Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures 2016
DOI: 10.1145/2935764.2935767
|View full text |Cite
|
Sign up to set email alerts
|

Parallel Algorithms for Asymmetric Read-Write Costs

Abstract: Motivated by the significantly higher cost of writing than reading in emerging memory technologies, we consider parallel algorithm design under such asymmetric read-write costs, with the goal of reducing the number of writes while preserving work-efficiency and low span. We present a nested-parallel model of computation that combines (i) small per-task stack-allocated memories with symmetric read-write costs and (ii) an unbounded heap-allocated shared memory with asymmetric read-write costs, and show how the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
42
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 52 publications
(42 citation statements)
references
References 52 publications
0
42
0
Order By: Relevance
“…This model captures different system consideration (latency, bandwidth, or energy) by simply plugging in a different value of ω, and also allows algorithms to be analyzed theoretically and practically. Similar scheduling results (upper bounds) on parallel running time and cache complexity are discussed in [13,17] based on work W , span D and asymmetric cache complexity Q of an algorithm. Based on this idea, many interesting algorithms and lower bounds are designed and analyzed by various recent works [13,16,17,23,61,14,21,19,53].…”
Section: Preliminaries and Related Workmentioning
confidence: 70%
See 2 more Smart Citations
“…This model captures different system consideration (latency, bandwidth, or energy) by simply plugging in a different value of ω, and also allows algorithms to be analyzed theoretically and practically. Similar scheduling results (upper bounds) on parallel running time and cache complexity are discussed in [13,17] based on work W , span D and asymmetric cache complexity Q of an algorithm. Based on this idea, many interesting algorithms and lower bounds are designed and analyzed by various recent works [13,16,17,23,61,14,21,19,53].…”
Section: Preliminaries and Related Workmentioning
confidence: 70%
“…The challenge arises in scheduling this computation. The scheduling theorem for the asymmetric case [13] constraints on the non-leaf stack memory to be a constant size. This contradicts the parallel version in Section 6.1.…”
Section: The Asymmetric Casementioning
confidence: 99%
See 1 more Smart Citation
“…8 If the search exhausts all vertices with center v, return. 9 Otherwise identify a vertex u that partitions the tree such that its subtree and the rest of the tree are each at least a constant fraction of k.…”
Section: Implicit Decompositionmentioning
confidence: 99%
“…The key subroutine of the algorithm, however, is just breadth-first searches (BFS's). Replacing these BFS's by write-efficient BFS's [9] yields the following theorem:…”
Section: Low-diameter Decompositionmentioning
confidence: 99%