2016
DOI: 10.1137/15m1019222
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Multistage Algorithm for Adjoint Computation

Abstract: International audienceWe reexamine the work of Stumm and Walther on multistage algorithms for adjoint computation. We provide an optimal algorithm for this problem when there are two levels of checkpoints , in memory and on disk. Previously, optimal algorithms for adjoint computations were known only for a single level of checkpoints with no writing and reading costs; a well-known example is the binomial checkpointing algorithm of Griewank and Walther. Stumm and Walther extended that binomial checkpointing alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(31 citation statements)
references
References 8 publications
0
31
0
Order By: Relevance
“…2.4.2 = 2, w 1 = r 1 = 0, c 2 = ∞; Disk-Revolve. This variant of the problem has received increasingly attention in the recent years with the introduction of a second level of storage of infinite capacity but with access (write and read) costs [Aupy and Herrmann 2017;Aupy et al 2016;Schanen et al 2016;Stumm and Walther 2009]. Indeed, with the increase in the sizes of the problem, the memory was not sufficient anymore to solve the problems in a reasonnable time.…”
Section: ∈ Mmentioning
confidence: 99%
See 2 more Smart Citations
“…2.4.2 = 2, w 1 = r 1 = 0, c 2 = ∞; Disk-Revolve. This variant of the problem has received increasingly attention in the recent years with the introduction of a second level of storage of infinite capacity but with access (write and read) costs [Aupy and Herrmann 2017;Aupy et al 2016;Schanen et al 2016;Stumm and Walther 2009]. Indeed, with the increase in the sizes of the problem, the memory was not sufficient anymore to solve the problems in a reasonnable time.…”
Section: ∈ Mmentioning
confidence: 99%
“…This model can be used to represent an architecture with a two-level storage system where the processor can write in a close cheap-to-access memory and can access a far storage, such as a disk, if needed. The problem consisting of minimizing the makespan of the Adjoint Computation problem on such an architecture was defined as DiskProb ∞ ( , c 1 , w 2 , r 2 ) in our previous work [Aupy et al 2016].…”
Section: ∈ Mmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the access time to read or write a checkpoint is not negligible in contrast to the assumption frequently made for the development of checkpointing approaches. There are a few contributions that extend the available checkpointing techniques to a hierarchical checkpointing (Aupy, Herrmann, Hovland, & Robert, 2016;Schanen, Marin, Anitescu, & Z, 2016;Stumm & Walther, 2009).…”
Section: Checkpointingmentioning
confidence: 99%
“…Then, the access time to read or write a checkpoint is not negligible, in contrast to the assumption frequently made for the development of checkpointing approaches. A few researchers have extended checkpointing techniques to a hierarchical checkpointing; see, e.g., [3,6,7]. To derive a checkpointing technique that incorporates resilience, we ignore this hierarchical nature and assume throughout that the writing or reading process for a checkpoint is performed asynchronously not interfering with the adjoint computation.…”
Section: Introductionmentioning
confidence: 99%