{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:03:23Z","timestamp":1750395803894,"version":"3.37.3"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1912680,PPoSS-2119816"],"award-info":[{"award-number":["CCF-1912680,PPoSS-2119816"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1109\/hpec55821.2022.9926307","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:40:48Z","timestamp":1667526048000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["SHARP: Software Hint-Assisted Memory Access Prediction for Graph Analytics"],"prefix":"10.1109","author":[{"given":"Pengmiao","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Southern California,Los Angeles,USA"}]},{"given":"Rajgopal","family":"Kannan","sequence":"additional","affiliation":[{"name":"DEVCOM US Army Research Lab,Los Angeles,USA"}]},{"given":"Xiangzhi","family":"Tong","sequence":"additional","affiliation":[{"name":"Xi&#x2019; an liaotong-Liverpool University,Suzhou,China"}]},{"given":"Anant V.","family":"Nori","sequence":"additional","affiliation":[{"name":"Processor Architecture Research Lab Intel Labs,Bangalore,India"}]},{"given":"Viktor K.","family":"Prasanna","sequence":"additional","affiliation":[{"name":"University of Southern California,Los Angeles,USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.jides.2016.10.005"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/216585.216588"},{"volume-title":"Proc. of IEEE International Conference on Control and Automation","author":"Carvalho","article-title":"The gap between processor and memory speeds","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1807167.1807184"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.14778\/2777598.2777604"},{"key":"ref6","first-page":"14","article-title":"Scalability! but at what cost?","volume-title":"Proceedings of the 15th USENIX Conference on Hot Topics in Operating Systems, ser. HOTOS\u201915. USENIX Association","author":"McSherry"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2442516.2442530"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.14778\/2809974.2809983"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2517349.2522739"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3380942"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/IPDPS.2017.112"},{"volume-title":"2015 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Lakhotia","article-title":"Accelerating pagerank using partition-centric processing","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1017\/CBO9781139051224"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/2.596622"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/I-SPAN.2008.24"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/C-M.1978.218016"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/325096.325162"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1150019.1136508"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/HPCA.2016.7446087"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2830772.2830793"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/MICRO.2016.7783763"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2540708.2540730"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/HPCA.2018.00021"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3357526.3357549"},{"key":"ref25","article-title":"Learning memory access patterns","volume":"abs\/1803.02329","author":"Hashemi","year":"2018","journal-title":"CoRR"},{"key":"ref26","first-page":"383","article-title":"Maximizing hard-ware prefetch effectiveness with machine learning","volume-title":"2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems","author":"Rahman"},{"key":"ref27","article-title":"A neural network memory prefetcher using semantic locality","author":"Peled","year":"2018","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3132402.3132405"},{"volume-title":"International Workshop on Al-assisted Design for Ar-chitecture (AIDArc), held in conjunction with ISCA","author":"Braun","article-title":"Understanding memory access patterns for prefetching","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/3422575.3422807"},{"key":"ref31","first-page":"1","article-title":"C-memmap: clustering-driven compact, adaptable, and generalizable meta-lstm models for memory access prediction","author":"Zhang","year":"2021","journal-title":"International Journal of Data Science and Analytics"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3445814.3446752"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3528416.3530236"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/SBAC-PAD.2017.25"},{"key":"ref35","first-page":"411","article-title":"Learning from inconsistent and noisy data: the aq 18 approach","volume-title":"International Symposium on Methodologies for Intelligent Systems","author":"Kaufman"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/2484425.2484427"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TAI.2021.3076021"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/1807167.1807184"},{"key":"ref39","first-page":"17","article-title":"{PowerGraph}: Distributed {Graph-Parallel} computation on natural graphs","volume-title":"10th USENIX symposium on operating systems design and implementation (OSDI 12)","author":"Gonzalez"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TKDE.2017.2762294"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/ISCA.1998.694794"},{"key":"ref42","article-title":"Learning memory access patterns","author":"Hashemi","year":"2018","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/978-3-030-47436-2_5"},{"volume-title":"The International Symposium on Computer Architecture (ISCA), ML for Computer Architecture and Systems Workshop","author":"Zhang","article-title":"Transformap: Transformer for memory access prediction","key":"ref44"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3494536"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1145\/3097983.3098069"},{"key":"ref47","first-page":"5998","article-title":"Attention is all you need","author":"Vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ICASSP.2018.8462506"},{"key":"ref49","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv preprint"},{"volume-title":"SNAP Datasets: Stanford large network dataset collection","year":"2014","author":"Leskovec","key":"ref50"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1145\/1232722.1232727"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1080\/15427951.2009.10129177"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1007\/s10115-013-0693-z"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1016\/j.patcog.2017.04.018"},{"volume-title":"The pagerank citation ranking: Bringing order to the web","year":"1999","author":"Page","key":"ref55"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1145\/1064978.1065034"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref58","article-title":"Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation","author":"Powers","year":"2020","journal-title":"arXiv prep rint"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.21236\/ADA440081"}],"event":{"name":"2022 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2022,9,19]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2022,9,23]]}},"container-title":["2022 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9926284\/9926287\/09926307.pdf?arnumber=9926307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T05:44:42Z","timestamp":1706075082000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9926307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/hpec55821.2022.9926307","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]}}}