Parallel Program Graphs and Their Classi Cation

Total Page:16

File Type:pdf, Size:1020Kb

Parallel Program Graphs and Their Classi Cation Parallel Program Graphs and their Classication Vivek Sarkar Barbara Simons IBM Santa Teresa Lab oratory Bailey Avenue San Jose CA fvivek sarkarsimonsgvnetib mcom Abstract We categorize and compare dierent representations of pro gram dep endence graphs including the Control Flow Graph CFG which is a sequential representation lacking data dep endences the Program Dep endence Graph PDG which is a parallel representation of a se quential program and is comprised of control and data dep endences and more generally the Parallel Program Graph PPG which is a parallel representation of sequential and inherently parallel programs and is comprised of parallel control ow edges and synchronization edges PPGs are classied according to their graphical structure and prop erties related to deadlo ck detection and serializabil i ty Intro duction The imp ortance of optimizing compilers has increased dramatically with the development of multipro cessor computers Writing correct and ecient parallel co de is quite dicult at b est writing such software and making it p ortable cur rently is almost imp ossible Intermediate forms are required b oth for optimiza tion and p ortability A natural intermediate form is the graph that represents the instructions of the program and the dep endences that exist b etween them This is the role played by the Parallel Program Graph PPG The Control Flow Graph CFG in turn is required once p ortions of the PPG have b een mapp ed onto individual pro cessors PPGs are a generalization of Program Dep endence Graphs PDGs which have b een shown to b e useful for solving a variety of problems including optimization vectorization co de generation for VLIW machines merging versions of programs and automatic detection and management of parallelism PPGs are useful for determining the semantic equivalence of parallel programs and also have applications to automatic co de generation In section we dene PPGs as a more general intermediate representation of parallel programs than PDGs PPGs contain control edges that represent parallel ow of control and synchronization edges that imp ose ordering constraints on execution instances of PPG no des MGOTO no des are used to create new threads of parallel control Section contains a few examples of PPGs to provide some intuition on how PPGs can b e built in a compiler and how they execute at run time Section characterizes PPGs based on the nature of their control edges and synchronization edges and summarizes the classications of PPGs according to the results rep orted in sections and Unlike PDGs which can only represent the parallelism in a sequential pro gram PPGs can represent the parallelism in inherently parallel programs Two imp ortant issues that are sp ecic to PPGs are dead lock and serializability A PPGs execution may deadlo ck if its synchronization edges are incorrectly sp ec ied ie if there is an execution sequence of PPG no des containing a cycle This is also one reason why PPGs are more general than PDGs In section we characterize the complexity of deadlo ck detection for dierent classes of PPGs Serialization is the pro cess of transforming a PPG into a semantically equivalent sequential CFG with neither no de duplication nor creation of Bo olean guards It has already b een shown that there exist PPGs that are not serializable which is another reason why PPGs are more general than PDGs In section we further study the serialization problem by characterizing the serializability of dierent classes of PPGs Finally section discusses related work and section contains the conclu sions of this pap er and an outline of p ossible directions for future work Denition of PPGs Control Flow Graphs CFGs We b egin with the denition of a control ow graph as presented in It diers from the usual denition by the inclusion of a set of lab els for edges and a mapping of no de typ es The lab el set fT F U g is used to distinguish b etween conditional execution lab els T and F and unconditional execution lab el U Denition A control ow graph CFG N E TYPE is a ro oted directed cf multigraph in which every no de is reachable from the ro ot It consists of N a set of no des A CFG no de represents an arbitrary sequential computa tion eg a basic blo ck a statement or an op eration E N N fT F U g a set of label led control ow edges cf TYPE a no de typ e mapping TYPEn identies the typ e of no de n as one of the following values START STOP PREDICATE COMPUTE We assume that CFG contains two distinguished no des of typ e START and STOP resp ectively and that for any no de N in CFG there exist directed paths from START to N and from N to STOP Each no de in a CFG has at most two outgoing edges A no de with exactly two outgoing edges represents a conditional branch predicate in that case the no de has TYPE PREDICATE and we assume that the outgoing edges are distin 1 guished by T true and F false lab els If a no de has TYPE COMPUTE then it has exactly one outgoing edge with lab el U unconditional 1 The restriction to at most two outgoing edges is made to simplify the discussion All the results presented in this pap er are applicabl e to control ow graphs with arbitrary outdegree eg when representing a computed GOTO statement in Fortran or a switch statement in C Note that CFG imp oses no restriction on the indegree of a no de 2 A CFG is a standard sequential representation of a program with no par allel constructs A CFG is also the target for co de generation from parallel to sequential co de Program Dep endence Graphs PDGs The Program Dependence Graph PDG is a standard representation of control and data dep endences derived from a sequential program and its CFG Like CFG no des a PDG no de represents an arbitrary sequential computation eg a basic blo ck a statement or an op eration An edge in a PDG represents a control dependence or a data dependence PDGs reveal the inherent parallelism in a program written in a sequential programming language by removing articial sequencing constraints from the program text Denition A Program Dependence Graph PDG N E E TYPE is a cd dd ro oted directed multigraph in which every no de is reachable from the ro ot It consists of N a set of no des E N N fT F U g a set of lab elled control dependence edges cd Edge a b L E identies a control dep endence from no de a to no de cd b with lab el L This means that a must have TYPE PREDICATE or TYPE REGION If TYPE PREDICATE and if as predicate value is evaluated to b e L then it causes an execution instance of b to b e created If TYPE REGION then an execution instance of b is always created E N N Contexts a set of data dependence edges dd Edge a b C E identies a data dep endence from no de a to no de b dd with context C The context C identies the pairs of execution instances of no des a and b that must b e synchronized Direction vectors and distance vectors are common approaches to representing contexts of data dep endences the gist and the lastwrite tree are newer representa tions for data dep endence contexts that provide more information Context information can identify a data dep endence as b eing loopindependent or loopcarried In the absence of any other information the context of a data dep endence edge in a PDG must at least b e plausible ie the execution instances participating in the data dep endences must b e consistent with the sequential ordering represented by the CFG from which the PDG is derived TYPE a no de typ e mapping TYPEn identies the typ e of no de n as one of the following values START PREDICATE COMPUTE REGION The START no de and PREDICATE no de typ es in a PDG are like the corresp onding no de typ es in a CFG The COMPUTE no de typ e is slightly dierent b ecause it has no outgoing control edges in a PDG By contrast every no de typ e except STOP is required to have at least one outgoing edge in a CFG A no de with TYPE REGION serves as a summary no de for a set of control dep endence successors in a PDG Region no des are also useful for factoring sets of control dep endence successors 2 Parallel Program Graphs PPGs The Paral lel Program Graph PPG is a general intermediate representation of parallel programs that includes PDGs and CFGs Analogous to control de p endence and data dep endence edges in PDGs PPGs contain control edges that represent parallel ow of control and synchronization edges that imp ose ordering constraints on execution instances of PPG no des PPGs also contain MGOTO no des that are a generalization of REGION no des in PDGs What distinguishes PPGs from PDGs is the complete freedom in connecting PPG no des with control and synchronization edges to span the full sp ectrum of sequential and parallel programs Control edges in PPGs can b e used to mo del program constructs that cannot b e mo delled by control dep endence edges in PDGs eg PPGs can represent nonserializable parallel programs Synchronization edges in PPGs can b e used to mo del program constructs that cannot b e mo delled with data dep endence edges in PDGs eg a PPG may enforce a synchronization with distance vector from the next iteration of a lo op to the previous iteration as in say Haskell array constructors or Istructures while such data dep endences are prohibited in PDGs b ecause they are not plausible with reference to the sequential program from which the PDG was derived Denition A Paral lel Program Graph PPG N E E TYPE is a cont sy nc ro oted directed multigraph in which every no de is reachable from the ro ot using only control
Recommended publications
  • Incremental Computation of Static Single Assignment Form
    Incremental Computation of Static Single Assignment Form Jong-Deok Choi 1 and Vivek Sarkar 2 and Edith Schonberg 3 IBM T.J. Watson Research Center, P. O. Box 704, Yorktown Heights, NY 10598 ([email protected]) 2 IBM Software Solutions Division, 555 Bailey Avenue, San Jose, CA 95141 ([email protected]) IBM T.J. Watson Research Center, P. O. Box 704, Yorktown Heights, NY 10598 ([email protected]) Abstract. Static single assignment (SSA) form is an intermediate rep- resentation that is well suited for solving many data flow optimization problems. However, since the standard algorithm for building SSA form is exhaustive, maintaining correct SSA form throughout a multi-pass com- pilation process can be expensive. In this paper, we present incremental algorithms for restoring correct SSA form after program transformations. First, we specify incremental SSA algorithms for insertion and deletion of a use/definition of a variable, and for a large class of updates on intervals. We characterize several cases for which the cost of these algorithms will be proportional to the size of the transformed region and hence poten- tially much smaller than the cost of the exhaustive algorithm. Secondly, we specify customized SSA-update algorithms for a set of common loop transformations. These algorithms are highly efficient: the cost depends at worst on the size of the transformed code, and in many cases the cost is independent of the loop body size and depends only on the number of loops. 1 Introduction Static single assignment (SSA) [8, 6] form is a compact intermediate program representation that is well suited to a large number of compiler optimization algorithms, including constant propagation [19], global value numbering [3], and program equivalence detection [21].
    [Show full text]
  • Arxiv:2106.11534V1 [Cs.DL] 22 Jun 2021 2 Nanjing University of Science and Technology, Nanjing, China 3 University of Southampton, Southampton, U.K
    Noname manuscript No. (will be inserted by the editor) Turing Award elites revisited: patterns of productivity, collaboration, authorship and impact Yinyu Jin1 · Sha Yuan1∗ · Zhou Shao2, 4 · Wendy Hall3 · Jie Tang4 Received: date / Accepted: date Abstract The Turing Award is recognized as the most influential and presti- gious award in the field of computer science(CS). With the rise of the science of science (SciSci), a large amount of bibliographic data has been analyzed in an attempt to understand the hidden mechanism of scientific evolution. These include the analysis of the Nobel Prize, including physics, chemistry, medicine, etc. In this article, we extract and analyze the data of 72 Turing Award lau- reates from the complete bibliographic data, fill the gap in the lack of Turing Award analysis, and discover the development characteristics of computer sci- ence as an independent discipline. First, we show most Turing Award laureates have long-term and high-quality educational backgrounds, and more than 61% of them have a degree in mathematics, which indicates that mathematics has played a significant role in the development of computer science. Secondly, the data shows that not all scholars have high productivity and high h-index; that is, the number of publications and h-index is not the leading indicator for evaluating the Turing Award. Third, the average age of awardees has increased from 40 to around 70 in recent years. This may be because new breakthroughs take longer, and some new technologies need time to prove their influence. Besides, we have also found that in the past ten years, international collabo- ration has experienced explosive growth, showing a new paradigm in the form of collaboration.
    [Show full text]
  • Alan Mathison Turing and the Turing Award Winners
    Alan Turing and the Turing Award Winners A Short Journey Through the History of Computer TítuloScience do capítulo Luis Lamb, 22 June 2012 Slides by Luis C. Lamb Alan Mathison Turing A.M. Turing, 1951 Turing by Stephen Kettle, 2007 by Slides by Luis C. Lamb Assumptions • I assume knowlege of Computing as a Science. • I shall not talk about computing before Turing: Leibniz, Babbage, Boole, Gödel... • I shall not detail theorems or algorithms. • I shall apologize for omissions at the end of this presentation. • Comprehensive information about Turing can be found at http://www.mathcomp.leeds.ac.uk/turing2012/ • The full version of this talk is available upon request. Slides by Luis C. Lamb Alan Mathison Turing § Born 23 June 1912: 2 Warrington Crescent, Maida Vale, London W9 Google maps Slides by Luis C. Lamb Alan Mathison Turing: short biography • 1922: Attends Hazlehurst Preparatory School • ’26: Sherborne School Dorset • ’31: King’s College Cambridge, Maths (graduates in ‘34). • ’35: Elected to Fellowship of King’s College Cambridge • ’36: Publishes “On Computable Numbers, with an Application to the Entscheindungsproblem”, Journal of the London Math. Soc. • ’38: PhD Princeton (viva on 21 June) : “Systems of Logic Based on Ordinals”, supervised by Alonzo Church. • Letter to Philipp Hall: “I hope Hitler will not have invaded England before I come back.” • ’39 Joins Bletchley Park: designs the “Bombe”. • ’40: First Bombes are fully operational • ’41: Breaks the German Naval Enigma. • ’42-44: Several contibutions to war effort on codebreaking; secure speech devices; computing. • ’45: Automatic Computing Engine (ACE) Computer. Slides by Luis C.
    [Show full text]
  • First Woman to Receive ACM Turing Award Contact: Virginia Gold 212-626-0505 [email protected]
    First Woman to Receive ACM Turing Award Contact: Virginia Gold 212-626-0505 [email protected] Cameron Wilson 202-659-9712 [email protected] IBM Fellow Emerita Frances Allen Responsible for Innovations to High Speed Computing; Work Inspired Generations of Computer Scientists New York, NY, February 21, 2007 – ACM, the Association for Computing Machinery, has named Frances E. Allen the recipient of the 2006 A.M. Turing Award for contributions that fundamentally improved the performance of computer programs in solving problems, and accelerated the use of high performance computing. This award marks the first time that a woman has received this honor. The Turing Award, first presented in 1966, and named for British mathematician Alan M. Turing, is widely considered the "Nobel Prize in Computing." It carries a $100,000 prize, with financial support provided by Intel Corporation. Allen, an IBM Fellow Emerita at the T.J. Watson Research Center, made fundamental contributions to the theory and practice of program optimization, which translates the users' problem-solving language statements into more efficient sequences of computer instructions. Her contributions also greatly extended earlier work in automatic program parallelization, which enables programs to use multiple processors simultaneously in order to obtain faster results. These techniques have made it possible to achieve high performance from computers while programming them in languages suitable to applications. They have contributed to advances in the use of high performance computers for solving problems such as weather forecasting, DNA matching, and national security functions. "Fran Allen's work has led to remarkable advances in compiler design and machine architecture that are at the foundation of modern high-performance computing," said Ruzena Bajcsy, Chair of ACM's Turing Award Committee, and professor of Electrical and Engineering and Computer Science at the University of California, Berkeley.
    [Show full text]
  • In Memory of Jacob Schwartz
    In Memory of Jacob Schwartz Sal Anastasio, Coordinating Editor —The outstanding contributions Jack had made to many fields and his ability to enter a field new to him, master it, make significant contributions, and move on. —Jack’s exceptional kindness and generosity. Eugenio Omodeo spoke of his “deep empathy with others”; Edmond Schonberg said that “his generosity had changed the lives of many;” and his sister, Judith, said that, to Jack, “acts of exceptional kindness were perfectly routine” and that his “stunning generosity…did not look for thanks” and “he was puzzled and even annoyed when they came.” —Finally, and in a lighter vein, Jack’s addiction to particular Chinese restaurants whose quality ranged from, at best, “mediocre,” to, at worst, “loathsome.” Jacob Theodore Schwartz was born on January 9, 1930, in the Bronx, New York City, of immigrant parents: his father, Ignatz, from Hungary, and his Photo courtesy of NYU Publicity for Courant. mother, Hedwig, from Germany. At every level of Jack Schwartz. his life, Jack was precocious. As a child he was an omnivorous reader. He attended Stuyvesant, a high school for gifted students. At age nineteen A few months after Jack Schwartz’s death on he graduated from the City College of New York (a producer of many Nobel Prize winners and March 2, 2009, a memorial gathering was held frequently called, at that time, “the poor man’s for him at the Courant Institute of New York Harvard”). While there, he studied with E. L. Post. University, his home base for almost fifty years. His friend and colleague Martin Davis recalls The well-planned program included a few piano that Jack interpreted one of Post’s remarks as pieces and almost a dozen speakers, each of whom expressing a need for a proof that all recursive had collaborated with Jack in one or more of his functions are Turing computable, and Jack sent many activities.
    [Show full text]
  • A Selective Chronology of IBM Women in Technology
    A Selective Chronology Of IBM Women In Technology 1890s 1899 The Computing Scale Company, one of three companies that will form the Computing - Tabulating - Recording Company (C-T-R) in 1911, hires Richard MacGregor, a Black employee, as well as Lilly J. Philp, Nettie A. Moore and Emma K. Manske. This occurs 10 years before the National Association for the Advancement of Colored People (NAACP) was founded, 36 years after President Lincoln signed the Emancipation Proclamation and 20 years before women won the right to vote. In 1924, these four employees help inaugurate IBM’s first Quarter Century Club. 1910s 1918 Clara Doring, Virginia Kempton, Rugh L. Schiele and Miriam R. Shott -- employees of an IBM predecessor company -- attend the Tabulating Machine School to learn about the mechanics and applications of punched card technology. 1920s 1924 Women join IBM’s first Quarter Century Club, created to honor employees with 25 years of service. 1929 Virginia L. Linkenhoker organizes IBM’s first customer training school. 1930s 1935 IBM hires its first professional women, 25 college seniors recruited for Systems Service They are graduates of IBM’s first women’s systems service class at Endicott, N.Y., in 1935. 1935 Thomas J. Watson, Sr. champions the introduction of women into IBM’s professional ranks, as the company holds its first systems service class for women. These pioneering women are the first wave of IBM female employees to take on customer contact positions traditionally filled by men. 1935 Virginia L. Linkenhoker becomes IBM’s first full-time system service woman. She is soon followed by the graduates of IBM’s first systems service class for women.
    [Show full text]
  • What Are the Important Problems for Programming Languages?
    What are the important problems for programming languages? Philip Wadler, University of Edinburgh [email protected] Part I Hamming Richard W. Hamming, 1915–1998 • Los Alamos, 1945. • Bell Labs, 1946–1976. • Naval Postgraduate School, 1976–1998. • Turing Award, 1968. (Third time given.) • IEEE Hamming Medal, 1987. (First time given.) What are the important problems? Hamming started to eat at the Chemistry table. “I started asking, ‘What are the important problems of your field?’ And after a week or so, ‘What important problems are you working on?’ And after some more time I came in one day and said, ‘If what you are doing is not important, why are you working on it?’ I wasn’t welcomed after that. “In the fall, Dave McCall stopped me in the hall and said, ‘Hamming, that remark of yours got underneath my skin. I thought about it all summer. I haven’t changed my research, but I think it was well worthwhile.’ I noticed a couple of months later he was made the head of the department. I noticed the other day he was a Member of the National Academy of Engineering. I have never again heard the names of any of the other fellows.” — Hamming You need an attack “If you do not work on an important problem, it’s unlikely you’ll do important work. It’s perfectly obvious. “Let me warn you, ‘important problem’ must be phrased carefully. The three outstanding problems in physics, in a certain sense, were never worked on while I was at Bell Labs. By important I mean guaranteed a Nobel Prize and any sum of money you want to mention.
    [Show full text]
  • Publications Core Magazine, 2012 This
    2012 COMMEMORATIVE ISSUE C O RE A Publication of 25 Years of the Fellow Awards the Computer The Origins of Timesharing History Museum An Evening with Walter Isaacson Close up of the Amdahl 470V/6 Computer, 1975. The 470V/6 was the Amdahl Corporation’s fi rst product and ran the same software as IBM System/370 computers but cost less and was smaller and faster. Opposite page: Close-up of IBM 305 RAMAC System Diagram B CORE 2012 / HALL OF FELLOWS DEPARTMENTS MUSEUM UPDATES EXPLORE THE COLLECTION 2 4 6 56 60 58 Contributors An Analog Life An Evening with Oral Histories: Donor Profile Recent Artifact Walter Isaacson The Origins of Donations 3 5 61 Timesharing CEO’s Letter Talking to the Future 7 Museum Donors The President @ CHM C O RE 2012 9 SPECIAL SECTION: TWENTY-FIVE YEARS OF FELLOWS 10 12 14 18 The Fellow Awards Fellows at a Glance Visionary Pioneer 25 Years of Fellows It was 25 years ago that the See an overview of our Fellows— Grace Murray Hopper was a The Computer History Museum Museum began its Fellows where they studied and worked unique individual: a woman in a Fellows often have very inter- program. Since that time, the and what they are known for—in man’s world of computers and esting life trajectories, full of Award has been given to over this two-page chart that shows mathematics and an admiral in dramatic turns and unexpected 60 outstanding individuals in 25 years of Fellows history in an the U.S. Naval Reserve.
    [Show full text]
  • Uva-DARE (Digital Academic Repository)
    UvA-DARE (Digital Academic Repository) Gathering evidence: Model-driven software engineering in automated digital forensics van den Bos, J. Publication date 2014 Link to publication Citation for published version (APA): van den Bos, J. (2014). Gathering evidence: Model-driven software engineering in automated digital forensics. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:27 Sep 2021 Bibliography [AB11] Leon Aronson and Jeroen van den Bos. Towards an Engineering Ap- proach to File Carver Construction. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), pages 368–373. IEEE, 2011. (page 18, 19) [AC72] Frances Allen and John Cocke. A Catalogue of Optimizing Transforma- tions. In Design and Optimization of Compilers, pages 1–30.
    [Show full text]
  • Women in Computing in Celebration of March: Women’S History Month, CS Bits & Bytes Is Featuring Stories of Contributions by Women to Computing
    CS Bits & Bytes is a bi-weekly newsletter highlighting innovative computer science research. It is our hope that you will use CS Bits & Bytes to engage in the multi-faceted world of computer science to become not just a user, but a creator of technology. Please visit our website at: http://www.nsf.gov/cise/csbytes. March 12, 2012 Volume 1, Issue 7 Women in Computing In celebration of March: Women’s History Month, CS Bits & Bytes is featuring stories of contributions by women to computing. Women have significantly impacted computing throughout history! The very first computer programmer was a woman born in the 1800s! In 1842, Ada Lovelace, an English mathematician, wrote notes on a newly invented machine by Charles Babbage called the Difference Engine and later the Analytical Engine. The engine is now rec- ognized as an early model for a computer, so early that it was entirely mechanical and used no electricity. The notes included a method for calculating a sequence of Bernoulli numbers. Her method is recognized as the world’s first computer program. To see a video of the Dif- ference Engine in action, go to: http://www.wired.com/gadgetlab/2008/05/exclusive-video/. During World War II, six women were hired to “program” the ENIAC (Electronic Numerical Integrator and Computer), the first general purpose electronic digital computer developed to compute tactical trajectories. Previously, these trajectories were computed by Ada Lovelace. Photo courtesy of Wiki Commons. hand and required doing thousands of mathematical calculations. These “Women of ENIAC” were the first professional programmers. Programming then was very different than it is now as the machine was controlled by electrical cables that were plugged into boards in different configurations.
    [Show full text]
  • Seminar: Turing Award Winners and Their Contributions 1
    Seminar: Turing Award Winners and Their Contributions 1. Organization, Dates & Topics Malte Helmert, Augusto Blaas Corr^eaand Florian Pommerening University of Basel September 17, 2020 Protective measures at the University of Basel Students are to wear masks on Masks do not have to be worn Masks must be worn outside the the way to their seats and again during lessons. lecture rooms. when they leave their seats. Eating during lessons is Students must clean their work Rooms with windows will be prohibited. surfaces before the start of the ventilated before lectures. This is lesson. the responsibility of teaching staff. Titel, Datum, Autor Universität Basel 1 Turing Award Winners and Their Contributions Organization Topics and Next Steps Seminar: Turing Award Winners and Their Contributions 1. Organization, Dates & Topics Malte Helmert, Augusto Blaas Corr^eaand Florian Pommerening University of Basel September 17, 2020 Turing Award Winners and Their Contributions Organization Topics and Next Steps Turing Award Winners and Their Contributions Turing Award Winners and Their Contributions Organization Topics and Next Steps Seminar Topic { Turing Award Turing Award is the \Nobel Prize of Computing" Awarded by the ACM since 1966 First winner: Alan Perlis, inventor of ALGOL Latest winners: Edwin Catmull and Pat Hanrahan, contributions to computer graphics Helps to tell part of the history of modern computer science Turing Award Winners and Their Contributions Organization Topics and Next Steps Some Turing Award Trivia Researchers from 13 different nationalities won the award Only US, UK, Israel, Canada, France and Norway have multiple winners Niklaus Wirth is the only Swiss person to ever win the award Joseph Sifakis (Greece) won the award while working at EPFL No money prize until 2007 2007{2013: 250,000 USD Since 2014: 1,000,000 USD Turing Award Winners and Their Contributions Organization Topics and Next Steps Some of the Winners John McCarthy Donald Knuth Stephen Cook Vint Cerf Frances Allen Edmund M.
    [Show full text]
  • Co-Authorship Proximity of A. M. Turing Award and John Von Neumann Medal Winners to the Disciplinary Boundaries of Computer Science
    Fields, p. 1 of 23 Co-authorship proximity of A. M. Turing Award and John von Neumann Medal winners to the disciplinary boundaries of computer science Chris Fields 528 Zinnia Court Sonoma, CA 95476 USA [email protected] Keywords: Biomedical sciences; Computer science; Cross-disciplinary brokers; Erdős numbers; Graph centrality; Interdisciplinarity Abstract It is shown that winners of the A. M. Turing Award or the John von Neumann Medal, both of which recognize achievement in computer science, are separated from some other A. M. Turing Award or John von Neumann Medal winner by at most 1.4 co-authorship steps on average, and from some cross- disciplinary broker, and hence from some discipline other than computer science, by at most 1.6 co- authorship steps on average. A. M. Turing Award and John von Neumann Medal recipients during this period are, therefore, on average closer in co-authorship terms to some other discipline that typical computer scientists are, on average, to each other. Introduction How are the most prominent and widely-recognized members of any scientific discipline distributed within the social network formed by that discipline? More specifically, how are the most prominent members of a discipline distributed within the co-authorship graph of that discipline? Studies of co- authorship paths traversing cross-disciplinary brokers (Fields, 2015) and of co-authorship connections of Nobel laureates in Physiology or Medicine (Fields, 2014; in press) suggest a surprising answer: prominent intellectual and, in many cases, political leaders of several disciplines appear to be located near the co-authorship boundaries of their disciplines, in close proximity to cross-disciplinary brokers.
    [Show full text]