Parallel probabilistic tree embeddings, k-median, and buy-at-bulk network design

Guy E. Blelloch, Anupam Gupta, Kanat Tangwongsan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents parallel algorithms for embedding an arbitrary n-point metric space into a distribution of dominating trees with O(log n) expected stretch. Such embedding has proved useful in the design of many approximation algorithms in the sequential setting. We give a parallel algorithm that runs in O(n 2 log n) work and O(log 2 n) depth - these bounds are independent of Δ = max x,y d(x,y)/min x≠y d(x;y), the ratio of the largest to smallest distance. Moreover, when Δ is exponentially bounded (Δ ≤/2 O(n)), our algorithm can be improved to O(n 2) work and O(log 2 n) depth. Using these results, we give an RNC O(log κ)-approximation algorithm for κ-median and an RNC O(log n)-approximation for buy-at-bulk network design. The κ-median algorithm is the first RNC algorithm with non-trivial guarantees for arbitrary values of κ, and the buy-at-bulk result is the first parallel algorithm for the problem.

Original languageEnglish (US)
Title of host publicationSPAA'12 - Proceedings of the 24th ACM Symposium on Parallelism in Algorithms and Architectures
Pages205-213
Number of pages9
DOIs
StatePublished - 2012
Event24th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA'12 - Pittsburgh, PA, United States
Duration: Jun 25 2012Jun 27 2012

Publication series

NameAnnual ACM Symposium on Parallelism in Algorithms and Architectures

Conference

Conference24th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA'12
Country/TerritoryUnited States
CityPittsburgh, PA
Period6/25/126/27/12

Keywords

  • Buy-at-bulk network design
  • K-median
  • Parallel algorithms
  • Probabilistic tree embedding

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Parallel probabilistic tree embeddings, k-median, and buy-at-bulk network design'. Together they form a unique fingerprint.

Cite this