2006
DOI: 10.1080/00036810600595813
|View full text |Cite
|
Sign up to set email alerts
|

An efficient parallel termination detection algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Without this requirement, we would need at least four traversals of the spanning tree instead of the two required for this algorithm (for example, see [1]). The cost of this algorithm in terms of P is O(log(P )) for the two sweeps of the virtual spanning tree.…”
Section: Exchanging Data Between Processorsmentioning
confidence: 99%
“…Without this requirement, we would need at least four traversals of the spanning tree instead of the two required for this algorithm (for example, see [1]). The cost of this algorithm in terms of P is O(log(P )) for the two sweeps of the virtual spanning tree.…”
Section: Exchanging Data Between Processorsmentioning
confidence: 99%
“…Some of these algorithms are efficient in terms of the number of secondary messages used [4,17,28], but may take a long time to detect termination [4]. Similarly, some of the algorithms are either less compute intensive [15] or require less memory [14], but are vulnerable to underflow [15] or overflow [14,3] problems. 2 Although the system model described in Section 1.1 is most commonly used, there are algorithms meant for other system characteristics: those that rely on a common clock [9,25,31], or assume a specific target system topology [11], or require first-in first-out (FIFO) communication between PEs [39], 3 or are designed to tolerate PE or link failures [9,18,22,32,37,38].…”
Section: Related Workmentioning
confidence: 99%
“…Although DTD is a long-standing problem, new algorithms for it with different performance characteristics and varying assumptions regarding the target computing system model appear regularly [2][3][4]9,11,14,15,17,18,22,24,25,28,27,29,31,32,[36][37][38][39]. Some of these algorithms are efficient in terms of the number of secondary messages used [4,17,28], but may take a long time to detect termination [4].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations