Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Faith Ellen is active.

Publication


Featured researches published by Faith Ellen.


principles of distributed computing | 2010

Non-blocking binary search trees

Faith Ellen; Panagiota Fatourou; Eric Ruppert; Franck van Breugel

This paper describes the first complete implementation of a non-blocking binary search tree in an asynchronous shared-memory system using single-word compare-and-swap operations. The implementation is linearizable and tolerates any number of crash failures. Insert and Delete operations that modify different parts of the tree do not interfere with one another, so they can run completely concurrently. Find operations only perform reads of shared memory.


principles of distributed computing | 2007

SNZI: scalable NonZero indicators

Faith Ellen; Yossi Lev; Victor Luchangco; Mark Moir

We introduce the SNZI shared object, which is related to traditional shared counters, but has weaker semantics. We also introduce a resettable version of SNZI called SNZI-R. We present implementations that are scalable, linearizable, nonblocking, and fast in the absence of contention, properties that are difficult or impossible to achieve simultaneously with the stronger semantics of traditional counters. Our primary motivation in introducing SNZI and SNZI-R is to use them to improve the performance and scalability of software and hybrid transactional memory systems. We present performance experiments showing that our implementations have excellent performance characteristics for this purpose.


acm sigplan symposium on principles and practice of parallel programming | 2014

A general technique for non-blocking trees

Trevor Brown; Faith Ellen; Eric Ruppert

We describe a general technique for obtaining provably correct, non-blocking implementations of a large class of tree data structures where pointers are directed from parents to children. Updates are permitted to modify any contiguous portion of the tree atomically. Our non-blocking algorithms make use of the LLX, SCX and VLX primitives, which are multi-word generalizations of the standard LL, SC and VL primitives and have been implemented from single-word CAS. To illustrate our technique, we describe how it can be used in a fairly straightforward way to obtain a non-blocking implementation of a chromatic tree, which is a relaxed variant of a red-black tree. The height of the tree at any time is O(c + log n), where n is the number of keys and c is the number of updates in progress. We provide an experimental performance analysis which demonstrates that our Java implementation of a chromatic tree rivals, and often significantly outperforms, other leading concurrent dictionaries.


foundations of computer science | 2013

A Tight Bound for Set Disjointness in the Message-Passing Model

Mark Braverman; Faith Ellen; Rotem Oshman; Toniann Pitassi; Vinod Vaikuntanathan

In a multiparty message-passing model of communication, there are k players. Each player has a private input, and they communicate by sending messages to one another over private channels. While this model has been used extensively in distributed computing and in secure multiparty computation, lower bounds on communication complexity in this model and related models have been somewhat scarce. In recent work [25], [29], [30], strong lower bounds of the form Ω(n·k) were obtained for several functions in the message-passing model; however, a lower bound on the classical set disjointness problem remained elusive. In this paper, we prove a tight lower bound of Ω(n · k) for the set disjointness problem in the message passing model. Our bound is obtained by developing information complexity tools for the message-passing model and proving an information complexity lower bound for set disjointness.


acm symposium on parallel algorithms and architectures | 2010

A universal construction for wait-free transaction friendly data structures

Phong Chuong; Faith Ellen

Given the sequential implementation of any data structure, we show how to obtain an efficient, wait-free implementation of that data structure shared by any fixed number of processes using only shared registers and CAS objects. Our universal construction is transaction friendly, allowing a process to gracefully exit from an operation that it wanted to perform, and it is cache-efficient in a multicore setting where the processes run on cores that share a single cache. We also present an optimized shared queue based on this method.


Distributed Computing | 2011

Fully-adaptive algorithms for long-lived renaming

Alex Brodsky; Faith Ellen; Philipp Woelfel

Long-lived renaming allows processes to repeatedly get distinct names from a small name space and release these names. This paper presents two long-lived renaming algorithms in which the name a process gets is bounded above by the number of processes currently occupying a name or performing one of these operations. The first algorithm is asynchronous, uses LL/SC objects, and has step complexity that is linear in the number of processes, c, currently getting or releasing a name. The second is synchronous, uses registers and counters, and has step complexity that is polylogarithmic in c. Both tolerate any number of process crashes.


Theory of Computing Systems \/ Mathematical Systems Theory | 2014

Tight Bounds for Adopt-Commit Objects

James Aspnes; Faith Ellen

We give matching upper and lower bounds of


principles of distributed computing | 2014

The amortized complexity of non-blocking binary search trees

Faith Ellen; Panagiota Fatourou; Joanna Helga; Eric Ruppert

\varTheta(\min(\frac{\log m}{\log \log m},\, n))


principles of distributed computing | 2013

Pragmatic primitives for non-blocking data structures

Trevor Brown; Faith Ellen; Eric Ruppert

for the individual step complexity of a wait-free m-valued adopt-commit object implemented using multi-writer registers for n anonymous processes. While the upper bound is deterministic, the lower bound holds for randomized adopt-commit objects as well. Our results are based on showing that adopt-commit objects are equivalent, up to small additive constants, to a simpler class of objects that we call conflict detectors.Our anonymous lower bound also applies to the individual step complexity of m-valued wait-free anonymous consensus, even for randomized algorithms with global coins against an oblivious adversary. The upper bound can be used to slightly improve the cost of randomized consensus against an oblivious adversary.For deterministic non-anonymous implementations of adopt-commit objects, we show a lower bound of


Distributed Computing | 2016

Universal constructions that ensure disjoint-access parallelism and wait-freedom

Faith Ellen; Panagiota Fatourou; Eleftherios Kosmas; Alessia Milani; Corentin Travers

\varOmega(\min(\frac{\log m}{\log \log m}, \frac{\sqrt{\log n}}{\log \log n}))

Collaboration


Dive into the Faith Ellen's collaboration.

Top Co-Authors

Avatar

Hagit Attiya

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joan Boyar

University of Southern Denmark

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Leqi Zhu

University of Toronto

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge