{"id":"https://openalex.org/W2809266395","doi":"https://doi.org/10.1145/3195970.3196088","title":"Extracting data parallelism in non-stencil kernel computing by optimally coloring folded memory conflict graph","display_name":"Extracting data parallelism in non-stencil kernel computing by optimally coloring folded memory conflict graph","publication_year":2018,"publication_date":"2018-06-19","ids":{"openalex":"https://openalex.org/W2809266395","doi":"https://doi.org/10.1145/3195970.3196088","mag":"2809266395"},"language":"en","primary_location":{"id":"doi:10.1145/3195970.3196088","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3195970.3196088","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3195970.3196088","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 55th Annual Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3195970.3196088","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013235794","display_name":"J. P. Escobedo","orcid":"https://orcid.org/0000-0003-2413-7119"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Juan Escobedo","raw_affiliation_strings":["University of Central Florida"],"affiliations":[{"raw_affiliation_string":"University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060908808","display_name":"Mingjie Lin","orcid":"https://orcid.org/0000-0002-3225-4406"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mingjie Lin","raw_affiliation_strings":["University of Central Florida"],"affiliations":[{"raw_affiliation_string":"University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013235794"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":1.3135,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.79152718,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8367310762405396},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.7212819457054138},{"id":"https://openalex.org/keywords/stencil","display_name":"Stencil","score":0.5065082311630249},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4635085165500641},{"id":"https://openalex.org/keywords/shared-memory","display_name":"Shared memory","score":0.4505307674407959},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.44731906056404114},{"id":"https://openalex.org/keywords/graph-reduction","display_name":"Graph reduction","score":0.4284118115901947},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41625547409057617},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.41054463386535645},{"id":"https://openalex.org/keywords/computational-science","display_name":"Computational science","score":0.1394008994102478},{"id":"https://openalex.org/keywords/functional-programming","display_name":"Functional programming","score":0.11157748103141785},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10368725657463074}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8367310762405396},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.7212819457054138},{"id":"https://openalex.org/C76752949","wikidata":"https://www.wikidata.org/wiki/Q7607499","display_name":"Stencil","level":2,"score":0.5065082311630249},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4635085165500641},{"id":"https://openalex.org/C133875982","wikidata":"https://www.wikidata.org/wiki/Q764810","display_name":"Shared memory","level":2,"score":0.4505307674407959},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.44731906056404114},{"id":"https://openalex.org/C97042676","wikidata":"https://www.wikidata.org/wiki/Q5597097","display_name":"Graph reduction","level":3,"score":0.4284118115901947},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41625547409057617},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.41054463386535645},{"id":"https://openalex.org/C459310","wikidata":"https://www.wikidata.org/wiki/Q117801","display_name":"Computational science","level":1,"score":0.1394008994102478},{"id":"https://openalex.org/C42383842","wikidata":"https://www.wikidata.org/wiki/Q193076","display_name":"Functional programming","level":2,"score":0.11157748103141785},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10368725657463074},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3195970.3196088","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3195970.3196088","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3195970.3196088","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 55th Annual Design Automation Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-8860","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/7861","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3195970.3196088","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3195970.3196088","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3195970.3196088","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 55th Annual Design Automation Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.9100000262260437,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2809266395.pdf","grobid_xml":"https://content.openalex.org/works/W2809266395.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W129572668","https://openalex.org/W1982506822","https://openalex.org/W2000031176","https://openalex.org/W2039974221","https://openalex.org/W2058625399","https://openalex.org/W2133732980","https://openalex.org/W2170349494","https://openalex.org/W2584219348","https://openalex.org/W2588368824"],"related_works":["https://openalex.org/W3105129168","https://openalex.org/W2804920739","https://openalex.org/W4316371992","https://openalex.org/W2186216222","https://openalex.org/W2392765154","https://openalex.org/W2008005532","https://openalex.org/W17155033","https://openalex.org/W1971603802","https://openalex.org/W2564509292","https://openalex.org/W1977185554"],"abstract_inverted_index":{"Irregular":[0],"memory":[1,65,70,96,112,116],"access":[2,55],"pattern":[3,56],"in":[4,37,53,60],"non-stencil":[5],"kernel":[6],"computing":[7],"renders":[8],"the":[9,64,90,109],"well-known":[10],"hyperplane-":[11],"[1],":[12],"lattice-":[13],"[2],":[14],"or":[15],"tessellation-based":[16],"[3]":[17],"HLS":[18],"techniques":[19],"ineffective.":[20],"We":[21],"develop":[22],"an":[23],"elegant":[24],"yet":[25],"effective":[26],"technique":[27],"that":[28,67],"synthesizes":[29],"memory-optimal":[30],"architecture":[31],"from":[32,88],"high":[33],"level":[34],"software":[35],"code":[36],"order":[38,61],"to":[39,48,62,94],"maximize":[40,95],"application-specific":[41],"data":[42,54],"parallelism.":[43],"Our":[44],"basic":[45],"idea":[46],"is":[47],"exploit":[49],"graph":[50,86,93],"structures":[51],"embedded":[52],"and":[57,76,114],"computation":[58],"structure":[59],"perform":[63],"banking":[66],"maximizes":[68],"parallel":[69],"accesses":[71],"while":[72],"conserving":[73],"both":[74],"hardware":[75],"energy":[77],"consumption.":[78],"Specifically,":[79],"we":[80],"priority":[81],"color":[82],"a":[83,105],"weighted":[84],"conflict":[85,92,97],"generated":[87],"folding":[89],"fundamental":[91],"reduction.":[98],"Most":[99],"interestingly,":[100],"our":[101],"graph-based":[102],"methodology":[103],"enables":[104],"straightforward":[106],"tradeoff":[107],"between":[108],"number":[110],"of":[111],"banks":[113],"minimizing":[115],"conflicts.":[117]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
