Encyclopedia of Algorithms 2008
DOI: 10.1007/978-0-387-30162-4_137
|View full text |Cite
|
Sign up to set email alerts
|

External Sorting and Permuting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…This approach therefore can characterize the limits of parallelism that are possible in a MapReduce algorithm and it also shows that we should concentrate on the round complexity and communication complexity of a MapReduce algorithm in characterizing its performance 3 . Of course, such bounds for R and C may depend on M , but that is fine, for similar characterizations are common in the literature on external-memory algorithms (e.g., see [1,3,4,18,19]). In the rest of the paper, when we talk about the MapReduce model, we always mean the I/O-memory-bound MapReduce model except when mentioned explicitly.…”
Section: Memory-bound and I/o-bound Mapreduce Algorithmsmentioning
confidence: 95%
“…This approach therefore can characterize the limits of parallelism that are possible in a MapReduce algorithm and it also shows that we should concentrate on the round complexity and communication complexity of a MapReduce algorithm in characterizing its performance 3 . Of course, such bounds for R and C may depend on M , but that is fine, for similar characterizations are common in the literature on external-memory algorithms (e.g., see [1,3,4,18,19]). In the rest of the paper, when we talk about the MapReduce model, we always mean the I/O-memory-bound MapReduce model except when mentioned explicitly.…”
Section: Memory-bound and I/o-bound Mapreduce Algorithmsmentioning
confidence: 95%
“…Thus, we can simply refer to the memory and message sizes in terms of the number of items that are stored. This notation is borrowed from the literature on external-memory algorithms (e.g., see [21]), since it closely models the scenario where the memory needed by a computation exceeds its local capacity so that external storage is needed. In keeping with this analogy to external-memory algorithms, we refer to each message that is exchanged between Alice and Bob as an I/O, each of which, as noted above, is of size at most M .…”
Section: Our Resultsmentioning
confidence: 99%
“…In this paper we describe efficient external-memory implementations of the multimap ADT. Our externalmemory algorithms are for the standard two-level I/O model, which captures the memory hierarchy of modern computer architectures (e.g., see [1,22]). In this model, there is a cache of size M connected to a disk of unbounded size, and the cache and disk are divided into blocks, where each block can store up to B items.…”
Section: Our Resultsmentioning
confidence: 99%