### Table 1: Wiring cost resuls of placements for various interconnection network topologies

"... In PAGE 3: ...esh shown in Fig. 3(a). For these cases, the superior, trivial solution is used. The maximum Manhattan wire-length for each considered topology is shown in Table1 , called the critical wire-length because it would determine the speed of a uniform network. There are three interesting points to note from these results.... ..."

### Table 1: Network Topologies

"... In PAGE 3: ... Network model Two different network topologies have been considered for our study (Figure 2). Table1 reports the number of nodes N, the number of unidirectional links L, the hop count averaged among all node pairs h and the link capacity C (Mb/s). The reason to have two different topologies is that the smaller 7nodes topology could be implemented both in the simulation study and in a testbed (see II.... ..."

### Table 5: Network Topologies

1995

"... In PAGE 5: ... We used LOOM to experimentally calculate the best network topol- ogy (number of hidden units). Table5 lists the best topology 1Scaling reduces the side effects of scale differences between param- eters. Linear, square root, logarithm, and general data transformation are... ..."

Cited by 4

### Table 1. Network Topology.

1997

Cited by 3

### Table 1. Network topologies

"... In PAGE 7: ...of different partitionings. To compare the different algorithms, we used the topolo- gies listed in Table1 . The names of the topologies roughly follow the convention: type-nodes-links-otherparam.... ..."

### Table II Network Topologies

### Table 2: Network topologies

### Table 6. Unique Network Topologies

"... In PAGE 6: ...able 5. Attacker Classification ..................................................................................................... 42 Table6 .... In PAGE 90: ... Since the number of elements that determine the symmetric topology are half that of the asymmetric case, we calculate the number of symmetric topologies using Equation 3: 2N(N-1)/2. (3) Following Equations 2 and 3, Table6 indicates the total unique network topologies that must be generated and evaluated to ensure all possible message event sequences for a given network size N. These topologies range from fully disconnected, with no links, to fully connected, where each node connects to all other nodes.... ..."