{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:04:15Z","timestamp":1767855855750,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DOE Office of Science Biological and Environmental Research program and Basic Energy Sciences program and DOE National Nuclear Security Administration","award":["17-SC-20-SC"],"award-info":[{"award-number":["17-SC-20-SC"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-181272"],"award-info":[{"award-number":["CNS-181272"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,9]]},"DOI":"10.1145\/3587135.3592196","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T10:22:41Z","timestamp":1691144561000},"page":"12-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["High-Level Synthesis of Irregular Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7137-7599","authenticated-orcid":false,"given":"Reece","family":"Neff","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4220-1420","authenticated-orcid":false,"given":"Marco","family":"Minutoli","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9452-120X","authenticated-orcid":false,"given":"Antonino","family":"Tumeo","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8353-2915","authenticated-orcid":false,"given":"Michela","family":"Becchi","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Vitis Unified Software Platform Documentation: Application Acceleration Development. https:\/\/www.xilinx.com\/support\/documentation\/sw_manuals\/xilinx2020_2\/ug1393-vitis-application-acceleration.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/77726.255132"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2014.30"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00031"},{"key":"e_1_3_2_1_5_1","unstructured":"Heiko Bauke. 2021. Tina's Random Number Generator Library. https:\/\/www.numbercrunch.de\/trng\/trng.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"Tal Ben-Nun, and Torsten Hoefler.","author":"Besta Maciej","year":"2019","unstructured":"Maciej Besta, Dimitri Stanojevic, Johannes De Fine Licht, Tal Ben-Nun, and Torsten Hoefler. 2019. Graph Processing on FPGAs: Taxonomy, Survey, Challenges. arXiv:1903.06697 [cs.DC]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2012.30"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.70"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00022"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of KDD '01","author":"Pedro","unstructured":"Pedro M. Domingos and Matthew Richardson. 2001. Mining the network value of customers. In Proc. of KDD '01. ACM, 57--66."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Timothy Dysart Peter Kogge Martin Deneroff Eric Bovell Preston Briggs Jay Brockman Kenneth Jacobsen Yujen Juan Shannon Kuntz Richard Lethin Janice McMahon Chandra Pawar Martin Perrigo Sarah Rucker John Ruttenberg Max Ruttenberg and Steve Stein. 2016. Highly Scalable Near Memory Processing with Migrating Threads on the Emu System Architecture. In 2016 6th Workshop on Irregular Applications: Architecture and Algorithms (IA3). 2--9. https:\/\/doi.org\/10.1109\/IA3.2016.007","DOI":"10.1109\/IA3.2016.007"},{"key":"e_1_3_2_1_13_1","volume-title":"FPGA-Based Implementation of Memory-Intensive Application Using OpenCL (HEART","author":"Firmansyah Iman","year":"2019","unstructured":"Iman Firmansyah, Du Changdao, Norihisa Fujita, Yoshiki Yamaguchi, and Taisuke Boku. 2019. FPGA-Based Implementation of Memory-Intensive Application Using OpenCL (HEART 2019). ACM, New York, NY, USA, Article 16, 4 pages."},{"key":"e_1_3_2_1_14_1","volume-title":"Boosting Parallel Influence-Maximization Kernels for Undirected Networks with Fusing and Vectorization. CoRR abs\/2008.03095","author":"G\u00f6kt\u00fcrk G\u00f6khan","year":"2020","unstructured":"G\u00f6khan G\u00f6kt\u00fcrk and Kamer Kaya. 2020. Boosting Parallel Influence-Maximization Kernels for Undirected Networks with Fusing and Vectorization. CoRR abs\/2008.03095 (2020). arXiv:2008.03095 https:\/\/arxiv.org\/abs\/2008.03095"},{"key":"e_1_3_2_1_15_1","unstructured":"Mark Harris. 2013. CUDA Pro Tip: Write Flexible Kernels with Grid-Stride Loops. https:\/\/developer.nvidia.com\/blog\/cuda-pro-tip-write-flexible-kernels-grid-stride-loops\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/RECONFIG.2018.8641699"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2018.8547536"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373087.3375887"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380942"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jure Leskovec Andreas Krause Carlos Guestrin Christos Faloutsos Jeanne Van-Briesen and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In KDD. ACM 420--429.","DOI":"10.1145\/1281192.1281239"},{"key":"e_1_3_2_1_22_1","unstructured":"Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT47387.2019.00056"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3057860"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392717.3392750"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2019.8890991"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00059"},{"key":"e_1_3_2_1_28_1","first-page":"111","article-title":"GraphOps","volume":"16","author":"Oguntebi Tayo","year":"2016","unstructured":"Tayo Oguntebi and Kunle Olukotun. 2016. GraphOps: A Dataflow Library for Graph Analytics Acceleration. In Proc. of FPGA 16. 111--117.","journal-title":"A Dataflow Library for Graph Analytics Acceleration. In Proc. of FPGA"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173180"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2009.5396155"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00042"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372553"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723734"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of FPL '01","author":"Tommiska Matti","unstructured":"Matti Tommiska and Jorma Skytt\u00e4. 2001. Dijkstra's Shortest Path Routing Algorithm in Reconfigurable Hardware. In Proc. of FPL '01. Springer-Verlag, Berlin, Heidelberg, 653--657."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.233"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2015.7393332"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2016.35"}],"event":{"name":"CF '23: 20th ACM International Conference on Computing Frontiers","location":"Bologna Italy","acronym":"CF '23","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 20th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587135.3592196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587135.3592196","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587135.3592196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:14Z","timestamp":1750178834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587135.3592196"}},"subtitle":["A Case Study on Influence Maximization"],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":37,"alternative-id":["10.1145\/3587135.3592196","10.1145\/3587135"],"URL":"https:\/\/doi.org\/10.1145\/3587135.3592196","relation":{},"subject":[],"published":{"date-parts":[[2023,5,9]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}