Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/378580acmconferencesBook PagePublication PagesspaaConference Proceedingsconference-collections
SPAA '01: Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures
ACM2001 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SPAA01: 13th ACM Symposium on Parallel Algorithms and Architectures Crete Island Greece
ISBN:
978-1-58113-409-4
Published:
03 July 2001
Sponsors:

Bibliometrics
Abstract

No abstract available.

Article
Compact routing schemes

We describe several compact routing schemes for general weighted undirected networks. Our schemes are simple and easy to implement. The routing tables stored at the nodes of the network are all very small. The headers attached to the routed messages, ...

      Article
      Routing without flow control

      We present the first dynamic hot-potato routing algorithm that does not require any form of explicit flow control: a node may inject a message into the network (n × n mesh) whenever a link is free. In the worst case, a node may have to wait an expected ...

      Article
      Fast, minimal and oblivious routing algorithms on the mesh with bounded queues

      This paper studies fast, deterministic, permutation routing algorithms with bounded queues on the n × n mesh. Our main result is an Ο(n)-step, strongly-dimensional (and thus also source-oblivious and minimal) permutation routing algorithm. This ...

      Article
      One-to-Many routing on the mesh

      We study the routing of messages with multiple destinations on an n-node square mesh (one-to-many routing). The obvious approach of simply replicating each message into the appropriate number of point-to-point messages and routing these independently ...

      Article
      Simple on-line algorithms for the maximum disjoint paths problem

      In this paper we study the problem of finding disjoint paths in graphs. Whereas for specific graphs many (almost) matching upper and lower bounds are known for the competitiveness of on-line path selection algorithms, much less is known about how well ...

      Article
      Stability and non-stability of the FIFO protocol

      In this paper, we analyze the stability properties of the FIFO protocol in the Adversarial Queueing model for packet routing. We show a graph for which FIFO is stable for any adversary with injection rate r ≰ 0.1428. We generalize this results to show ...

      Article
      Competitve buffer management for shared-memory switches

      We consider buffer management policies for shared memory packet switches supporting Quality of Service (QoS). There are two interesting dimensions in which the setting may different. The first is the packet size, whether all the packets of the same ...

      Article
      Tradeoffs between knowledge and time of communication in geometric radio networks

      We consider deterministic broadcasting in geometric radio networks (GRN) whose nodes know only a limited part of the network Nodes of a GRN are situated in the plane and each of them is equipped with a transmitter of some range r. A signal from this ...

      Article
      Attack propagation in networks

      A new model for intrusion and its propagation through various attack schemes in networks is considered. The model is characterized by the number of network nodes, and two parameters f and g. Parameter f represents the probability of failure of an attack ...

      Article
      Deterministic resource discovery in distributed networks

      The resource discovery problem was introduced by Harchol-Balter, Leigh ton and Lewin. They developed a number of algorithms for the problem in the weakly connected directed graph model. This model is a directed logical graph, that represents the ...

      Article
      Latency effects on reachability in large-scale peer-to-peer networks

      In this paper we study the latency effects introduced in large scale internet applications. In particular, we study the effects of heterogeneous latency on reachability in decentralized, distributed networks operating under flooding protocols. We show ...

      Article
      Towards a first vertical prototyping of an extremely fine-grained parallel programming approach

      Explicit-multithreading (XMT) is a parallel programming approach for exploiting on-chip parallelism. XMT introduces a computational framework with 1) a simple programming style that relies on fine-grained PRAM-style algorithms; 2) hardware support for ...

      Article
      A cost effective architecture for vectorizable numerical and multimedia applications

      This paper analyzes the performance of vector-dominated regions of code in numerical and multimedia applications in a superscalar+vector architecture and compares it to an 8-way superscalar processor. The ability to split a program's execution into ...

      Article
      Automatable verification of sequential consistency

      Sequential consistency is a multiprocessor memory model of both practical and theoretical importance. Designing and implementing a memory system that efficiently provides a given memory model is a challenging and error-prone task, so automated ...

      Article
      Room synchronizations

      We present a class of synchronization called room synchronizations and show how this class can be used to implement asynchronous parallel queues and stacks with constant time access (assuming a fetch-and-add operation). The room synchronization problem ...

      Article
      A simple, fast and scalable non-blocking concurrent FIFO queue for shared memory multiprocessor systems

      A non-blocking FIFO queue algorithm for multiprocessor shared memory systems is presented in this paper. The algorithm is very simple, fast and scales very well in both symmetric and non-symmetric multiprocessor shared memory systems. Experiments on a ...

      Article
      Computational power of pipelined memory hierarchies

      We define a model of computation, called the Pipelined Hierarchical Random Access Machine with access function a (x), denoted the a(x)-PH-RAM. In this model, a processor interacts with a memory which can accept requests at a constant rate and satisfy ...

      Article
      Optimal semi-oblique tiling

      For 2-D iteration space tiling, we address the problem of determining the tile parameters that minimize the total execution time under the BSP model. We consider uniform dependency computations, tiled so that (at least) one of the tile boundaries is ...

      Article
      Finding large independent sets of hypergraphs in parallel

      A basic problem in hypergraphs is that of finding a large independent set-one of guaranteed size-in a given hypergraph. Understanding the parallel complexity of this and related independent set problems on hypergraphs is a fundamental open issue in ...

      Article
      Columnsort lives! an efficient out-of-core sorting program

      We present the design and implementation of a parallel out-of-core sorting algorithm, which is based on Leighton's columnsort algorithm. We show how to relax some of the steps of the original columnsort algorithm to permit a faster out-of-core ...

      Article
      Efficient parallel exponentiation in GF(2n) using normal basis representations

      Vonzur Gathen proposed an efficient parallel exponentiation algorithm in finite fields using normal basis representations. In this paper we present a processor-efficient parallel exponentiation algorithm in GF(2 n ) which improves upon von zur Gathen's ...

      Article
      Low-contention depth-first scheduling of parallel computations with write-once synchronization variables

      We present an efficient, randomized, online, scheduling algorithm for a large class of programs with write-once synchronization variables. The algorithm combines the work-stealing paradigm with the depth-first scheduling technique, resulting in high ...

      Article
      Scheduling on hierarchical clusters using malleable tasks

      The model of malleable task (MT) was introduced some years ago and has been proved to be an efficient way for implementing parallel applications. It considers a target application at a larger level of granularity than in other models (corresponding ...

      Article
      Scheduling best-effort and real-time pipelined applications on time-shared clusters

      Two important emerging trends are influencing the design, implementation and deployment of high performance parallel systems. The first is on the architectural end, where both economic and technological factors are compelling the use of off-the-shelf ...

      Article
      Optimal prefetching and caching for parallel I/O sytems

      We address the problem of prefetching and caching in a parallel I/O system and present a new algorithm for optimal parallel-disk scheduling. Traditional buffer management algorithms that minimize the number of I/O disk accesses, are substantially ...

      Article
      Ordering disks for double erasure codes

      Dish arrays have been designed with two competing goals in mind, the ability to reconstruct erased disks (reliability), and the speed with which information can be read, written, and reconstructed (performance). The substantial loss in performance of ...

      Article
      Approximation algorithms for data management in networks

      This paper deals with static data management in computer systems connected by networks. A basic functionality in these systems is the interactive use of shared data objects that can be accessed from each computer in the system. Examples for these ...

      Article
      A data tracking scheme for general networks

      Consider an arbitrary distributed network in which large numbers of objects are continuously being created, replicated, and destroyed. A basic problem arising in such an environment is that of organizing a data tracking scheme for locating object ...

      Article
      New spectral bounds on k-partitioning of graphs

      When executing processes on parallel computer systems they encounter as a major bottleneck inter-processor communication. One way to address this problem is to minimize the communication between processes that are mapped to different processors. This ...

      Article
      Efficient quantum algorithms for some instances of the non-Abelian hidden subgroup problem

      In this paper we show that certain special cases of the hidden subgroup problem can be solved in polynomial time by a quantum algorithm. These special cases involve finding hidden normal subgroups of solvable groups and permutation groups, finding ...

      Contributors
      • University of Massachusetts Amherst

      Index Terms

      1. Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures

            Recommendations

            Acceptance Rates

            SPAA '01 Paper Acceptance Rate 34 of 93 submissions, 37%;
            Overall Acceptance Rate 447 of 1,461 submissions, 31%
            YearSubmittedAcceptedRate
            SPAA '191093431%
            SPAA '181203630%
            SPAA '171273124%
            SPAA '151313124%
            SPAA '141223025%
            SPAA '131303124%
            SPAA '031063836%
            SPAA '01933437%
            SPAA '00452453%
            SPAA '99902629%
            SPAA '98843036%
            SPAA '97973233%
            SPAA '961063937%
            SPAA '951013131%
            Overall1,46144731%