2017
DOI: 10.14778/3151113.3151122
|View full text |Cite
|
Sign up to set email alerts
|

Accelerating dynamic graph analytics on GPUs

Abstract: As graph analytics often involves compute-intensive operations, GPUs have been extensively used to accelerate the processing. However, in many applications such as social networks, cyber security, and fraud detection, their representative graphs evolve frequently and one has to perform a rebuild of the graph structure on GPUs to incorporate the updates. Hence, rebuilding the graphs becomes the bottleneck of processing high-speed graph streams. In this paper, we propose a GPU-based dynamic graph storage scheme … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 70 publications
(31 citation statements)
references
References 54 publications
(85 reference statements)
0
26
0
1
Order By: Relevance
“…The ST are those determined in Section III. The UT are derived with ρ 1 = 0.08, ρ h = 0.3, τ h = 0.75 and τ 1 = 1, mimicking the configuration of previous work [10], [14], [30]. These are also the density thresholds employed in the rest of the experiments.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The ST are those determined in Section III. The UT are derived with ρ 1 = 0.08, ρ h = 0.3, τ h = 0.75 and τ 1 = 1, mimicking the configuration of previous work [10], [14], [30]. These are also the density thresholds employed in the rest of the experiments.…”
Section: Discussionmentioning
confidence: 99%
“…For consistency [10], this approach imposes a further constraint: 2 · ρ h ≤ τ h . For this strategy, common thresholds in existing applications [10], [14], [30] are ρ 1 ∼ 0.1, ρ h ∼ 0.3, τ h ∼ 0.75 and τ 1 ≥ 0.9. In the second approach, the capacity of the array is set to 2·N τ h +ρ h on resize.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, for each checkpoint x i , H(x i ) processes v t and updates the candidates independently according to Lines 6-13 of Algorithm 1. After updating the candidates of H(x i ) for v t , it performs the buffer maintenance procedure as follows (Lines [25][26][27][28][29][30][31].…”
Section: The Knapwindowplus Algorithmmentioning
confidence: 99%
“…In many cases, data is generated rapidly and only available as a stream [11,18,19,30,39]. To address the requirement for summarizing such datasets in real-time, RSS over data streams [2,10,29,32] has been extensively studied in recent years.…”
Section: Introductionmentioning
confidence: 99%