Exploiting non-constant safe memory in resilient algorithms and data structures

Lorenzo De Stefani, Francesco Silvestri

Research output: Journal Article or Conference Article in JournalJournal articleResearchpeer-review

Abstract

We extend the Faulty RAM model by Finocchi and Italiano (2008) by adding a safe memory of arbitrary size $S$, and we then derive tradeoffs between the performance of resilient algorithmic techniques and the size of the safe memory. Let $\delta$ and $\alpha$ denote, respectively, the maximum amount of faults which can happen during the execution of an algorithm and the actual number of occurred faults, with $\alpha \leq \delta$. We propose a resilient algorithm for sorting $n$ entries which requires $O\left(n\log n+\alpha (\delta/S + \log S)\right)$ time and uses $\Theta(S)$ safe memory words. Our algorithm outperforms previous resilient sorting algorithms which do not exploit the available safe memory and require $O\left(n\log n+ \alpha\delta\right)$ time. Finally, we exploit our sorting algorithm for deriving a resilient priority queue. Our implementation uses $\Theta(S)$ safe memory words and $\Theta(n)$ faulty memory words for storing $n$ keys, and requires $O\left(\log n + \delta/S\right)$ amortized time for each insert and deletemin operation. Our resilient priority queue improves the $O\left(\log n + \delta\right)$ amortized time required by the state of the art.
Original languageEnglish
JournalTheoretical Computer Science
Volume583
Pages (from-to)86-97
ISSN0304-3975
DOIs
Publication statusPublished - 7 Jun 2015
Externally publishedYes

Keywords

  • Resilient algorithm
  • Resilient data structure
  • Memory errors
  • Sorting
  • Priority queue
  • Tradeoffs
  • Fault tolerance

Fingerprint

Dive into the research topics of 'Exploiting non-constant safe memory in resilient algorithms and data structures'. Together they form a unique fingerprint.

Cite this