[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1468075.1468121acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafipsConference Proceedingsconference-collections
research-article
Free access

Sorting networks and their applications

Published: 30 April 1968 Publication History

Abstract

To achieve high throughput rates today's computers perform several operations simultaneously. Not only are I/O operations performed concurrently with computing, but also, in multiprocessors, several computing operations are done concurrently. A major problem in the design of such a computing system is the connecting together of the various parts of the system (the I/O devices, memories, processing units, etc.) in such a way that all the required data transfers can be accommodated. One common scheme is a high-speed bus which is time-shared by the various parts; speed of available hardware limits this scheme. Another scheme is a cross-bar switch or matrix; limiting factors here are the amount of hardware (an m × n matrix requires m × n cross-points) and the fan-in and fan-out of the hardware.

References

[1]
K E Batcher A new internal sorting method Goodyear Aerospace Report GER-11759 1964
[2]
K E Batcher Bitonic sorting Goodyear Aerospace Report GER-11869 1964
[3]
L J Goldstein S W Leibholz On the synthesis of signal switching networks with transient blocking IEEE Transactions EC-16 5 637--641 1967

Cited By

View all
  • (2024)Matching radar signals and fingerprints with MPCIACR Communications in Cryptology10.62056/aywa0l5vtOnline publication date: 7-Oct-2024
  • (2024)Efficient isochronous fixed-weight sampling with applications to NTRUIACR Communications in Cryptology10.62056/a6n59qgxqOnline publication date: 8-Jul-2024
  • (2024)Active ranking and matchmaking, with perfect matchingsProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3692610(13460-13480)Online publication date: 21-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AFIPS '68 (Spring): Proceedings of the April 30--May 2, 1968, spring joint computer conference
April 1968
550 pages
ISBN:9781450378970
DOI:10.1145/1468075
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • AFIPS: American Federation of Information Processing Societies

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 April 1968

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

AFIPS '68 (Spring)
Sponsor:
  • AFIPS
April 30 - May 2, 1968
New Jersey, Atlantic City

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)588
  • Downloads (Last 6 weeks)65
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Matching radar signals and fingerprints with MPCIACR Communications in Cryptology10.62056/aywa0l5vtOnline publication date: 7-Oct-2024
  • (2024)Efficient isochronous fixed-weight sampling with applications to NTRUIACR Communications in Cryptology10.62056/a6n59qgxqOnline publication date: 8-Jul-2024
  • (2024)Active ranking and matchmaking, with perfect matchingsProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3692610(13460-13480)Online publication date: 21-Jul-2024
  • (2024)Technological Prerequisites and Consequences of Ubiquitous Computing and Networking in Resurrecting Extinct ComputersJournal of Computer Networks and Virtualization10.48001/jocnv.2024.2115-202:1(15-20)Online publication date: 10-Apr-2024
  • (2024)Quelques pistes pour l'étude des situations d'informatique débranchéeepiDEMES10.46298/epidemes-11147Numéro spécial DEMIMES...Online publication date: 29-Nov-2024
  • (2024)SecretFlow-SCQL: A Secure Collaborative Query PlatformProceedings of the VLDB Endowment10.14778/3685800.368582117:12(3987-4000)Online publication date: 8-Nov-2024
  • (2024)Enhancing K-nearest neighbor algorithm: a comprehensive review and performance analysis of modificationsJournal of Big Data10.1186/s40537-024-00973-y11:1Online publication date: 11-Aug-2024
  • (2024)Sound and Partially-Complete Static Analysis of Data-Races in GPU ProgramsProceedings of the ACM on Programming Languages10.1145/36897978:OOPSLA2(2434-2461)Online publication date: 8-Oct-2024
  • (2024)Secure Sorting and Selection via Function Secret SharingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690359(3023-3037)Online publication date: 2-Dec-2024
  • (2024)PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output DeliveryProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670343(3272-3286)Online publication date: 2-Dec-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media