{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q856156","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q856156","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q856156","kernelVersion":"v1","immutable":true,"modified":"2026-01-12T11:18:25Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q856156","name":"A bypassing path based routing algorithm for the pyramid structures","headline":"A bypassing path based routing algorithm for the pyramid structures","description":"scientific article; zbMATH DE number 5078443","url":"https://portal.mardi4nfdi.de/entity/Q856156","datePublished":"2006-12-07","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q300260"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q70476"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1016/J.AMC.2006.02.044","url":"https://doi.org/10.1016/J.AMC.2006.02.044"},"sameAs":["https://doi.org/10.1016/J.AMC.2006.02.044"],"comment":"A pyramid structure belongs to the interconnection distributed architectures, modelling many parallel configurations or arrangements, such as component labelling, image processing (shrinking and expanding), etc. The pyramid structure consists of a connected mesh. To exchange information between computing nodes of the structure, a natural routing algorithm based on links between adjacent nodes is used.   In the article, the existence of faulty mesh nodes or links are explicitly considered. When the nodes or links are faulty, it is generally impossible to obtain the effective path for data transmission. Therefore, an alternative routing algorithm based on a collection of bypassing paths is suggested and some of the mathematical properties of those bypassing paths are investigated. Specially, the average length of bypassing paths is studied.","citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q4871748"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4692391"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4541799"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4571391"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4002466"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3126969"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3774926"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1416347"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2572332"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3392273"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4419733"}]},"provenance":{"prov:generatedAtTime":"2026-01-12T11:18:25Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}