Proceedings of the Sixteenth Annual ACM Symposium on Theory of Computing - STOC '84 1984
DOI: 10.1145/800057.808721
|View full text |Cite
|
Sign up to set email alerts
|

Log-logarithmic protocols for resolving ethernet and semaphore conflicts

Abstract: We propose two protocols for resolving conflicts on ethernetlike mediums in log-logarithmicexpected time and prove our algorithms are optimal up to an additive constant.It is difficult to second-guess the fast-changing electronics industry, but our analysis could be relevant outside the traditional interests of the ethernet literature to semaphore-like problems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

1991
1991
2015
2015

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…We believe that on bursty inputs in general, polynomial backoff backs off too slowly, and exponential backoff provides a more aggressive backoff. Batch arrivals have been considered by several authors [9,11,14,16,17,43] with the goal of routing h-relations, involving multiple channels, while we consider a detailed analysis of one channel. The most relevant work is by Gereb-Graus and Tsantilis [9] (see also [18]), who showed that there is a backoff-backon protocol with an optimal O(n) makespan for the Control Tower Problem.…”
Section: Previous Resultsmentioning
confidence: 99%
“…We believe that on bursty inputs in general, polynomial backoff backs off too slowly, and exponential backoff provides a more aggressive backoff. Batch arrivals have been considered by several authors [9,11,14,16,17,43] with the goal of routing h-relations, involving multiple channels, while we consider a detailed analysis of one channel. The most relevant work is by Gereb-Graus and Tsantilis [9] (see also [18]), who showed that there is a backoff-backon protocol with an optimal O(n) makespan for the Control Tower Problem.…”
Section: Previous Resultsmentioning
confidence: 99%
“…Worst-case/adversarial arrivals. More recently, there has been work on adversarial queueing theory, looking at the worst-case performance [1,4,5,13,14,18,22,26,29,59]. A common theme is that dynamic arrivals are hard to cope with.…”
Section: Introductionmentioning
confidence: 99%
“…A common theme is that dynamic arrivals are hard to cope with. When all the packets begin at the same time, efficient protocols are possible [18,19,21,29,30,59]. When packets begin at different times, the problem is harder.…”
Section: Introductionmentioning
confidence: 99%
“…The WNCD model is one of the simplest parallel computation models which have been studied for more than two decades. Some researchers regarded the model as the broadcast communication model [4]- [7], [9], [13], [15]- [17], [19]- [21], [23], [24]. In the WNCD model some important and essential components were investigated such as the sorting problem [3]- [5], [8], [14], [24], maximum finding problem [7], [15] and graph algorithm [21]- [23].…”
Section: Introductionmentioning
confidence: 99%