Skip to main content

Showing 1–8 of 8 results for author: Schardl, T B

.
  1. arXiv:2305.03152  [pdf, other

    cs.LG cs.DC cs.PF

    Communication-Efficient Graph Neural Networks with Probabilistic Neighborhood Expansion Analysis and Caching

    Authors: Tim Kaler, Alexandros-Stavros Iliopoulos, Philip Murzynowski, Tao B. Schardl, Charles E. Leiserson, Jie Chen

    Abstract: Training and inference with graph neural networks (GNNs) on massive graphs has been actively studied since the inception of GNNs, owing to the widespread use and success of GNNs in applications such as recommendation systems and financial forensics. This paper is concerned with minibatch training and inference with GNNs that employ node-wise sampling in distributed settings, where the necessary pa… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: MLSys 2023. Code is available at https://github.com/MITIBMxGraph/SALIENT_plusplus

  2. arXiv:2110.08450  [pdf, other

    cs.LG cs.AI cs.PF

    Accelerating Training and Inference of Graph Neural Networks with Fast Sampling and Pipelining

    Authors: Tim Kaler, Nickolas Stathas, Anne Ouyang, Alexandros-Stavros Iliopoulos, Tao B. Schardl, Charles E. Leiserson, Jie Chen

    Abstract: Improving the training and inference performance of graph neural networks (GNNs) is faced with a challenge uncommon in general neural networks: creating mini-batches requires a lot of computation and data movement due to the exponential growth of multi-hop graph neighborhoods along network layers. Such a unique challenge gives rise to a diverse set of system design choices. We argue in favor of pe… ▽ More

    Submitted 16 March, 2022; v1 submitted 15 October, 2021; originally announced October 2021.

    Comments: MLSys 2022. Code is available at https://github.com/MITIBMxGraph/SALIENT

  3. arXiv:1910.12340  [pdf, other

    cs.DS cs.DC

    Cilkmem: Algorithms for Analyzing the Memory High-Water Mark of Fork-Join Parallel Programs

    Authors: Tim Kaler, William Kuszmaul, Tao B. Schardl, Daniele Vettorel

    Abstract: Software engineers designing recursive fork-join programs destined to run on massively parallel computing systems must be cognizant of how their program's memory requirements scale in a many-processor execution. Although tools exist for measuring memory usage during one particular execution of a parallel program, such tools cannot bound the worst-case memory usage over all possible parallel execut… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

  4. TapirXLA: Embedding Fork-Join Parallelism into the XLA Compiler in TensorFlow Using Tapir

    Authors: Tao B. Schardl, Siddharth Samsi

    Abstract: This work introduces TapirXLA, a replacement for TensorFlow's XLA compiler that embeds recursive fork-join parallelism into XLA's low-level representation of code. Machine-learning applications rely on efficient parallel processing to achieve performance, and they employ a variety of technologies to improve performance, including compiler technology. But compilers in machine-learning frameworks la… ▽ More

    Submitted 29 August, 2019; originally announced August 2019.

    Comments: IEEE HPEC 2019

  5. arXiv:1902.10191  [pdf, other

    cs.LG cs.SI stat.ML

    EvolveGCN: Evolving Graph Convolutional Networks for Dynamic Graphs

    Authors: Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hiroki Kanezashi, Tim Kaler, Tao B. Schardl, Charles E. Leiserson

    Abstract: Graph representation learning resurges as a trending research subject owing to the widespread use of deep learning for Euclidean data, which inspire various creative designs of neural networks in the non-Euclidean domain, particularly graphs. With the success of these graph neural networks (GNN) in the static setting, we approach further practical scenarios where the graph dynamically evolves. Exi… ▽ More

    Submitted 18 November, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: AAAI 2020. The code is available at https://github.com/IBM/EvolveGCN

  6. arXiv:1812.00076  [pdf, ps, other

    cs.SI cs.AI cs.LG

    Scalable Graph Learning for Anti-Money Laundering: A First Look

    Authors: Mark Weber, Jie Chen, Toyotaro Suzumura, Aldo Pareja, Tengfei Ma, Hiroki Kanezashi, Tim Kaler, Charles E. Leiserson, Tao B. Schardl

    Abstract: Organized crime inflicts human suffering on a genocidal scale: the Mexican drug cartels have murdered 150,000 people since 2006, upwards of 700,000 people per year are "exported" in a human trafficking industry enslaving an estimated 40 million people. These nefarious industries rely on sophisticated money laundering schemes to operate. Despite tremendous resources dedicated to anti-money launderi… ▽ More

    Submitted 30 November, 2018; originally announced December 2018.

    Comments: NeurIPS 2018 Workshop on Challenges and Opportunities for AI in Financial Services: the Impact of Fairness, Explainability, Accuracy, and Privacy, Montreal, Canada

  7. arXiv:1804.04773  [pdf, ps, other

    cs.DC cs.DM cs.DS

    On the Efficiency of Localized Work Stealing

    Authors: Warut Suksompong, Charles E. Leiserson, Tao B. Schardl

    Abstract: This paper investigates a variant of the work-stealing algorithm that we call the localized work-stealing algorithm. The intuition behind this variant is that because of locality, processors can benefit from working on their own work. Consequently, when a processor is free, it makes a steal attempt to get back its own work. We call this type of steal a steal-back. We show that the expected running… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

    Comments: 13 pages, 1 figure

    Journal ref: Information Processing Letters, 116(2):100-106 (2016)

  8. arXiv:1706.03184  [pdf, ps, other

    cs.DC cs.DM cs.DS

    Upper Bounds on Number of Steals in Rooted Trees

    Authors: Charles E. Leiserson, Tao B. Schardl, Warut Suksompong

    Abstract: Inspired by applications in parallel computing, we analyze the setting of work stealing in multithreaded computations. We obtain tight upper bounds on the number of steals when the computation can be modeled by rooted trees. In particular, we show that if the computation with $n$ processors starts with one processor having a complete $k$-ary tree of height $h$ (and the remaining $n-1$ processors h… ▽ More

    Submitted 15 June, 2017; v1 submitted 10 June, 2017; originally announced June 2017.

    Comments: 18 pages, 5 figures

    Journal ref: Theory of Computing Systems, 58(2):223-240 (2016)