2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849236
|View full text |Cite
|
Sign up to set email alerts
|

Irregular Product Coded Computation for High-Dimensional Matrix Multiplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…In the linear regime, the one-dimensional decoding of the MDS-coded schemes is sufficient to recover the missing entries of the computation results. By allowing each row and column of the MDS constituent codes to have different code rates [92], the average computation time can be further reduced, contributing to a decrease in the overall job execution time. Product codes can also be used to solve higher-dimensional linear operations such as tensor operations by exploiting the tensor-structured encoding matrix [93].…”
Section: B Cdc To Mitigate the Straggler Effectsmentioning
confidence: 99%
“…In the linear regime, the one-dimensional decoding of the MDS-coded schemes is sufficient to recover the missing entries of the computation results. By allowing each row and column of the MDS constituent codes to have different code rates [92], the average computation time can be further reduced, contributing to a decrease in the overall job execution time. Product codes can also be used to solve higher-dimensional linear operations such as tensor operations by exploiting the tensor-structured encoding matrix [93].…”
Section: B Cdc To Mitigate the Straggler Effectsmentioning
confidence: 99%
“…A wealth of straggler avoidance techniques have been proposed in recent years for DGD as well as other distributed computation tasks [ 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 ]. The common design notion behind all these schemes is the assignment of redundant computations/tasks to workers, such that faster workers can compensate for the stragglers.…”
Section: Introductionmentioning
confidence: 99%
“…We start the second phase of the proposed worker placement algorithm to place w 12 into a cluster that has a worker which can be assigned to the first cluster. We see from (18) that w 12 can be assigned to clusters 3 or 4. None of the workers which has been assigned to cluster 3 in Phase I can be assigned to the first cluster.…”
mentioning
confidence: 96%