{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:46:41Z","timestamp":1767854801528,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Air Force Research Laboratory (AFRL) and Defense Advanced Research Projects Agency (DARPA)","award":["FA8650-18-2- 7864"],"award-info":[{"award-number":["FA8650-18-2- 7864"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,18]]},"DOI":"10.1145\/3470496.3527437","type":"proceedings-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T19:06:01Z","timestamp":1654023961000},"page":"146-159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["NDMiner"],"prefix":"10.1145","author":[{"given":"Nishil","family":"Talati","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Haojie","family":"Ye","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Yichen","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Leul","family":"Belayneh","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Kuan-Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"David","family":"Blaauw","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Trevor","family":"Mudge","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Ronald","family":"Dreslinski","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2018.8573480"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750386"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2925426.2926254"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"V. Balaji and B. Lucia. 2018. When is Graph Reordering an Optimization? Studying the Effect of Lightweight Graph Reordering Across Applications and Input Graphs. In IISWC. 203--214.  V. Balaji and B. Lucia. 2018. When is Graph Reordering an Optimization? Studying the Effect of Lightweight Graph Reordering Across Applications and Input Graphs. In IISWC. 203--214.","DOI":"10.1109\/IISWC.2018.8573478"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00051"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Beamer K. Asanovi\u0107 and D. Patterson. 2015. The GAP Benchmark Suite. In arXiv:1508.03619 [cs.DC].  S. Beamer K. Asanovi\u0107 and D. Patterson. 2015. The GAP Benchmark Suite. In arXiv:1508.03619 [cs.DC]."},{"key":"e_1_3_2_1_7_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Belayneh Leul Wuletaw","year":"2020","unstructured":"Leul Wuletaw Belayneh and V. Bertacco . 2020. GraphVine: Exploiting Multicast for Scalable Graph Analytics. 2020 Design , Automation & Test in Europe Conference & Exhibition (DATE) ( 2020 ), 762--767. Leul Wuletaw Belayneh and V. Bertacco. 2020. GraphVine: Exploiting Multicast for Scalable Graph Analytics. 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (2020), 762--767."},{"key":"e_1_3_2_1_8_1","volume-title":"SISA: Set-Centric Instruction Set Architecture for Graph Mining on Processing-in-Memory Systems. 2021 54th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)","author":"Besta Maciej","year":"2021","unstructured":"Maciej Besta , Raghavendra Kanakagiri , Grzegorz Kwasniewski , Rachata Ausavarungnirun , Jakub Ber\u00e1nek , Konstantinos Kanellopoulos , Kacper Janda , Zur Vonarburg-Shmaria , Lukas Gianinazzi , Ioana Stefan , Juan G\u00f3mez Luna , Marcin Copik , Lukas Kapp-Schwoerer , Salvatore Di Girolamo , Marek Konieczny , Onur Mutlu , and Torsten Hoefler . 2021 . SISA: Set-Centric Instruction Set Architecture for Graph Mining on Processing-in-Memory Systems. 2021 54th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO) (2021). Maciej Besta, Raghavendra Kanakagiri, Grzegorz Kwasniewski, Rachata Ausavarungnirun, Jakub Ber\u00e1nek, Konstantinos Kanellopoulos, Kacper Janda, Zur Vonarburg-Shmaria, Lukas Gianinazzi, Ioana Stefan, Juan G\u00f3mez Luna, Marcin Copik, Lukas Kapp-Schwoerer, Salvatore Di Girolamo, Marek Konieczny, Onur Mutlu, and Torsten Hoefler. 2021. SISA: Set-Centric Instruction Set Architecture for Graph Mining on Processing-in-Memory Systems. 2021 54th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO) (2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447818.3460359"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389137"},{"key":"e_1_3_2_1_11_1","unstructured":"Xuhao Chen and Tianhao Huang. 2021. GraphMinerBench open-source implementations. In Github Repository. https:\/\/github.com\/chenxuhao\/GraphMiner  Xuhao Chen and Tianhao Huang. 2021. GraphMinerBench open-source implementations. In Github Repository. https:\/\/github.com\/chenxuhao\/GraphMiner"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00052"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2028234"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2821565"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319875"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.748803"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.902"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.375174"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783759"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358275"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387548"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469379.3469381"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378524"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00070"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2414456"},{"key":"e_1_3_2_1_27_1","volume-title":"Hardware Architecture and Software Stack for PIM Based on Commercial DRAM Technology. In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA).","author":"Lee Sukhan","year":"2021","unstructured":"Sukhan Lee , Shin haeng Kang , Jaehoon Lee , Hyeonsu Kim , Eojin Lee , Seungwoo Seo , Hosang Yoon , Seungwon Lee , Kyounghwan Lim , Hyunsung Shin , Jinhyun Kim , Seongil O, Anand Iyer , David Wang , Kyomin Sohn , and Nam Sung Kim . 2021 . Hardware Architecture and Software Stack for PIM Based on Commercial DRAM Technology. In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). Sukhan Lee, Shin haeng Kang, Jaehoon Lee, Hyeonsu Kim, Eojin Lee, Seungwoo Seo, Hosang Yoon, Seungwon Lee, Kyounghwan Lim, Hyunsung Shin, Jinhyun Kim, Seongil O, Anand Iyer, David Wang, Kyomin Sohn, and Nam Sung Kim. 2021. Hardware Architecture and Software Stack for PIM Based on Commercial DRAM Technology. In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.152"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898064"},{"key":"e_1_3_2_1_30_1","volume-title":"Graphzero: Breaking symmetry for efficient graph mining. In arXiv preprint arXiv:1911.12877.","author":"Mawhirter D.","year":"2019","unstructured":"D. Mawhirter , S. Reinehr , C. Holmes , T. Liu , , and B. Wu . 2019 . Graphzero: Breaking symmetry for efficient graph mining. In arXiv preprint arXiv:1911.12877. D. Mawhirter, S. Reinehr, C. Holmes, T. Liu, , and B. Wu. 2019. Graphzero: Breaking symmetry for efficient graph mining. In arXiv preprint arXiv:1911.12877."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359633"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2015.2429031"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00010"},{"key":"e_1_3_2_1_34_1","volume-title":"AGP'17","author":"Mukkara Anurag","year":"2017","unstructured":"Anurag Mukkara , Nathan Beckmann , and Daniel Sanchez . 2017 . Cache-Guided Scheduling: Exploiting caches to maximize locality in graph processing . AGP'17 (2017). Anurag Mukkara, Nathan Beckmann, and Daniel Sanchez. 2017. Cache-Guided Scheduling: Exploiting caches to maximize locality in graph processing. AGP'17 (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358254"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/279361.279387"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.24"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.592312"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.1997.585348"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322212"},{"key":"e_1_3_2_1_41_1","volume-title":"DRAMA: Exploiting DRAM addressing for cross-cpu attacks. In 25th USENIX security symposium (USENIX security 16). 565--581.","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM addressing for cross-cpu attacks. In 25th USENIX security symposium (USENIX security 16). 565--581. Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM addressing for cross-cpu attacks. In 25th USENIX security symposium (USENIX security 16). 565--581."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14039-1_14"},{"key":"e_1_3_2_1_43_1","volume-title":"IntersectX: An Efficient Accelerator for Graph Mining. arXiv:2012.10848v4","author":"Rao Gengyu","year":"2021","unstructured":"Gengyu Rao , Jingji Chen , Jason Yik , and Xuehai Qian . 2021. IntersectX: An Efficient Accelerator for Graph Mining. arXiv:2012.10848v4 ( 2021 ). Gengyu Rao, Jingji Chen, Jason Yik, and Xuehai Qian. 2021. IntersectX: An Efficient Accelerator for Graph Mining. arXiv:2012.10848v4 (2021)."},{"key":"e_1_3_2_1_44_1","unstructured":"Samsung. 2018. DDR4 SDRAM Data sheet 288--pin Load Reduced DIMM (LRDIMM)-based 8GB C-Die.  Samsung. 2018. DDR4 SDRAM Data sheet 288--pin Load Reduced DIMM (LRDIMM)-based 8GB C-Die."},{"key":"e_1_3_2_1_45_1","volume-title":"2013 46th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 185--197","author":"Seshadri Vivek","unstructured":"Vivek Seshadri , Yoongu Kim , Chris Fallin , Donghyuk Lee , Rachata Ausavarungnirun , Gennady Pekhimenko , Yixin Luo , Onur Mutlu , Phillip B. Gibbons , Michael A. Kozuch , and Todd C. Mowry . 2013. RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization . In 2013 46th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 185--197 . Vivek Seshadri, Yoongu Kim, Chris Fallin, Donghyuk Lee, Rachata Ausavarungnirun, Gennady Pekhimenko, Yixin Luo, Onur Mutlu, Phillip B. Gibbons, Michael A. Kozuch, and Todd C. Mowry. 2013. RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization. In 2013 46th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 185--197."},{"key":"e_1_3_2_1_46_1","volume-title":"Ambit: In-Memory Accelerator for Bulk Bitwise Operations Using Commodity DRAM Technology. In 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 273--287","author":"Seshadri Vivek","unstructured":"Vivek Seshadri , Donghyuk Lee , Thomas Mullins , Hasan Hassan , Amirali Boroumand , Jeremie Kim , Michael A. Kozuch , Onur Mutlu , Phillip B. Gibbons , and Todd C. Mowry . 2017 . Ambit: In-Memory Accelerator for Bulk Bitwise Operations Using Commodity DRAM Technology. In 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 273--287 . Vivek Seshadri, Donghyuk Lee, Thomas Mullins, Hasan Hassan, Amirali Boroumand, Jeremie Kim, Michael A. Kozuch, Onur Mutlu, Phillip B. Gibbons, and Todd C. Mowry. 2017. Ambit: In-Memory Accelerator for Bulk Bitwise Operations Using Commodity DRAM Technology. In 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 273--287."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.12"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis.","author":"Shi T.","unstructured":"T. Shi , M. Zhai , Y. Xu , and J. Zhai . 2020. GraphPi: High Performance Graph Pattern Matching through Effective Redundancy Elimination . Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. T. Shi, M. Zhai, Y. Xu, and J. Zhai. 2020. GraphPi: High Performance Graph Pattern Matching through Effective Redundancy Elimination. Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2017.8091070"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00052"},{"key":"e_1_3_2_1_51_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1628--1633","author":"Talati Nishil","year":"2018","unstructured":"Nishil Talati , Ameer Haj Ali , Rotem Ben Hur , Nimrod Wald , Ronny Ronen , Pierre-Emmanuel Gaillardon , and Shahar Kvatinsky . 2018 . Practical challenges in delivering the promises of real processing-in-memory machines. In 2018 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1628--1633 . Nishil Talati, Ameer Haj Ali, Rotem Ben Hur, Nimrod Wald, Ronny Ronen, Pierre-Emmanuel Gaillardon, and Shahar Kvatinsky. 2018. Practical challenges in delivering the promises of real processing-in-memory machines. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1628--1633."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2016.2570248"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.2890033"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00061"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Lei Tang and Huan Liu. 2010. Graph Mining Applications to Social Network Analysis. In Managing and Mining Graph Data.  Lei Tang and Huan Liu. 2010. Graph Mining Applications to Social Network Analysis. In Managing and Mining Graph Data.","DOI":"10.1007\/978-1-4419-6045-0_16"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815410"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488502"},{"key":"e_1_3_2_1_58_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Wang Kai","year":"2018","unstructured":"Kai Wang , Zhiqiang Zuo , John Thorpe , Tien Quang Nguyen , and Guoqing Harry Xu . 2018 . {RStream}: Marrying Relational Algebra with Streaming for Efficient Graph Mining on A Single Machine . In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . 763--782. Kai Wang, Zhiqiang Zuo, John Thorpe, Tien Quang Nguyen, and Guoqing Harry Xu. 2018. {RStream}: Marrying Relational Algebra with Streaming for Efficient Graph Mining on A Single Machine. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). 763--782."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358318"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00077"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00053"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358256"}],"event":{"name":"ISCA '22: The 49th Annual International Symposium on Computer Architecture","location":"New York New York","acronym":"ISCA '22","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS TCAA IEEE CS technical committee on architectural acoustics"]},"container-title":["Proceedings of the 49th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527437","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470496.3527437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:54Z","timestamp":1750191534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527437"}},"subtitle":["accelerating graph pattern mining using near data processing"],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":62,"alternative-id":["10.1145\/3470496.3527437","10.1145\/3470496"],"URL":"https:\/\/doi.org\/10.1145\/3470496.3527437","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}