No abstract available.
Compact routing schemes
We describe several compact routing schemes for general weighted undirected networks. Our schemes are simple and easy to implement. The routing tables stored at the nodes of the network are all very small. The headers attached to the routed messages, ...
Routing without flow control
We present the first dynamic hot-potato routing algorithm that does not require any form of explicit flow control: a node may inject a message into the network (n × n mesh) whenever a link is free. In the worst case, a node may have to wait an expected ...
Fast, minimal and oblivious routing algorithms on the mesh with bounded queues
This paper studies fast, deterministic, permutation routing algorithms with bounded queues on the n × n mesh. Our main result is an Ο(n)-step, strongly-dimensional (and thus also source-oblivious and minimal) permutation routing algorithm. This ...
One-to-Many routing on the mesh
We study the routing of messages with multiple destinations on an n-node square mesh (one-to-many routing). The obvious approach of simply replicating each message into the appropriate number of point-to-point messages and routing these independently ...
Simple on-line algorithms for the maximum disjoint paths problem
In this paper we study the problem of finding disjoint paths in graphs. Whereas for specific graphs many (almost) matching upper and lower bounds are known for the competitiveness of on-line path selection algorithms, much less is known about how well ...
Stability and non-stability of the FIFO protocol
- Josep Díaz,
- Dimitrios Koukopoulos,
- Sotiris Nikoletseas,
- Maria Serna,
- Paul Spirakis,
- Dimitrios M. Thilikos
In this paper, we analyze the stability properties of the FIFO protocol in the Adversarial Queueing model for packet routing. We show a graph for which FIFO is stable for any adversary with injection rate r ≰ 0.1428. We generalize this results to show ...
Competitve buffer management for shared-memory switches
We consider buffer management policies for shared memory packet switches supporting Quality of Service (QoS). There are two interesting dimensions in which the setting may different. The first is the packet size, whether all the packets of the same ...
Tradeoffs between knowledge and time of communication in geometric radio networks
We consider deterministic broadcasting in geometric radio networks (GRN) whose nodes know only a limited part of the network Nodes of a GRN are situated in the plane and each of them is equipped with a transmitter of some range r. A signal from this ...
Attack propagation in networks
A new model for intrusion and its propagation through various attack schemes in networks is considered. The model is characterized by the number of network nodes, and two parameters f and g. Parameter f represents the probability of failure of an attack ...
Deterministic resource discovery in distributed networks
The resource discovery problem was introduced by Harchol-Balter, Leigh ton and Lewin. They developed a number of algorithms for the problem in the weakly connected directed graph model. This model is a directed logical graph, that represents the ...
Latency effects on reachability in large-scale peer-to-peer networks
In this paper we study the latency effects introduced in large scale internet applications. In particular, we study the effects of heterogeneous latency on reachability in decentralized, distributed networks operating under flooding protocols. We show ...
Towards a first vertical prototyping of an extremely fine-grained parallel programming approach
Explicit-multithreading (XMT) is a parallel programming approach for exploiting on-chip parallelism. XMT introduces a computational framework with 1) a simple programming style that relies on fine-grained PRAM-style algorithms; 2) hardware support for ...
A cost effective architecture for vectorizable numerical and multimedia applications
This paper analyzes the performance of vector-dominated regions of code in numerical and multimedia applications in a superscalar+vector architecture and compares it to an 8-way superscalar processor. The ability to split a program's execution into ...
Automatable verification of sequential consistency
Sequential consistency is a multiprocessor memory model of both practical and theoretical importance. Designing and implementing a memory system that efficiently provides a given memory model is a challenging and error-prone task, so automated ...
Room synchronizations
We present a class of synchronization called room synchronizations and show how this class can be used to implement asynchronous parallel queues and stacks with constant time access (assuming a fetch-and-add operation). The room synchronization problem ...
A simple, fast and scalable non-blocking concurrent FIFO queue for shared memory multiprocessor systems
A non-blocking FIFO queue algorithm for multiprocessor shared memory systems is presented in this paper. The algorithm is very simple, fast and scales very well in both symmetric and non-symmetric multiprocessor shared memory systems. Experiments on a ...
Computational power of pipelined memory hierarchies
We define a model of computation, called the Pipelined Hierarchical Random Access Machine with access function a (x), denoted the a(x)-PH-RAM. In this model, a processor interacts with a memory which can accept requests at a constant rate and satisfy ...
Optimal semi-oblique tiling
For 2-D iteration space tiling, we address the problem of determining the tile parameters that minimize the total execution time under the BSP model. We consider uniform dependency computations, tiled so that (at least) one of the tile boundaries is ...
Finding large independent sets of hypergraphs in parallel
A basic problem in hypergraphs is that of finding a large independent set-one of guaranteed size-in a given hypergraph. Understanding the parallel complexity of this and related independent set problems on hypergraphs is a fundamental open issue in ...
Columnsort lives! an efficient out-of-core sorting program
We present the design and implementation of a parallel out-of-core sorting algorithm, which is based on Leighton's columnsort algorithm. We show how to relax some of the steps of the original columnsort algorithm to permit a faster out-of-core ...
Efficient parallel exponentiation in GF(2n) using normal basis representations
Vonzur Gathen proposed an efficient parallel exponentiation algorithm in finite fields using normal basis representations. In this paper we present a processor-efficient parallel exponentiation algorithm in GF(2 n ) which improves upon von zur Gathen's ...
Low-contention depth-first scheduling of parallel computations with write-once synchronization variables
We present an efficient, randomized, online, scheduling algorithm for a large class of programs with write-once synchronization variables. The algorithm combines the work-stealing paradigm with the depth-first scheduling technique, resulting in high ...
Scheduling on hierarchical clusters using malleable tasks
The model of malleable task (MT) was introduced some years ago and has been proved to be an efficient way for implementing parallel applications. It considers a target application at a larger level of granularity than in other models (corresponding ...
Scheduling best-effort and real-time pipelined applications on time-shared clusters
Two important emerging trends are influencing the design, implementation and deployment of high performance parallel systems. The first is on the architectural end, where both economic and technological factors are compelling the use of off-the-shelf ...
Optimal prefetching and caching for parallel I/O sytems
We address the problem of prefetching and caching in a parallel I/O system and present a new algorithm for optimal parallel-disk scheduling. Traditional buffer management algorithms that minimize the number of I/O disk accesses, are substantially ...
Ordering disks for double erasure codes
Dish arrays have been designed with two competing goals in mind, the ability to reconstruct erased disks (reliability), and the speed with which information can be read, written, and reconstructed (performance). The substantial loss in performance of ...
Approximation algorithms for data management in networks
This paper deals with static data management in computer systems connected by networks. A basic functionality in these systems is the interactive use of shared data objects that can be accessed from each computer in the system. Examples for these ...
A data tracking scheme for general networks
Consider an arbitrary distributed network in which large numbers of objects are continuously being created, replicated, and destroyed. A basic problem arising in such an environment is that of organizing a data tracking scheme for locating object ...
New spectral bounds on k-partitioning of graphs
When executing processes on parallel computer systems they encounter as a major bottleneck inter-processor communication. One way to address this problem is to minimize the communication between processes that are mapped to different processors. This ...
Efficient quantum algorithms for some instances of the non-Abelian hidden subgroup problem
In this paper we show that certain special cases of the hidden subgroup problem can be solved in polynomial time by a quantum algorithm. These special cases involve finding hidden normal subgroups of solvable groups and permutation groups, finding ...
Index Terms
- Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures