Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing - STOC '87 1987
DOI: 10.1145/28395.28396
|View full text |Cite
|
Sign up to set email alerts
|

Matrix multiplication via arithmetic progressions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

11
1,095
0
6

Year Published

1989
1989
2018
2018

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,009 publications
(1,112 citation statements)
references
References 6 publications
11
1,095
0
6
Order By: Relevance
“…The state of the art algorithm is due to Alon, Yuster and Zwick [2] and runs in O(m 2ω ω+1 ), where currently the fast matrix multiplication exponent ω is 2.371 [10]. Thus, the Alon et al algorithm currently runs in O(m 1.41 ) time.…”
Section: Existing Workmentioning
confidence: 99%
“…The state of the art algorithm is due to Alon, Yuster and Zwick [2] and runs in O(m 2ω ω+1 ), where currently the fast matrix multiplication exponent ω is 2.371 [10]. Thus, the Alon et al algorithm currently runs in O(m 1.41 ) time.…”
Section: Existing Workmentioning
confidence: 99%
“…The generic algorithm has a number of instantiations, depending on how its steps are implemented (in the RAM or I/O model). Below, we compare the worst-case performance analysis of Algorithm 1 in the RAM model with the analysis of the classical sort-merge-join, the results by Coppersmith and Winograd [3] and Yuster and Zwick [9]. We emphasize analysis because the various analyses are not tight to the actual performance of the algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…As explained in more detail later, one way to improve the worst-case behavior in cases similar to the example above is to represent the input tuples of R1 and R2 as adjacency matrices of size n×n and construct the result by multiplying the matrices inÕ(n 2.376 ) time [3].…”
Section: Introductionmentioning
confidence: 99%
“…For k-vertex connectivity of a graph q, Eppstein et al [10] have shown that g k ( k jI f j ) is a strong, sparse certificate of q, where f j is a breadth-first search forest in graph q À jÀI iI f i . However, currently, the number of processors used in any NC algorithm for finding a breadth-first search forest is no better than the number of scalar operations for matrix multiplication, which is yn PXQUT [7]. To reduce the number of processors used, we adopt an alternative approach to find a sparse k-vertex certificate and show the found certificate is a strong certificate.…”
Section: Maintaining 3-edge Connected Componentsmentioning
confidence: 99%