首页 > 最新文献

[1993] The 2nd Israel Symposium on Theory and Computing Systems最新文献

英文 中文
Competitive algorithms for the weighted server problem 加权服务器问题的竞争算法
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253459
A. Fiat, Moty Ricklin
The authors deal with a generalization of the k-server problem, in which the servers are unequal. In the weighted server model each of the servers is assigned a positive weight. The cost associated with moving a server equals the product of the distance traversed and the server weight. A weighted k-server algorithm is called competitive if the competitive ratio depends only upon the number of servers. (i.e., the competitive ratio is independent of the weights associated with the servers and the number of points in the metric space). For the uniform metric space, they give super exponential competitive algorithms for any set of weights. If the servers have one of two possible weights, they give deterministic exponential competitive algorithms and randomized polynomial competitive algorithms. They use the MIN operator for both algorithms. One can model the problem of storage management for RAM and E/sup 2/PROM type memories as a weighted server problem with two weights on the uniform metric space.<>
作者处理了k-服务器问题的推广,其中服务器是不相等的。在加权服务器模型中,每个服务器被分配一个正的权重。与移动服务器相关的成本等于所经过的距离和服务器权重的乘积。如果竞争比率仅取决于服务器的数量,则加权k-server算法称为竞争算法。(即,竞争比率独立于与服务器相关的权重和度量空间中的点数)。对于一致度量空间,他们给出了任意一组权值的超指数竞争算法。如果服务器具有两种可能的权重之一,则给出确定性指数竞争算法和随机多项式竞争算法。它们对两种算法都使用MIN运算符。我们可以将RAM和E/sup 2/PROM类型存储器的存储管理问题建模为在统一度量空间上具有两个权重的加权服务器问题。
{"title":"Competitive algorithms for the weighted server problem","authors":"A. Fiat, Moty Ricklin","doi":"10.1109/ISTCS.1993.253459","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253459","url":null,"abstract":"The authors deal with a generalization of the k-server problem, in which the servers are unequal. In the weighted server model each of the servers is assigned a positive weight. The cost associated with moving a server equals the product of the distance traversed and the server weight. A weighted k-server algorithm is called competitive if the competitive ratio depends only upon the number of servers. (i.e., the competitive ratio is independent of the weights associated with the servers and the number of points in the metric space). For the uniform metric space, they give super exponential competitive algorithms for any set of weights. If the servers have one of two possible weights, they give deterministic exponential competitive algorithms and randomized polynomial competitive algorithms. They use the MIN operator for both algorithms. One can model the problem of storage management for RAM and E/sup 2/PROM type memories as a weighted server problem with two weights on the uniform metric space.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123421993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Optimal speedup of Las Vegas algorithms 拉斯维加斯算法的最佳加速
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253477
M. Luby, A. Sinclair, David Zuckerman
Let A be a Las Vegas algorithm, i.e., A is a randomized algorithm that always produces the correct answer when its stops but whose running time is a random variable. The authors consider the problem of minimizing the expected time required to obtain an answer from A using strategies which simulate A as follows: run A for a fixed amount of time t/sub 1/, then run A independent for a fixed amount of time t/sub 2/, etc. The simulation stops if A completes its execution during any of the runs. Let S=(t/sub 1/, t/sub 2/,. . .) be a strategy, and let l/sub A/=inf/sub S/T(A,S), where T(A,S) is the expected value of the running time of the simulation of A under strategy S. The authors describe a simple universal strategy S/sup univ/, with the property that, for any algorithm A, T(A,S/sup univ/)=O(l/sub A/log(l/sub A/)). Furthermore, they show that this is the best performance that can be achieved, up to a constant factor, by any universal strategy.<>
设A是一个拉斯维加斯算法,即A是一个随机算法,当它停止时总是产生正确的答案,但其运行时间是一个随机变量。作者考虑最小化从A获得答案所需的期望时间的问题,使用模拟A的策略如下:在固定时间t/下标1/上运行A,然后在固定时间t/下标2/上独立运行A,等等。如果A在任何运行期间完成其执行,则模拟停止。设S=(t/下标1/,t/下标2/,…)为策略,设l/下标a /=inf/下标S/ t (a,S),其中t (a,S)为策略S下a仿真运行时间的期望值。作者描述了一种简单的通用策略S/sup univ/,其性质是,对于任意算法a, t (a,S/sup univ/)=O(l/下标a /log(l/下标a /))。此外,他们还表明,这是任何通用策略所能达到的最佳性能。
{"title":"Optimal speedup of Las Vegas algorithms","authors":"M. Luby, A. Sinclair, David Zuckerman","doi":"10.1109/ISTCS.1993.253477","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253477","url":null,"abstract":"Let A be a Las Vegas algorithm, i.e., A is a randomized algorithm that always produces the correct answer when its stops but whose running time is a random variable. The authors consider the problem of minimizing the expected time required to obtain an answer from A using strategies which simulate A as follows: run A for a fixed amount of time t/sub 1/, then run A independent for a fixed amount of time t/sub 2/, etc. The simulation stops if A completes its execution during any of the runs. Let S=(t/sub 1/, t/sub 2/,. . .) be a strategy, and let l/sub A/=inf/sub S/T(A,S), where T(A,S) is the expected value of the running time of the simulation of A under strategy S. The authors describe a simple universal strategy S/sup univ/, with the property that, for any algorithm A, T(A,S/sup univ/)=O(l/sub A/log(l/sub A/)). Furthermore, they show that this is the best performance that can be achieved, up to a constant factor, by any universal strategy.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 566
A well-characterized approximation problem 一个很好表征的近似问题
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253463
J. Håstad, S. Phillips, S. Safra
The authors consider the following NP optimization problem: given a set of polynomials P/sub i/(x), i=1. . .s of degree at most 2 over GF(p) in n variables, find a root common to as many as possible of the polynomials P/sub i/(x). They prove that in the case when the polynomials do not contain any squares as monomials, it is always possible to approximate this problem within a factor of /sup p2///sub p-1/ in polynomial time. This follows from the stronger statement that one can, in polynomial time, find an assignment that satisfies at least /sup p-1///sub p2/ of the nontrivial equations. More interestingly, they prove that approximating the maximal number of polynomials with a common root to within a factor of p- in is NP-hard. They also prove that for any constant delta <1, it is NP-hard to approximate the solution of quadratic equations over the rational numbers, or over the reals, within n/sup delta /.<>
本文研究了一个NP优化问题:给定一组多项式P/下标i/(x),在n个变量中,i=1. .s次不超过2 / GF(P),求多项式P/下标i/(x)尽可能多的公根。他们证明了在多项式不包含任何平方作为单项式的情况下,总是可以在多项式时间内/sup p2///sub p-1/的因子内近似这个问题。这是从一个更强的命题推导出来的,即在多项式时间内,可以找到一个赋值,它至少满足非平凡方程的/sup p-1/// /sub p2/。更有趣的是,他们证明了在p- in的因子范围内逼近多项式的最大数目是np困难的。他们也证明了对于任意常数>
{"title":"A well-characterized approximation problem","authors":"J. Håstad, S. Phillips, S. Safra","doi":"10.1109/ISTCS.1993.253463","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253463","url":null,"abstract":"The authors consider the following NP optimization problem: given a set of polynomials P/sub i/(x), i=1. . .s of degree at most 2 over GF(p) in n variables, find a root common to as many as possible of the polynomials P/sub i/(x). They prove that in the case when the polynomials do not contain any squares as monomials, it is always possible to approximate this problem within a factor of /sup p2///sub p-1/ in polynomial time. This follows from the stronger statement that one can, in polynomial time, find an assignment that satisfies at least /sup p-1///sub p2/ of the nontrivial equations. More interestingly, they prove that approximating the maximal number of polynomials with a common root to within a factor of p- in is NP-hard. They also prove that for any constant delta <1, it is NP-hard to approximate the solution of quadratic equations over the rational numbers, or over the reals, within n/sup delta /.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Efficient on-line call control algorithms 高效的在线呼叫控制算法
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253460
J. Garay, I. Gopal, S. Kutten, Y. Mansour, M. Yung
The authors study the problem of on-line call control, i.e., the problem of accepting or rejecting an incoming call without knowledge of future calls. The problem is part of the more general problem of bandwidth allocation and management. Intuition suggests that knowledge of future call arrivals can be crucial to the performance of the system. They present on-line call control algorithms that, in some circumstances, are competitive, i.e., perform (up to a constant factor) as well as their off-line, clairvoyant counterparts. They also prove the optimality of some algorithms. The model is that of a line of nodes, and they investigate a variety of cases concerning the value of the calls. The value is gained only if the call terminates successfully, otherwise-if the call is rejected, or prematurely terminated-no value is gained. The performance of the algorithm is then measured by the cumulative value achieved, when given a sequence of calls. The variety of call value criteria captures the most natural cost assignments to network services.<>
作者研究了在线呼叫控制问题,即在不知道未来呼叫的情况下接受或拒绝传入呼叫的问题。这个问题是更普遍的带宽分配和管理问题的一部分。直觉告诉我们,对未来来电的了解对系统的性能至关重要。他们提出在线呼叫控制算法,在某些情况下,是竞争性的,即,执行(高达一个常数因子)以及他们的离线,千里眼对应物。他们还证明了一些算法的最优性。该模型是一组节点的模型,他们研究了与调用值有关的各种情况。只有在调用成功终止时才获得该值,否则(如果调用被拒绝或过早终止)不会获得任何值。当给定一系列调用时,算法的性能通过获得的累积值来衡量。呼叫价值标准的多样性捕获了网络服务最自然的成本分配。
{"title":"Efficient on-line call control algorithms","authors":"J. Garay, I. Gopal, S. Kutten, Y. Mansour, M. Yung","doi":"10.1109/ISTCS.1993.253460","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253460","url":null,"abstract":"The authors study the problem of on-line call control, i.e., the problem of accepting or rejecting an incoming call without knowledge of future calls. The problem is part of the more general problem of bandwidth allocation and management. Intuition suggests that knowledge of future call arrivals can be crucial to the performance of the system. They present on-line call control algorithms that, in some circumstances, are competitive, i.e., perform (up to a constant factor) as well as their off-line, clairvoyant counterparts. They also prove the optimality of some algorithms. The model is that of a line of nodes, and they investigate a variety of cases concerning the value of the calls. The value is gained only if the call terminates successfully, otherwise-if the call is rejected, or prematurely terminated-no value is gained. The performance of the algorithm is then measured by the cumulative value achieved, when given a sequence of calls. The variety of call value criteria captures the most natural cost assignments to network services.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Zero-one permanent is not=P-complete, a simpler proof 0 - 1永久不= p完全,一个更简单的证明
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253457
A. Ben-Dor, S. Halevi
Valiant (1979) proved that computing the permanent of a 01-matrix is not=P-complete. The authors present another proof for the same result. The proof uses 'black box' methodology, which facilitates its presentation. They also prove that deciding whether the permanent is divisible by a small prime is not=P-hard. They conclude by proving that a polynomially bounded function can not be not=P-complete under 'reasonable' complexity assumptions.<>
Valiant(1979)证明了计算01矩阵的永久性是不完全的。作者对同样的结果提出了另一个证明。该证明使用了“黑箱”方法,这有利于其呈现。他们也证明了判定恒数是否能被一个小素数整除不是= p难的。他们的结论是,在“合理的”复杂性假设下,多项式有界函数不可能是非p完全的。
{"title":"Zero-one permanent is not=P-complete, a simpler proof","authors":"A. Ben-Dor, S. Halevi","doi":"10.1109/ISTCS.1993.253457","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253457","url":null,"abstract":"Valiant (1979) proved that computing the permanent of a 01-matrix is not=P-complete. The authors present another proof for the same result. The proof uses 'black box' methodology, which facilitates its presentation. They also prove that deciding whether the permanent is divisible by a small prime is not=P-hard. They conclude by proving that a polynomially bounded function can not be not=P-complete under 'reasonable' complexity assumptions.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
The Las-Vegas processor identity problem (how and when to be unique) 拉斯维加斯处理器标识问题(如何以及何时是唯一的)
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253474
S. Kutten, R. Ostrovsky, B. Patt-Shamir
One of the fundamental problems in distributed computing is how identical processes with identical local memory can choose unique IDs provided they can flip a coin. The variant considered is the asynchronous shared memory model (atomic registers), and the basic correctness requirement is that upon termination the processes must always have unique IDs. The authors study this problem from several viewpoints. On the positive side, they present the first Las-Vegas protocol that solves the problem. The protocol terminates in (optimal) O(log n) expected time, using O(n) shared memory space, where n is the number of participating processes. On the negative side, they show that there is no Las-Vegas protocol unless n is known precisely, and that no finite-state Las-Vegas protocol can work under schedules that may depend on the history of the shared variable. For the case of arbitrary adversary, they present a Las-Vegas protocol that uses O(n) unbounded registers.<>
分布式计算中的一个基本问题是,具有相同本地内存的相同进程如何选择唯一的id,前提是它们可以抛硬币。考虑的变体是异步共享内存模型(原子寄存器),基本的正确性要求是在终止时进程必须始终具有惟一的id。作者从几个角度对这个问题进行了研究。积极的一面是,他们提出了第一个解决这个问题的拉斯维加斯协议。该协议在(最优)O(log n)预期时间内终止,使用O(n)个共享内存空间,其中n是参与进程的数量。消极的一面是,他们表明,除非n是精确已知的,否则不存在拉斯维加斯协议,并且没有有限状态的拉斯维加斯协议可以在可能依赖于共享变量历史的时间表下工作。对于任意对手的情况,他们提出了一个使用O(n)个无界寄存器的Las-Vegas协议
{"title":"The Las-Vegas processor identity problem (how and when to be unique)","authors":"S. Kutten, R. Ostrovsky, B. Patt-Shamir","doi":"10.1109/ISTCS.1993.253474","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253474","url":null,"abstract":"One of the fundamental problems in distributed computing is how identical processes with identical local memory can choose unique IDs provided they can flip a coin. The variant considered is the asynchronous shared memory model (atomic registers), and the basic correctness requirement is that upon termination the processes must always have unique IDs. The authors study this problem from several viewpoints. On the positive side, they present the first Las-Vegas protocol that solves the problem. The protocol terminates in (optimal) O(log n) expected time, using O(n) shared memory space, where n is the number of participating processes. On the negative side, they show that there is no Las-Vegas protocol unless n is known precisely, and that no finite-state Las-Vegas protocol can work under schedules that may depend on the history of the shared variable. For the case of arbitrary adversary, they present a Las-Vegas protocol that uses O(n) unbounded registers.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116545718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
On fixed-parameter tractability and approximability of NP-hard optimization problems NP-hard优化问题的定参数可跟踪性和近似性
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253478
L. Cai, Jianer Chen
Fixed-parameter tractability and approximability of NP-hard optimization problems are studied based on a model GC(s(n), Pi /sub k//sup L/). The main results are (1) a class of NP-hard optimization problems, including dominating-set and zero-one integer-programing, are fixed-parameter tractable if and only if GC(s(n), Pi /sub 2//sup L/) contained in P for some s(n) in omega (log n); (2) most approximable NP-hard optimization problems are fixed-parameter tractable. In particular, the class MAX NP is fixed-parameter tractable; (3) a class of optimization problems do not have fully polynomial time approximation scheme unless GC(s(n), Pi /sub k//sup L/) contained in P for some s(n) in omega (log n) and for some k>l; and (4) every fixed-parameter tractable optimization problem can be approximated in polynomial time to a non-trivial ratio.<>
基于GC(s(n), Pi /sub k//sup L/)模型,研究了NP-hard优化问题的定参数可跟踪性和近似性。主要结果是:(1)一类NP-hard优化问题,包括支配集和0 - 1整数规划,当且仅当对于(log n)中的某个s(n), GC(s(n), Pi /sub 2//sup L/)包含在P中是定参数可处理的;(2)大多数近似NP-hard优化问题是固定参数可处理的。特别地,MAX NP类是固定参数可处理的;(3)一类优化问题除非GC(s(n), Pi /sub k//sup L/)包含在P中,对于(log n)中的某些s(n)和某些k> L,则不具有完全多项式时间逼近方案;(4)每一个固定参数可处理的优化问题都可以在多项式时间内逼近到一个非平凡的比率。
{"title":"On fixed-parameter tractability and approximability of NP-hard optimization problems","authors":"L. Cai, Jianer Chen","doi":"10.1109/ISTCS.1993.253478","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253478","url":null,"abstract":"Fixed-parameter tractability and approximability of NP-hard optimization problems are studied based on a model GC(s(n), Pi /sub k//sup L/). The main results are (1) a class of NP-hard optimization problems, including dominating-set and zero-one integer-programing, are fixed-parameter tractable if and only if GC(s(n), Pi /sub 2//sup L/) contained in P for some s(n) in omega (log n); (2) most approximable NP-hard optimization problems are fixed-parameter tractable. In particular, the class MAX NP is fixed-parameter tractable; (3) a class of optimization problems do not have fully polynomial time approximation scheme unless GC(s(n), Pi /sub k//sup L/) contained in P for some s(n) in omega (log n) and for some k>l; and (4) every fixed-parameter tractable optimization problem can be approximated in polynomial time to a non-trivial ratio.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
Hot-potato worm routing is almost as easy as store-and-forward packet routing 热土豆蠕虫路由几乎和存储转发数据包路由一样简单
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253469
I. Newman, A. Schuster
The theory of worm routing (rather than packet routing) recently attracts an increased attention as an abstraction of the underlying communication mechanisms in many parallel machines. Routing the worms in the hot-potato style is a desired form of communication in high-speed optical interconnection networks. The authors develop a simple method for the design of parallel hot-potato worm routing algorithms. The basic approach is to simulate known packet routing algorithms, so that in each step worms are moved around instead of packets. For hot-potato permutation routing of worms of size k the authors have the following results. They get a O(k/sup 2.5/n) algorithm for the n*n mesh, and a O(k/sup 1.5/n) algorithm for the corresponding offline problem. For the 2/sup n/-nodes hypercube they get a O(k/sup 3/n log /sup 2/n) deterministic algorithm, and a O(k/sup 3/n) randomized algorithm. Although the results are given for permutation routing on the mesh and the hypercube, the general method can be applied to many other networks and to more general communication patterns as well. Moreover, once better routing algorithms are found for the underlying network, the worm routing algorithm improves, too.<>
蠕虫路由理论(而不是包路由)最近引起了越来越多的关注,因为它是许多并行机器中底层通信机制的抽象。在高速光互连网络中,以烫手山芋方式路由蠕虫是一种理想的通信形式。提出了一种简单的并行热土豆蠕虫路由算法设计方法。基本方法是模拟已知的数据包路由算法,以便在每一步中移动蠕虫而不是数据包。对于大小为k的蠕虫的热土豆排列路线,作者有以下结果。对于n*n网格,他们得到了O(k/sup 2.5/n)算法,对于相应的离线问题,他们得到了O(k/sup 1.5/n)算法。对于2/sup n/节点的超立方体,他们得到一个O(k/sup 3/n log /sup 2/n)确定性算法和一个O(k/sup 3/n)随机算法。虽然给出的结果适用于网格和超立方体上的排列路由,但一般方法也可以应用于许多其他网络和更一般的通信模式。此外,一旦为底层网络找到更好的路由算法,蠕虫路由算法也会得到改进。
{"title":"Hot-potato worm routing is almost as easy as store-and-forward packet routing","authors":"I. Newman, A. Schuster","doi":"10.1109/ISTCS.1993.253469","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253469","url":null,"abstract":"The theory of worm routing (rather than packet routing) recently attracts an increased attention as an abstraction of the underlying communication mechanisms in many parallel machines. Routing the worms in the hot-potato style is a desired form of communication in high-speed optical interconnection networks. The authors develop a simple method for the design of parallel hot-potato worm routing algorithms. The basic approach is to simulate known packet routing algorithms, so that in each step worms are moved around instead of packets. For hot-potato permutation routing of worms of size k the authors have the following results. They get a O(k/sup 2.5/n) algorithm for the n*n mesh, and a O(k/sup 1.5/n) algorithm for the corresponding offline problem. For the 2/sup n/-nodes hypercube they get a O(k/sup 3/n log /sup 2/n) deterministic algorithm, and a O(k/sup 3/n) randomized algorithm. Although the results are given for permutation routing on the mesh and the hypercube, the general method can be applied to many other networks and to more general communication patterns as well. Moreover, once better routing algorithms are found for the underlying network, the worm routing algorithm improves, too.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A formalization of superposition refinement 叠加细化的形式化
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253467
K. Sere
One form of program refinement is to add new variables to the state, together with code that manipulates these new variables. When the addition of new variables and associated computation code is done in a way that prevents the old computation of the program from being disturbed, then the author calls it superpositioning. He studies superposition in the context of constructing parallel programs following the stepwise refinement approach, where the added computation in each step could consist of an entire parallel algorithm. Hence, it is important to find methods that are easy to use and also guarantee the correctness of the operation. It is also important be able to superpose one algorithm, like a termination detection algorithm, onto several different original algorithms. He therefore gives a method for defining and using such superposable modules.<>
程序优化的一种形式是向状态添加新变量,以及操作这些新变量的代码。当新变量和相关计算代码的添加以一种防止程序的旧计算受到干扰的方式完成时,作者称之为叠加。他在构建并行程序的背景下研究叠加,遵循逐步细化的方法,其中每一步增加的计算可以由整个并行算法组成。因此,找到既易于使用又能保证操作正确性的方法是很重要的。能够将一个算法(如终止检测算法)叠加到几个不同的原始算法上也很重要。因此,他给出了一种定义和使用这种可叠加模块的方法。
{"title":"A formalization of superposition refinement","authors":"K. Sere","doi":"10.1109/ISTCS.1993.253467","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253467","url":null,"abstract":"One form of program refinement is to add new variables to the state, together with code that manipulates these new variables. When the addition of new variables and associated computation code is done in a way that prevents the old computation of the program from being disturbed, then the author calls it superpositioning. He studies superposition in the context of constructing parallel programs following the stepwise refinement approach, where the added computation in each step could consist of an entire parallel algorithm. Hence, it is important to find methods that are easy to use and also guarantee the correctness of the operation. It is also important be able to superpose one algorithm, like a termination detection algorithm, onto several different original algorithms. He therefore gives a method for defining and using such superposable modules.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using selective path-doubling for parallel shortest-path computations 使用选择性路径加倍并行最短路径计算
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253481
E. Cohen
The author considers parallel shortest-path computations in weighted undirected graphs G=(V,E), where n= mod V mod and m= mod E mod . The standard path-doubling algorithms consists of O(log n) phases, where in each phase, for every triple of vertices (u/sub 1/, u/sub 2/, u/sub 3/) in V/sup 3/, she updates the distance between u/sub 1/ and u/sub 3/ to be no more than the sum of the previous-phase distances between (u/sub 1/, u/sub 2/) and (u/sub 2/, u/sub 3/). The work performed in each phase, O(n/sup 3/) (linear in the number of triples), is currently the bottleneck in NC shortest-paths computations. She introduces a new algorithm that for delta =o(n), considers only O(n delta /sup 2/) triples. Roughly, the resulting NC algorithm performs O(n delta /sup 2/) work and augments E with O(n delta ) new weighted edges such that between every pair of vertices, there exists a minimum weight path of size (number of edges) O(n/ delta ) (where O(f) identical to O(f polylog n)). To compute shortest-paths, she applies work-efficient algorithms, where the time depends on the size of shortest paths, to the augmented graph. She obtains a O(t) time O( mod S mod n/sup 2/+n/sup 3//t/sup 2/) work deterministic PRAM algorithm for computing shortest-paths form mod S mod sources to all other vertices, where t>
考虑加权无向图G=(V,E)中的并行最短路径计算,其中n=模V模,m=模E模。标准的路径加倍算法由O(log n)个阶段组成,其中在每个阶段,对于V/sup 3/中的每个三个顶点(u/sub 1/, u/sub 2/, u/sub 3/),她更新u/sub 1/和u/sub 3/之间的距离,使其不超过前一阶段(u/sub 1/, u/sub 2/)和(u/sub 2/, u/sub 3/)之间的距离之和。在每个阶段执行的工作,O(n/sup 3/)(三元组数量线性),是目前NC最短路径计算的瓶颈。她介绍了一个新的算法,对于delta =o(n),只考虑o(n delta /sup 2/)个三元组。粗略地说,由此产生的NC算法执行O(n δ /sup 2/)功,并用O(n δ)个新的加权边增加E,使得在每对顶点之间存在一个大小为O(n/ δ)的最小权重路径(其中O(f)与O(f polylog n)相同)。为了计算最短路径,她将工作效率算法应用于增广图,其中时间取决于最短路径的大小。她得到了一个O(t)时间O(模S模n/sup 2/+n/sup 3//t/sup 2/)的工作确定性PRAM算法,用于计算从模S模源到所有其他顶点的最短路径,其中t>
{"title":"Using selective path-doubling for parallel shortest-path computations","authors":"E. Cohen","doi":"10.1109/ISTCS.1993.253481","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253481","url":null,"abstract":"The author considers parallel shortest-path computations in weighted undirected graphs G=(V,E), where n= mod V mod and m= mod E mod . The standard path-doubling algorithms consists of O(log n) phases, where in each phase, for every triple of vertices (u/sub 1/, u/sub 2/, u/sub 3/) in V/sup 3/, she updates the distance between u/sub 1/ and u/sub 3/ to be no more than the sum of the previous-phase distances between (u/sub 1/, u/sub 2/) and (u/sub 2/, u/sub 3/). The work performed in each phase, O(n/sup 3/) (linear in the number of triples), is currently the bottleneck in NC shortest-paths computations. She introduces a new algorithm that for delta =o(n), considers only O(n delta /sup 2/) triples. Roughly, the resulting NC algorithm performs O(n delta /sup 2/) work and augments E with O(n delta ) new weighted edges such that between every pair of vertices, there exists a minimum weight path of size (number of edges) O(n/ delta ) (where O(f) identical to O(f polylog n)). To compute shortest-paths, she applies work-efficient algorithms, where the time depends on the size of shortest paths, to the augmented graph. She obtains a O(t) time O( mod S mod n/sup 2/+n/sup 3//t/sup 2/) work deterministic PRAM algorithm for computing shortest-paths form mod S mod sources to all other vertices, where t<or=n is a parameter. When the ratio of the largest edge weight and the smallest edge weight is n/sup O(polylog/ /sup n)/, the algorithm computes shortest paths. When weights are arbitrary, it computes paths within a factor of 1+n/sup - Omega (polylog/ /sup n)/ of shortest. This improves over previous bounds. She achieves improved O( mod S mod (n/sup 2//t+m)+n/sup 3//t/sup 2/) work for computing approximate distances to within a factor of (1+ in ) (for any fixed in ).<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133157579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
[1993] The 2nd Israel Symposium on Theory and Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1