A bridging model for parallel computation
LG Valiant - Communications of the ACM, 1990 - dl.acm.org
The success of the von Neumann model of sequential computation is attributable to the fact
that it is an efficient bridge between software and hardware: high-level languages can be …
that it is an efficient bridge between software and hardware: high-level languages can be …
Linear work suffix array construction
J Kärkkäinen, P Sanders, S Burkhardt - Journal of the ACM (JACM), 2006 - dl.acm.org
Suffix trees and suffix arrays are widely used and largely interchangeable index structures
on strings and sequences. Practitioners prefer suffix arrays due to their simplicity and space …
on strings and sequences. Practitioners prefer suffix arrays due to their simplicity and space …
Simple linear work suffix array construction
J Kärkkäinen, P Sanders - … ICALP 2003 Eindhoven, The Netherlands, June …, 2003 - Springer
A suffix array represents the suffixes of a string in sorted order. Being a simpler and more
compact alternative to suffix trees, it is an important tool for full text indexing and other string …
compact alternative to suffix trees, it is an important tool for full text indexing and other string …
Δ-stepping: a parallelizable shortest path algorithm
The single source shortest path problem for arbitrary directed graphs with n nodes, m edges
and nonnegative edge weights can sequentially be solved using O (n· log n+ m) operations …
and nonnegative edge weights can sequentially be solved using O (n· log n+ m) operations …
[图书][B] Parallel computation: models and methods
SG Akl - 1997 - dl.acm.org
Parallel computation | Guide books skip to main content ACM Digital Library home ACM home
Google, Inc. (search) Advanced Search Browse About Sign in Register Advanced Search …
Google, Inc. (search) Advanced Search Browse About Sign in Register Advanced Search …
Equihash: Asymmetric proof-of-work based on the generalized birthday problem
A Biryukov, D Khovratovich - Ledger, 2017 - ledgerjournal.org
Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice
protection tools, but the requirement for fast verification so far has made it an easy prey for …
protection tools, but the requirement for fast verification so far has made it an easy prey for …
[PDF][PDF] A comparison of sorting algorithms for the connection machine CM-2
We have implemented three parallel sorting algorithms on the Connection Machine
Supercomputer model CM-2: B atcher's bitonic sort, a parallel radix sor~ and a sample sort …
Supercomputer model CM-2: B atcher's bitonic sort, a parallel radix sor~ and a sample sort …
General purpose parallel architectures
LG Valiant - Algorithms and Complexity, 1990 - Elsevier
Publisher Summary This chapter focuses on general purpose parallel architectures.
Multiprocessor parallel computation has been considered in the context of problems with …
Multiprocessor parallel computation has been considered in the context of problems with …
Color set size problem with applications to string matching
L Chi, K Hui - Annual Symposium on Combinatorial Pattern Matching, 1992 - Springer
Abstract The Color Set Size problem is: Given a rooted tree of size n with l leaves colored
from 1 to m, m≤ l, for each vertex u find the number of different leaf colors in the subtree …
from 1 to m, m≤ l, for each vertex u find the number of different leaf colors in the subtree …
[图书][B] Sequential and Parallel Algorithms and Data Structures
viii Preface reason for this change is that sequential processors have ceased to get
proportional performance improvements from increased circuit complexity. Although the …
proportional performance improvements from increased circuit complexity. Although the …