Results 1  10
of
35
STAR/MPI: Binding a Parallel Library to Interactive Symbolic Algebra Systems
 Proc. of International Symposium on Symbolic and Algebraic Computation (ISSAC '95), ACM
, 1995
"... Many users of symbolic algebra systems have felt the need for greater CPU power. Yet few of them have ventured into parallel programming due to the steep learning curve and the unfamiliar programming environment entailed by such an effort. In an attempt to remedy that situation, the parallel library ..."
Abstract

Cited by 21 (12 self)
 Add to MetaCart
Many users of symbolic algebra systems have felt the need for greater CPU power. Yet few of them have ventured into parallel programming due to the steep learning curve and the unfamiliar programming environment entailed by such an effort. In an attempt to remedy that situation, the parallel library MPI has been integrated into both GCL (GNU Common LISP) and GAP [14] (a general purpose language for mathematical group theory). These implementations are examples that extend bindings of MPI to interactive languages. (MPI already has bindings to the compiled languages C and FORTRAN.) Further, this binding to an interactive language retains the interactive environment during execution. Further, STAR/MPI represents a blueprint for binding MPI to other interactive languages besides GCL and GAP, from which comes the name STAR/MPI, or /MPI. STAR/MPI includes a simple SPMD architecture on top of this MPI binding. An important class of sequential algorithms is described that can be parallelized with little effort using STAR/MPI architecture. Since GAP is representative of systems for discrete mathematics and LISP is the basis for several symbolic algebra systems with strengths in nondiscrete mathematics, it is hoped to gain broad feedback on the issues involved. Although vendorspecific, interactive, parallel languages exist, this appears to be the first attempt at defining a binding of a vendorindependent, portable, parallel library to arbitrary interactive languages.
Combinatorial Tools for Computational Group Theory
 Groups and Computation, DIMACS Ser. Discrete Math. Theoret. Comput. Sci
, 1993
"... Abstract. A variety of elementary combinatorial techniques for permutation groups are reviewed. It is shown how to apply these techniques to yield faster and/or more spaceefficient algorithms for problems including group membership, normal closure, center, base change and Cayley graphs. Emphasis is ..."
Abstract

Cited by 21 (5 self)
 Add to MetaCart
Abstract. A variety of elementary combinatorial techniques for permutation groups are reviewed. It is shown how to apply these techniques to yield faster and/or more spaceefficient algorithms for problems including group membership, normal closure, center, base change and Cayley graphs. Emphasis is placed on randomized techniques and new data structures. The paper includes both a survey of recent algorithms with which the authors have been associated, and some new algorithms in the same spirit that have not previously appeared in print. Many of the results include both complexity bounds and pseudocode, along with comments for faster software implementations.
New Methods for Using Cayley Graphs in Interconnection Networks
 DISCRETE APPLIED MATHEMATICS
, 1992
"... A number of researchers have proposed Cayley graphs and Schreier coset graphs as models for interconnection networks. New algorithms are presented for generating Cayley graphs in a more timeefficient manner than was previously possible. Alternatively, a second algorithm is provided for storing Cayl ..."
Abstract

Cited by 16 (5 self)
 Add to MetaCart
A number of researchers have proposed Cayley graphs and Schreier coset graphs as models for interconnection networks. New algorithms are presented for generating Cayley graphs in a more timeefficient manner than was previously possible. Alternatively, a second algorithm is provided for storing Cayley graphs in a spaceefficient manner (log 2 (3) bits per node), so that copies could be cheaply stored at each node of an interconnection network. The second algorithm is especially useful for providing a compact encoding of an optimal routing table (for example, a 13 kilobyte optimal table for 64,000 nodes). The algorithm relies on using a compact encoding of group elements known from computational group theory. Generalizations of all of the above are presented for Schreier coset graphs.
Efficient representation of perm groups
 Combinatorica
, 1991
"... Abstract: This note presents an elementary version of Sims’s algorithm for computing strong generators of a given perm group, together with a proof of correctness and some notes about appropriate lowlevel data structures. Upper and lower bounds on the running time are also obtained. (Following a su ..."
Abstract

Cited by 12 (1 self)
 Add to MetaCart
Abstract: This note presents an elementary version of Sims’s algorithm for computing strong generators of a given perm group, together with a proof of correctness and some notes about appropriate lowlevel data structures. Upper and lower bounds on the running time are also obtained. (Following a suggestion of Vaughan Pratt, we adopt the convention that perm = permutation, perhaps thereby saving millions of syllables in future research.) 1. A data structure for perm groups. A “perm, ” for the purposes of this paper, is a onetoone mapping of a set onto itself. If α and β are perms such that α takes i ↦ → j and β takes j ↦ → k, the product αβ takes i ↦ → k. We write α − for the inverse of the perm α; hence αβ = γ iff α = γβ −. Let Π(k) be the set of all perms of the positive integers that fix all points> k. Consider the following data structure: For 1 ≤ j ≤ k, either σkj = ∅ or σkj is a perm of Π(k) that takes k ↦ → j. Let Σ(k) be the set of all non ∅ perms σkj. We assume that σkk is the identity perm; hence Σ(k) is always nonempty. We write Γ(k) for the set of all perms that can be written as products of the form σ1... σk where each σi is in Σ(i). There is an easy way to test if a given perm π ∈ Π(k) is a member of Γ(k): Let π take k ↦ → j. Then if σkj = ∅ we have π � ∈ Γ(k); otherwise if k = 1 we have π ∈ Γ(k);
GAP/MPI: Facilitating Parallelism
 Proc. of DIMACS Workshop on Groups and Computation II 28, DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, 1997
"... The goal of this work is to overcome the learning barriers faced when first using parallelism. Currently, in order to parallelize a system such as GAP, one must embed a message passing library such as MPI, with many routines and many parameters. GAP/MPI provides a simple, taskoriented interface ..."
Abstract

Cited by 12 (9 self)
 Add to MetaCart
The goal of this work is to overcome the learning barriers faced when first using parallelism. Currently, in order to parallelize a system such as GAP, one must embed a message passing library such as MPI, with many routines and many parameters. GAP/MPI provides a simple, taskoriented interface sitting above the MPI library. The system presents the enduser with a single SPMD (single program, multiple data) environment in GAP: an existing, familiar interactive language. In GAP/MPI one describes the end application in terms of high level tasks, which are invoked by a single procedure call in GAP/MPI. This eliminates the complexities of a message passing library, such as encoding a message in a suitable data structure, message synchronization, communication topologies and deadlock avoidance.
Algorithms for Matrix Groups and the Tits Alternative
 Proc. 36th IEEE FOCS
, 1999
"... l over the generators grows as c l for some constant c>1 depending on G. For groups with abelian subgroups of finite index, we obtain a Las Vegas algorithm for several basic computational tasks, including membership testing and computing a presentation. This generalizes recent work of Beals an ..."
Abstract

Cited by 11 (2 self)
 Add to MetaCart
l over the generators grows as c l for some constant c>1 depending on G. For groups with abelian subgroups of finite index, we obtain a Las Vegas algorithm for several basic computational tasks, including membership testing and computing a presentation. This generalizes recent work of Beals and Babai, who give a Las Vegas algorithm for the case of finite groups, as well as recent work of Babai, Beals, Cai, Ivanyos, and Luks, who give a deterministic algorithm for the case of abelian groups. # 1999 Academic Press Article ID jcss.1998.1614, available online at http:##www.idealibrary.com on 260 00220000#99 #30.00 Copyright # 1999 by Academic Press All rights of reproduction in any form reserved. * Research conducted while visiting IAS and DIMACS and supported in part by an NSF Mathematical Sciences
Structural Symmetries and Model Checking
, 1998
"... We present a fully automatic framework for identifying symmetries in structural descriptions of digital circuits and CTL* formulas and using them in a model checker. We show how the set of subformulas of a formula can be partitioned into equivalence classes so that truth values for only one subfor ..."
Abstract

Cited by 10 (0 self)
 Add to MetaCart
We present a fully automatic framework for identifying symmetries in structural descriptions of digital circuits and CTL* formulas and using them in a model checker. We show how the set of subformulas of a formula can be partitioned into equivalence classes so that truth values for only one subformula in any class need be evaluated for model checking. We unify and extend the theories developed by Clarke et al [CEFJ96] and Emerson and Sistla [ES96] for symmetries in Kripke structures. We formalize the notion of structural symmetries in netlist descriptions of digital circuits and CTL* formulas. We show how they relate to symmetries in the corresponding Kripke structures. We also show how such symmetries can automatically be extracted by constructing a suitable directed labeled graph and computing its automorphism group. We present a novel fast algorithm for solving the graph automorphism problem for directed labeled graphs.
MOLGEN–CID, A Canonizer for Molecules and Graphs Accessible through the Internet
 J. Chem. Inf. Comput. Sci
, 2004
"... The MOLGEN Chemical Identifier MOLGENCID is a software module freely accessible via the Internet. For a molecule or graph entered in molfile format it produces, by a canonical renumbering procedure, a canonical molfile and a unique character string that is easily compared by computer to a similar s ..."
Abstract

Cited by 8 (7 self)
 Add to MetaCart
The MOLGEN Chemical Identifier MOLGENCID is a software module freely accessible via the Internet. For a molecule or graph entered in molfile format it produces, by a canonical renumbering procedure, a canonical molfile and a unique character string that is easily compared by computer to a similar string. The mode of operation of MOLGENCID is detailed and visualized with examples.