Skip to main navigation Skip to search Skip to main content

Triangle Counting Accelerations: From Algorithm to In-Memory Computing Architecture

Research output: Contribution to journalArticlepeer-review

Abstract

Triangles are the basic substructure of networks and triangle counting (TC) has been a fundamental graph computing problem in numerous fields such as social network analysis. Nevertheless, like other graph computing problems, due to the high memory-computation ratio and random memory access pattern, TC involves a large amount of data transfers thus suffers from the bandwidth bottleneck in the traditional Von-Neumann architecture. To overcome this challenge, in this paper, we propose to accelerate TC with the emerging processing-in-memory (PIM) architecture through an algorithm-architecture co-optimization manner. To enable the efficient in-memory implementations, we come up to reformulate TC with bitwise logic operations (such as AND), and develop customized graph compression and mapping techniques for efficient data flow management. With the emerging computational Spin-Transfer Torque Magnetic RAM (STT-MRAM) array, which is one of the most promising PIM enabling techniques, the device-to-architecture co-simulation results demonstrate that the proposed TC in-memory accelerator outperforms the state-of-the-art GPU and FPGA accelerations by 12.2× and 31.8 ×, respectively, and achieves a 34× energy efficiency improvement over the FPGA accelerator.

Original languageEnglish
Pages (from-to)2462-2472
Number of pages11
JournalIEEE Transactions on Computers
Volume71
Issue number10
DOIs
StatePublished - 1 Oct 2022

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 7 - Affordable and Clean Energy
    SDG 7 Affordable and Clean Energy

Keywords

  • Triangle counting acceleration
  • algorithm-architecture co-design
  • graph computing
  • processing-in-memory

Fingerprint

Dive into the research topics of 'Triangle Counting Accelerations: From Algorithm to In-Memory Computing Architecture'. Together they form a unique fingerprint.

Cite this