skip to main content
research-article
Public Access

Parallel Peeling Algorithms

Published: 16 January 2017 Publication History

Abstract

The analysis of several algorithms and data structures can be framed as a peeling process on a random hypergraph: vertices with degree less than k are removed until there are no vertices of degree less than k left. The remaining hypergraph is known as the k-core. In this article, we analyze parallel peeling processes, in which in each round, all vertices of degree less than k are removed. It is known that, below a specific edge-density threshold, the k-core is empty with high probability. We show that, with high probability, below this threshold, only 1/log((k-1)(r-1)) log log n + O(1) rounds of peeling are needed to obtain the empty k-core for r-uniform hypergraphs. This bound is tight up to an additive constant. Interestingly, we show that, above this threshold, Ω(log n) rounds of peeling are required to find the nonempty k-core. Since most algorithms and data structures aim to peel to an empty k-core, this asymmetry appears fortunate. We verify the theoretical results both with simulation and with a parallel implementation using graphics processing units (GPUs). Our implementation provides insights into how to structure parallel peeling algorithms for efficiency in practice.

References

[1]
Dimitris Achlioptas and Michael Molloy. 2015. The solution space geometry of random linear equations. Random Structures and Algorithms 46, 2, 197--231.
[2]
Yossi Azar, Andrei Z. Broder, Anna R. Karlin, and Eli Upfal. 1999. Balanced allocations. SIAM Journal on Computing 29, 1, 180--200.
[3]
Andrei Z. Broder, Alan M. Frieze, and Eli Upfal. 1993. On the satisfiability and maximum satisfiability of random 3-CNF formulas. In Proceedings of the 4th Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms,Vijaya Ramachandran (Ed.). ACM/SIAM, 322--330. http://dl.acm.org/citation.cfm?id=313559.313794.
[4]
Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, and Ayellet Tal. 2004. The Bloomier filter: An efficient data structure for static support lookup tables. In Proceedings of the 15th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'04). J. Ian Munro (Ed.). SIAM, 30--39. http://dl.acm.org/citation.cfm?id=982792.982797.
[5]
Fan R. K. Chung and Lincoln Lu. 2006. Survey: Concentration inequalities and Martingale inequalities: A survey. Internet Mathematics 3, 1, 79--127.
[6]
Colin Cooper. 2004. The cores of random hypergraphs with a given degree sequence. Random Structures and Algorithms 25, 4, 353--375.
[7]
Martin Dietzfelbinger, Andreas Goerdt, Michael Mitzenmacher, Andrea Montanari, Rasmus Pagh, and Michael Rink. 2010. Tight thresholds for cuckoo hashing via XORSAT. In Proceedings of the 37th International Colloquium of Automata, Languages and Programming (ICALP'10), Part I. Lecture Notes in Computer Science, Samson Abramsky, Cyril Gavoille, Claude Kirchner, Friedhelm Meyer auf der Heide, and Paul G. Spirakis (Eds.), Vol. 6198. Springer, Berlin, 213--225.
[8]
David Eppstein, Michael T. Goodrich, Frank Uyeda, and George Varghese. 2011. What's the difference? Efficient set reconciliation without prior context. In Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Srinivasan Keshav, Jörg Liebeherr, John W. Byers, and Jeffrey C. Mogul (Eds.). ACM, 218--229.
[9]
Pu Gao. 2014. Analysis of the parallel peeling algorithm: a short proof. http://arxiv.org/abs/1402.7326.
[10]
Michael T. Goodrich and Michael Mitzenmacher. 2011. Invertible Bloom lookup tables. In 49th Annual Allerton Conference on Communication, Control, and Computing. IEEE, 792--799.
[11]
Richard M. Karp, Michael Luby, and Friedhelm Meyer auf der Heide. 1996. Efficient PRAM simulation on a distributed memory machine. Algorithmica 16, 4/5, 517--542.
[12]
Adam Kirsch, Michael Mitzenmacher, and Udi Wieder. 2009. More robust hashing: Cuckoo hashing with a stash. SIAM Journal on Computing 39, 4, 1543--1561.
[13]
Lucien Le Cam. 1960. An approximation theorem for the Poisson binomial distribution. Pacific Journal of Mathematics 10, 4, 1181--1197. http://projecteuclid.org/euclid.pjm/1103038058
[14]
Michael Luby, Michael Mitzenmacher, Mohammad Amin Shokrollahi, and Daniel A. Spielman. 2001. Efficient erasure correcting codes. IEEE Transactions on Information Theory 47, 2, 569--584.
[15]
Michael Mitzenmacher. 2001. The power of two choices in randomized load balancing. IEEE Transactions on Parallel Distributed Systems 12, 10, 1094--1104.
[16]
Michael Mitzenmacher and Eli Upfal. 2005. Probability and Computing - Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, New York, NY.
[17]
Michael Mitzenmacher and George Varghese. 2012. Biff (Bloom filter) codes: Fast error correction for large data sets. In Proceedings of the International Symposium on Information Theory (ISIT'12). IEEE, 483--487.
[18]
Michael Mitzenmacher and B. Vöcking. 1999. The asymptotics of selecting the shortest of two, improved. In Proceedings of the 37th Annual Allerton Conference on Communication Control and Computing. 326--327.
[19]
Michael Molloy. 2005. Cores in random hypergraphs and Boolean formulas. Random Structures and Algorithms 27, 1, 124--135.
[20]
Rasmus Pagh and Flemming Friche Rodler. 2004. Cuckoo hashing. Journal of Algorithms 51, 2, 122--144.
[21]
Berthold Vöcking. 2003. How asymmetry helps load balancing. Journal of the ACM 50, 4, 568--589.
[22]
U. Voll. 2001. Threshold Phenomena in Branching Trees and Sparse Random Graphs. Ph.D. Dissertation. Techischen Universität München, Munich, Germany.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Parallel Computing
ACM Transactions on Parallel Computing  Volume 3, Issue 1
Special Issue for SPAA 2014
June 2016
192 pages
ISSN:2329-4949
EISSN:2329-4957
DOI:10.1145/2965648
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 January 2017
Accepted: 01 March 2015
Revised: 01 March 2015
Received: 01 August 2014
Published in TOPC Volume 3, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Peeling algorithms
  2. invertible Bloom lookup tables
  3. low-density parity check codes
  4. parallel algorithms

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)124
  • Downloads (Last 6 weeks)34
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media