2008
DOI: 10.1016/j.jda.2006.11.002
|View full text |Cite
|
Sign up to set email alerts
|

Efficient sampling of random permutations

Abstract: We show how to uniformly distribute data at random (not to be confounded with permutation routing) in two settings that are able to deal with massive data: coarse grained parallelism and external memory. In contrast to previously known work for parallel setups, our method is able to fulfill the three criteria of uniformity, work-optimality and balance among the processors simultaneously. To guarantee the uniformity we investigate the matrix of communication requests between the processors. We show that its dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The expected ratio in whole human genome is 0.019 (total number of SNVs in coding and non-coding region divided by total number of bases in the human genome). To evaluate the expected ratio in the whole genome, random sampling of permutation [69] was performed in R (http://www.R-project.org/) for comparing the observed ratio in random fragments and calculating the number of SNVs in each fragment (1000 bases in one fragment). (S3 Table)…”
Section: Methodsmentioning
confidence: 99%
“…The expected ratio in whole human genome is 0.019 (total number of SNVs in coding and non-coding region divided by total number of bases in the human genome). To evaluate the expected ratio in the whole genome, random sampling of permutation [69] was performed in R (http://www.R-project.org/) for comparing the observed ratio in random fragments and calculating the number of SNVs in each fragment (1000 bases in one fragment). (S3 Table)…”
Section: Methodsmentioning
confidence: 99%
“…By Theorem 4, doing so to all the 2 l child nodes requires O(2 l + (2 l B/B) log M/B (n/B)) = O(2 l log M/B (n/B)) amortized I/Os in total. Finally, we generate a random permutation of the 2 l B samples in O(2 l log M/B (n/B)) I/Os [7], and store the permutation as the newly computed Su(l). All these samples are marked as clean.…”
Section: A One-sided Structurementioning
confidence: 99%
“…This is nearly a factor of B higher than the Θ(t/B) cost needed to write t samples. Going back to the baseline solution, one can always retrieve the entire P (q) = P ∩ q, and then sample t elements from P (q) using a standard algorithm [7,15]. Assuming t ≤ k, the query cost is O(log B n + (k/B) log M/B (k/B)), where k = |P (q)|.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…They employed two secret keys to protect the watermark against possible attacks. Besides, their methods also embed binary watermark into the cover image by used random permutations [5] and XOR operations. Meanwhile, they claimed that their scheme is not only secure and fast but also can detect and localize the modification position.…”
Section: Introductionmentioning
confidence: 99%