MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture 2021
DOI: 10.1145/3466752.3480133
|View full text |Cite
|
Sign up to set email alerts
|

SISA: Set-Centric Instruction Set Architecture for Graph Mining on Processing-in-Memory Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

4
4

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 135 publications
0
12
0
Order By: Relevance
“…However, one has to additionally compute graph clustering as a form of preprocessing. This can be parallelized with one of many established parallel clustering routines [29], [30], [36], [122].…”
Section: Appropriate Selection Of Target Verticesmentioning
confidence: 99%
See 2 more Smart Citations
“…However, one has to additionally compute graph clustering as a form of preprocessing. This can be parallelized with one of many established parallel clustering routines [29], [30], [36], [122].…”
Section: Appropriate Selection Of Target Verticesmentioning
confidence: 99%
“…Moreover, Field Programmable Gate Arrays (FPGAs) are well suited for problems that easily form pipelines. Finally, novel proposals include processing-in-memory (PIM) [29], [163] that brings computation closer to data.…”
Section: Single-machine Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…There are two main approaches to PIM [4]: (1) processingnear-memory (PnM) [2,, where PIM logic is added to the same die as memory or to the logic layer of 3Dstacked memory [78][79][80]; and (2) processing-using-memory (PuM) [44,, which uses the operational principles of memory cells to perform computation (for example, by exploiting DRAM's analog operation to perform bulk bitwise AND, OR, and NOT logic operations [83,84,87,96,97,99]).…”
Section: Motivation and Problemmentioning
confidence: 99%
“…These systems range from social networks [1], to biological networks [2], to the full Internet [3]. Data mining, information retrieval, recommendation systems, and fraud detection are just a few applications of graph analysis [4]- [8].…”
Section: Introductionmentioning
confidence: 99%