2015 9th International Conference on Application of Information and Communication Technologies (AICT) 2015
DOI: 10.1109/icaict.2015.7338591
|View full text |Cite
|
Sign up to set email alerts
|

Accelerating Medoids-based clustering with the Intel Many Integrated Core architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Loop-optimizations unrolling, 9,17,23,24,29,50,84,90 collapsing, 4,6,7,13,20,21,44,54 splitting 22,28 Blocking (tiling) in cache, 14,15,18,[20][21][22]27,39,44,52,54,69 registers 68,69 Compile-time optimizations using pre-computed values, 35,52 specifying array and loop bounds at compile time 6,54 Compute-related optimizations Reusing intermediate variables, 22,35 using conflict-detection instruction of AVX-512, 52,85 performing redundant computation to avoid data-communication or atomic operations 52,82 Array transpose 6, 79…”
Section: Ta B L E 3 Optimization Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Loop-optimizations unrolling, 9,17,23,24,29,50,84,90 collapsing, 4,6,7,13,20,21,44,54 splitting 22,28 Blocking (tiling) in cache, 14,15,18,[20][21][22]27,39,44,52,54,69 registers 68,69 Compile-time optimizations using pre-computed values, 35,52 specifying array and loop bounds at compile time 6,54 Compute-related optimizations Reusing intermediate variables, 22,35 using conflict-detection instruction of AVX-512, 52,85 performing redundant computation to avoid data-communication or atomic operations 52,82 Array transpose 6, 79…”
Section: Ta B L E 3 Optimization Strategiesmentioning
confidence: 99%
“…,[12][13][14][16][17][18]20,21,24,[27][28][29][30][33][34][35][36][37]39,[42][43][44][45][46][47][48]50,52,55,57,59,63,66,84,86,90,92,93,95,99 IntelMKL 2,17,19,31,32,40,93,99 …”
mentioning
confidence: 99%
“…Such a point exists and is unique because the polytope M is a bounded, closed and convex set. Combining the dist definition, equation (18), the triangle inequality for the norm and equations (29) and (14), we get…”
Section: Lemma 1 Under the Conditions Of Theorem 1 We Havementioning
confidence: 99%
“…The first set must satisfy the non-formalized constraints, while the second must not. To obtain representative patterns, methods of data mining [14] and time series analysis can be used [15]. To overcome the problem of non-stationary input data, the authors proposed in [16,17] the pursuit algorithm for solving non-stationary LP problems on cluster computing systems.…”
Section: Introductionmentioning
confidence: 99%
“…Clustering is one of the basic techniques in the data mining domain aimed at organizing a set of data objects into their natural subsets (called clusters), when labels for the data are unavailable. An ideal cluster is an isolated set of data points which are similar to one another, but dissimilar to the points in other clusters [8,9]. Similarity is commonly defined in terms of how close the objects are and is based on a specified distance metric [8].…”
Section: Introductionmentioning
confidence: 99%