Collision-free spatial hash functions for structural analysis of billion-vertex chemical bond networks

نویسندگان

  • Cheng Zhang
  • Bhupesh Bansal
  • Paulo S. Branicio
  • Rajiv K. Kalia
  • Aiichiro Nakano
  • Ashish Sharma
  • Priya Vashishta
چکیده

State-of-the-art molecular dynamics (MD) simulations generate massive datasets involving billion-vertex chemical bond networks, which makes data mining based on graph algorithms such as K-ring analysis a challenge. This paper proposes an algorithm to improve the efficiency of ring analysis of large graphs, exploiting properties of K-rings and spatial correlations of vertices in the graph. The algorithm uses dual-tree expansion (DTE) and spatial hash-function tagging (SHAFT) to optimize computation and memory access. Numerical tests show nearly perfect linear scaling of the algorithm. Also a parallel implementation of the DTE + SHAFT algorithm achieves high scalability. The algorithm has been successfully employed to analyze large MD simulations involving up to 500 million atoms. © 2006 Elsevier B.V. All rights reserved. PACS: 07.05.Kf; 07.05.Tp; 61.43.Bn; 61.72.Ff; 82.20.Wt; 89.20.Ff

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Does Secure Time-Stamping Imply Collision-Free Hash Functions?

We prove that there are no black-box reductions from Collision-Free Hash Functions to secure time-stamping schemes, which means that in principle secure time-stamping schemes may exist even if there exist no collision-resistant hash functions. We show that there is an oracle relative to which there exist secure time-stamping schemes but no hash function is collision-free. The oracle we use is n...

متن کامل

Security of Iterated Hash Functions Based on Block Ciphers

Cryptographic hash functions obtained by iterating a round function constructed from a block cipher and for which the hash-code length is twice the block length m of the underlying block cipher are considered. The computational security of such hash functions against two particular attacks, namely, the free-start target and free-start collision attacks, is investigated; these two attacks differ...

متن کامل

On Building Hash Functions from Multivariate Quadratic Equations

Recent advances in hash functions cryptanalysis provide a strong impetus to explore new designs. This paper describes a new hash function mq-hash that depends for its security on the difficulty of solving randomly drawn systems of multivariate equations over a finite field. While provably achieving pre-image resistance for a hash function based on multivariate equations is relatively easy, näıv...

متن کامل

Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?

It has been known for quite some time that collision-resistance of hash functions does not seem to give any actual security guarantees for unbounded hash-tree time-stamping, where the size of the hash-tree created by the timestamping service is not explicitly restricted. We focus on the possibility of showing that there exist no black-box reductions of unbounded time-stamping schemes to collisi...

متن کامل

Two infinite classes of cryptographic hash functions

We offer two new definitions of two infinite classes of strongly collision free hash functions that we gave a name “Edon”–C and “Edon”– R. Beside the fact that “Edon” are infinite classes of hash functions, “Edon” hash functions have other “good” properties such as possibility to have variable length of output, and also their strongly collision free property can be mathematically and experiment...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Physics Communications

دوره 175  شماره 

صفحات  -

تاریخ انتشار 2006