AbstractIn PRAM emulations, universal hashing is a well-known method for distributing the address space among memory modules. However, if the memory access patterns of an application often result in high module congestion, it is necessary to rehash by choosing another hash function and redistributing data on the fly. For the case of linear hash functions h(x) = ax mod m we present an algorithm to rehash an address space of size m = 2u on a PRAM emulation with p processors in time O(mp + log m + L), where L denotes the network latency. For the common case that m is polynomial in p and L = O(log p) the runtime is O(mp + log p). The algorithm requires O(log m + L) words of local storage per processor. We show that an obvious simplification of ...
Abstmct-In most parallel random access machine (PRAM) models, memory references are assumed to take ...
The performance of hash tables is analyzed in a parallel context. Assuming that a hash table of fixe...
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing a...
AbstractIn PRAM emulations, universal hashing is a well-known method for distributing the address sp...
AbstractAssume that a set U of memory locations is distributed among n memory modules, using some nu...
AbstractWe present a simple algorithm for emulating an N-processor CROW PRAM on an N-ode butterfly. ...
The present paper provides a comprehensive study of the following problem. Consider algorithms which...
We present algorithms for the randomized simulation of a shared memory machine (PRAM) on a Distribut...
We present a novel approach to parallel computing, where (virtual) PRAM processors are represented a...
We present efficient emulations of the CRCW PRAM on a large class of processor interconnection netwo...
It is possible to implement the parallel random access machine (PRAM) on a chip multiprocessor (CMP)...
The parallel random access machine (PRAM) is the most commonly used general-purpose machine model fo...
We investigate the problem of permuting n data items on an EREW PRAM with p processors using little ...
Parallel Random Access Machine, PRAM, is the most popular abstract model of the parallel computation...
170 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1988.In this thesis, we compare th...
Abstmct-In most parallel random access machine (PRAM) models, memory references are assumed to take ...
The performance of hash tables is analyzed in a parallel context. Assuming that a hash table of fixe...
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing a...
AbstractIn PRAM emulations, universal hashing is a well-known method for distributing the address sp...
AbstractAssume that a set U of memory locations is distributed among n memory modules, using some nu...
AbstractWe present a simple algorithm for emulating an N-processor CROW PRAM on an N-ode butterfly. ...
The present paper provides a comprehensive study of the following problem. Consider algorithms which...
We present algorithms for the randomized simulation of a shared memory machine (PRAM) on a Distribut...
We present a novel approach to parallel computing, where (virtual) PRAM processors are represented a...
We present efficient emulations of the CRCW PRAM on a large class of processor interconnection netwo...
It is possible to implement the parallel random access machine (PRAM) on a chip multiprocessor (CMP)...
The parallel random access machine (PRAM) is the most commonly used general-purpose machine model fo...
We investigate the problem of permuting n data items on an EREW PRAM with p processors using little ...
Parallel Random Access Machine, PRAM, is the most popular abstract model of the parallel computation...
170 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1988.In this thesis, we compare th...
Abstmct-In most parallel random access machine (PRAM) models, memory references are assumed to take ...
The performance of hash tables is analyzed in a parallel context. Assuming that a hash table of fixe...
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing a...