Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures 2021
DOI: 10.1145/3409964.3461796
|View full text |Cite
|
Sign up to set email alerts
|

Pebbles, Graphs, and a Pinch of Combinatorics

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…The data locality accounts for these algorithmic limitations and is defined as the ratio of the I/O lower bound Q of the algorithm and the measured transferred bytes from main memory D, in short, 𝑄 𝐷 . Q is estimated automatically by SOAP-Analysis [39], which is based on the concept of the Red-Blue Pebble Game [36].…”
Section: Performance Similaritymentioning
confidence: 99%
“…The data locality accounts for these algorithmic limitations and is defined as the ratio of the I/O lower bound Q of the algorithm and the measured transferred bytes from main memory D, in short, 𝑄 𝐷 . Q is estimated automatically by SOAP-Analysis [39], which is based on the concept of the Red-Blue Pebble Game [36].…”
Section: Performance Similaritymentioning
confidence: 99%
“…The pros include using less memory and power and also they are the less iteration to converge to the consensus solution and easiness to configure the complete mathematical model as per the requirement [12]. ) communicated elements per processor -only 1/3× over our established lower bound, which would be considered as a massive speedup [13]. Through another one, the authors show, that the D-Wave 2X can be effectively used as part of an unsupervised machine learning method.…”
Section: -Related Workmentioning
confidence: 99%
“…Global Formulations for HOGNNs. There have been efforts into building global formulations for GNNs [23], [39], [46], [235] and general graph computing [42], [45], [64]- [68], [107], [145], [146], [153], [220], [259]. This facilitates applying mechanisms such as communication avoidance or vectorization [154], [155], [221], [222].…”
Section: 𝑂(|𝐸|)mentioning
confidence: 99%