Proceedings of the Thirteenth Annual ACM Symposium on Theory of Computing - STOC '81 1981
DOI: 10.1145/800076.802479
|View full text |Cite
|
Sign up to set email alerts
|

Universal schemes for parallel communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
246
0
4

Year Published

1992
1992
2015
2015

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 513 publications
(257 citation statements)
references
References 13 publications
0
246
0
4
Order By: Relevance
“…The oblivious routing problem has been investigated before (e.g., Azar et al 2003;Bienkowski et al 2003;Borodin and Hopcroft 1985;Gupta et al 2006;Räcke 2002;Valiant and Brebner 1981). Most of the above mentioned works dwell upon algorithmic approaches, while Applegate and Cohen (2003) and Belotti and Pınar (2008) resort to mathematical programming models.…”
Section: Oblivious Routing Under Polyhedral Demand Uncertaintymentioning
confidence: 99%
“…The oblivious routing problem has been investigated before (e.g., Azar et al 2003;Bienkowski et al 2003;Borodin and Hopcroft 1985;Gupta et al 2006;Räcke 2002;Valiant and Brebner 1981). Most of the above mentioned works dwell upon algorithmic approaches, while Applegate and Cohen (2003) and Belotti and Pınar (2008) resort to mathematical programming models.…”
Section: Oblivious Routing Under Polyhedral Demand Uncertaintymentioning
confidence: 99%
“…We first convert an input instance of the permutation to a path-routing problem using Valiant's method [28,29]: we use two butterflies connected back to back, and each packet uses a path to an intermediate random node in the output of the first butterfly. The path selection guarantees that the congestion is O(lg n), with high probability.…”
Section: Meshmentioning
confidence: 99%
“…We study permutation routing problems on the butterfly, in which each input node is the source of one packet, and each output node is the destination of one packet. In order to solve the permutation problems efficiently, we will use Valiant's scheme [28,29] which uses two back to back butterflies where packets choose random intermediate nodes before reaching their destinations. Thus, we first study the random destination problem on a butterfly, which we then use to solve permutation routing problems.…”
Section: Butterflymentioning
confidence: 99%
See 1 more Smart Citation
“…Permutation routing on mesh-connected computers has been extensively investigated [9,10,12,13,14,16,17,22,25,29]. In permutation routing, each processor initially has a packet to send, and packets have unique destinations.…”
Section: Introductionmentioning
confidence: 99%