Coarse Grained Parallel Maximum Matching In Convex Bipartite Graphs

Size: px
Start display at page:

Download "Coarse Grained Parallel Maximum Matching In Convex Bipartite Graphs"

Transcription

1 Coarse Grained Parallel Maximum Matchin In Convex Bipartite Graphs P. Bose, A. Chan, F. Dehne, and M. Latzel School o Computer Science Carleton University Ottawa, Canada K1S 5B6 jit,achan,dehne,mlatzel@scs.carleton.ca Abstract We present a coarse rained parallel alorithm or computin a maximum matchin in a convex bipartite raph G = (A; B; E). For p processors with N=p memory per processor, N = jaj + jbj, N=p p, the alorithm requires O(lo p) communication rounds and O(T sequ ( n p ; m p ) + n p lo p) local computation, where n = jaj, m = jbj and T sequ (n; m) is the sequential time complexity or the problem. For the BSP model, this implies O(lo p) supersteps with O(N + n p lo p) communication cost and 1 Introduction 1.1 The Problem We study the problem o computin the maximum matchin in convex bipartite raphs deined as ollows. Deinition 1 A Bipartite raph G =(A; B; E) is an undirected raph with vertex set A [ B where A and B are disjoint and E (A B). For the remainder let n = jaj, m = jbj and N = n + m. Deinition 2 A Convex bipartite raph is a bipartite raph G =(A; B; E) with an orderin B =(b 1 ;b 2 ; b n ) such that or any a 2 A, i(a; b i ) 2 E and (a; b j ) 2 E (i j) then (a; b k ) 2 E or all i k j. Deinition 3 AmatchinM in a raph G = (V;E) is a subset o E such that no two edes in M are incident to the same vertex. Deinition 4 A maximum matchin in a raph G =(V;E) is a matchin o G o which the size (number o edes) is maximum. The problem o indin a maximum matchin in a bipartite raph or a convex bipartite raph is a classical and well studied problem [7, 12, 14, 15]. The case o convex bipartite raphs has several interestin applications as outlined in [7, 15]. A particularly interestin industrial application or matchin parts with products was described in [15]. Sequential solutions or maximum matchin in bipartite raphs and convex bipartite raphs with time complexities O(n 5=2 ) and O(n + (m)) were described in [14] and [15], respectively, where (m) is a very slowly rowin unction related to the inverse Ackermann unction. A PRAM alorithm or maximum matchin in convex bipartite raphs requirein O(lo 2 n) time and n=2 processors was presented in [7]. In this paper, we consider the maximum matchin problem or the coarse rained parallel and BSP models o computation described in the next subsection. These new parallel models have recently received much attention because they allow the desin o parallel alorithms that have much improved practical perormance in actual implementations on commercial multiprocessors compared to previous models like the PRAM or ine rained network models (e.. mesh or hypercube). Beore proceedin to the description o the coarse rained parallel and BSP models o computation, we note that indin a maximum matchin in a convex bipartite raph can be transormed into the ollowin problem: Deinition 5 Given a set o intervals I = I 1 ; ;I n, each o which represents an inteer rane, i.e. I i =(l i ;r i ). A maximum interval assinment consists o assinin, or a maximum number o intervals, one inteer label to each interval such that the inteer or each interval is within the interval s rane and no two intervals are assined the same inteer. For a iven convex bipartite raph G = (A; B; E) let I(G) be the set o jaj intervals containin or each a 2 A an interval I i =(l i ;r i ) where l i and r i are the smallest and larest ranks, in B, o all element b 2 B with (a; b) 2 E.

2 Observation 1 The maximum matchin problem or a convex bipartite raph G can be reduced to indin a maximum interval assinment in I(G). 1.2 The Model The Coarse Grained Multicomputer (CGM) A CGM (Coarse Grained Multicomputer) is a special case o a BSP (Bulk Synchronous Parallel) multiprocessor [18] where all communication within a superstep is reduced to one h-relation. A CGM consists o a collection o p processors with N=p local memory each, connected by a router that can deliver messaes in a point to point ashion. A CGM alorithm consists o an alternatin sequence o computation rounds and communication rounds separated by barrier synchronization. A computation round is equivalent to a computation superstep in the BSP model, and the total computation cost T comp is deined analoously. A communication roundconsists o a sinle h-relation with h N=p. The total communication cost,t comm, is measured by the number o communication rounds. Consult [3, 4, 5] or more details. In a recent overview o dierent BSP and related models, Goodrich [13] reerred to the CGM as the weak-crew BSP. The CGM model aims at desinin simple and practical, yet theoretically optimal or eicient, parallel alorithms or coarse rained parallel systems (N=p >> 1). Alorithms do usually require a lower bound on N=p, e..n=p p or N=p p. The CGM model tarets in particular the case where the overall computation speed is considerably larer than the overall communication speed, which is usually the case. Since the messae size is maximal, the model also minimizes the messae overhead associated with sendin a messae, which is very important in practice. Relationship Between BSP And CGM In the remainder o this paper, we will present our alorithms in the CGM model. The relationship to the BSP model is iven by the ollowin Observation 2 A CGM alorithm with rounds and computation cost T comp corresponds to a BSP alorithm with supersteps, communication cost O( N p ) and the same computation cost T comp. 1.3 The Result In this paper, we present a coarse rained parallel alorithm or computin a maximum matchin o a convex bipartite raph G = (A; B; E). For a p processor CGM with N=p memory per processor, N=p p, the alorithm requires O(lo p) communication rounds and O(T sequ ( n p ; m p ) + n p lo p) local computation where T sequ (n; m) is the sequential time complexity or the problem. For the BSP model, this implies O(lo p) supersteps with O(N + n p lo p) communication cost and 2 Alorithm Description In the ollowin Section 2.1, we irst present an alorithm that solves a special case: all intervals start at the same let end point. This alorithm will be used in our solution or the eneral case which is presented in Section Special Case: All Intervals Start At The Same Point Alorithm 1 All intervals have the same let end point l i = l; i =1n. Input: Asetonintervals I = I 1 ;:::;I n with their associated let and riht end points I i =(l i ;r i );i =1:::n, distributed over a p processor CGM with n=p intervals per processor. Note that, we assume n p p. (1) All intervals are sorted by their riht end points usin CGM parallel inteer sort [6, 13]. (2) Each processor P i ;i = 1 :::p, 1, determines the larest riht end point, e i, received in Step 1 and sends it to the next processor P i+1. (3) Each processor P i ;i = 2 :::p,setss i = e i,1 +1. The irst processor sets s 1 = l. We call (s i ;e i ) the controlled rane o P i. This is the rane o inteers that the processor can use to label intervals. (4) Each processor P i ;i = 1 :::p, temporarily chanes the let end points o its intervals to s i and then solves the modiied problem locally usin a sequential alorithm (essentially sequential inteer sort). (5) Each processor P i ;i = 1 :::p, calculates how many labels in the controlled rane are let unused (a i )and how many intervals did not yet receive an inteer label (b i ). These two numbers per processor are broadcast to all processors (in one h-relation). This is possible since n p p. (6) Based on the data received in the previous step, each processor can now calculate rom where it should request labels and to where it should send unused labels. See Alorithm 2 or more details. (7) Each processor selects unused labels and sends them to the processors that need them. (8) Upon receivin the needed labels, each processor can now assin them to the respective intervals. End o Alorithm Alorithm 2 Sequential computation or Step 6 in Alorithm 1, executed by processor P k, 1 k p.

3 Input: An array a = (a 1 ;:::;a p ) representin the numbers o ree (unused) labels in the p processors. An array b = (b 1 ;:::;b p ) representin the numbers o intervals so ar without labels in the p processors. Output: An array et = (et 1 ;:::;et p ) representin numbers o labels that are to be sent to processor P k by the other processors. An array ive =(ive i ;:::;ive p ) representin numbers o labels that are expected rom processor P k by the other processors. or (i=1; ip; i++) et i =0;ive i =0; i=1; j=2; while ((i<p) and (jp)) i (i==j) j++; while ((a i 6=0) and (jp)) i++; i (a i b j ) i (P k =i) et j =b j ; i (P k =j) receive i =b j ; a i =a i -b j ; b j =0; j++; else End o Alorithm i (P k =i) et j =a i ; i (P k =j) ive i =a i ; b j =b j -a i ; a i =0; Lemma 1 The sequential time complexity o Alorithm 2 is O(p). Proo. The variable i counts rom 1 to p-1, and j counts rom 2 to p. Since both variables are incremented independently, the total time complexity o the alorithm is O(p). 2 Lemma 2 The inteer label assinment produced by Alorithm 1 is maximum. Proo. It is easy to see that the label assinment based on the order o the riht end points is maximum. Let A o be such an assinment. Let A 1 be the label assinment produced by Alorithm 1. Since A o is maximum, ja o j ja 1 j.we compare assinments A 1 and A o. We irst remove the intervals that are not assined labels in both assinments. I the remainin intervals all have labels assined in both assinments, then we have ja o j = ja 1 j and the lemma ollows. I the kth interval (lk 0 ;r0 k ) (with respect to the riht end points) is assined a label in A o but not in A 1, then the irst k, 1 intervals must be assined labels l; l +1;:::;l+k, 2 in A o and the kth interval must be assined label l + k, 1. This also means rk 0 l + k, 1. Now consider A 1.Itheirstk, 1 intervals are also assined labels l; l +1;:::;l+ k, 2, thenl + k, 1 will be available or the kth intervals. I some o the irst k,1 intervals are not assined labels in the rane l; l+1;:::;l+k,2, then there will be a hole in this rane that can be used or the kth interval. Hence, or every interval with a label assined in A o, there is a label assined to that interval in A 1. Thereore, ja 1 jja o j. Thus, the label assinment obtained rom Alorithm 1 is maximum. 2 Theorem 1 Alorithm 1 inds a maximum label assinment or n intervals with the same let endpoints stored on a p processor CGM with n=p local memory per processor, n p p, in O(1) communication rounds with O( n p ) local computation. Proo. The correctness o the alorithm is shown in Lemma 2. The communication rounds required in each step o Alorithm 1 is O(1). Hence the total number o communication rounds needed is O(1). In each round, the total messae size per processor is O( n p ). Step 1 uses CGM inteer sort [6, 13] which requires O(1) communication rounds and O( n p ) local computation. The local computation o Step 6 is O(p) (rom Lemma 1). For all other steps, it is either O(1) or O( n p ). Thereore, the total local computation per processor is O( n p )+O(p) =O( n p ) since n p p The General Case In order to solve the maximum interval assinment problem or arbitrary intervals, we now combine Alorithm 1 with a mere/unmere scheme presented in [7]. Alorithm 3 General case where the intervals can have dierent let end points. Input: Aseton intervals I = I 1 ;:::;I n with their associated let and riht end points I i =(l i ;r i );i =1n, distributed over a p processor CGM with n=p intervals per processor. Note that, we assume that n p p. (1) All intervals are sorted by their let end points usin CGM parallel inteer sort [6, 13]. (In case o a tie, intervals are compared by their riht end points.)

4 (2) Intervals with the same let end points are combined into roups. All roups that are stored completely within a processor are mered into a sinle roup. Let be the number o roups. Note that is at most 2p +1. (3) Each roup is assined a controlled rane (l i ;r i );i = 1 ::: where l i is equal to the smallest let end point o that roup and r i = l i+1, 1;i =1:::, 1. Let r be the larest riht end point o the intervals. (4) Usin a sequential alorithm, each processor solves the problem or interval roups that are completely within the processor. Remove the label o all those intervals that received a label outside their roup s controlled rane. Classiy the intervals usin one o the ollowin three types. Matchable (M): all labeled intervals. To-be-determined (T ): all non labeled intervals that extend beyond the rihtmost label iven by that processor. Unmatchable (U): all remainin intervals. Remove all unmatchable intervals. (5) Usin Alorithm 1, solve the problem or interval roups that cross a processor boundary (or each such roup in isolation). Remove the label o all intervals that received a label outside their roup s controlled rane. Classiy the intervals usin one o the ollowin three types. Matchable (M): all labeled intervals. To-be-determined (T ): all nonlabeled intervals that extend beyond the rihtmost label iven by that processor. Unmatchable (U): all remainin intervals. Remove all unmatchable intervals. (6) Mere the intervals in adjacent roups. Let M L, T L be the intervals rom the let roup, let M R, T R be the intervals rom the riht roup, and let (l L ;r L ) and (l R ;r R ) be the controlled ranes o the let and riht roups, respectively. Usin Alorithm 1, solve the problem or T L [ M R over the rane (l R ;r R ). Let the resultin sets o machable and to-be-determined intervals be M n,andt n. For the combined roup, set M = M L [ M n and T = T n [ T R. The controlled rane o the combined roup is (l L ;r R ). (7) Repeat Step 6 O(lo ) times until a sinle roup is obtained. (8) Usin a reverse process o the previous steps, usin O(lo ) iterations, redistribute the intervals back into the roups obtained at the end o Step 3. In each splittin phase, let M be the roup we are splittin and let M L and M R be those two components. Let V be the set o intervals that have a let end point smaller than the startin value o the controlled rane o M. Note that, V can be empty. Let W be the union o V and M L. W should be distributed to M L and the rest to M R. However, the controlled rane o M L may not allow the entire W to be assined to M L. Hence, we assin only the irst min(jw j;lr,lj) intervals to M L and the remainder to M R. (9) Step 8 is repeated until roups are obtained. (10) Usin a sequential alorithm, each processor solves the problem or its interval roups over each roup s controlled rane. For roups that span over more than one processor, adjust the let end points to the startin values o the controlled rane and then apply Alorithm 1. End o Alorithm Theorem 2 Alorithm 3 solves the label assinment problem in O(lo p) communication rounds and Proo. The correctness o the split/mere scheme ollows rom [7]. Step 6 is executed O(lo ) times. In Step 6, we invoke Alorithm 1 which requires O(1) communication rounds. Since 2p +1, the total number o communication rounds is O(lo p). The local computation time is dominated by the O(1) executions o the sequential alorithm on each processor and the linear local time in each o the O(lo ) iterations. 2 As described in Section 1.1, this theorem implies an alorithm or computin the maximum matchin o a convex bipartite raph with the same number o communication rounds and local computation. 3 Conclusion In this paper, we have presented a coarse rained parallel alorithm or computin a maximum matchin o a convex bipartite raph G =(A; B; E). Forp processors with N=p memory per processor, N=p p, the alorithm requires O(lo p) communication rounds and O(T sequ ( n p ; m p ) + n p For the BSP model, this implies O(lo p) supersteps with O(N + n p lo p) communication cost and From a practical point o view, i.e. or implementin this method on commercial multiprocessors, it is very important that the problem size is not a parameter or the number o communication rounds. The result obtained, i.e. O(lo p) communication rounds, is a unction o p only. Since p is usually ixed or rows on very slowly in practice, and lo p is a slowly rowin unction, the number o communication rounds is essentially a ixed constant or most practical arranements. This is important because empirical studies show that the number o communication rounds is the most important parameter inluencin the observed runnin time. From a theoretical point o view it is an important open problem to study whether it is possible to ind an alorithm with even ewer communication rounds (is O(1) possible?) and/or determine lower bounds or the number o communication rounds.

5 Reerences [1] R.J. Anderson and L. Snyder, A Comparison o Shared and Nonshared Memory Models o Computation. Proc. o IEEE, vol 79(4),pp [2] G.E. Blelloch, C.E. Leiserson, B.M. Mas, and C.G. Plaxton, A Comparison o Sortin Alorithms or the Connection Machine CM-2., Proc. ACM Symp. on Parallel Alorithms and Architectures, 1991, pp [3] E. Caceres, F. Dehne, A. Ferreira, P. Flocchini, I. Riepin, A. Roncato, N. Santoro, and S. W. Son, Eicient parallel raph alorithms or coarse rained multicomputers and BSP, in Proc. 24th International Colloquium on Automata, Lanuaes and Prorammin (ICALP 97), 1997, Spriner Verla Lecture Notes in Computer Science, Vol. 1256, pp [4] F. Dehne, A. Fabri, and A. Rau-Chaplin, Scalable Parallel Geometric Alorithms or Coarse Grained Multicomputers, Proc. ACM 9th Annual Computational Geometry, paes , 1993 [5] F. Dehne, X. Den, P. Dymond, A. Fabri, and A. A. Kokhar, A randomized parallel 3D convex hull alorithm or coarse rained multicomputers, in Proc. ACM Symposium on Parallel Alorithms and Architectures (SPAA 95), pp , [12] F. Glover, Maximum matchin in convex bipartite raphs, Naval Res. Loist. Quarterly, 14, 1967, pp [13] M.T. Goodrich, Communication eicient parallel sortin, ACM Symposium on Theory o Computin (STOC), [14] J.E. Hopkrot, R.M. Karp, An n 5=2 alorithm or maximum matchin in bipartite raphs, SIAM J. Comput., 2, 1973, pp [15] W. Lipski and F.P. Preparata, Eicient alorithms or indin maximum matchins in convex bibartite raphs and related problems, Acta Inormatica, 15, 1981, pp [16] Hui Li, and K.C. Sevcik, Parallel Sortin by Overpartitionin. SPAA94, pp.46-56,1994. [17] L. Snyder, Type architectures, shared memory and the corollary o modest potential. Annu. Rev. Comput. Sci. 1, pp , [18] L.G. Valiant, A Bridin Model or Parallel Computation. Communications o the ACM, Vol. 33, paes , [6] F. Dehne, A.Chan, A note on coarse rained parallel inteer sortin, Technical Report, School o Computer Science, Carleton University, 1998, [7] E. Dekel and S. Sahni, A Parallel Matchin Alorithm or Convex Bipartite Graphs, International Conerence on Parallel Processin, 1982, pp [8] X. Den, A Convex Hull Alorithm or Coarse Grained Multiprocessors. Proc. 5th International Symposium on Alorithms and Computation, [9] X. Den and P. Dymond. Eicient Routin and Messae Bounds or Optimal Parallel Alorithms. to appear in IPPS 1995, Santa Barbara, April, [10] X. Den and N. Gu, Good Prorammin Style on Multiprocessors. Proceedins o IEEE Symposium on Parallel and Distributed Processin, Dallas, October, 1994, pp , [11] A.V. Gerbessiotis and L.G. Valiant, Direct Bulk- Synchronous Parallel Alorithms, Proc. 3rd Scandinavian Workshop on Alorithm Theory, Lecture Notes in Computer Science, Vol. 621, 1992, pp

Coarse-Grained Parallel Geometric Search 1

Coarse-Grained Parallel Geometric Search 1 Journal of Parallel and Distributed Computing 57, 224235 (1999) Article ID jpdc.1998.1527, available online at http:www.idealibrary.com on Coarse-Grained Parallel Geometric Search 1 Albert Chan,* Frank

More information

Experimental Results of a Coarse-Grained Parallel Algorithm for Spanning Tree and Connected Components

Experimental Results of a Coarse-Grained Parallel Algorithm for Spanning Tree and Connected Components Experimental Results of a Coarse-Grained Parallel Algorithm for Spanning Tree and Connected Components Edson Norberto Cáceres, Henrique Mongelli, Christiane Nishibe Universidade Federal de Mato Grosso

More information

Composite functions. [Type the document subtitle] Composite functions, working them out.

Composite functions. [Type the document subtitle] Composite functions, working them out. Composite unctions [Type the document subtitle] Composite unctions, workin them out. luxvis 11/19/01 Composite Functions What are they? In the real world, it is not uncommon or the output o one thin to

More information

Global Constraints. Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019

Global Constraints. Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019 Global Constraints Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019 Global Constraints Global constraints are classes o constraints

More information

A BSP/CGM Algorithm for Computing Euler Tours in Graphs

A BSP/CGM Algorithm for Computing Euler Tours in Graphs A BSP/CGM Algorithm for Computing Euler Tours in Graphs E.N. Cáceres Λ and C. Y. Nasu Universidade Federal de Mato Grosso do Sul Campo Grande, MS, Brazil edson@dct.ufms.br, claudia@dct.ufms.br Abstract

More information

A SUIF Interface Module for Eli. W. M. Waite. University of Colorado

A SUIF Interface Module for Eli. W. M. Waite. University of Colorado A SUIF Interace Module or Eli W. M. Waite Department o Electrical and Computer Enineerin University o Colorado William.Waite@Colorado.edu 1 What is Eli? Eli [2] is a domain-specic prorammin environment

More information

CGMGRAPH/CGMLIB: IMPLEMENTING AND TESTING CGM GRAPH ALGORITHMS ON PC CLUSTERS AND SHARED MEMORY MACHINES

CGMGRAPH/CGMLIB: IMPLEMENTING AND TESTING CGM GRAPH ALGORITHMS ON PC CLUSTERS AND SHARED MEMORY MACHINES CGMGRAPH/CGMLIB: IMPLEMENTING AND TESTING CGM GRAPH ALGORITHMS ON PC CLUSTERS AND SHARED MEMORY MACHINES Albert Chan 1 Frank Dehne 2 Ryan Taylor 3 Abstract In this paper, we present CGMgraph, the first

More information

Efficient Algorithm for the Paired-Domination Problem in Convex Bipartite Graphs

Efficient Algorithm for the Paired-Domination Problem in Convex Bipartite Graphs Efficient Algorithm for the Paired-Domination Problem in Convex Bipartite Graphs Ruo-ei Hung, Chi-Hyi Laio, and Chun-Kai ang Abstract Let G =(V,E) be a graph without isolated vertices. A matching in G

More information

Linear Network Coding

Linear Network Coding IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 2, FEBRUARY 2003 371 Linear Network Codin Shuo-Yen Robert Li, Senior Member, IEEE, Raymond W. Yeun, Fellow, IEEE, Nin Cai Abstract Consider a communication

More information

A Nearest Neighbor Method for Efficient ICP

A Nearest Neighbor Method for Efficient ICP A Nearest Neihbor Method or Eicient ICP Michael Greenspan Guy Godin Visual Inormation Technoloy Group Institute or Inormation Technoloy, National Research Council Canada Bld. M50, 1500 Montreal Rd., Ottawa,

More information

Status. We ll do code generation first... Outline

Status. We ll do code generation first... Outline Status Run-time Environments Lecture 11 We have covered the ront-end phases Lexical analysis Parsin Semantic analysis Next are the back-end phases Optimization Code eneration We ll do code eneration irst...

More information

A 2-D Parallel Convex Hull Algorithm with Optimal Communication Phases

A 2-D Parallel Convex Hull Algorithm with Optimal Communication Phases A 2-D arallel Convex Hull Algorithm with Optimal Communication hases Jieliang Zhou, Xiaotie Deng, and atrick Dymond Department of Computer Science York University Toronto, Ontario, M3J 13, Canada E-mail:fzhou,

More information

A new NC Algorithm for Perfect Matching in Bipartite Cubic Graphs

A new NC Algorithm for Perfect Matching in Bipartite Cubic Graphs A new NC Algorithm for Perfect Matching in Bipartite Cubic Graphs Roded Sharan Avi Wigderson Institute of Computer Science, Hebrew University of Jerusalem, Israel. E-mail: roded@math.tau.ac.il, avi@cs.huji.ac.il

More information

Using Real-Time Serializability and Optimistic Concurrency Control in Firm Real-Time Databases

Using Real-Time Serializability and Optimistic Concurrency Control in Firm Real-Time Databases Usin Real-Time Serializability and Optimistic Concurrency Control in Firm Real-Time Databases Jan Lindström and Kimmo Raatikainen University o Helsinki, Department o Computer Science P.O. Box 26 (Teollisuuskatu

More information

Graph Coloring on a Coarse Grained Multiprocessor

Graph Coloring on a Coarse Grained Multiprocessor Graph Coloring on a Coarse Grained Multiprocessor (extended abstract) Assefaw Hadish Gebremedhin 1, Isabelle Guérin Lassous 2, Jens Gustedt 3, and Jan Arne Telle 1 1 Univ. of Bergen, Norway. assefaw telle

More information

Piecewise polynomial interpolation

Piecewise polynomial interpolation Chapter 2 Piecewise polynomial interpolation In ection.6., and in Lab, we learned that it is not a good idea to interpolate unctions by a highorder polynomials at equally spaced points. However, it transpires

More information

Chordal Graphs: Theory and Algorithms

Chordal Graphs: Theory and Algorithms Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also

More information

CS 161: Design and Analysis of Algorithms

CS 161: Design and Analysis of Algorithms CS 161: Design and Analysis o Algorithms Announcements Homework 3, problem 3 removed Greedy Algorithms 4: Human Encoding/Set Cover Human Encoding Set Cover Alphabets and Strings Alphabet = inite set o

More information

9.8 Graphing Rational Functions

9.8 Graphing Rational Functions 9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction

More information

On the Convexity Number of Graphs

On the Convexity Number of Graphs On the Convexity Number of Graphs Mitre C. Dourado 1, Fábio Protti, Dieter Rautenbach 3, and Jayme L. Szwarcfiter 4 1 ICE, Universidade Federal Rural do Rio de Janeiro and NCE - UFRJ, Brazil, email: mitre@nce.ufrj.br

More information

Thread-based vs Event-based Implementation of a Group Communication Service

Thread-based vs Event-based Implementation of a Group Communication Service Thread-based vs Event-based Implementation o a Group Communication Service Shivakant Mishra and Ronuan Yan Department o Computer Science University o Wyomin, P.O. Box 3682 Laramie, WY 8271-3682, USA. Email:

More information

WHEN DO THREE LONGEST PATHS HAVE A COMMON VERTEX?

WHEN DO THREE LONGEST PATHS HAVE A COMMON VERTEX? WHEN DO THREE LONGEST PATHS HAVE A COMMON VERTEX? MARIA AXENOVICH Abstract. It is well known that any two longest paths in a connected graph share a vertex. It is also known that there are connected graphs

More information

Parallel Algorithm for Multilevel Graph Partitioning and Sparse Matrix Ordering

Parallel Algorithm for Multilevel Graph Partitioning and Sparse Matrix Ordering Parallel Algorithm for Multilevel Graph Partitioning and Sparse Matrix Ordering George Karypis and Vipin Kumar Brian Shi CSci 8314 03/09/2017 Outline Introduction Graph Partitioning Problem Multilevel

More information

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem Ahmad Biniaz Anil Maheshwari Michiel Smid September 30, 2013 Abstract Let P and S be two disjoint sets of n and m points in the

More information

a<b x = x = c!=d = y x = = x false true

a<b x = x = c!=d = y x = = x false true 1 Introduction 1.1 Predicated execution Predicated execution [HD86, RYYT89, DT93, KSR93] is an architectural model in which each operation is uarded by a boolean operand whose value determines whether

More information

RE2C { A More Versatile Scanner Generator. Peter Bumbulis Donald D. Cowan. University of Waterloo. April 15, Abstract

RE2C { A More Versatile Scanner Generator. Peter Bumbulis Donald D. Cowan. University of Waterloo. April 15, Abstract RE2C { A More Versatile Scanner Generator Peter Bumbulis Donald D. Cowan Computer Science Department and Computer Systems Group University o Waterloo April 15, 1994 Abstract It is usually claimed that

More information

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.

More information

A matching of maximum cardinality is called a maximum matching. ANn s/2

A matching of maximum cardinality is called a maximum matching. ANn s/2 SIAM J. COMPUT. Vol. 2, No. 4, December 1973 Abstract. ANn s/2 ALGORITHM FOR MAXIMUM MATCHINGS IN BIPARTITE GRAPHS* JOHN E. HOPCROFT" AND RICHARD M. KARP The present paper shows how to construct a maximum

More information

Lecture notes on: Maximum matching in bipartite and non-bipartite graphs (Draft)

Lecture notes on: Maximum matching in bipartite and non-bipartite graphs (Draft) Lecture notes on: Maximum matching in bipartite and non-bipartite graphs (Draft) Lecturer: Uri Zwick June 5, 2013 1 The maximum matching problem Let G = (V, E) be an undirected graph. A set M E is a matching

More information

Kriging in a Parallel Environment

Kriging in a Parallel Environment Kriging in a Parallel Environment Jason Morrison (Ph.D. Candidate, School of Computer Science, Carleton University, ON, K1S 5B6, Canada; (613)-520-4333; e-mail: morrison@scs.carleton.ca) Introduction In

More information

OCC and Its Variants. Jan Lindström. Helsinki 7. November Seminar on real-time systems UNIVERSITY OF HELSINKI. Department of Computer Science

OCC and Its Variants. Jan Lindström. Helsinki 7. November Seminar on real-time systems UNIVERSITY OF HELSINKI. Department of Computer Science OCC and Its Variants Jan Lindström Helsinki 7. November 1997 Seminar on real-time systems UNIVERSITY OF HELSINKI Department o Computer Science Contents 1 Introduction 1 2 Optimistic Concurrency Control

More information

From Java to C A Supplement to Computer Algorithms, Third Edition. Sara Baase Allen Van Gelder

From Java to C A Supplement to Computer Algorithms, Third Edition. Sara Baase Allen Van Gelder From Java to C A Supplement to Computer Alorithms, Third Edition Sara Baase Allen Van Gelder October 30, 2004 ii clcopyriht 2000, 2001 Sara Baase and Allen Van Gelder. All rihts reserved. This document

More information

Efficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints

Efficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints Efficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints Jaya Prakash Champati and Ben Lian Department of Electrical and Computer Enineerin, University of Toronto

More information

Rough Connected Topologized. Approximation Spaces

Rough Connected Topologized. Approximation Spaces International Journal o Mathematical Analysis Vol. 8 04 no. 53 69-68 HIARI Ltd www.m-hikari.com http://dx.doi.org/0.988/ijma.04.4038 Rough Connected Topologized Approximation Spaces M. J. Iqelan Department

More information

Portable Parallel Algorithms for Geometric Problems

Portable Parallel Algorithms for Geometric Problems In Proc. 2nd Symp. Frontiers Massively Parallel Computation (1988), pp. 195 198. Portable Parallel Algorithms for Geometric Problems (Preliminary Version) Russ Miller Λ Department of Computer Science State

More information

FPGA Technology Mapping: A Study of Optimality

FPGA Technology Mapping: A Study of Optimality FPGA Technoloy Mappin: A Study o Optimality Andrew Lin Department o Electrical and Computer Enineerin University o Toronto Toronto, Canada alin@eec.toronto.edu Deshanand P. Sinh Altera Corporation Toronto

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

Asymptotically Efficient Hypercube Algorithms for Computational Geometry Preliminary Version

Asymptotically Efficient Hypercube Algorithms for Computational Geometry Preliminary Version In Proc. 3rd Symp. Frontiers Massively Parallel Computation (1990), pp. 8 11. Asymptotically Efficient Hypercube Algorithms for Computational Geometry Preliminary Version Philip D. MacKenzie 1 and Quentin

More information

Reducing Network Cost of Many-to-Many Communication in Unidirectional WDM Rings with Network Coding

Reducing Network Cost of Many-to-Many Communication in Unidirectional WDM Rings with Network Coding 1 Reducin Network Cost of Many-to-Many Communication in Unidirectional WDM Rins with Network Codin Lon Lon and Ahmed E. Kamal, Senior Member, IEEE Abstract In this paper we address the problem of traffic

More information

A parallel algorithm for minimum spanning tree on GPU

A parallel algorithm for minimum spanning tree on GPU A parallel algorithm for minimum spanning tree on GPU Jucele França de Alencar Vasconcellos, Edson Norberto Cáceres and Henrique Mongelli College of Computing Federal University of Mato Grosso do Sul Campo

More information

Geometric Separators and the Parabolic Lift

Geometric Separators and the Parabolic Lift CCCG 13, Waterloo, Ontario, August 8 1, 13 Geometric Separators and the Parabolic Lit Donald R. Sheehy Abstract A geometric separator or a set U o n geometric objects (usually balls) is a small (sublinear

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University ommunication Networks (0368-3030) / Sprin 0 The lavatnik School o omputer Science, Tel-viv University llon Waner urose & Ross, hapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, hapters 4.3.4 4.3.8 (5 th

More information

Ray shooting from convex ranges

Ray shooting from convex ranges Discrete Applied Mathematics 108 (2001) 259 267 Ray shooting from convex ranges Evangelos Kranakis a, Danny Krizanc b, Anil Maheshwari a;, Jorg-Rudiger Sack a, Jorge Urrutia c a School of Computer Science,

More information

Minimum Spanning Tree Verification under Uncertainty

Minimum Spanning Tree Verification under Uncertainty Minimum Spanning Tree Verification under Uncertainty Thomas Erlebach and Michael Hoffmann Department of Computer Science, University of Leicester, England {te17,mh55}@mcs.le.ac.uk Abstract. In the verification

More information

The minimum cut algorithm of. Stoer and Wagner. Kurt Mehlhorn and Christian Uhrig. June 27, 1995

The minimum cut algorithm of. Stoer and Wagner. Kurt Mehlhorn and Christian Uhrig. June 27, 1995 The minimum cut alorithm of Stoer and Waner Kurt Mehlhorn and Christian Uhri June 27, 1995 1. Min-cuts in undirected raphs. Let G = (V ; E) be an undirected raph (self-loops and parallel edes are allowed)

More information

1 Theory 1 (CSc 473): Automata, Grammars, and Lanuaes For any strin w = w 1 w 2 :::w n, define w R to be the reversal of w: w R = w n w n 1 :::w 1. Su

1 Theory 1 (CSc 473): Automata, Grammars, and Lanuaes For any strin w = w 1 w 2 :::w n, define w R to be the reversal of w: w R = w n w n 1 :::w 1. Su Masters Examination Department of Computer Science March 27, 1999 Instructions This examination consists of nine problems. The questions are in three areas: 1. Theory and Alorithms: CSc 473, 545, and 573;

More information

The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

More information

Acyclic orientations do not lead to optimal deadlock-free packet routing algorithms

Acyclic orientations do not lead to optimal deadlock-free packet routing algorithms Acyclic orientations do not lead to optimal deadloc-ree pacet routing algorithms Daniel Šteanovič 1 Department o Computer Science, Comenius University, Bratislava, Slovaia Abstract In this paper e consider

More information

FSM ENCODING FOR BDD REPRESENTATIONS

FSM ENCODING FOR BDD REPRESENTATIONS Int. J. Appl. Math. Comput. Sci., 27, Vol. 7, No., 3 28 DOI:.2478/v6-7--6 FSM ENCODING FOR BDD REPRESENTATIONS WILSIN GOSTI, TIZIANO VILLA,, ALEX SALDANHA, ALBERTO L. SANGIOVANNI-VINCENTELLI, Cadence Desin

More information

A Cell Burst Scheduling for ATM Networking Part II: Implementation

A Cell Burst Scheduling for ATM Networking Part II: Implementation A Cell Burst Schedulin or ATM Networkin Part II: Implementation C. Tan, A. T. Chronopoulos, Senior Member, IEEE Computer Science Department Wayne State University email:ctan, chronos@cs.wayne.edu E. Yaprak,

More information

Geometric Streaming Algorithms with a Sorting Primitive (TR CS )

Geometric Streaming Algorithms with a Sorting Primitive (TR CS ) Geometric Streaming Algorithms with a Sorting Primitive (TR CS-2007-17) Eric Y. Chen School of Computer Science University of Waterloo Waterloo, ON N2L 3G1, Canada, y28chen@cs.uwaterloo.ca Abstract. We

More information

Some Inequalities Involving Fuzzy Complex Numbers

Some Inequalities Involving Fuzzy Complex Numbers Theory Applications o Mathematics & Computer Science 4 1 014 106 113 Some Inequalities Involving Fuzzy Complex Numbers Sanjib Kumar Datta a,, Tanmay Biswas b, Samten Tamang a a Department o Mathematics,

More information

Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption

Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption Efficient and Provably Secure Ciphers for Storae Device Block evel Encryption Yulian Zhen SIS Department, UNC Charlotte yzhen@uncc.edu Yone Wan SIS Department, UNC Charlotte yonwan@uncc.edu ABSTACT Block

More information

Characterization of Networks Supporting Multi-dimensional Linear Interval Routing Scheme

Characterization of Networks Supporting Multi-dimensional Linear Interval Routing Scheme Characterization of Networks Supporting Multi-dimensional Linear Interval Routing Scheme YASHAR GANJALI Department of Computer Science University of Waterloo Canada Abstract An Interval routing scheme

More information

MetaTeD A Meta Language for Modeling. Telecommunication Networks. Kalyan S. Perumalla and Richard M. Fujimoto

MetaTeD A Meta Language for Modeling. Telecommunication Networks. Kalyan S. Perumalla and Richard M. Fujimoto MetaTeD A Meta Lanuae or Modelin Telecommunication Networks Kalyan S. Perumalla and Richard M. Fujimoto (kalyan@cc.atech.edu and ujimoto@cc.atech.edu) Collee o Computin Georia Institute o Technoloy Atlanta,

More information

GRAPH THEORY and APPLICATIONS. Factorization Domination Indepence Clique

GRAPH THEORY and APPLICATIONS. Factorization Domination Indepence Clique GRAPH THEORY and APPLICATIONS Factorization Domination Indepence Clique Factorization Factor A factor of a graph G is a spanning subgraph of G, not necessarily connected. G is the sum of factors G i, if:

More information

Image Fusion for Enhanced Vision System using Laplacian Pyramid

Image Fusion for Enhanced Vision System using Laplacian Pyramid Imae Fusion or Enhanced Vision System usin aplacian Pyramid Abhilash G, T.V. Rama Murthy Department o ECE REVA Institute o Technoloy and Manaement Banalore-64, India V. P. S Naidu MSDF ab, FMCD, CSIR-National

More information

Scheduling in Multihop Wireless Networks without Back-pressure

Scheduling in Multihop Wireless Networks without Back-pressure Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei

More information

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Sparse Hypercube 3-Spanners

Sparse Hypercube 3-Spanners Sparse Hypercube 3-Spanners W. Duckworth and M. Zito Department of Mathematics and Statistics, University of Melbourne, Parkville, Victoria 3052, Australia Department of Computer Science, University of

More information

A NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING

A NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING Chater 26 A NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING A. Cha ad F. Dehe School of Comuter Sciece Carleto Uiversity Ottawa, Caada K1S 5B6 æ {acha,dehe}@scs.carleto.ca Abstract Keywords: We observe

More information

Seminar on. Edge Coloring Series Parallel Graphs. Mohammmad Tawhidul Islam. Masters of Computer Science Summer Semester 2002 Matrikel Nr.

Seminar on. Edge Coloring Series Parallel Graphs. Mohammmad Tawhidul Islam. Masters of Computer Science Summer Semester 2002 Matrikel Nr. Seminar on Edge Coloring Series Parallel Graphs Mohammmad Tawhidul Islam Masters of Computer Science Summer Semester 2002 Matrikel Nr. 9003378 Fachhochschule Bonn-Rhein-Sieg Contents 1. Introduction. 2.

More information

Towards an Override in Topoi

Towards an Override in Topoi Artur Hues University o Dublin, Trinity Collee, Dublin, Ireland e-mail : Artur.Hues@cs.tcd.ie November 5, 1998 Abstract Models o sotware systems are built in Z and VDM usin partial unctions between sets

More information

Module. Sanko Lan Avi Ziv Abbas El Gamal. and its accompanying FPGA CAD tools, we are focusing on

Module. Sanko Lan Avi Ziv Abbas El Gamal. and its accompanying FPGA CAD tools, we are focusing on Placement and Routin For A Field Prorammable Multi-Chip Module Sanko Lan Avi Ziv Abbas El Gamal Information Systems Laboratory, Stanford University, Stanford, CA 94305 Abstract Placemen t and routin heuristics

More information

Bichromatic Line Segment Intersection Counting in O(n log n) Time

Bichromatic Line Segment Intersection Counting in O(n log n) Time Bichromatic Line Segment Intersection Counting in O(n log n) Time Timothy M. Chan Bryan T. Wilkinson Abstract We give an algorithm for bichromatic line segment intersection counting that runs in O(n log

More information

MODELS FOR PARALLEL ALGORITHM DESIGN: AN INTRODUCTION. Afonso Ferreira* and Michel Morvan**

MODELS FOR PARALLEL ALGORITHM DESIGN: AN INTRODUCTION. Afonso Ferreira* and Michel Morvan** 1 MODELS FOR PARALLEL ALGORITHM DESIGN: AN INTRODUCTION Afonso Ferreira* and Michel Morvan** * CNRS LIP { ENS Lyon 69364 Lyon Cedex 07 France ferreira@lip.ens-lyon.fr ** LITP/IBP Universite Paris 7 75251

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

Optimal Parallel Randomized Renaming

Optimal Parallel Randomized Renaming Optimal Parallel Randomized Renaming Martin Farach S. Muthukrishnan September 11, 1995 Abstract We consider the Renaming Problem, a basic processing step in string algorithms, for which we give a simultaneously

More information

Randomized Parallel Selection

Randomized Parallel Selection University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 1990 Randomized Parallel Selection Sanguthevar Rajasekaran University of Pennsylvania

More information

I. A.H. Gebremedhin and F. Manne. Scalable Parallel Graph Coloring Algorithms. Concurrency: Practice and Experience. 2000; 12:

I. A.H. Gebremedhin and F. Manne. Scalable Parallel Graph Coloring Algorithms. Concurrency: Practice and Experience. 2000; 12: 1 Introduction Partitioning a set of objects into groups according to certain rules is a fundamental process in mathematics and computer science. Often, the rules that determine whether or not a pair of

More information

Fast and Simple Algorithms for Weighted Perfect Matching

Fast and Simple Algorithms for Weighted Perfect Matching Fast and Simple Algorithms for Weighted Perfect Matching Mirjam Wattenhofer, Roger Wattenhofer {mirjam.wattenhofer,wattenhofer}@inf.ethz.ch, Department of Computer Science, ETH Zurich, Switzerland Abstract

More information

A Coarse Grained Parallel Algorithm for Hausdorff Voronoi Diagrams

A Coarse Grained Parallel Algorithm for Hausdorff Voronoi Diagrams A Coarse Grained Parallel Algorithm for Hausdorff Voronoi Diagrams Frank Dehne, Anil Maheshwari and Ryan Taylor Abstract We present the first parallel algorithm for building a Hausdorff Voronoi diagram

More information

The Bounded Edge Coloring Problem and Offline Crossbar Scheduling

The Bounded Edge Coloring Problem and Offline Crossbar Scheduling The Bounded Edge Coloring Problem and Offline Crossbar Scheduling Jonathan Turner WUCSE-05-07 Abstract This paper introduces a variant of the classical edge coloring problem in graphs that can be applied

More information

Integrated QOS management for disk I/O. Dept. of Comp. Sci. Dept. of Elec. Engg. 214 Zachry. College Station, TX

Integrated QOS management for disk I/O. Dept. of Comp. Sci. Dept. of Elec. Engg. 214 Zachry. College Station, TX Interated QOS manaement or disk I/O Ravi Wijayaratne A. L. Narasimha Reddy Dept. o Comp. Sci. Dept. o Elec. En. Texas A & M University 214 Zachry Collee Station, TX 77843-3128 ravi,reddy@ee.tamu.edu Abstract

More information

Multicasting in the Hypercube, Chord and Binomial Graphs

Multicasting in the Hypercube, Chord and Binomial Graphs Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez Department of Computer Science University of California, Santa Barbara, CA, 93106 E-mail: {ccc,teo}@cs.ucsb.edu

More information

Superconcentrators of depth 2 and 3; odd levels help (rarely)

Superconcentrators of depth 2 and 3; odd levels help (rarely) Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv

More information

LEGEND. Cattail Sawgrass-Cattail Mixture Sawgrass-Slough. Everglades. National. Park. Area of Enlargement. Lake Okeechobee

LEGEND. Cattail Sawgrass-Cattail Mixture Sawgrass-Slough. Everglades. National. Park. Area of Enlargement. Lake Okeechobee An Ecient Parallel Implementation of the Everlades Landscape Fire Model Usin Checkpointin Fusen He and Jie Wu Department of Computer Science and Enineerin Florida Atlantic University Boca Raton, FL 33431

More information

Binary recursion. Unate functions. If a cover C(f) is unate in xj, x, then f is unate in xj. x

Binary recursion. Unate functions. If a cover C(f) is unate in xj, x, then f is unate in xj. x Binary recursion Unate unctions! Theorem I a cover C() is unate in,, then is unate in.! Theorem I is unate in,, then every prime implicant o is unate in. Why are unate unctions so special?! Special Boolean

More information

CS 598: Communication Cost Analysis of Algorithms Lecture 15: Communication-optimal sorting and tree-based algorithms

CS 598: Communication Cost Analysis of Algorithms Lecture 15: Communication-optimal sorting and tree-based algorithms CS 598: Communication Cost Analysis of Algorithms Lecture 15: Communication-optimal sorting and tree-based algorithms Edgar Solomonik University of Illinois at Urbana-Champaign October 12, 2016 Defining

More information

Derrick Stolee. April 12,

Derrick Stolee. April 12, 1 / 38 University Of Nebraska Lincoln Computer Science & Mathematics April 12, 2008 s-dstolee1@math.unl.edu 2 / 38 Acknowledgments Research Assistance and Funding This research funded by UCARE USDA FCIC/RMA

More information

Applications of Geometric Spanner

Applications of Geometric Spanner Title: Name: Affil./Addr. 1: Affil./Addr. 2: Affil./Addr. 3: Keywords: SumOriWork: Applications of Geometric Spanner Networks Joachim Gudmundsson 1, Giri Narasimhan 2, Michiel Smid 3 School of Information

More information

1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1

1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 Asymptotics, Recurrence and Basic Algorithms 1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 1. O(logn) 2. O(n) 3. O(nlogn) 4. O(n 2 ) 5. O(2 n ) 2. [1 pt] What is the solution

More information

Expected Approximation Guarantees for the Demand Matching Problem

Expected Approximation Guarantees for the Demand Matching Problem Expected Approximation Guarantees for the Demand Matching Problem C. Boucher D. Loker September 2006 Abstract The objective of the demand matching problem is to obtain the subset M of edges which is feasible

More information

Provably Efficient Non-Preemptive Task Scheduling with Cilk

Provably Efficient Non-Preemptive Task Scheduling with Cilk Provably Efficient Non-Preemptive Task Scheduling with Cilk V. -Y. Vee and W.-J. Hsu School of Applied Science, Nanyang Technological University Nanyang Avenue, Singapore 639798. Abstract We consider the

More information

Approximation Algorithms for Geometric Intersection Graphs

Approximation Algorithms for Geometric Intersection Graphs Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline

More information

Improving Computer Security using Extended Static Checking

Improving Computer Security using Extended Static Checking Improvin Computer Security usin Extended Static Checkin Brian V. Chess Department o Computer Enineerin University o Caliornia, Santa Cruz Abstract We describe a method or indin security laws in source

More information

Concavity. Notice the location of the tangents to each type of curve.

Concavity. Notice the location of the tangents to each type of curve. Concavity We ve seen how knowing where a unction is increasing and decreasing gives a us a good sense o the shape o its graph We can reine that sense o shape by determining which way the unction bends

More information

23.2 Minimum Spanning Trees

23.2 Minimum Spanning Trees 23.2 Minimum Spanning Trees Kruskal s algorithm: Kruskal s algorithm solves the Minimum Spanning Tree problem in O( E log V ) time. It employs the disjoint-set data structure that is similarly used for

More information

main Entry main main pow Entry pow pow

main Entry main main pow Entry pow pow Interprocedural Path Prolin David Melski and Thomas Reps Computer Sciences Department, University of Wisconsin, 20 West Dayton Street, Madison, WI, 53706, USA, fmelski, reps@cs.wisc.edu Abstract. In path

More information

Euler Tours and Their Applications. Chris Moultrie CSc 8530

Euler Tours and Their Applications. Chris Moultrie CSc 8530 Euler Tours and Their Applications Chris Moultrie CSc 8530 Topics Covered History Terminology Sequential Algorithm Parallel Algorithm BSP/CGM Algorithm History Started with the famous Konigsberg problem.

More information

A Rigorous Correctness Proof of a Tomasulo Scheduler Supporting Precise Interrupts

A Rigorous Correctness Proof of a Tomasulo Scheduler Supporting Precise Interrupts A Riorous Correctness Proo o a Tomasulo Scheduler Supportin Precise Interrupts Daniel Kroenin Λ, Silvia M. Mueller y, and Wolan J. Paul Dept. 14: Computer Science, University o Saarland, Post Box 151150,

More information

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute

More information

An NC Algorithm for Sorting Real Numbers

An NC Algorithm for Sorting Real Numbers EPiC Series in Computing Volume 58, 2019, Pages 93 98 Proceedings of 34th International Conference on Computers and Their Applications An NC Algorithm for Sorting Real Numbers in O( nlogn loglogn ) Operations

More information

Counting the Number of Eulerian Orientations

Counting the Number of Eulerian Orientations Counting the Number of Eulerian Orientations Zhenghui Wang March 16, 011 1 Introduction Consider an undirected Eulerian graph, a graph in which each vertex has even degree. An Eulerian orientation of the

More information

LITERATURE REVIEW: Parallel algorithms for the maximal independent set problem in graphs

LITERATURE REVIEW: Parallel algorithms for the maximal independent set problem in graphs LITERATURE REVIEW: Parallel algorithms for the maximal independent set problem in graphs Luis Barba October 16, 2012 1 Introduction Let G = (V, E) be an undirected graph. An independent set of G is a subset

More information

The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks

The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks 1 The Role of Switchin in Reducin the Number of Electronic Ports in WDM Networks Randall A. Berry and Eytan Modiano Abstract We consider the role of switchin in minimizin the number of electronic ports

More information

arxiv: v1 [cs.dc] 13 Oct 2008

arxiv: v1 [cs.dc] 13 Oct 2008 A SIMPLE LOCAL 3-APPROXIMATION ALGORITHM FOR VERTEX COVER VALENTIN POLISHCHUK AND JUKKA SUOMELA arxiv:0810.2175v1 [cs.dc] 13 Oct 2008 Abstract. We present a local algorithm (constant-time distributed algorithm)

More information

U1 S1 T1 U2 S1 T2 U3 S2 T3 U4 S3 T4

U1 S1 T1 U2 S1 T2 U3 S2 T3 U4 S3 T4 A Toolkit of Services for Implementin Fault-Tolerant Distributed Protocols Flaviu Cristian Department of Computer Science & Enineerin University of California, San Dieo La Jolla, CA 92093-0114, U.S.A.

More information