Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing 2019
DOI: 10.1145/3293611.3331593
|View full text |Cite
|
Sign up to set email alerts
|

Randomized Concurrent Set Union and Generalized Wake-Up

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…Another point is that compression by rank (subtree height) appears to perform particularly well with respect to other methods (in particular, pseudo-random ranks) since it tends to produce higher-quality compressed trees. Notice that this diverges from the theoretical proposals of [11,13], which avoid ranks due to additional algorithmic complexity.…”
Section: Discussionmentioning
confidence: 65%
See 2 more Smart Citations
“…Another point is that compression by rank (subtree height) appears to perform particularly well with respect to other methods (in particular, pseudo-random ranks) since it tends to produce higher-quality compressed trees. Notice that this diverges from the theoretical proposals of [11,13], which avoid ranks due to additional algorithmic complexity.…”
Section: Discussionmentioning
confidence: 65%
“…In this situation, SameSet can safely return false, while Unite can link the first root to the current element of the second Find climb. Goel et al used this technique in sequential versions [12], while Jayanti and Tarjan adopted it for the concurrent environment [13].…”
Section: Optimizationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Randomized Two-Try Splitting. Next, we incorporate a more sophisticated randomized algorithm by Jayanti, Tarjan, and Boix-Adserà [60], and refer to this algorithm as UF-JTB. The algorithm either performs finds naively, without using any path compression (FindNaive), or uses a strategy called FindTwoTrySplit, which guarantees provably-efficient bounds for their algorithm, assuming a source of random bits.…”
Section: Finish Algorithmsmentioning
confidence: 99%
“…The algorithm either performs finds naively, without using any path compression (FindNaive), or uses a strategy called FindTwoTrySplit, which guarantees provably-efficient bounds for their algorithm, assuming a source of random bits. We refer to [60] for the pseudocode and proofs of correctness. Concurrent Rem's Algorithm.…”
Section: Finish Algorithmsmentioning
confidence: 99%