2012
DOI: 10.1145/2071379.2071383
|View full text |Cite
|
Sign up to set email alerts
|

Cache-Oblivious Algorithms

Abstract: This article presents asymptotically optimal algorithms for rectangular matrix transpose, fast Fourier transform (FFT), and sorting on computers with multiple levels of caching. Unlike previous optimal algorithms, these algorithms are cache oblivious : no variables dependent on hardware parameters, such as cache size and cache-line length, need to be tuned to achieve optimality. Nevertheless, these algorithms use an optimal amount of work and move data optimally among multiple levels of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
140
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 144 publications
(141 citation statements)
references
References 25 publications
1
140
0
Order By: Relevance
“…Hence, this solution improves the time complexity of the previous approach but retains the same important drawback. We conclude by mentioning a solution [13] that solves the weak prefix search problem efficiently in the Cache-Oblivious Model [14], and, thus, makes the above approach suitable for this model. Applying this solution we can search for a pattern P [1, p] in O(log B n + ( p log σ )/B) I/Os in the CacheOblivious Model by using O n log n bits of space, where B is the number of bits that fit in a block.…”
Section: Solutions For the Substring Occurrence Estimation Problemmentioning
confidence: 92%
“…Hence, this solution improves the time complexity of the previous approach but retains the same important drawback. We conclude by mentioning a solution [13] that solves the weak prefix search problem efficiently in the Cache-Oblivious Model [14], and, thus, makes the above approach suitable for this model. Applying this solution we can search for a pattern P [1, p] in O(log B n + ( p log σ )/B) I/Os in the CacheOblivious Model by using O n log n bits of space, where B is the number of bits that fit in a block.…”
Section: Solutions For the Substring Occurrence Estimation Problemmentioning
confidence: 92%
“…The width of the block is called the block size. (This technique is sufficient for our purposes, but see Frigo et al [7] for more clever methods.) Figure 4 shows the relative weight of all these issues.…”
Section: Concurrency and Data In All-pairsmentioning
confidence: 99%
“…An online split strategy was previously used by Frigo et al [7] in a cache-oblivious algorithm setting.…”
Section: Lemma 1 (Han and Thorupmentioning
confidence: 99%