Research Article

[Retracted] Fault-Tolerant Secure Routing Based on Trust Evaluation Model in Data Center Networks

Table 1

Comparison of shortest path algorithms.

FloydDijkstraBellman–FordSPFADouble-stack_DFS

Spatial complexityO(N2)O(E)O(E)O(E)O(N)
Time complexityO(N3)O(N+E)logNO(NE)O(NE)O(N!)
ApplicationDense graph
Nodes are closely related
Dense graph
Nodes are closely related
Sparse graph
Edges are closely related
Sparse graph
Edges are closely related
Sparse graph
Edges are closely related
UsageThe optimal path of any two nodes can be obtained by executing onceOnce executed, the optimal path from the first node to any node can be obtainedOnce executed, the optimal path from the first node to any node can be obtainedOnce executed, the optimal path from the first node to any node can be obtainedOnce executed, all paths are specified between two nodes
Spatial complexityO(N2)O(E)O(E)O(E)O(N)