Abstract
Substituting disk for RAM, disk-based computation is a way to increase working memory and achieve results that are not otherwise economical.
- Kunkle, D. and Cooperman, G. Twenty-six moves suffice for Rubik's Cube. In Proceedings of the 2007 International Symposium on Symbolic and Algebraic Computation (Waterloo, Ontario, Canada, July 29--Aug. 1). ACM Press, New York, 2007, 235--242. Google ScholarDigital Library
- Robinson, R., Kunkle, D., and Cooperman, G. A comparative analysis of parallel disk-based methods for enumerating implicit graphs. In Proceedings of the 2007 International Workshop on Parallel Symbolic Computation (London, Ontario, Canada, July 27--28). ACM Press, New York, 2007, 78--87. Google ScholarDigital Library
- Vitter, J. External memory algorithms and data structures: Dealing with massive data. ACM Computing Surveys 33, 2 (June 2001), 209--271. Google ScholarDigital Library
Index Terms
- Solving Rubik's Cube: disk is the new RAM
Recommendations
Twenty-six moves suffice for Rubik's cube
ISSAC '07: Proceedings of the 2007 international symposium on Symbolic and algebraic computationThe number of moves required to solve any state of Rubik's cube has been a matter of long-standing conjecture for over 25 years -- since Rubik's cube appeared. This number is sometimes called "God's number". An upper bound of 29 (in the face-turn metric)...
From Chaos to Order: A Group Theory Approach to the Rubik's Cube
ICACS '23: Proceedings of the 7th International Conference on Algorithms, Computing and SystemsRubik's cube is a classic puzzle toy, and restoring it is not an easy task, especially without memorizing formulas. In fact, the restoration of the Rubik's Cube is closely related to group theory. If we consider the cubes or facelets at each position of ...
Memory Coalescing for Hybrid Memory Cube
ICPP '18: Proceedings of the 47th International Conference on Parallel ProcessingArguably, many data-intensive applications pose significant challenges to conventional architectures and memory systems, especially when applications exhibit non-contiguous, irregular, and small memory access patterns. The long memory access latency can ...
Comments