Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms 2020
DOI: 10.1137/1.9781611975994.40
|View full text |Cite
|
Sign up to set email alerts
|

Flushing Without Cascades

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…Second, the fills placed in cups x and y are at most 1: this is because (10)) and f y − f x + ∆ x < ∆ x ≤ 1 (by ( 9)). Third, the fills placed in cups x and y are non-negative: this is because f x − f y + ∆ x > ∆ x ≥ 0 (by (9)) and f y − f x + ∆ y > ∆ x ≥ 0 (by (10)).…”
Section: Claim 52 If Some Cup Inmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, the fills placed in cups x and y are at most 1: this is because (10)) and f y − f x + ∆ x < ∆ x ≤ 1 (by ( 9)). Third, the fills placed in cups x and y are non-negative: this is because f x − f y + ∆ x > ∆ x ≥ 0 (by (9)) and f y − f x + ∆ y > ∆ x ≥ 0 (by (10)).…”
Section: Claim 52 If Some Cup Inmentioning
confidence: 99%
“…Starting with the seminal paper of Liu [30], work on the p processor cup game has spanned more than five decades [7,20,8,29,27,33,6,23,30,31,16,10,25,1,15,28]. In addition to processor scheduling [7,20,8,29,27,33,6,23,30,31,1,28,16], applications include network-switch buffer management [21,4,35,19], quality of service guarantees [7,1,28], and data structure deamortization [2,16,15,3,34,22,17,24,9]. The game has also been studied in many different forms.…”
Section: Introductionmentioning
confidence: 99%
“…The cup game was first introduced in the late 1960s [28,29] , and has been studied in many different forms [1, 5-7, 9, 13, 14, 18, 21, 23, 25-30]. The game has found extensive applications in areas such as processor scheduling [1, 5-7, 9, 10, 14, 18, 21, 23-30], network-switch buffer management [4,17,19,32], quality of service guarantees [1,6,26], and data-structure deamortization [2,3,8,13,14,16,20,22,31]. See [23] for a detailed discussion of the related work.…”
Section: Introductionmentioning
confidence: 99%
“…Until recently, the applications focused primarily on in-memory data structures, since externalmemory data structures often cannot afford the cost of a buffer overflowing by an ω(1) factor. Recent work shows how to use bounds in tail-size in order to solve this problem, and presents a new technique for applying cup games to external-memory data structures [10]. A key insight is that if a cup game has small tail size, then the water in "overflowed cups" (i.e., cups with fill more than O(1)) can be stored in a small in-memory cache.…”
Section: Introductionmentioning
confidence: 99%
“…The result is that every cup consumes exactly Θ(1) blocks in external memory, meaning that each cup can be read/modified by the data structure in O(1) I/Os. This insight was recently applied to external-memory dictionaries in order to eliminate flushing cascades in write optimized data structures [10].…”
Section: Introductionmentioning
confidence: 99%