skip to main content
10.1145/2612669.2612674acmconferencesArticle/Chapter ViewAbstractPublication PagesspaaConference Proceedingsconference-collections
research-article

Parallel peeling algorithms

Published:21 June 2014Publication History

ABSTRACT

The analysis of several algorithms and data structures can be framed as a peeling process on a random hypergraph: vertices with degree less than k are removed until there are no vertices of degree less than k left. The remaining hypergraph is known as the k-core. In this paper, we analyze parallel peeling processes, where in each round, all vertices of degree less than k are removed. It is known that, below a specific edge density threshold, the k-core is empty with high probability. We show that, with high probability, below this threshold, only 1⁄log((k-1)(r-1)) log logn+O(1) rounds of peeling are needed to obtain the empty k-core for r-uniform hypergraphs. Interestingly, we show that above this threshold, Ω(log n) rounds of peeling are required to find the non-empty k-core. Since most algorithms and data structures aim to peel to an empty k-core, this asymmetry appears fortunate. We verify the theoretical results both with simulation and with a parallel implementation using graphics processing units (GPUs). Our implementation provides insights into how to structure parallel peeling algorithms for efficiency in practice.

References

  1. D. Achlioptas and M. Molloy. The solution space geometry of random linear equations. Random Structures and Algorithms (to appear), 2013.Google ScholarGoogle Scholar
  2. Y. Azar, A. Broder, A. Karlin, and E. Upfal. Balanced allocations. SIAM Journal of Computing 29(1):180--200, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Broder, A. Frieze, and E. Upfal. On the satisfiability and maximumsatisfiability of random 3-CNF formulas. In Proc. of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 322--330,1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal.The Bloomier filter: an efficient data structure for static support lookup tables.In Proc. of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms,pp. 30--39, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Chung and L. Lu.Concentration inequalities and martingale inequalities: a survey. Internet Mathematics, 3(1):79--127, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Dietzfelbinger, A. Goerdt, M. Mitzenmacher, A. Montanari,R. Pagh, and M. Rink. Tight thresholds for cuckoo hashing viaXORSAT. In Proc. of ICALP, pp. 213--225, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Eppstein, M. Goodrich, F Uyeda, and G. Varghese. What's the Difference? Efficient Set Reconciliation without Prior Context.\textitACM SIGCOMM Computer Communications Review (SIGCOMM 2011), 41(4):218--229, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Gao.Analysis of the parallel peeling algorithm: a short proof.pharXiv:1402.7326, 2014.Google ScholarGoogle Scholar
  9. M. Goodrich and M. Mitzenmacher. Invertible Bloom Lookup Tables. Proc. of the 49th Allerton Conference, pp. 792--799, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Jiang, M. Mitzenmacher, J. Thaler.Parallel Peeling Algorithms. CoRR abs/1302.7014, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Karp, M. Luby, and F. Meyer auf der Heide.Efficient PRAM simulation on a distributed memory machine. Algorithmica, 16(4):517--542, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  12. A. Kirsch, M. Mitzenmacher, and U. Wieder.More robust hashing: Cuckoo hashing with a stash. SIAM Journal on Computing, 39(4):1543--1561, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Le Cam.An approximation theorem for the Poisson binomial distribution. Pacific Journal of Mathematics 10(4):1181--1197, 1960.Google ScholarGoogle ScholarCross RefCross Ref
  14. M. Luby, M. Mitzenmacher, A. Shokrollahi, and D. Spielman.Efficient erasure correcting codes. IEEE Transactions on Information Theory, 47(2):569--584, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Mitzenmacher. The power of two choices in randomized load balancing. IEEE Transactions on Parallel and Distributed Systems, 12(10):1094--1104, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Mitzenmacher and E. Upfal. Probability and computing: Randomized algorithms and probabilistic analysis, 2005, Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Mitzenmacher and G. Varghese. Biff (Bloom filter) codes: Fasterror correction for large data sets. In Proc. of the IEEE International Symposium on Information Theory, pp. 483--487, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  18. M. Mitzenmacher and B. Vöcking.The asymptotics of selecting the shortest of two, improved. Proc. of the 37th Annual Allerton Conference on Communication Control and Computing,pp. 326--327, 1999.Google ScholarGoogle Scholar
  19. M. Molloy. The pure literal rule threshold and cores in randomhypergraphs. IntextitProc. of the 15th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 672--681, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Pagh and F. Rodler. Cuckoo hashing.textJournal of Algorithms,51(2):122--144, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Vöcking.How asymmetry helps load balancing, Journal of the ACM, 50(4):568--589, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. U. Voll.Threshold Phenomena in Branching Trees and Sparse Random Graphs.Dissertation. Techischen Universitat München. 2001.Google ScholarGoogle Scholar

Index Terms

  1. Parallel peeling algorithms

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SPAA '14: Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures
                June 2014
                356 pages
                ISBN:9781450328210
                DOI:10.1145/2612669
                • General Chair:
                • Guy Blelloch,
                • Program Chair:
                • Peter Sanders

                Copyright © 2014 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 21 June 2014

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                SPAA '14 Paper Acceptance Rate30of122submissions,25%Overall Acceptance Rate447of1,461submissions,31%

                Upcoming Conference

                SPAA '24

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader