2020 IEEE International Conference on Data Mining (ICDM) 2020
DOI: 10.1109/icdm50108.2020.00053
|View full text |Cite
|
Sign up to set email alerts
|

Force2Vec: Parallel Force-Directed Graph Embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 21 publications
0
12
0
Order By: Relevance
“…If we aim to implement SDDMM and SpMM separately, we could use either 1D (i.e., vertex partitioning) or 2D (edge partitioning) partitioning of the adjacency matrix A. However, when we fuse SDDMM and SpMM in FusedMM, 2D partitioning of A may be very inefficient or even outright [4] and VERSE [3] with sigmoid) Fig. 1 {A 1 , ...,…”
Section: The Parallel Fusedmm Algorithmmentioning
confidence: 99%
See 3 more Smart Citations
“…If we aim to implement SDDMM and SpMM separately, we could use either 1D (i.e., vertex partitioning) or 2D (edge partitioning) partitioning of the adjacency matrix A. However, when we fuse SDDMM and SpMM in FusedMM, 2D partitioning of A may be very inefficient or even outright [4] and VERSE [3] with sigmoid) Fig. 1 {A 1 , ...,…”
Section: The Parallel Fusedmm Algorithmmentioning
confidence: 99%
“…If we recognize a pattern from predefined VOP, ROP, SOP, MOP, and AOP operations, we can optimize the whole kernel by feeding the output of one operation directly to the next operation without storing the results. For example, the second row in Table III uses the (MUL, RSUM, SIGMOID, MUL, ASUM) sequence of operations, which is a common pattern used by various node embedding algorithms such as VERSE [3] and Force2Vec [4]. Hence, we develop optimized FusedMM kernels for patterns denoted by the first three rows in Table III.…”
Section: Optimizations and Code Generationmentioning
confidence: 99%
See 2 more Smart Citations
“…Several unsupervised methods have been proposed in the literature to solve this problem sub-optimally [5,11]. Graph layout generation methods can also be used to generate embedding [12,13]. Some of them generate good quality embedding but have high runtime and memory costs while some of them consume less runtime and memory costs but generate moderate-quality embedding.…”
mentioning
confidence: 99%