Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A Permutation Network

Published: 01 January 1968 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper the construction of a switching network capable of n!-permutation of its n input terminals to its n output terminals is described. The building blocks for this network are binary cells capable of permuting their two input terminals to their two output terminals.
    The number of cells used by the network is 〈n · log2 n - n + 1〉 = Σn k=1 〈log2 k〉. It could be argued that for such a network this number of cells is a lower bound, by noting that binary decision trees in the network can resolve individual terminal assignments only and not the partitioning of the permutation set itself which requires only 〈log2 n!〉 = 〈Σn k=1 log2 k〉 binary decisions.
    An algorithm is also given for the setting of the binary cells in the network according to any specified permutation.

    References

    [1]
    HALL, P. On representatives of subsets. J. London Math. Soe. 10 (1965), 26-30.
    [2]
    BENES, V. E. MathemaTIcal Theory of connecting networks and Telephone Traffic. Academic Press New York, 1935.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Journal of the ACM
    Journal of the ACM  Volume 15, Issue 1
    Jan. 1968
    163 pages
    ISSN:0004-5411
    EISSN:1557-735X
    DOI:10.1145/321439
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 January 1968
    Published in JACM Volume 15, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)554
    • Downloads (Last 6 weeks)53
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Multi-Function Scan Circuit for Assisting the Parallel Computational Map PatternRomanian Journal of Information Science and Technology10.59277/ROMJIST.2024.1.012024:1(3-20)Online publication date: 26-Mar-2024
    • (2024)Interconnection networksSequences and the de Bruijn Graph10.1016/B978-0-44-313517-0.00018-4(405-457)Online publication date: 2024
    • (2023)Necessary Conditions and Empirical Observations for Rearrangeable Banyan-Type NetworksWSEAS TRANSACTIONS ON CIRCUITS AND SYSTEMS10.37394/23201.2023.22.2122(180-194)Online publication date: 31-Dec-2023
    • (2023)Physically non-cloneable arbiter -type function with non-linear path pairs«System analysis and applied information science»10.21122/2309-4923-2023-1-54-62(54-62)Online publication date: 2-Aug-2023
    • (2023)Exploiting the Regular Structure of Modern Quantum Architectures for Compiling and Optimizing Programs with Permutable OperatorsProceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 410.1145/3623278.3624751(108-124)Online publication date: 25-Mar-2023
    • (2023)Less is more: refinement proofs for probabilistic proofs2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179393(1112-1129)Online publication date: May-2023
    • (2023)Arbitrary-size permutation networks using arbitrary-radix switchesTheoretical Computer Science10.1016/j.tcs.2023.113939962(113939)Online publication date: Jun-2023
    • (2023)Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean ArithmeticJournal of Cryptology10.1007/s00145-023-09464-436:3Online publication date: 11-Jul-2023
    • (2023)PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity CommunicationInformation Security and Cryptology10.1007/978-981-97-0942-7_12(227-252)Online publication date: 9-Dec-2023
    • (2023)Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear ComplexitiesApplied Cryptography and Network Security10.1007/978-3-031-33491-7_5(115-142)Online publication date: 19-Jun-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media