We show that any one-round algorithm that computes a minimum spanning tree (MST) in the unicast congested clique must use a link bandwidth of Omega( log(3) n) bits in the worst case. Consequently, computing an MST und...
详细信息
ISBN:
(纸本)9798400701214
We show that any one-round algorithm that computes a minimum spanning tree (MST) in the unicast congested clique must use a link bandwidth of Omega( log(3) n) bits in the worst case. Consequently, computing an MST under the standard assumption of O (log n)-size messages requires at least 2 rounds. This is the first round complexity lower bound in the unicast congested clique for a problem where the output size is small, i.e., O (n log n) bits. Our lower bound holds as long as every edge of the MST is output by an incident node. To the best of our knowledge, all prior lower bounds for the unicast congested clique either considered problems with large output sizes (e.g., subgraph enumeration) or required every node to learn the entire output.
We present a low-energy deterministic distributed algorithm that computes exact Single-Source Shortest Paths (SSSP) in near-optimal time: it runs in Õ(n) rounds and each node is awake during only poly(log n) roun...
详细信息
Population protocols are a model of distributed computation in which finite-state agents interact randomly in pairs. A protocol decides for any initial configuration whether it satisfies a fixed property, specified as...
详细信息
ISBN:
(纸本)9798400701214
Population protocols are a model of distributed computation in which finite-state agents interact randomly in pairs. A protocol decides for any initial configuration whether it satisfies a fixed property, specified as a predicate on the set of configurations. A family of protocols deciding predicates phi(n) is succinct if it uses O(|phi(n)|) states, where phi n is encoded as quantifier-free Presburger formula with coefficients in binary. (All predicates decidable by population protocols can be encoded in this manner.) While it is known that succinct protocols exist for all predicates, it is open whether protocols with O (|phi(n)|) states exist for any family of predicates phi(n). We answer this affirmatively, by constructing protocols with O( log |phi(n)|) states for some family of threshold predicates phi(n) (x) double left right arrow x >= k(n), with k1, k2,.. is an element of N. (In other words, protocols with O(n) states that decide x >= k for a k >= 2(2n)) This matches a known lower bound. Moreover, our construction is the first that is not 1-aware, making it robust against some types of errors.
We develop deterministic algorithms for the problems of consensus, gossiping and checkpointing with nodes prone to failing. distributed systems are modeled as synchronous complete networks. Failures are represented ei...
详细信息
ISBN:
(纸本)9798400701214
We develop deterministic algorithms for the problems of consensus, gossiping and checkpointing with nodes prone to failing. distributed systems are modeled as synchronous complete networks. Failures are represented either as crashes or Byzantine faults with authentication. The algorithmic goal is to have both linear running time and linear amount of communication for as large an upper bound t on the number of faults as possible, with respect to the number of nodes n. For crash failures, these bounds of optimality are t = O (n/log n) for consensus and t = O (n/log(2) n) for gossiping and checkpointing. For the model of Byzantine faults with authentication, we show how to reach consensus in both linear running time and communication for t = O(root n). We show how to implement the consensus algorithm for crash failures in the single-port model such as to preserve the range of t for which both the running time and communication are optimal. We prove a lower bound Omega(l +log n) on the running time of algorithms for each of the considered problems.
The proceedings contain 55 papers. The topics discussed include: fully local succinct distributed arguments;a knowledge-based analysis of intersection protocols;byzantine resilient distributedcomputing on external da...
ISBN:
(纸本)9783959773522
The proceedings contain 55 papers. The topics discussed include: fully local succinct distributed arguments;a knowledge-based analysis of intersection protocols;byzantine resilient distributedcomputing on external data;almost optimal algorithms for token collision in anonymous networks;asynchronous fault-tolerant distributed proper coloring of graphs;hyperproperty-preserving register specifications;vertical atomic broadcast and passive replication;what cannot be implemented on weak memory?;faster cycle detection in the congested clique;efficient signature-free validated agreement;convex consensus with asynchronous fallback;a simple computability theorem for colorless tasks in submodels of the iterated immediate snapshot;and on the limits of information spread by memory-less agents.
In this paper, we present a low-diameter decomposition algorithm in the LOCAL model of distributedcomputing that succeeds with probability 1 - 1/poly(n). Specifically, we show how to compute an (is an element of,O(lo...
详细信息
ISBN:
(纸本)9798400701214
In this paper, we present a low-diameter decomposition algorithm in the LOCAL model of distributedcomputing that succeeds with probability 1 - 1/poly(n). Specifically, we show how to compute an (is an element of,O(logn/is an element of)) low-diameter decomposition in O(log(3) (1/is an element of) log n/is an element of) rounds. Further developing our techniques, we show new distributed algorithms for approximating general packing and covering integer linear programs in the LOCAL model. For packing problems, our algorithm finds an (1 - epsilon)-approximate solution in O(log(3) (1/epsilon) logn/epsilon) rounds with probability 1 - 1/poly(n). For covering problems, our algorithm finds an ( 1+epsilon)-approximate solution in O ((log logn+log(1/epsilon))(3) logn/epsilon) rounds with probability 1 - 1/poly(n). These results improve upon the previous O (log(3) n/epsilon) -round algorithm by Ghaffari, Kuhn, and Maus [STOC 2017] which is based on network decompositions. Our algorithms are near-optimal for many fundamental combinatorial graph optimization problems in the LOCAL model, such as minimum vertex cover and minimum dominating set, as their ( 1 +/-epsilon)-approximate solutions require Omega (logn/epsilon) rounds to compute.
Stencil computation plays a pivotal role in numerous scientific and engineering applications. Previous studies have extensively investigated vectorization techniques to enhance in-core parallelism;however, the perform...
详细信息
ISBN:
(纸本)9798400714436
Stencil computation plays a pivotal role in numerous scientific and engineering applications. Previous studies have extensively investigated vectorization techniques to enhance in-core parallelism;however, the performance bottleneck caused by data alignment conflicts (DAC) has not been effectively resolved in all dimensions. This paper proposes Jigsaw, a conflict-free vectorization method to reduce DAC across all dimensions by tessellating swizzled finest-grained lanes. Jigsaw comprises three key components: Lane-based Butterfly Vectorization, SVD-based Dimension Flattening, and Iteration-based Temporal Merging. These components effectively address DAC across spatial and temporal dimensions. Experimental results on different machines demonstrate that Jigsaw could achieve a significant improvement compared to the state-of-the-art techniques, with an average speedup of 2.31x on various stencil kernels.
We study the deterministic complexity of the 2-Ruling Set problem in the model of Massively Parallel Computation (MPC) with linear and strongly sublinear local *** MPC: We present a constant-round deterministic algori...
详细信息
We present randomized distributed algorithms for the maximal independent set problem (MIS) that, while keeping the time complexity nearly matching the best known, reduce the energy complexity substantially. These algo...
详细信息
ISBN:
(纸本)9798400701214
We present randomized distributed algorithms for the maximal independent set problem (MIS) that, while keeping the time complexity nearly matching the best known, reduce the energy complexity substantially. These algorithms work in the standard CONGEST model of distributed message passing with O (log n) bit messages. The time complexity measures the number of rounds in the algorithm. The energy complexity measures the number of rounds each node is awake;during other rounds, the node sleeps and cannot perform any computation or communications. Our first algorithm has an energy complexity of O (log log n) and a time complexity of O ( log(2) n). Our second algorithm is faster but slightly less energy-efficient: it achieves an energy complexity of O (log(2) log n) and a time complexity of O (log n center dot log log n center dot log* n). Thus, this algorithm nearly matches the O (log n) time complexity of the state-of-the-art MIS algorithms while significantly reducing their energy complexity from O (log n) to O ( log(2) log n).
In today's data-driven era, the explosive growth of global data volume has led to an increasing consumption of computing and storage resources. Effective management of virtual machines (VMs) memory usage is critic...
详细信息
ISBN:
(纸本)9798400714436
In today's data-driven era, the explosive growth of global data volume has led to an increasing consumption of computing and storage resources. Effective management of virtual machines (VMs) memory usage is critical for cloud vendors to optimize system performance and resource utilization. Existing memory prefetching methods often slow down system performance, creating a difficult balance between maintaining service quality and optimizing resource use. For instance, Leap, which primarily utilizes address information, performs poorly in VM environments. The main issue is the performance drop caused by the reuse of memory resources in virtualized environments, a common situation in public clouds. To tackle this, we introduce vPrefetcher, a page prefetching system designed specifically for VMs. vPrefetcher monitors how VMs access memory that is not currently in use and prepares that memory in advance. Our unique Trend algorithm uses the spatial and temporal patterns to improve how memory is prefetched, reduce the overhead of memory reclamation. By applying vPrefetcher in tests with typical data center applications under memory reuse conditions, we have noticed a significant improvement. Our system reduces the performance loss in VMs by up to 45%, which is a considerable improvement over existing solutions. [GRAPHICS] .
暂无评论