Dense or sparse: Elastic spmm implementation for optimal big-data processing

U Choi, K Lee - IEEE Transactions on Big Data, 2022 - ieeexplore.ieee.org
Many real-world graph datasets can be represented using a sparse matrix format, and they
are widely used for various big-data applications. The multiplication of two sparse matrices …

DyLaClass: Dynamic Labeling Based Classification for Optimal Sparse Matrix Format Selection in Accelerating SpMV

Z Shi, Y Zou, X Song, S Li, F Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Sparse matrix-vector multiplication (SpMV) is crucial in many scientific and engineering
applications, particularly concerning the effectiveness of different sparse matrix storage …

An asymptotic cost model for autoscheduling sparse tensor programs

W Ahrens, F Kjolstad, S Amarasinghe - arXiv preprint arXiv:2111.14947, 2021 - arxiv.org
While loop reordering and fusion can make big impacts on the constant-factor performance
of dense tensor programs, the effects on sparse tensor programs are asymptotic, often …

Explore as a Storm, Exploit as a Raindrop: On the Benefit of Fine-Tuning Kernel Schedulers with Coordinate Descent

M Canesche, G Verma, FMQ Pereira - arXiv preprint arXiv:2406.20037, 2024 - arxiv.org
Machine-learning models consist of kernels, which are algorithms applying operations on
tensors--data indexed by a linear combination of natural numbers. Examples of kernels …

Performance Prediction for Sparse Matrix Vector Multiplication Using Structure-Dependent Features

K Pogorelov, J Trotter, J Langguth - European Conference on Parallel …, 2023 - Springer
Sparse matrix-vector multiplication (SpMV) is one of the most important kernels in high-
performance computing, with numerous applications in scientific computing, machine …

Identity Theft Prediction Model using Historical Data and Supervised Machine Learning: Design Science Research Study

C Mitchell - 2023 - search.proquest.com
With the growth of online banking, there has been a rise in identity theft and other
cybercrimes. What is missing in the current published literature is how historical identity theft …