article
Hussak, W., & Trehan, A. (2023). Termination of amnesiac flooding. Distributed Computing, 36(2), 193-207. https://doi.org/10.1007/s00446-023-00448-y

We consider a stateless ‘amnesiac’ variant of the stateful distributed network flooding algorithm, expanding on our conference papers [PODC’19, STACS’20]. Flooding begins with a set of source ‘initial’ nodes I seeking to broadcast a message M in roun... Read More about Termination of amnesiac flooding.

Parameterized temporal exploration problems (2023)
Journal Article
Erlebach, T., & Spooner, J. T. (2023). Parameterized temporal exploration problems. Journal of Computer and System Sciences, 135, 73-88. https://doi.org/10.1016/j.jcss.2023.01.003

In this paper we study the fixed-parameter tractability of the problem of deciding whether a given temporal graph G admits a temporal walk that visits all vertices (temporal exploration) or, in some problem variants, a certain subset of the vertices.... Read More about Parameterized temporal exploration problems.

A distributed task orchestration scheme in collaborative vehicular cloud edge networks (2022)
Journal Article
Mittal, S., Dudeja, R. K., Bali, R. S., & Aujla, G. S. (2022). A distributed task orchestration scheme in collaborative vehicular cloud edge networks. Computing, https://doi.org/10.1007/s00607-022-01119-9

The next generation vehicular networks would be expected to support a wide array of cutting edge applications concerning intelligent transportation system (ITS). Due to this reason, the scale and complexity of ITS-based compute-intensive tasks has ex... Read More about A distributed task orchestration scheme in collaborative vehicular cloud edge networks.

TRUTH: Trust and Authentication Scheme in 5G-IIoT (2022)
Journal Article
Soleymani, S. A., Goudarzi, S., Anisi, M. H., Cruickshank, H., Jindal, A., & Kama, N. (2023). TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics, 19(1), 880-889. https://doi.org/10.1109/tii.2022.3174718

Due to the extremely important role of data in the Industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this study, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-par... Read More about TRUTH: Trust and Authentication Scheme in 5G-IIoT.