Efficient pebbling for list traversal synopses with application to program rollback

Yossi Matias, Ely Porat

Research output: Contribution to journalArticlepeer-review

Abstract

We show how to support efficient back traversal in a unidirectional list, using small memory and with essentially no slowdown in forward steps. Using O (lg n) memory for a list of size n, the i'th back-step from the farthest point reached so far takes O (lg i) time in the worst case, while the overhead per forward step is at most ε{lunate} for arbitrary small constant ε{lunate} > 0. An arbitrary sequence of forward and back steps is allowed. A full trade-off between memory usage and time per back-step is presented: k vs. k n1 / k and vice versa. Our algorithms are based on a novel pebbling technique which moves pebbles on a virtual binary, or n1 / k-ary, tree that can only be traversed in a pre-order fashion. The compact data structures used by the pebbling algorithms, called list traversal synopses, extend to general directed graphs, and have other interesting applications, including memory efficient hash-chain implementation. Perhaps the most surprising application is in showing that for any program, arbitrary rollback steps can be efficiently supported with small overhead in memory, and marginal overhead in its ordinary execution. More concretely: let P be a program that runs for at most T steps, using memory of size M. Then, at the cost of recording the input used by the program, and increasing the memory by a factor of O (lg T) to O (M lg T), the program P can be extended to support an arbitrary sequence of forward execution and rollback steps: the i'th rollback step takes O (lg i) time in the worst case, while forward steps take O (1) time in the worst case, and 1 + ε{lunate} amortized time per step.

Original languageEnglish
Pages (from-to)418-436
Number of pages19
JournalTheoretical Computer Science
Volume379
Issue number3
DOIs
StatePublished - 15 Jun 2007

Fingerprint

Dive into the research topics of 'Efficient pebbling for list traversal synopses with application to program rollback'. Together they form a unique fingerprint.

Cite this