## Optimal Sparse Matrix Dense Vector Multiplication in the I/O-Model

- Michael A. Bender, Gerth Stølting Brodal, Rolf Fagerberg, Riko Jacob, Elias Vicari
- Theory of Computing Systems
- 2007

Highly Influential

15 Excerpts

- Published 2013

In 1981 Hong and Kung proved a lower bound on the amount of communication (amount of data moved between a small, fast memory and large, slow memory) needed to perform dense, n-by-n matrix-multiplication using the conventional O(n) algorithm, where the input matrices were too large to fit in the small, fast memory. In 2004 Irony, Toledo and Tiskin gave a new proof of this result and extended it to the parallel case (where communication means the amount of data moved between processors). In both cases the lower bound may be expressed as Ω(#arithmetic operations / √ M ), where M is the size of the fast memory (or local memory in the parallel case). Here we generalize these results to a much wider variety of algorithms, including LU factorization, Cholesky factorization, LDL factorization, QR factorization, Gram–Schmidt algorithm, algorithms for eigenvalues and singular values, i.e., essentially all direct methods of linear algebra. The proof works for dense or sparse matrices, and for sequential or parallel algorithms. In addition to lower bounds on the amount of data moved (bandwidth-cost), we get lower bounds on the number of messages required to move it (latency-cost). We extend our lower bound technique to compositions of linear algebra operations (like computing powers of a matrix), to decide whether it is enough to call a sequence of simpler optimal algorithms (like matrix multiplication) to minimize communication, or if we can do better. We give examples of both. We also show how to extend our lower bounds to certain graph theoretic problems. We point out recently designed algorithms that attain many of these lower bounds.

Showing 1-10 of 59 references

Highly Influential

15 Excerpts

Highly Influential

15 Excerpts

Highly Influential

20 Excerpts

Highly Influential

6 Excerpts

Highly Influential

11 Excerpts

Highly Influential

6 Excerpts

Highly Influential

10 Excerpts

Highly Influential

4 Excerpts

Highly Influential

4 Excerpts

Highly Influential

7 Excerpts

@inproceedings{Demmel2013CommunicationA,
title={Communication Avoiding (CA) and Other Innovative Algorithms},
author={James Demmel and Kathy Yelick},
year={2013}
}