CO Algorithms: Brief History
|
|
- Benjamin Hood
- 5 years ago
- Views:
Transcription
1 Piyush Kumar Departmet of Computer Sciece Advisor: Joseph S.B. Mitchell CO Algorithms: Brief History Frigo, Leiserso, Prokop, Ramachadra (FOCS 99) Cache Oblivious Algorithms Thesis Harold Prokop s Thesis Beder, Demaie, Farch-Coltu (FOCS 00) Cache Oblivious B-TreesB Arge, Beder, Demaie et.al. (STOC02) CO Priority Queue 1
2 Talk Outlie 4 4! Workstatios SUN UltraSparc 2: UltraSparc 16kB L1, 512kB L2. SGI Visual Workstatio 540: Quad-Petium III 32kB L1, 1024kB L2. Dell Precisio: Dual-Petium III 32kB L1 512kB L2. IBM ThikPad 600: Petium II 32kB L1, 256kB L2. Compaq Presario: AMD K6-III 64kB L1, 256kB L2, 1024kB L3. How ca we write portable code that rus efficietly o differet multilevel cachig architectures? 2
3 3 Itel Itaiums Itel Itaiums Matrix Multiplicatio (MM) Matrix Multiplicatio (MM) = = k kj ik ij b a c 1 C c c c c c c c c c B b b b b b b b b b A a a a a a a a a a =
4 Cache-Aware MM BLOCK-MULT (A,B,C,) 1 for forii 1 to to/s 2 do do for forjj 1 to to/s 3 do for k 1 to to/s 4 do do ORD-MULT (A (A ik,b ik,b kj,c kj,c ij,s) ij,s) s s s s [HK81] Cache-Aware MM s s BLOCK-MULT (A,B,C,) Oracle?! 1 for forii 1 to to/s 2 do do for forjj 1 to to/s 3 do for k 1 to to/s 4 do do ORD-MULT (A (A ik,b ik,b kj,c kj,c ij,s) ij,s) Tue s so that A ik, B kj, ad C ij s = Θ Z just fit ito cache ( ) If > s, the Q 3 = Θ( L Z ). 3 2 ( ) = Θ ( s) ( s L) ) Optimal [HK81]. 4
5 Two-Level Three-Level Cache s t s Oe parameter voodoo parameter per cachig per level! cachig level! BLOCK-MULT (A,B,C,) BLOCK-MULT (A,B,C,) 1 1 for for i 1 i 1 1 1to to/s /s 2 2 do do for for j 1 j to to/s /s 3 3 do do for forkk to to/s /s 4 4 do do for ORD-MULT for i ORD-MULT 2 i (A (A ik,b ik,b kj,c kj,c ij,s) ij,s) to tos s /t /t 5 5 do do for forj 2 j 2 1 1to tos s /t /t 66 do do for for k k to tos s /t /t 77 do do for ORD-MULT fori (A ORD-MULT 3 i (A ik,b ik,b kj,c kj,c ij,t) 3 11to tot t /u /u 8 ij,t) 8 do do for forj 3 j 3 1 1to tot t /u /u 99 do do for fork k to tot t /u /u do do ORD-MULT (A ORD-MULT (A ik,b ik,b kj,c kj,c ij,u) ij,u) Recursive Matrix Multiplicatio Divide ad coquer o matrices. C 11 C 12 = A 11 A 12 B 11 B 12 C 21 C 22 A 21 A 22 B 21 B 22 = A 11 B 11 A 11 B 12 A 21 B 11 A 21 B 12 + A 12 B 21 A 12 B 22 A 22 B 21 A 22 B 22 8 multiplicatios of (/2) (/2) matrices. 1 additio of matrices. 5
6 ( 3 )-Matrix Multiplicatio (,) (,) time / / 3 3 [i [i aosecods] iterative algorithm recursive algorithm 450-MHz AMD K6-III processor with with 32kB 32kB L1-cache, 64kB 64kB L2-cache, ad ad 1MB 1MB L3-cache. [double precisio umbers] Experimets: MM Liux Athlo 1Ghz/1Gb/g++ -O Time i Secods Size of Matrix Loop Base = bytes Base = 32 bytes 6
7 Experimets: MM Liux/Itaium/2GB/g++ -O Time i secods Size of Matrix loop Base = 32 bytes Base = bytes Recursive Traspose Partitio 1. matrix Partitio i matrix i 4 i submatrices 4 A, submatrices A, B, A, B, C, B, C, ad C, D ad D Recursively 2. traspose Recursively A. traspose A. A Recursively 3. traspose Recursively ad traspose swap ad B swap ad B C. ad C. C Recursively 4. traspose Recursively D. traspose D. D. A T C C T B T D D T ( ( 2 2 / L) L) cache cache misses, misses, which which is is optimal. optimal. Used Used as as a a subroutie subroutie i i our our optimal optimal cache-oblivious FFT FFT [HK81]. [HK81]. Harald Prokop 18 Oct
8 Code: The IPlace Loop Code : Co Traspose 8
9 Experimets: MT Notebook, Widows 2k/512Mb/PIII 1GHz/g++ -O Time i Secods N loop co_traspose Experimets: MT Notebook, Widows 2k/512Mb/PIII 1GHz/g++ -O Time i secods N loop co_traspose 9
10 Experimets: MT Liux Athlo 1Ghz/1Gb/g++ -O Time i Secods N loop co_traspose Experimets: MT Liux Athlo 1Ghz/1Gb/g++ -O3/ Size =N x (P =100), tall matrices Time i secods M Not Iplace Loop co_traspose 10
11 Experimets: MT Liux Athlo 1Ghz/1Gb/g++ -O3/ Size = N x (P =1000) Time i secods M Not Iplace Loop co_traspose What wet Wrog? Blockig! Ad the loop was IPlace! 11
12 Experimets: MT Loop ot Iplace Liux Athlo 1Ghz/1Gb/g++ -O3/ Size = N x N Time i secods N loop Base = 2kb Base = 8b Experimets: MT Loop ot Iplace Notebook, Widows 2k/512Mb/PIII 1GHz/g++ -O Time i secods N Loop Base = 2k el Base = 8 el Base = 1el 12
13 Did we miss somethig? " #$%&'" " ($ )! " *$+, " -$, ".$ " /$ Chatterjee & Se HPCA 00 Did we miss somethig? 13
14 Static Searches,) ), ", What is a layout?,!, $8'), 14
15 Example of Va Emde Boas Cut 1 1, 2, 3, 4, 8, 9, 5, 10, 11, 6, 12, 13, 7, 14, 15 Aother View 15
16 Theoretical Guaratees? Cache Complexity Q() 9 O(log L ) Work Complexity W() 9 O(log ) 5! I Practice?? Widows otebook/512mb/piii 1Gz/256 byte odes Time i secods ^x odes Geeral Search Cache Oblivious 16
17 I Practice II 1.4 Widows otebook/512mb/piii 1Gz/32 byte odes Time i secods Number of Nodes 2^x Geeral Search Cache Oblivious I Practice III 3 Liux/Itaium/2GB/g++ -O3/ 48 byte odes 2.5 Time i secods ^x odes Geeral Search Cache Oblivious 17
18 I Practice! ),,': (Cache oblivious Practical Matrix operatio results) ;;: (Cache oblivious dictioaries) 8; ;8 (CO B-Trees) Talk outlie '12 < 18
19 (M,B) Ideal Cache Model (Z,L) Ideal Cache Model Z = Ω( L 2 ) P cache L Z/L Cache Lies Q mai memory Features: Two-level hierarchy. Cache of size Z. Cache-lie legth L. Fully associative. Optimal, omisciet replacemet. Measures: Work W. Cache misses Q. 19
20 Assumptios? =', " Optimal Cache Replacemet No Asymptotic loss Fully-associative LRU ca be used istead of optimal replacemet with o asymptotic loss of performace [ST85]. Fully-associative LRU caches ca be maitaied i ordiary memory with costat slowdow i expected performace. Cache Obliviousess Cache-oblivious algorithms aturally tue for varyig cache sizes. multiple levels of cache. Whe a subproblem fits ito a give level of cache, o further cache misses are icurred beyod those required to brig the subproblem itself ito the cache. A optimal cache-oblivious algorithm ca be made to ru optimally i the HMM [AACN87] ad SUMH [VN93] models 20
21 CO-Sortig!,! 12 ➅ 1 ;: >'2 Fuel Sort 1/3 2/3 54> N N 8', 1/3 N Iput Array Sorted Output 21
22 Harold s slide picture 2 3 buffers 2 3 Q ( ) = 13 = O Q ( ) + Q ( ) Merge ( 1+ ( L)( 1+ log ) ) Z Fuel Sort: k-mergersk!!?!@* 3 4 ' 3 A!,1 2 22
23 Fuel Sort: k-mergerk 2 k 3 k L 1 2 L 2 2k 3/ 2 4'!1! )' 2 R k 3 k L k B 3/ 2 '8 k Fuel Sort : Optimality :!, O( log ), O( 1+ (1 + logz )) L Agarwal ad Vitter show that there is a Boud o the umber of cache misses. Ω( log L Z L ( )) L 23
24 Distributio Sort 5"), >C8', ))!!8',,! Recursive Sortig of Subarrays iput elemets, partitioed ito cotiguous subarrays of of size :: Recursively sorted arrays: Order: Harald Prokop 18 Oct
25 Distributio Step Recursively sorted arrays: Buckets: Pivots: Distribute step? Order: Harald Prokop 18 Oct The Distributio Step +)), )! %45 B B, B... 1, 2 3 B q ',' 25
26 The Recursive Bucketig used SubArray1 )",( SubArray2 Buffer 1# Buffer 2 Recursive Sortig of Buckets After distributio step: Recursively sort each bucket. Harald Prokop 18 Oct
27 Some Aalysis ow 12 6 Talk outlie ' ) ", 7 27
28 Radomized CO Sortig CO-Sortig Experimets 8 (5)! D5 D 1!,) 2 28
29 I Practice: 2 Pass CO-Dissort CO-Distributio Sort secods Series1 Series ^x doubles 9(@#-9#/*E- Does this imply aythig?* 4,'#F), G;4,; #HHHF), I ' 8 29
30 Two Levels of Recursio CO-Distributio Sort Time i Secods Series1 Series ^x doubles 9(@#H9#H(- Talk outlie ' 0 30
31 What wet Wrog? What wet Wrog? Assumptios! 31
32 Is the model oversimplified? "', (Not fully associative) " ( Asymptotics hides disasters! ) D(Istructio Caches) =(ot tall),(coherece misses: Xeo) 8 5,(4Gb Limit)!(Ca icrese I/O speed) : ( Causes misses eve if problem fits ito cache ) 4Practice Elaborated Here What did I lear from it? J;8 %=! '", ) ) 4 I 1, ) 2 = 4 " ), 7 ', ' ' ), 32
33 Kow Optimal Results K Matrix Multiplicatio Matrix Traspose -poit FFT LUP Decompositio Sortig Searchig Results Kow 5,B 14 2 =8! " D 1 O( log B M B N ) B O( sort( V )) O( sort( V )) E O (( V+ )log2v + sort( E)) B O ( V + sort( E)) O ( sort( E) + log log2 2 V ) 33
34 Results Kow ",8' =D 14 2L =, '+ * Θ (1 + 2 N + B O( sort( V )) O(logB ) OPT O( sca( V )) O(log(B)) O( sort( N)) 3 N ) B M New Result ) '1:78;D4D2 6(* " $, '8 34
35 Publicatios Book : Algorithms for Memory Hierarchies Chapter: : Cache Oblivious Algorithms (Editors Meyer et.al.) Cache Oblivious Vorooi diagrams (with Edgar Ramos, I Progress) Miimum Eclosig Balls (with Joe Mitchell, Alper Yildirim) (i Aleex 03) < Also cache oblivious > Other Itroductios Chapter by Eric Demaie 35
36 Ackowledgemets! " #!$! % &$ ' ( ) Special thaks to MPI Saarbruecke where part of this work was doe. 36
Cache-Efficient Algorithms II
6.172 Performace Egieerig of Software Systems LECTURE 9 Cache-Efficiet Algorithms II Charles E. Leiserso October 7, 2010 2010 Charles E. Leiserso 1 Ideal-Cache Model Features Two-level hierarchy. Cache
More informationCache-Oblivious Algorithms
Cache-Oblivious Algorithms 1 Cache-Oblivious Model 2 The Unknown Machine Algorithm C program gcc Object code linux Execution Can be executed on machines with a specific class of CPUs Algorithm Java program
More informationCache-Oblivious Algorithms
Cache-Oblivious Algorithms 1 Cache-Oblivious Model 2 The Unknown Machine Algorithm C program gcc Object code linux Execution Can be executed on machines with a specific class of CPUs Algorithm Java program
More informationIntroduction to Algorithms 6.046J/18.401J LECTURE 3 Divide and conquer Binary search Powering a number Fibonacci numbers Matrix multiplication
Itroductio to Algorithms 6.046J/8.40J LECTURE 3 Divide ad coquer Biary search Powerig a umber Fiboacci umbers Matrix multiplicatio Strasse s algorithm VLSI tree layout Prof. Charles E. Leiserso The divide-ad-coquer
More informationCS583 Lecture 02. Jana Kosecka. some materials here are based on E. Demaine, D. Luebke slides
CS583 Lecture 02 Jaa Kosecka some materials here are based o E. Demaie, D. Luebke slides Previously Sample algorithms Exact ruig time, pseudo-code Approximate ruig time Worst case aalysis Best case aalysis
More informationModel of Computation and Runtime Analysis
Model of Computatio ad Rutime Aalysis Model of Computatio Model of Computatio Specifies Set of operatios Cost of operatios (ot ecessarily time) Examples Turig Machie Radom Access Machie (RAM) PRAM Map
More informationCS 332: Algorithms. Linear-Time Sorting. Order statistics. Slide credit: David Luebke (Virginia)
1 CS 332: Algorithms Liear-Time Sortig. Order statistics. Slide credit: David Luebke (Virgiia) Quicksort: Partitio I Words Partitio(A, p, r): Select a elemet to act as the pivot (which?) Grow two regios,
More informationAnalysis of Algorithms -Quicksort-
Aalysis of Algorithms -- Adreas Ermedahl MRTC (Mälardales Real-Time Research Ceter) adreas.ermedahl@mdh.se Autum 2004 Proposed by C.A.R. Hoare i 962 Worst- case ruig time: Θ( 2 ) Expected ruig time: Θ(
More informationModel of Computation and Runtime Analysis
Model of Computatio ad Rutime Aalysis Model of Computatio Model of Computatio Specifies Set of operatios Cost of operatios (ot ecessarily time) Examples Turig Machie Radom Access Machie (RAM) PRAM Map
More informationData Structures Lecture 9
Fall 2017 Fag Yu Software Security Lab. Dept. Maagemet Iformatio Systems, Natioal Chegchi Uiversity Data Structures Lecture 9 Midterm o Dec. 7 (9:10-12:00am, 106) Lec 1-9, TextBook Ch1-8, 11,12 How to
More informationDesign and Analysis of ALGORITHM (Topic 2)
DR. Gatot F. Hertoo, MSc. Desig ad Aalysis of ALGORITHM (Topic 2) Algorithms + Data Structures = Programs Lessos Leared 1 Our Machie Model: Assumptios Geeric Radom Access Machie (RAM) Executes operatios
More informationPlan. Analysis of Multithreaded Algorithms. Plan. Matrix multiplication. University of Western Ontario, London, Ontario (Canada) Marc Moreno Maza
Pla Aalysis of Multithreaded Algorithms Marc Moreo Maza Uiversity of Wester Otario, Lodo, Otario (Caada) CS4402-9535 1 2 3 Pla (Moreo Maza) Aalysis of Multithreaded Algorithms CS4402-9535 1 / 27 (Moreo
More informationData Structures and Algorithms
Data Structures ad Algorithms Autum 2017-2018 Outlie 1 Sortig Algorithms (cotd) Outlie Sortig Algorithms (cotd) 1 Sortig Algorithms (cotd) Heapsort Sortig Algorithms (cotd) Have see that we ca build a
More informationAlgorithms Design & Analysis. Divide & Conquer
Algorithms Desig & Aalysis Divide & Coquer Recap Direct-accessible table Hash tables Hash fuctios Uiversal hashig Perfect Hashig Ope addressig 2 Today s topics The divide-ad-coquer desig paradigm Revised
More informationCS 270 Algorithms. Oliver Kullmann. Growth of Functions. Divide-and- Conquer Min-Max- Problem. Tutorial. Reading from CLRS for week 2
Geeral remarks Week 2 1 Divide ad First we cosider a importat tool for the aalysis of algorithms: Big-Oh. The we itroduce a importat algorithmic paradigm:. We coclude by presetig ad aalysig two examples.
More informationCSE 202 Homework 1 Matthias Springer, A Yes, there does always exist a perfect matching without a strong instability.
CSE 0 Homework 1 Matthias Spriger, A9950078 1 Problem 1 Notatio a b meas that a is matched to b. a < b c meas that b likes c more tha a. Equality idicates a tie. Strog istability Yes, there does always
More informationSorting Algorithms. Algorithms Kyuseok Shim SoEECS, SNU.
Sortig Algorithms Algorithms Kyuseo Shim SoEECS, SNU. Desigig Algorithms Icremetal approaches Divide-ad-Coquer approaches Dyamic programmig approaches Greedy approaches Radomized approaches You are ot
More informationDesign and Analysis of Algorithms
Desig ad Aalysis of Algorithms CSE 53 Lecture 9 Media ad Order Statistics Juzhou Huag, Ph.D. Departmet of Computer Sciece ad Egieerig Dept. CSE, UT Arligto CSE53 Desig ad Aalysis of Algorithms Medias ad
More informationData Structures and Algorithm. Xiaoqing Zheng
Data Structures ad Algorithm Xiaoqig Zheg zhegxq@fudaeduc What are algorithms? A sequece of computatioal steps that trasform the iput ito the output Sortig problem: Iput: A sequece of umbers
More information) n. ALG 1.3 Deterministic Selection and Sorting: Problem P size n. Examples: 1st lecture's mult M(n) = 3 M ( È
Algorithms Professor Joh Reif ALG 1.3 Determiistic Selectio ad Sortig: (a) Selectio Algorithms ad Lower Bouds (b) Sortig Algorithms ad Lower Bouds Problem P size fi divide ito subproblems size 1,..., k
More informationDivide & Conquer. Divide-and-conquer algorithms. Conventional product of polynomials. Conventional product of polynomials.
Divide-ad-coquer algorithms Divide & Coquer Strategy: Divide the problem ito smaller subproblems of the same type of problem Solve the subproblems recursively Combie the aswers to solve the origial problem
More informationDivide and Conquer. 1 Overview. 2 Multiplying Bit Strings. COMPSCI 330: Design and Analysis of Algorithms 1/19/2016 and 1/21/2016
COMPSCI 330: Desig ad Aalysis of Algorithms 1/19/2016 ad 1/21/2016 Lecturer: Debmalya Paigrahi Divide ad Coquer Scribe: Tiaqi Sog 1 Overview I this lecture, a importat algorithm desig techique called divide-ad-coquer
More informationCS / MCS 401 Homework 3 grader solutions
CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of
More informationCSE 4095/5095 Topics in Big Data Analytics Spring 2017; Homework 1 Solutions
CSE 09/09 Topics i ig Data Aalytics Sprig 2017; Homework 1 Solutios Note: Solutios to problems,, ad 6 are due to Marius Nicolae. 1. Cosider the followig algorithm: for i := 1 to α log e do Pick a radom
More informationAdvanced Course of Algorithm Design and Analysis
Differet complexity measures Advaced Course of Algorithm Desig ad Aalysis Asymptotic complexity Big-Oh otatio Properties of O otatio Aalysis of simple algorithms A algorithm may may have differet executio
More informationAlgorithms and Data Structures Lecture IV
Algorithms ad Data Structures Lecture IV Simoas Šalteis Aalborg Uiversity simas@cs.auc.dk September 5, 00 1 This Lecture Aalyzig the ruig time of recursive algorithms (such as divide-ad-coquer) Writig
More informationThis Lecture. Divide and Conquer. Merge Sort: Algorithm. Merge Sort Algorithm. MergeSort (Example) - 1. MergeSort (Example) - 2
This Lecture Divide-ad-coquer techique for algorithm desig. Example the merge sort. Writig ad solvig recurreces Divide ad Coquer Divide-ad-coquer method for algorithm desig: Divide: If the iput size is
More informationAnalysis of Algorithms. Introduction. Contents
Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We
More information6.046 Recitation 5: Binary Search Trees Bill Thies, Fall 2004 Outline
6.046 Recitatio 5: Biary Search Trees Bill Thies, Fall 2004 Outlie My cotact iformatio: Bill Thies thies@mit.edu Office hours: Sat 1-3pm, 36-153 Recitatio website: http://cag.lcs.mit.edu/~thies/6.046/
More informationClassification of problem & problem solving strategies. classification of time complexities (linear, logarithmic etc)
Classificatio of problem & problem solvig strategies classificatio of time complexities (liear, arithmic etc) Problem subdivisio Divide ad Coquer strategy. Asymptotic otatios, lower boud ad upper boud:
More informationCS 332: Algorithms. Quicksort
CS 33: Aorithms Quicsort David Luebe //03 Homewor Assiged today, due ext Wedesday Will be o web page shortly after class Go over ow David Luebe //03 Review: Quicsort Sorts i place Sorts O( ) i the average
More informationMerge and Quick Sort
Merge ad Quick Sort Merge Sort Merge Sort Tree Implemetatio Quick Sort Pivot Item Radomized Quick Sort Adapted from: Goodrich ad Tamassia, Data Structures ad Algorithms i Java, Joh Wiley & So (1998). Ruig
More informationCSI 5163 (95.573) ALGORITHM ANALYSIS AND DESIGN
CSI 5163 (95.573) ALGORITHM ANALYSIS AND DESIGN CSI 5163 (95.5703) ALGORITHM ANALYSIS AND DESIGN (3 cr.) (T) Topics of curret iterest i the desig ad aalysis of computer algorithms for graphtheoretical
More informationOPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES
OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass
More informationAlgorithm Analysis. Algorithms that are equally correct can vary in their utilization of computational resources
Algorithm Aalysis Algorithms that are equally correct ca vary i their utilizatio of computatioal resources time ad memory a slow program it is likely ot to be used a program that demads too much memory
More informationCS 5150/6150: Assignment 1 Due: Sep 23, 2010
CS 5150/6150: Assigmet 1 Due: Sep 23, 2010 Wei Liu September 24, 2010 Q1: (1) Usig master theorem: a = 7, b = 4, f() = O(). Because f() = log b a ε holds whe ε = log b a = log 4 7, we ca apply the first
More informationCS161 Design and Analysis of Algorithms. Administrative
CS161 Desig ad Aalysis of Algorithms Da Boeh 1 Admiistrative Lecture 1, April 3, 1 Web page http://theory.staford.edu/~dabo/cs161» Hadouts» Aoucemets» Late breakig ews Gradig ad course requiremets» Midterm/fial/hw»
More informationRecursive Algorithm for Generating Partitions of an Integer. 1 Preliminary
Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the
More information4.3 Growth Rates of Solutions to Recurrences
4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.
More informationMatriculation number: You have 90 minutes to complete the exam of InformatikIIb. The following rules apply:
Departmet of Iformatics Prof. Dr. Michael Böhle Bizmühlestrasse 14 8050 Zurich Phoe: +41 44 635 4333 Email: boehle@ifi.uzh.ch AlgoDat Midterm1 Sprig 016 08.04.016 Name: Matriculatio umber: Advice You have
More informationDivide and Conquer. 1 Overview. 2 Insertion Sort. COMPSCI 330: Design and Analysis of Algorithms 1/19/2016 and 1/21/2016
COMPSCI 330: Desig ad Aalysis of Algorithms 1/19/2016 ad 1/21/2016 Divide ad Coquer Lecturer: Debmalya Paigrahi Scribe: Tiaqi Sog, Tiayu Wag 1 Overview This set of otes is orgaized as follows. We begi
More informationCIS 121 Data Structures and Algorithms with Java Spring Code Snippets and Recurrences Monday, February 4/Tuesday, February 5
CIS 11 Data Structures ad Algorithms with Java Sprig 019 Code Sippets ad Recurreces Moday, February 4/Tuesday, February 5 Learig Goals Practice provig asymptotic bouds with code sippets Practice solvig
More informationTest One (Answer Key)
CS395/Ma395 (Sprig 2005) Test Oe Name: Page 1 Test Oe (Aswer Key) CS395/Ma395: Aalysis of Algorithms This is a closed book, closed otes, 70 miute examiatio. It is worth 100 poits. There are twelve (12)
More informationCOMP285 Midterm Exam Department of Mathematics
COMP85 Midterm Exam Departmet of Mathematics Fall 010/011 - November 8, 010 Name: Studet Number: Please fiish withi 90 miutes. All poits above 100 are cosidered as bous poit. You ca reach maximal 1 poits.
More informationAlgorithms. Elementary Sorting. Dong Kyue Kim Hanyang University
Algorithms Elemetary Sortig Dog Kyue Kim Hayag Uiversity dqkim@hayag.a.kr Cotets Sortig problem Elemetary sortig algorithms Isertio sort Merge sort Seletio sort Bubble sort Sortig problem Iput A sequee
More informationDepartment of Informatics Prof. Dr. Michael Böhlen Binzmühlestrasse Zurich Phone:
Departmet of Iformatics Prof. Dr. Michael Böhle Bizmühlestrasse 14 8050 Zurich Phoe: +41 44 635 4333 Email: boehle@ifi.uzh.ch Iformatik II Midterm1 Sprig 018 3.03.018 Advice You have 90 miutes to complete
More informationThere is no straightforward approach for choosing the warmup period l.
B. Maddah INDE 504 Discrete-Evet Simulatio Output Aalysis () Statistical Aalysis for Steady-State Parameters I a otermiatig simulatio, the iterest is i estimatig the log ru steady state measures of performace.
More informationA recurrence equation is just a recursive function definition. It defines a function at one input in terms of its value on smaller inputs.
CS23 Algorithms Hadout #6 Prof Ly Turbak September 8, 200 Wellesley College RECURRENCES This hadout summarizes highlights of CLRS Chapter 4 ad Appedix A (CLR Chapters 3 & 4) Two-Step Strategy for Aalyzig
More informationTHE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS
THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity
More informationCache-Oblivious Computations: Algorithms and Experimental Evaluation
Cache-Oblivious Computations: Algorithms and Experimental Evaluation Vijaya Ramachandran Department of Computer Sciences University of Texas at Austin Dissertation work of former PhD student Dr. Rezaul
More informationTMA4205 Numerical Linear Algebra. The Poisson problem in R 2 : diagonalization methods
TMA4205 Numerical Liear Algebra The Poisso problem i R 2 : diagoalizatio methods September 3, 2007 c Eiar M Røquist Departmet of Mathematical Scieces NTNU, N-749 Trodheim, Norway All rights reserved A
More informationExamples: data compression, path-finding, game-playing, scheduling, bin packing
Algorithms - Basic Cocepts Algorithms so what is a algorithm, ayway? The dictioary defiitio: A algorithm is a well-defied computatioal procedure that takes iput ad produces output. This class will deal
More informationSpectral Partitioning in the Planted Partition Model
Spectral Graph Theory Lecture 21 Spectral Partitioig i the Plated Partitio Model Daiel A. Spielma November 11, 2009 21.1 Itroductio I this lecture, we will perform a crude aalysis of the performace of
More informationA Probabilistic Analysis of Quicksort
A Probabilistic Aalysis of Quicsort You are assumed to be familiar with Quicsort. I each iteratio this sortig algorithm chooses a pivot ad the, by performig comparisios with the pivot, splits the remaider
More informationAlgorithm Analysis. Chapter 3
Data Structures Dr Ahmed Rafat Abas Computer Sciece Dept, Faculty of Computer ad Iformatio, Zagazig Uiversity arabas@zu.edu.eg http://www.arsaliem.faculty.zu.edu.eg/ Algorithm Aalysis Chapter 3 3. Itroductio
More information2. ALGORITHM ANALYSIS
2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times 2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times Lecture slides by Kevi Waye Copyright 2005 Pearso-Addiso
More informationAlgorithms 演算法. Multi-threaded Algorithms
演算法 Multi-threaded Professor Chie-Mo James Li 李建模 Graduate Istitute of Electroics Egieerig Natioal aiwa Uiversity Outlie Multithreaded, CH7 7. Basics 7. Matrix Multiplicatio 7.3 Merge sort Leoardo Fiboacci
More informationLecture 2: Monte Carlo Simulation
STAT/Q SCI 43: Itroductio to Resamplig ethods Sprig 27 Istructor: Ye-Chi Che Lecture 2: ote Carlo Simulatio 2 ote Carlo Itegratio Assume we wat to evaluate the followig itegratio: e x3 dx What ca we do?
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More informationOblivious Gradient Clock Synchronization
Motivatio: Clock Sychroizatio Oblivious Gradiet Clock Sychroizatio Thomas Locher, ETH Zurich Roger Wattehofer, ETH Zurich Clock sychroizatio is a classic, importat problem! May results have bee published
More informationRecursive Algorithms. Recurrences. Recursive Algorithms Analysis
Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects
More informationCh3. Asymptotic Notation
Ch. Asymptotic Notatio copyright 006 Preview of Chapters Chapter How to aalyze the space ad time complexities of program Chapter Review asymptotic otatios such as O, Ω, Θ, o for simplifyig the aalysis
More informationThe Divide-and-Conquer Design Paradigm
CS473- Algorithms I Lecture 4 The Divide-and-Conquer Design Paradigm CS473 Lecture 4 1 The Divide-and-Conquer Design Paradigm 1. Divide the problem (instance) into subproblems. 2. Conquer the subproblems
More informationParallel Vector Algorithms David A. Padua
Parallel Vector Algorithms 1 of 32 Itroductio Next, we study several algorithms where parallelism ca be easily expressed i terms of array operatios. We will use Fortra 90 to represet these algorithms.
More informationECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.
ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.
More informationMatrix Multiplication. Data Structures and Algorithms Andrei Bulatov
Matrix Multiplicatio Data Structures ad Algorithms Adrei Bulatov Algorithms Matrix Multiplicatio 7- Matrix Multiplicatio Matrix multiplicatio. Give two -by- matrices A ad B, compute A B. k kj ik ij b a
More informationPolynomial Multiplication and Fast Fourier Transform
Polyomial Multiplicatio ad Fast Fourier Trasform Com S 477/577 Notes Ya-Bi Jia Sep 19, 2017 I this lecture we will describe the famous algorithm of fast Fourier trasform FFT, which has revolutioized digital
More informationDaniel Lee Muhammad Naeem Chingyu Hsu
omplexity Aalysis of Optimal Statioary all Admissio Policy ad Fixed Set Partitioig Policy for OVSF-DMA ellular Systems Daiel Lee Muhammad Naeem higyu Hsu Backgroud Presetatio Outlie System Model all Admissio
More informationPartial match queries: a limit process
Partial match queries: a limit process Nicolas Brouti Ralph Neiiger Heig Sulzbach Partial match queries: a limit process 1 / 17 Searchig geometric data ad quadtrees 1 Partial match queries: a limit process
More informationhttp://www.xelca.l/articles/ufo_ladigsbaa_houte.aspx imulatio Output aalysis 3/4/06 This lecture Output: A simulatio determies the value of some performace measures, e.g. productio per hour, average queue
More informationCOMP26120: Introducing Complexity Analysis (2018/19) Lucas Cordeiro
COMP60: Itroduig Complexity Aalysis (08/9) Luas Cordeiro luas.ordeiro@mahester.a.uk Itroduig Complexity Aalysis Textbook: Algorithm Desig ad Appliatios, Goodrih, Mihael T. ad Roberto Tamassia (hapter )
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationA widely used display of protein shapes is based on the coordinates of the alpha carbons - - C α
Nice plottig of proteis: I A widely used display of protei shapes is based o the coordiates of the alpha carbos - - C α -s. The coordiates of the C α -s are coected by a cotiuous curve that roughly follows
More informationCS 330 Discussion - Probability
CS 330 Discussio - Probability March 24 2017 1 Fudametals of Probability 11 Radom Variables ad Evets A radom variable X is oe whose value is o-determiistic For example, suppose we flip a coi ad set X =
More informationALG 2.2 Search Algorithms
Algorithms Professor Joh Reif ALG 2.2 Search Algorithms (a Biary Search: average case (b Biary Search with Errors (homework (c Iterpolatio Search (d Ubouded Search Biary Search Trees (i sorted Table of
More informationCSE Introduction to Parallel Processing. Chapter 3. Parallel Algorithm Complexity
Dr. Izadi CSE-40533 Itroductio to Parallel Processig Chapter 3 Parallel Algorithm Complexity Review algorithm complexity ad various complexity classes Itroduce the otios of time ad time-cost optimality
More informationRandom assignment with integer costs
Radom assigmet with iteger costs Robert Parviaie Departmet of Mathematics, Uppsala Uiversity P.O. Box 480, SE-7506 Uppsala, Swede robert.parviaie@math.uu.se Jue 4, 200 Abstract The radom assigmet problem
More informationIntroduction to Signals and Systems, Part V: Lecture Summary
EEL33: Discrete-Time Sigals ad Systems Itroductio to Sigals ad Systems, Part V: Lecture Summary Itroductio to Sigals ad Systems, Part V: Lecture Summary So far we have oly looked at examples of o-recursive
More informationOutput Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should be doe
More informationPrinciple Of Superposition
ecture 5: PREIMINRY CONCEP O RUCUR NYI Priciple Of uperpositio Mathematically, the priciple of superpositio is stated as ( a ) G( a ) G( ) G a a or for a liear structural system, the respose at a give
More informationMath 155 (Lecture 3)
Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,
More informationPractical Spectral Anaysis (continue) (from Boaz Porat s book) Frequency Measurement
Practical Spectral Aaysis (cotiue) (from Boaz Porat s book) Frequecy Measuremet Oe of the most importat applicatios of the DFT is the measuremet of frequecies of periodic sigals (eg., siusoidal sigals),
More informationData Structures 1 NTIN066
Data Structures 1 NTIN066 Jirka Fink Department of Theoretical Computer Science and Mathematical Logic Faculty of Mathematics and Physics Charles University in Prague Winter semester 2017/18 Last change
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More informationB = B is a 3 4 matrix; b 32 = 3 and b 2 4 = 3. Scalar Multiplication
MATH 37 Matrices Dr. Neal, WKU A m matrix A = (a i j ) is a array of m umbers arraged ito m rows ad colums, where a i j is the etry i the ith row, jth colum. The values m are called the dimesios (or size)
More informationQuantum Computing Lecture 7. Quantum Factoring
Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates
More informationLecture 1 Probability and Statistics
Wikipedia: Lecture 1 Probability ad Statistics Bejami Disraeli, British statesma ad literary figure (1804 1881): There are three kids of lies: lies, damed lies, ad statistics. popularized i US by Mark
More informationECE 669 Parallel Computer Architecture
ECE 669 Parallel Computer Architecture Lecture 4 Parallel Applicatios Outlie Motivatig Problems (applicatio case studies) Classifyig problems Parallelizig applicatios Examiig tradeoffs Uderstadig commuicatio
More information2 DD2458 Popup HT Solution: Choose the activity which ends first and does not conflict with earlier chosen activities.
DD2458, Problem Solvig ad Programmig Uder Pressure Lecture 1: Greedy algorithms ad dyamic programmig Date: 2008-09-01 Scribe(s: Marti Wedi ad Nilas Wagre Lecturer: Douglas Wiström This lecture cotais basic
More informationLinear Programming! References! Introduction to Algorithms.! Dasgupta, Papadimitriou, Vazirani. Algorithms.! Cormen, Leiserson, Rivest, and Stein.
Liear Programmig! Refereces! Dasgupta, Papadimitriou, Vazirai. Algorithms.! Corme, Leiserso, Rivest, ad Stei. Itroductio to Algorithms.! Slack form! For each costrait i, defie a oegative slack variable
More information6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.
6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio
More informationFundamental Algorithms
Fudametal Algorithms Chapter 2b: Recurreces Michael Bader Witer 2014/15 Chapter 2b: Recurreces, Witer 2014/15 1 Recurreces Defiitio A recurrece is a (i-equality that defies (or characterizes a fuctio i
More informationSignals & Systems Chapter3
Sigals & Systems Chapter3 1.2 Discrete-Time (D-T) Sigals Electroic systems do most of the processig of a sigal usig a computer. A computer ca t directly process a C-T sigal but istead eeds a stream of
More informationLinear chord diagrams with long chords
Liear chord diagrams with log chords Everett Sulliva Departmet of Mathematics Dartmouth College Haover New Hampshire, U.S.A. everett..sulliva@dartmouth.edu Submitted: Feb 7, 2017; Accepted: Oct 7, 2017;
More informationSums, products and sequences
Sums, products ad sequeces How to write log sums, e.g., 1+2+ (-1)+ cocisely? i=1 Sum otatio ( sum from 1 to ): i 3 = 1 + 2 + + If =3, i=1 i = 1+2+3=6. The ame ii does ot matter. Could use aother letter
More informationw (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.
2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For
More informationFastest mixing Markov chain on a path
Fastest mixig Markov chai o a path Stephe Boyd Persi Diacois Ju Su Li Xiao Revised July 2004 Abstract We ider the problem of assigig trasitio probabilities to the edges of a path, so the resultig Markov
More informationAnnouncements. EE382A Lecture 16: Multi-Core Design Tradeoffs. Law #1 CPU (Latency) Performance. Performance Iron Law and Multi-core Scalability
Aoucemets HW3 due toda, Wed / EE382A Lecture : Multi-Core Desig Tradeoffs Exam o Fri /3, 9:am 2:oo, room 2-3 All lectures + required papers Closed books, page of otes, calculator Departmet of Electrical
More informationAverage-Case Analysis of QuickSort
Average-Case Aalysis of QuickSort Comp 363 Fall Semester 003 October 3, 003 The purpose of this documet is to itroduce the idea of usig recurrece relatios to do average-case aalysis. The average-case ruig
More informationORIE 633 Network Flows September 27, Lecture 8
ORIE 633 Network Flows September 7, 007 Lecturer: David P. Williamso Lecture 8 Scribe: Gema Plaza-Martíez 1 Global mi-cuts i udirected graphs 1.1 Radom cotractio Recall from last time we itroduced the
More information