Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing - STOC '89 1989
DOI: 10.1145/73007.73029
|View full text |Cite
|
Sign up to set email alerts
|

Work-preserving emulations of fixed-connection networks

Abstract: In addition to describing several work-preserving and real-time emulations, we also provide a general model in which lower bounds can be proved. Some of the more interesting and diverse consequences of this work include:(1) a proof that a linear array can emulate a (much larger) butterfly in a work-preserving fashion, but that a butterfly cannot emulate an expander (of any size) in a work-preserving fashion,(2) a proof that a butterfly can emulate a shuffle-exchange network in a real-time work-preserving fashi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

1993
1993
2014
2014

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 49 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…In particular this means that any computation performed by G k , could be performed by G x in constant slowdown (see Maggs and Schwabe [1998] and Koch et al [1997] for an overview on the literature of real-time emulations).…”
Section: Emulating General Graphs-smoothness Is Everythingmentioning
confidence: 99%
“…In particular this means that any computation performed by G k , could be performed by G x in constant slowdown (see Maggs and Schwabe [1998] and Koch et al [1997] for an overview on the literature of real-time emulations).…”
Section: Emulating General Graphs-smoothness Is Everythingmentioning
confidence: 99%
“…Koch et al in [7], and Maggs and Schwabe in [11] address the problem of performing network emulations via embeddings.…”
Section: Related Workmentioning
confidence: 99%
“…These shorter linear arrays simulate their subarrays independently for some number of steps, and then must communicate with their neighbors to update the information near their boundaries. (For more details on this type of simulation, see [7] and [13].) If we divide each linear array into overlapping arrays of length (1 + ε) log M, we can store the short overlapping arrays in the lower linear arrays as we stored the disjoint blocks of length log M in the stack allocation algorithm, and use them to simulate the full linear array.…”
Section: Extensions Of the Basic Network And Algorithmmentioning
confidence: 99%