Benchmarks for IP Forwarding Tables

Total Page:16

File Type:pdf, Size:1020Kb

Benchmarks for IP Forwarding Tables Reviewers James Abello Richard Cleve Vassos Hadzilacos Dimitris Achilioptas James Clippinger Jim Hafner Micah Adler Anne Condon Torben Hagerup Oswin Aichholzer Stephen Cook Armin Haken William Aiello Tom Cormen Shai Halevi Donald Aingworth Dan Dooly Eric Hansen Susanne Albers Oliver Duschka Refael Hassin Eric Allender Martin Dyer Johan Hastad Rajeev Alur Ran El-Yaniv Lisa Hellerstein Andris Ambainis David Eppstein Monika Henzinger Amihood Amir Jeff Erickson Tom Henzinger Artur Andrzejak Kousha Etessami Jeremy Horwitz Boris Aronov Will Evans Russell Impagliazzo Sanjeev Arora Guy Even Piotr Indyk Amotz Barnoy Ron Fagin Sandra Irani Yair Bartal Michalis Faloutsos Ken Jackson Julien Basch Martin Farach-Colton David Johnson Saugata Basu Uri Feige John Jozwiak Bob Beals Joan Feigenbaum Bala Kalyandasundaram Paul Beame Stefan Felsner Ming-Yang Kao Steve Bellantoni Faith Fich Haim Kaplan Micahel Ben-Or Andy Fingerhut Bruce Kapron Josh Benaloh Paul Fischer Michael Kaufmann Charles Bennett Lance Fortnow Michael Kearns Marshall Bern Steve Fortune Sanjeev Khanna Nikolaj Bjorner Alan Frieze Samir Khuller Johannes Blomer Anna Gal Joe Kilian Avrim Blum Naveen Garg Valerie King Dan Boneh Bernd Gartner Philip Klein Andrei Broder Rosario Gennaro Spyros Kontogiannis Nader Bshouty Ashish Goel Gilad Koren Adam Buchsbaum Michel Goemans Dexter Kozen Lynn Burroughs Leslie Goldberg Dina Kravets Ran Canetti Paul Goldberg S. Ravi Kumar Pei Cao Oded Goldreich Eyal Kushilevitz Moses Charikar John Gray Stephen Kwek Chandra Chekuri Dan Greene Larry Larmore Yi-Jen Chiang Dima Grigoriev Stefano Leonardi Benny Chor Michelangelo Gringi Daniel Lewin Isaac Chuang Roberto Grossi Leonid Libkin Ken Clarkson Sudipto Guha Ami Litman xiv Michael Loui Ran Raz Dan Suciu Victor Luchangko Jon Riecke Mario Szegedy Alexis Maciel Ron Rivest Amnon Ta-Shma Bruce Maggs Phil Rogaway Roberto Tamassia Yishay Mansour Dana Ron Eva Tardos Jiri Matousek Adi Rosen Shang-Hua Teng Kevin McCurley Gunter Rote Barbara Terhal Kurt Mehlhorn Dan Roth Mikkel Thorup Daniele Micciancio Ronitt Rubinfeld Mike Todd Dave Mitchell Larry Ruzzo Sivan Toledo Michael Mitzenmacher Amit Sahai Eric Torng Ian Munro John Savage Luca Trevisan Moni Naor Baruch Schieber Chris Umans Jeffrey Oldham Katya Schienberg Alasdair Urquhart Rafail Ostrovsky Leonard Schulman Salil Vardhan Daniel Panario Eric Schwabe Steve Vavasis Gopal Pandurangan Raimund Seidel Umesh Vazirani Michal Parnas Bart Selman Vijay Vazirani Ramamohan Paturi Jiri Sgall Suresh Cindy Phillips Hadas Shachnai Venkatasubramanian Serge Plotkin David Shmoys Joel Wein Vaughan Pratt M. Amin Shrokrollahi Jeff Westbrook Kirk Pruhs Peter Shor Martin Will Teresa Przytycka Craig Silverstein Rebecca Wright Yuval Rabani Dan Simon Deng Xiaotie Tal Rabin Hans Ulrich Simon Li Zhang Charles Rackoff Alistair Sinclair Mark Ziegelmann Prabhakar Raghavan John Smolin Shlomo Zilberstein Sridhar Rajagopalan Vugranam Sreedhar Uri Zwick Sergio Rajsbaum Cliff Stein Bernhard von Stengel R. Ravi Larry Stockmeyer Danny Raz Martin Strauss xiv.
Recommended publications
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2014 VOL.57 NO.11 Scene Understanding by Labeling Pixels Evolution of the Product Manager The Data on Diversity On Facebook, Most Ties Are Weak Keeping Online Reviews Honest Association for Computing Machinery tvx-full-page.pdf-newest.pdf 1 11/10/2013 12:03 3-5 JUNE, 2015 BRUSSELS, BELGIUM Course and Workshop C proposals by M 15 November 2014 Y CM Paper Submissions by MY 12 January 2015 CY CMY K Work in Progress, Demos, DC, & Industrial Submissions by 2 March 2015 Welcoming Submissions on Content Production Systems & Infrastructures Devices & Interaction Techniques Experience Design & Evaluation Media Studies Data Science & Recommendations Business Models & Marketing Innovative Concepts & Media Art TVX2015.COM [email protected] ACM Books M MORGAN& CLAYPOOL &C PUBLISHERS Publish your next book in the ACM Digital Library ACM Books is a new series of advanced level books for the computer science community, published by ACM in collaboration with Morgan & Claypool Publishers. I’m pleased that ACM Books is directed by a volunteer organization headed by a dynamic, informed, energetic, visionary Editor-in-Chief (Tamer Özsu), working closely with a forward-looking publisher (Morgan and Claypool). —Richard Snodgrass, University of Arizona books.acm.org ACM Books ◆ will include books from across the entire spectrum of computer science subject matter and will appeal to computing practitioners, researchers, educators, and students. ◆ will publish graduate level texts; research monographs/overviews of established and emerging fields; practitioner-level professional books; and books devoted to the history and social impact of computing. ◆ will be quickly and attractively published as ebooks and print volumes at affordable prices, and widely distributed in both print and digital formats through booksellers and to libraries and individual ACM members via the ACM Digital Library platform.
    [Show full text]
  • Arxiv:2008.08417V2 [Cs.DS] 3 Nov 2020
    Modular Subset Sum, Dynamic Strings, and Zero-Sum Sets Jean Cardinal∗ John Iacono† Abstract a number of operations on a persistent collection strings, e modular subset sum problem consists of deciding, given notably, split and concatenate, as well as nding the longest a modulus m, a multiset S of n integers in 0::m − 1, and common prex (LCP) of two strings, all in at most loga- a target integer t, whether there exists a subset of S with rithmic time with updates being with high probability. We elements summing to t (mod m), and to report such a inform the reader of the independent work of Axiotis et + set if it exists. We give a simple O(m log m)-time with al., [ABB 20], contains much of the same results and ideas high probability (w.h.p.) algorithm for the modular sub- for modular subset sum as here has been accepted to ap- set sum problem. is builds on and improves on a pre- pear along with this paper in the proceedings of the SIAM vious O(m log7 m) w.h.p. algorithm from Axiotis, Backurs, Symposium on Simplicity in Algorithms (SOSA21). + Jin, Tzamos, and Wu (SODA 19). Our method utilizes the As the dynamic string data structure of [GKK 18] is ADT of the dynamic strings structure of Gawrychowski quite complex, we provide in §4 a new and far simpler alter- et al. (SODA 18). However, as this structure is rather com- native, which we call the Data Dependent Tree (DDT) struc- plicated we present a much simpler alternative which we ture.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • The Best Nurturers in Computer Science Research
    The Best Nurturers in Computer Science Research Bharath Kumar M. Y. N. Srikant IISc-CSA-TR-2004-10 http://archive.csa.iisc.ernet.in/TR/2004/10/ Computer Science and Automation Indian Institute of Science, India October 2004 The Best Nurturers in Computer Science Research Bharath Kumar M.∗ Y. N. Srikant† Abstract The paper presents a heuristic for mining nurturers in temporally organized collaboration networks: people who facilitate the growth and success of the young ones. Specifically, this heuristic is applied to the computer science bibliographic data to find the best nurturers in computer science research. The measure of success is parameterized, and the paper demonstrates experiments and results with publication count and citations as success metrics. Rather than just the nurturer’s success, the heuristic captures the influence he has had in the indepen- dent success of the relatively young in the network. These results can hence be a useful resource to graduate students and post-doctoral can- didates. The heuristic is extended to accurately yield ranked nurturers inside a particular time period. Interestingly, there is a recognizable deviation between the rankings of the most successful researchers and the best nurturers, which although is obvious from a social perspective has not been statistically demonstrated. Keywords: Social Network Analysis, Bibliometrics, Temporal Data Mining. 1 Introduction Consider a student Arjun, who has finished his under-graduate degree in Computer Science, and is seeking a PhD degree followed by a successful career in Computer Science research. How does he choose his research advisor? He has the following options with him: 1. Look up the rankings of various universities [1], and apply to any “rea- sonably good” professor in any of the top universities.
    [Show full text]
  • Kurt Mehlhorn, and Monique Teillaud
    Volume 1, Issue 3, March 2011 Reasoning about Interaction: From Game Theory to Logic and Back (Dagstuhl Seminar 11101) Jürgen Dix, Wojtek Jamroga, and Dov Samet .................................... 1 Computational Geometry (Dagstuhl Seminar 11111) Pankaj Kumar Agarwal, Kurt Mehlhorn, and Monique Teillaud . 19 Computational Complexity of Discrete Problems (Dagstuhl Seminar 11121) Martin Grohe, Michal Koucký, Rüdiger Reischuk, and Dieter van Melkebeek . 42 Exploration and Curiosity in Robot Learning and Inference (Dagstuhl Seminar 11131) Jeremy L. Wyatt, Peter Dayan, Ales Leonardis, and Jan Peters . 67 DagstuhlReports,Vol.1,Issue3 ISSN2192-5283 ISSN 2192-5283 Published online and open access by Aims and Scope Schloss Dagstuhl – Leibniz-Zentrum für Informatik The periodical Dagstuhl Reports documents the GmbH, Dagstuhl Publishing, Saarbrücken/Wadern, program and the results of Dagstuhl Seminars and Germany. Dagstuhl Perspectives Workshops. Online available at http://www.dagstuhl.de/dagrep In principal, for each Dagstuhl Seminar or Dagstuhl Perspectives Workshop a report is published that Publication date contains the following: August, 2011 an executive summary of the seminar program and the fundamental results, Bibliographic information published by the Deutsche an overview of the talks given during the seminar Nationalbibliothek (summarized as talk abstracts), and The Deutsche Nationalbibliothek lists this publica- summaries from working groups (if applicable). tion in the Deutsche Nationalbibliografie; detailed This basic framework can be extended by suitable bibliographic data are available in the Internet at contributions that are related to the program of the http://dnb.d-nb.de. seminar, e.g. summaries from panel discussions or open problem sessions. License This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license: CC-BY-NC-ND.
    [Show full text]
  • CS Cornell 40Th Anniversary Booklet
    Contents Welcome from the CS Chair .................................................................................3 Symposium program .............................................................................................4 Meet the speakers ..................................................................................................5 The Cornell environment The Cornell CS ambience ..............................................................................6 Faculty of Computing and Information Science ............................................8 Information Science Program ........................................................................9 College of Engineering ................................................................................10 College of Arts & Sciences ..........................................................................11 Selected articles Mission-critical distributed systems ............................................................ 12 Language-based security ............................................................................. 14 A grand challenge in computer networking .................................................16 Data mining, today and tomorrow ...............................................................18 Grid computing and Web services ...............................................................20 The science of networks .............................................................................. 22 Search engines that learn from experience ..................................................24
    [Show full text]
  • On Data Structures and Memory Models
    2006:24 DOCTORAL T H E SI S On Data Structures and Memory Models Johan Karlsson Luleå University of Technology Department of Computer Science and Electrical Engineering 2006:24|: 402-544|: - -- 06 ⁄24 -- On Data Structures and Memory Models by Johan Karlsson Department of Computer Science and Electrical Engineering Lule˚a University of Technology SE-971 87 Lule˚a, Sweden May 2006 Supervisor Andrej Brodnik, Ph.D., Lule˚a University of Technology, Sweden Abstract In this thesis we study the limitations of data structures and how they can be overcome through careful consideration of the used memory models. The word RAM model represents the memory as a finite set of registers consisting of a constant number of unique bits. From a hardware point of view it is not necessary to arrange the memory as in the word RAM memory model. However, it is the arrangement used in computer hardware today. Registers may in fact share bits, or overlap their bytes, as in the RAM with Byte Overlap (RAMBO) model. This actually means that a physical bit can appear in several registers or even in several positions within one regis- ter. The RAMBO model of computation gives us a huge variety of memory topologies/models depending on the appearance sets of the bits. We show that it is feasible to implement, in hardware, other memory models than the word RAM memory model. We do this by implementing a RAMBO variant on a memory board for the PC100 memory bus. When alternative memory models are allowed, it is possible to solve a number of problems more efficiently than under the word RAM memory model.
    [Show full text]
  • A Satisfiability Algorithm for AC0 961 Russel Impagliazzo, William Matthews and Ramamohan Paturi
    A Satisfiability Algorithm for AC0 Russell Impagliazzo ∗ William Matthews † Ramamohan Paturi † Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92093-0404, USA January 2011 Abstract ing the size of the search space. In contrast, reducing We consider the problem of efficiently enumerating the problems such as planning or model-checking to the spe- satisfying assignments to AC0 circuits. We give a zero- cial cases of cnf Satisfiability or 3-sat can increase the error randomized algorithm which takes an AC0 circuit number of variables dramatically. On the other hand, as input and constructs a set of restrictions which cnf-sat algorithms (especially for small width clauses partitions {0, 1}n so that under each restriction the such as k-cnfs) have both been analyzed theoretically value of the circuit is constant. Let d denote the depth and implemented empirically with astounding success, of the circuit and cn denote the number of gates. This even when this overhead is taken into account. For some algorithm runs in time |C|2n(1−µc,d) where |C| is the domains of structured cnf formulas that arise in many d−1 applications, state-of-the-art SAT-solvers can handle up size of the circuit for µc,d ≥ 1/O[lg c + d lg d] with probability at least 1 − 2−n. to hundreds of thousands of variables and millions of As a result, we get improved exponential time clauses [11]. Meanwhile, very few results are known ei- algorithms for AC0 circuit satisfiability and for counting ther theoretically or empirically about the difficulty of solutions.
    [Show full text]
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 10/2015 VOL.58 NO.10 Discovering Genes Involved in Disease and the Mystery of Missing Heritability Crash Consistency Concerns Rise about AI Seeking Anonymity in an Internet Panopticon What Can Be Done about Gender Diversity in Computing? A Lot! Association for Computing Machinery Previous A.M. Turing Award Recipients 1966 A.J. Perlis 1967 Maurice Wilkes 1968 R.W. Hamming 1969 Marvin Minsky 1970 J.H. Wilkinson 1971 John McCarthy 1972 E.W. Dijkstra 1973 Charles Bachman 1974 Donald Knuth 1975 Allen Newell 1975 Herbert Simon 1976 Michael Rabin 1976 Dana Scott 1977 John Backus ACM A.M. TURING AWARD 1978 Robert Floyd 1979 Kenneth Iverson 1980 C.A.R Hoare NOMINATIONS SOLICITED 1981 Edgar Codd 1982 Stephen Cook Nominations are invited for the 2015 ACM A.M. Turing Award. 1983 Ken Thompson 1983 Dennis Ritchie This is ACM’s oldest and most prestigious award and is presented 1984 Niklaus Wirth annually for major contributions of lasting importance to computing. 1985 Richard Karp 1986 John Hopcroft Although the long-term influences of the nominee’s work are taken 1986 Robert Tarjan into consideration, there should be a particular outstanding and 1987 John Cocke 1988 Ivan Sutherland trendsetting technical achievement that constitutes the principal 1989 William Kahan claim to the award. The recipient presents an address at an ACM event 1990 Fernando Corbató 1991 Robin Milner that will be published in an ACM journal. The award is accompanied 1992 Butler Lampson by a prize of $1,000,000. Financial support for the award is provided 1993 Juris Hartmanis 1993 Richard Stearns by Google Inc.
    [Show full text]
  • Robert L. Constable Curriculum Vitae February 14, 2019
    Robert L. Constable Curriculum Vitae February 14, 2019 PERSONAL DETAILS • Citizenship United States • Contacting Address Computer Science Department Cornell University 320 Gates Hall Ithaca, New York 14853 Tel: +01 607 255-9204 Fax: +01 607 255-4428 Email: [email protected] EDUCATION • 1964 A.B., Princeton University, Mathematics • 1965 M.A., University of Wisconsin, Mathematics • 1968 Ph.D., University of Wisconsin, Mathematics Thesis Supervisor: Stephen Cole Kleene ACADEMIC POSITIONS • 1999{2009 Founding Dean, Faculty of Computing and Information Science, Cornell University • 1993{1999 Chair, Department of Computer Science, Cornell University • 1978{ Professor, Department of Computer Science, Cornell University • 1972{1978 Associate Professor, Department of Computer Science, Cornell University • 1968{1972 Assistant Professor, Department of Computer Science, Cornell University • 1968{1968 Instructor, Department of Computer Science, University of Wisconsin PROFESSIONAL ACTIVITIES • Editorships { Logical Methods in Computer Science { The Computer Journal, Oxford University Press { Journal of Logic and Computation, Oxford University Press { Formal Methods in System Design, Kluwer Academic Publishers 1 • Directorships { Oregon Programming Languages Summer School (OPLSS) (2012 continuing) { NATO Summer School at Marktoberdorf (1985 - 2009) { PRL Research Group (1980 - present) • Advisory Committees { Council of Higher Education (CHE) Israel, review committee for computer science departments (2013) { Johns Hopkins University, Department of
    [Show full text]
  • Submission Data for 2017 CORE Conference Re-Ranking Process International Symposium on Theoretical Aspects of Computer Science S
    Submission Data for 2017 CORE conference Re-ranking process International Symposium on Theoretical Aspects of Computer Science Submitted by: Christophe Paul [email protected] Supported by: Christophe Paul, Martin Dietzfelbinger Conference Details Conference Title: International Symposium on Theoretical Aspects of Computer Science Acronym : STACS Rank: B Requested Rank Requested Rank: A Recent Years Most Recent Year Year: 2017 URL: https://stacs2017.thi.uni-hannover.de Papers submitted: 212 Papers published: 54 Acceptance rate: 25 Source for acceptance rate: http://drops.dagstuhl.de/opus/volltexte/2017/7032/pdf/LIPIcs-STACS-2017-0.pdf Program Chairs Name: Brigitte Vallée Affiliation: CNRS, Université de Caen H index: 26 Google Scholar URL: https://scholar.google.fr/citations?user=L4GKuTEAAAAJ&hl=en DBLP URL: http://dblp2.uni-trier.de/pers/hd/v/Vall=eacute=e:Brigitte Name: Heribert Vollmer Affiliation: Leibniz Universität Hannover H index: 26 Google Scholar URL: https://scholar.google.de/citations?user=hU5ScRwAAAAJ&hl=de DBLP URL: http://dblp.uni-trier.de/pers/hd/v/Vollmer:Heribert General Chairs Name: Heribert Vollmer Affiliation: Leibniz Universität Hannover H index: 26 Google Scholar URL: https://scholar.google.de/citations?user=hU5ScRwAAAAJ&hl=de DBLP URL: http://dblp.uni-trier.de/pers/hd/v/Vollmer:Heribert Second Most Recent Year Year: 2016 URL: http://www.univ-orleans.fr/lifo/events/STACS2016/ Papers submitted: 205 Papers published: 54 Acceptance rate: 26 Source for acceptance rate: http://drops.dagstuhl.de/opus/volltexte/2016/5701/pdf/1.pdf
    [Show full text]
  • Federated Computing Research Conference, FCRC’96, Which Is David Wise, Steering Being Held May 20 - 28, 1996 at the Philadelphia Downtown Marriott
    CRA Workshop on Academic Careers Federated for Women in Computing Science 23rd Annual ACM/IEEE International Symposium on Computing Computer Architecture FCRC ‘96 ACM International Conference on Research Supercomputing ACM SIGMETRICS International Conference Conference on Measurement and Modeling of Computer Systems 28th Annual ACM Symposium on Theory of Computing 11th Annual IEEE Conference on Computational Complexity 15th Annual ACM Symposium on Principles of Distributed Computing 12th Annual ACM Symposium on Computational Geometry First ACM Workshop on Applied Computational Geometry ACM/UMIACS Workshop on Parallel Algorithms ACM SIGPLAN ‘96 Conference on Programming Language Design and Implementation ACM Workshop of Functional Languages in Introductory Computing Philadelphia Skyline SIGPLAN International Conference on Functional Programming 10th ACM Workshop on Parallel and Distributed Simulation Invited Speakers Wm. A. Wulf ACM SIGMETRICS Symposium on Burton Smith Parallel and Distributed Tools Cynthia Dwork 4th Annual ACM/IEEE Workshop on Robin Milner I/O in Parallel and Distributed Systems Randy Katz SIAM Symposium on Networks and Information Management Sponsors ACM CRA IEEE NSF May 20-28, 1996 SIAM Philadelphia, PA FCRC WELCOME Organizing Committee Mary Jane Irwin, Chair Penn State University Steve Mahaney, Vice Chair Rutgers University Alan Berenbaum, Treasurer AT&T Bell Laboratories Frank Friedman, Exhibits Temple University Sampath Kannan, Student Coordinator Univ. of Pennsylvania Welcome to the second Federated Computing Research Conference, FCRC’96, which is David Wise, Steering being held May 20 - 28, 1996 at the Philadelphia downtown Marriott. This second Indiana University FCRC follows the same model of the highly successful first conference, FCRC’93, in Janice Cuny, Careers which nine constituent conferences participated.
    [Show full text]