Difference between revisions of "Kaustubh Shivdikar"

m (Dotted new lines added)
m (Image resizing)
 
Line 61: Line 61:
  
 
==Publications==
 
==Publications==
[[File:PIM Logo.png|alt=Scalability Limitations of Processing-in-Memory using Real System Evaluations|right|frameless|112x112px]]
+
[[File:PIM Logo.png|alt=Scalability Limitations of Processing-in-Memory using Real System Evaluations|right|frameless|105x105px]]
  
 
======[https://wiki.kaustubh.us/w/img_auth.php/scalability_limitations.pdf Scalability Limitations of Processing-in-Memory using Real System Evaluations]======
 
======[https://wiki.kaustubh.us/w/img_auth.php/scalability_limitations.pdf Scalability Limitations of Processing-in-Memory using Real System Evaluations]======
Line 79: Line 79:
  
 
==.==
 
==.==
[[File:MaxK teaser.png|right|frameless|109x109px]]
+
[[File:network logo.png|alt=GNN Logo|right|frameless|82x82px|GNN Logo]]
  
 
======[https://wiki.kaustubh.us/w/img_auth.php/maxk.pdf MaxK-GNN: Towards Theoretical Speed Limits for Accelerating Graph Neural Networks Training]======
 
======[https://wiki.kaustubh.us/w/img_auth.php/maxk.pdf MaxK-GNN: Towards Theoretical Speed Limits for Accelerating Graph Neural Networks Training]======
Line 97: Line 97:
 
|}
 
|}
  
== . ==
+
==.==
[[File:AMD MI100 GPU.png|right|frameless|171x171px|AMD MI100 GPU]]
+
[[File:AMD MI100 GPU.png|right|frameless|226x226px|AMD MI100 GPU]]
  
 
======[https://wiki.kaustubh.us/w/img_auth.php/GME.pdf GME: GPU-based Microarchitectural Extensions to Accelerate Homomorphic Encryption]======
 
======[https://wiki.kaustubh.us/w/img_auth.php/GME.pdf GME: GPU-based Microarchitectural Extensions to Accelerate Homomorphic Encryption]======
Line 136: Line 136:
 
|}
 
|}
  
== . ==
+
==.==
[[File:V100 GPU.png|right|frameless|196x196px]]
+
[[File:V100 GPU.png|right|frameless|168x168px]]
  
 
======[https://wiki.kaustubh.us/w/img_auth.php/FHE_IEEE_Micro.pdf Accelerating Finite Field Arithmetic for Homomorphic Encryption on GPUs]======
 
======[https://wiki.kaustubh.us/w/img_auth.php/FHE_IEEE_Micro.pdf Accelerating Finite Field Arithmetic for Homomorphic Encryption on GPUs]======
 
{{Nutshell|Optimized modulo "%" operator on NVIDIA V100 GPU to speedup Homomorphic Encryption.|title=Paper}}
 
{{Nutshell|Optimized modulo "%" operator on NVIDIA V100 GPU to speedup Homomorphic Encryption.|title=Paper}}
  
([https://ieeexplore.ieee.org/document/10068510 IEEE MICRO 2023]) [[https://wiki.kaustubh.us/w/img_auth.php/FHE_IEEE_Micro.pdf PDF]] [[https://www.researchgate.net/publication/369197973_Accelerating_Finite_Field_Arithmetic_for_Homomorphic_Encryption_on_GPUs RG]][[File:Lady Bug.png|right|frameless|91x91px]]
+
([https://ieeexplore.ieee.org/document/10068510 IEEE MICRO 2023]) [[https://wiki.kaustubh.us/w/img_auth.php/FHE_IEEE_Micro.pdf PDF]] [[https://www.researchgate.net/publication/369197973_Accelerating_Finite_Field_Arithmetic_for_Homomorphic_Encryption_on_GPUs RG]]
 
+
==.==
== . ==
+
[[File:Lady Bug.png|right|frameless|111x111px]]
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/FHE_SEED_2022.pdf Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/FHE_SEED_2022.pdf Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs]'''======
Line 169: Line 169:
 
|}
 
|}
  
== . ==
+
==.==
[[File:Hacker icon.png|right|frameless|103x103px]]
+
[[File:Hacker icon.png|right|frameless|90x90px]]
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/JAXED_Reverse_Engineering_DNN_Architectures_Leveraging_JIT_GEMM_Libraries.pdf JAXED: Reverse Engineering DNN Architectures Leveraging JIT GEMM Libraries]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/JAXED_Reverse_Engineering_DNN_Architectures_Leveraging_JIT_GEMM_Libraries.pdf JAXED: Reverse Engineering DNN Architectures Leveraging JIT GEMM Libraries]'''======
Line 193: Line 193:
 
|}
 
|}
  
== . ==
+
==.==
[[File:Mini GNN.png|right|frameless|69x69px]]
+
[[File:Mini GNN.png|right|frameless|98x98px]]
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/GNNMark.pdf GNNMark: A benchmark suite to characterize graph neural network training on GPUs]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/GNNMark.pdf GNNMark: A benchmark suite to characterize graph neural network training on GPUs]'''======
Line 217: Line 217:
 
|}
 
|}
  
== . ==
+
==.==
[[File:Core Image SMASH.png|right|frameless|52x52px]]
+
[[File:Core Image SMASH.png|right|frameless|45x45px]]
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/SMASH_Thesis.pdf SMASH: Sparse Matrix Atomic Scratchpad Hashing]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/SMASH_Thesis.pdf SMASH: Sparse Matrix Atomic Scratchpad Hashing]'''======
Line 243: Line 243:
 
|}
 
|}
  
== . ==
+
==.==
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/SC_18_Cluster_Contest_Paper.pdf Student cluster competition 2018, team northeastern university: Reproducing performance of a multi-physics simulations of the Tsunamigenic 2004 Sumatra Megathrust earthquake on the AMD EPYC 7551 architecture]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/SC_18_Cluster_Contest_Paper.pdf Student cluster competition 2018, team northeastern university: Reproducing performance of a multi-physics simulations of the Tsunamigenic 2004 Sumatra Megathrust earthquake on the AMD EPYC 7551 architecture]'''======
Line 262: Line 262:
 
|}
 
|}
  
== . ==
+
==.==
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/BARC_speeding.pdf Speeding up DNNs using HPL based Fine-grained Tiling for Distributed Multi-GPU Training]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/BARC_speeding.pdf Speeding up DNNs using HPL based Fine-grained Tiling for Distributed Multi-GPU Training]'''======
Line 270: Line 270:
 
[[https://www.researchgate.net/publication/357766887_Speeding_up_DNNs_using_HPL_based_Fine-grained_Tiling_for_Distributed_Multi-GPU_Training RG]]
 
[[https://www.researchgate.net/publication/357766887_Speeding_up_DNNs_using_HPL_based_Fine-grained_Tiling_for_Distributed_Multi-GPU_Training RG]]
  
== . ==
+
==.==
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/Video_Steganography.pdf Video steganography using encrypted payload for satellite communication]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/Video_Steganography.pdf Video steganography using encrypted payload for satellite communication]'''======
Line 278: Line 278:
 
[[https://www.researchgate.net/publication/317702110_Video_steganography_using_encrypted_payload_for_satellite_communication RG]]
 
[[https://www.researchgate.net/publication/317702110_Video_steganography_using_encrypted_payload_for_satellite_communication RG]]
  
== . ==
+
==.==
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/missing_middle.pdf Missing 'Middle Scenarios' Uncovering Nuanced Conditions in Latin America's Housing Crisis]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/missing_middle.pdf Missing 'Middle Scenarios' Uncovering Nuanced Conditions in Latin America's Housing Crisis]'''======
Line 286: Line 286:
 
[[https://www.researchgate.net/publication/361864952_Missing_Middle_Scenarios_Uncovering_Nuanced_Conditions_in_Latin_America's_Housing_Crisis RG]]
 
[[https://www.researchgate.net/publication/361864952_Missing_Middle_Scenarios_Uncovering_Nuanced_Conditions_in_Latin_America's_Housing_Crisis RG]]
  
== . ==
+
==.==
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/dynamic_power.pdf Dynamic power allocation using Stackelberg game in a wireless sensor network]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/dynamic_power.pdf Dynamic power allocation using Stackelberg game in a wireless sensor network]'''======
Line 294: Line 294:
 
[[https://www.researchgate.net/publication/294873909_Dynamic_Power_Allocation_using_Stackelberg_Game_in_a_Wireless_Sensor_Network RG]]
 
[[https://www.researchgate.net/publication/294873909_Dynamic_Power_Allocation_using_Stackelberg_Game_in_a_Wireless_Sensor_Network RG]]
  
== . ==
+
==.==
  
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/automatic_image.pdf Automatic image annotation using a hybrid engine]'''======
 
======'''[https://wiki.kaustubh.us/w/img_auth.php/automatic_image.pdf Automatic image annotation using a hybrid engine]'''======

Latest revision as of 15:46, 14 March 2024

Boston, MA

Hi, I am Kaustubh, a Ph.D. candidate studying computer engineering in NUCAR lab at Northeastern University with my advisor David Kaeli. My research focuses on designing hardware accelerators for sparse graph workloads.

My expertise lies in:

  • Computer Architecture Simulator Design
  • Graph Neural Network Accelerators
  • Sparse Matrix Accelerators
  • Homomorphic Encryption Accelerators
  • GPU Kernel Design

Contact:

  • shivdikar.k [at] northeastern [dot] edu
  • mail [at] kaustubh [dot] us

ResearchGate Google Scholar


[Resume]







Education

  • PhD - Computer Engineering, Northeastern University [May 2024]
  • MS - Electrical and Computer Engineering, Northeastern University [May 2021]
  • BS - Electrical Engineering, Veermata Jijabai Technological Institute [May 2016]

Work







Recent News

  • June 2022: Mentored Lina Adkins for the GNN Acceleration project at REU-Pathways program
  • May 2022: Served as Submission co-chair for HPCA 2023 conference.
  • Jan 2020: Taught the GPU Programming Course at NEU
  • April 2019: Graduate Innovator Award at the RISE 2019 Research Expo for our poster Pi-Tiles
  • April 2018: Best Poster Award at the RISE 2018 Research Expo for our poster The Prime Hexagon
  • Nov 2018: Mentored the NEU team for Student Cluster Contest at Super Computing Conference 2018
  • Nov 2017: Joined the NEU Team for Student Cluster Contest at Super Computing Conference 2017






Publications

Scalability Limitations of Processing-in-Memory using Real System Evaluations
Scalability Limitations of Processing-in-Memory using Real System Evaluations


(ACM SIGMETRICS 2024) [PDF] [RG]

Abstract
Abstract
Processing-in-memory (PIM), where the compute is moved closer to the memory or the data, has been widely explored to accelerate emerging workloads. Recently, different PIM-based systems have been announced by memory vendors to minimize data movement and improve performance as well as energy efficiency. One critical component of PIM is the large amount of compute parallelism provided across many PIM “nodes” or the compute units near the memory. In this work, we provide an extensive evaluation and analysis of real PIM systems based on UPMEM PIM. We show that while there are benefits of PIM, there are also scalability challenges and limitations as the number of PIM nodes increases. In particular, we show how collective communications that are commonly found in many kernels/workloads can be problematic for PIM systems. To evaluate the impact of collective communication in PIM architectures, we provide an in-depth analysis of two workloads on the UPMEM PIM system that utilize representative common collective communication patterns – AllReduce and All-to-All communication. Specifically, we evaluate 1) embedding tables that are commonly used in recommendation systems that require AllReduce and 2) the Number Theoretic Transform (NTT) kernel which is a critical component of Fully Homomorphic Encryption (FHE) that requires All-to-All communication. We analyze the performance benefits of these workloads and show how they can be efficiently mapped to the PIM architecture through alternative data partitioning. However, since each PIM compute unit can only access its local memory, when communication is necessary between PIM nodes (or remote data is needed), communication between the compute units must be done through the host CPU, thereby severely hampering application performance. To increase the scalability (or applicability) of PIM to future workloads, we make the case for how future PIM architectures need efficient communication or interconnection networks between the PIM nodes that require both hardware and software support.
Scaling PIM.png
Authors: Gilbert Jonatan, Haeyoon Cho, Hyojun Son, Xiangyu Wu, Neal Livesay, Evelio Mora, Kaustubh Shivdikar, José L. Abellán, Ajay Joshi, David Kaeli, John Kim

.

GNN Logo
MaxK-GNN: Towards Theoretical Speed Limits for Accelerating Graph Neural Networks Training


(ASPLOS 2024) [PDF] [GitHub] [RG]

Abstract
Abstract
In the acceleration of deep neural network training, the graphics processing unit (GPU) has become the mainstream platform. GPUs face substantial challenges on Graph Neural Networks (GNNs), such as workload imbalance and memory access irregularities, leading to underutilized hardware. Existing solutions such as PyG, DGL with cuSPARSE, and GNNAdvisor frameworks partially address these challenges. However, the memory traffic involved with Sparse-Dense Matrix Matrix Multiplication (SpMM) is still significant. We argue that drastic performance improvements can only be achieved by the vertical optimization of algorithm and system innovations, rather than treating the speedup optimization as an "after-thought" (i.e., (i) given a GNN algorithm, designing an accelerator, or (ii) given hardware, mainly optimizing the GNN algorithm). In this paper, we present MaxK-GNN, an advanced high-performance GPU training system integrating algorithms and system innovation. (i) We introduce the MaxK nonlinearity and provide a theoretical analysis of MaxK nonlinearity as a universal approximator, and present the Compressed Balanced Sparse Row (CBSR) format, designed to store the data and index of the feature matrix after nonlinearity; (ii) We design a coalescing enhanced forward computation with row-wise product-based Sparse Matrix-Matrix Multiplication (SpGEMM) Kernel using CBSR for input feature matrix fetching and strategic placement of a sparse output accumulation buffer in shared memory; (iii) We develop an optimized backward computation with outer product-based and Sampled Sparse Matrix Dense Matrix Multiplication (SSpMM) Kernel. We conduct extensive evaluations of MaxK-GNN and report the end-to-end system run-time. Experiments show that our MaxK-GNN system could approach the theoretical speedup limit according to Amdahl’s law. We achieve comparable accuracy to existing GNNs, but at a significantly increased speed: 3.22×/4.24× speedup (vs. theoretical limits, 5.52×/7.27×) on Reddit compared to DGL and GNNAdvisor implementations. Our implementation can be found on GitHub
MaxK GNN Operations.png

Training dataflow of single MaxK-based GNN layer. In the backward computation, the transposed CSC format is equal to original CSR format.

Authors: Hongwu Peng, Xi Xie, Kaustubh Shivdikar, MD Amit Hasan, Shaoyi Huang, Omen Khan, Caiwen Ding, David Kaeli

.

AMD MI100 GPU
GME: GPU-based Microarchitectural Extensions to Accelerate Homomorphic Encryption


(IEEE/ACM MICRO 2023) [PDF] [RG] [Slides]

Abstract
Abstract
Fully Homomorphic Encryption (FHE) enables the processing of encrypted data without decrypting it.

FHE has garnered significant attention over the past decade as it supports secure outsourcing of data processing to remote cloud services.

Despite its promise of strong data privacy and security guarantees, FHE introduces a slowdown of up to five orders of magnitude as compared to the same computation using plaintext data.

This overhead is presently a major barrier to the commercial adoption of FHE.

In this work, we leverage GPUs to accelerate FHE, capitalizing on a well-established GPU ecosystem available in the cloud.

We propose GME, which combines three key microarchitectural extensions along with a compile-time optimization to the current AMD CDNA GPU architecture.

First, GME integrates a lightweight on-chip compute unit (CU)-side hierarchical interconnect to retain ciphertext in cache across FHE kernels, thus eliminating redundant memory transactions.

Second, to tackle compute bottlenecks, GME introduces special MOD-units that provide native custom hardware support for modular reduction operations, one of the most commonly executed sets of operations in FHE.

Third, by integrating the MOD-unit with our novel pipelined 64-bit integer arithmetic cores (WMAC-units), GME further accelerates FHE workloads by 19%.

Finally, we propose a Locality-Aware Block Scheduler (LABS) that exploits the temporal locality available in FHE primitive blocks.

Incorporating these microarchitectural features and compiler optimizations, we create a synergistic approach achieving average speedups of 796x, 14.2x, and 2.3x over Intel Xeon CPU, NVIDIA V100 GPU, and Xilinx FPGA implementations, respectively.

GME NOC.png
Authors: Kaustubh Shivdikar, Yuhui Bao, Rashmi Agrawal, Michael Shen, Gilbert Jonatan, Evelio Mora, Alexander Ingare, Neal Livesay, José L. Abellán, John Kim, Ajay Joshi, David Kaeli

.

V100 GPU.png
Accelerating Finite Field Arithmetic for Homomorphic Encryption on GPUs


(IEEE MICRO 2023) [PDF] [RG]

.

Lady Bug.png
Accelerating Polynomial Multiplication for Homomorphic Encryption on GPUs


(SEED 2022) [PDF][Slides] [RG]

Abstract
Abstract
Homomorphic Encryption (HE) enables users to securely outsource both the storage and computation of sensitive data to untrusted servers. Not only does FHE offer an attractive solution for security in cloud systems, but lattice-based FHE systems are also believed to be resistant to attacks by quantum computers. However, current FHE implementations suffer from prohibitively high latency. For lattice-based FHE to become viable for real-world systems, it is necessary for the key bottlenecks---particularly polynomial multiplication---to be highly efficient.

In this paper, we present a characterization of GPU-based implementations of polynomial multiplication. We begin with a survey of modular reduction techniques and analyze several variants of the widely-used Barrett modular reduction algorithm. We then propose a modular reduction variant optimized for 64-bit integer words on the GPU, obtaining a 1.8x speedup over the existing comparable implementations.


Next, we explore the following GPU-specific improvements for polynomial multiplication targeted at optimizing latency and throughput: 1) We present a 2D mixed-radix, multi-block implementation of NTT that results in a 1.85x average speedup over the previous state-of-the-art. 2) We explore shared memory optimizations aimed at reducing redundant memory accesses, further improving speedups by 1.2x. 3) Finally, we fuse the Hadamard product with neighboring stages of the NTT, reducing the twiddle factor memory footprint by 50%. By combining our NTT optimizations, we achieve an overall speedup of 123.13x and 2.37x over the previous state-of-the-art CPU and GPU implementations of NTT kernels, respectively.

FHE Teaser.png

FHE protects against network insecurities in untrusted cloud services, enabling users to securely offload sensitive data

Authors: Kaustubh Shivdikar, Gilbert Jonatan, Evelio Mora, Neal Livesay, Rashmi Agrawal, Ajay Joshi, José L. Abellán, John Kim, David Kaeli

.

Hacker icon.png
JAXED: Reverse Engineering DNN Architectures Leveraging JIT GEMM Libraries


(SEED 2021) [PDF] [Slides] [Poster] [RG]

Abstract
Abstract
General matrix multiplication (GEMM) libraries on x86 architectures have recently adopted Just-in-time (JIT) based optimizations to dramatically reduce the execution time of small and medium-sized matrix multiplication. The exploitation of the latest CPU architectural extensions, such as the AVX2 and AVX-512 extensions, are the target for these optimizations. Although JIT compilers can provide impressive speedups to GEMM libraries, they expose a new attack surface through the built-in JIT code caches. These software-based caches allow an adversary to extract sensitive information through carefully designed timing attacks. The attack surface of such libraries has become more prominent due to their widespread integration into popular Machine Learning (ML) frameworks such as PyTorch and Tensorflow.


In our paper, we present a novel attack strategy for JIT-compiled GEMM libraries called JAXED. We demonstrate how an adversary can exploit the GEMM library's vulnerable state management to extract confidential CNN model hyperparameters. We show that using JAXED, one can successfully extract the hyperparameters of models with fully-connected layers with an average accuracy of 92%. Further, we demonstrate our attack against the final fully connected layer of 10 popular DNN models. Finally, we perform an end-to-end attack on MobileNetV2, on both the convolution and FC layers, successfully extracting model hyperparameters.

JAXED Teaser.png

Attack Surface: After the victim’s execution, the victim leaves behind information about its model hyperparameters in the JIT code cache. The attacker probes this JIT code cache through the attacker’s ML model and observes timing information to determine the victim’s model hyperparameters.

Authors: Malith Jayaweera, Kaustubh Shivdikar, Yanzhi Wang, David Kaeli

.

Mini GNN.png
GNNMark: A benchmark suite to characterize graph neural network training on GPUs


(ISPASS 2021) [PDF] [RG]

Abstract
Abstract
Graph Neural Networks (GNNs) have emerged as a promising class of Machine Learning algorithms to train on non-euclidean data. GNNs are widely used in recommender systems, drug discovery, text understanding, and traffic forecasting. Due to the energy efficiency and high-performance capabilities of GPUs, GPUs are a natural choice for accelerating the training of GNNs. Thus, we want to better understand the architectural and system level implications of training GNNs on GPUs. Presently, there is no benchmark suite available designed to study GNN training workloads.


In this work, we address this need by presenting GNNMark, a feature-rich benchmark suite that covers the diversity present in GNN training workloads, datasets, and GNN frameworks. Our benchmark suite consists of GNN workloads that utilize a variety of different graph-based data structures, including homogeneous graphs, dynamic graphs, and heterogeneous graphs commonly used in a number of application domains that we mentioned above. We use this benchmark suite to explore and characterize GNN training behavior on GPUs. We study a variety of aspects of GNN execution, including both compute and memory behavior, highlighting major bottlenecks observed during GNN training. At the system level, we study various aspects, including the scalability of training GNNs across a multi-GPU system, as well as the sparsity of data, encountered during training. The insights derived from our work can be leveraged by both hardware and software developers to improve both the hardware and software performance of GNN training on GPUs.

GNN Analysis.png

Graph Neural Network Analysis

Authors: Trinayan Baruah, Kaustubh Shivdikar, Shi Dong, Yifan Sun, Saiful A Mojumder, Kihoon Jung, José L. Abellán, Yash Ukidave, Ajay Joshi, John Kim, David Kaeli

.

Core Image SMASH.png
SMASH: Sparse Matrix Atomic Scratchpad Hashing


(MS Thesis, 2021) [PDF] [RG]

Abstract
Abstract
Sparse matrices, more specifically Sparse Matrix-Matrix Multiply (SpGEMM) kernels, are commonly found in a wide range of applications, spanning graph-based path-finding to machine learning algorithms (e.g., neural networks). A particular challenge in implementing SpGEMM kernels has been the pressure placed on DRAM memory. One approach to tackle this problem is to use an inner product method for the SpGEMM kernel implementation. While the inner product produces fewer intermediate results, it can end up saturating the memory bandwidth, given the high number of redundant fetches of the input matrix elements. Using an outer product-based SpGEMM kernel can reduce redundant fetches, but at the cost of increased overhead due to extra computation and memory accesses for producing/managing partial products.


In this thesis, we introduce a novel SpGEMM kernel implementation based on the row-wise product approach. We leverage atomic instructions to merge intermediate partial products as they are generated. The use of atomic instructions eliminates the need to create partial product matrices, thus eliminating redundant DRAM fetches.

To evaluate our row-wise product approach, we map an optimized SpGEMM kernel to a custom accelerator designed to accelerate graph-based applications. The targeted accelerator is an experimental system named PIUMA, being developed by Intel. PIUMA provides several attractive features, including fast context switching, user-configurable caches, globally addressable memory, non-coherent caches, and asynchronous pipelines. We tailor our SpGEMM kernel to exploit many of the features of the PIUMA fabric.

This thesis compares our SpGEMM implementation against prior solutions, all mapped to the PIUMA framework. We briefly describe some of the PIUMA architecture features and then delve into the details of our optimized SpGEMM kernel. Our SpGEMM kernel can achieve 9.4x speedup as compared to competing approaches.

SMASH Algorithm.png

The SMASH Algorithm

.

Student cluster competition 2018, team northeastern university: Reproducing performance of a multi-physics simulations of the Tsunamigenic 2004 Sumatra Megathrust earthquake on the AMD EPYC 7551 architecture


(SC 2018) [PDF] [RG]

Abstract
Abstract
This paper evaluates the reproducibility of a Supercomputing 17 paper titled Extreme Scale Multi-Physics Simulations of the Tsunamigenic 2004 Sumatra Megathrust Earthquake. We evaluate reproducibility on a significantly smaller computer system than used in the original work. We found that we able to demon- strate reproducibility of the multi-physics simulations on a single-node system, as well as confirm multi- node scaling. However, reproducibility of the visual and geophysical simulation results were inconclusive due to issues related to input parameters provided to our model. The SC 17 paper provided results for both CPU-based simulations as well as Xeon Phi based simulations. Since our cluster uses NVIDIA V100s for acceleration, we are only able to assess the CPU-based results in terms of reproducibility.
Earthquake simulation.png

Horizontal Seafloor displacement simulation

Authors: Chris Bunn, Harrison Barclay, Anthony Lazarev, Toyin Yusuf, Jason Fitch, Jason Booth, Kaustubh Shivdikar, David Kaeli

.

Speeding up DNNs using HPL based Fine-grained Tiling for Distributed Multi-GPU Training


(BARC 2018) [PDF] [RG]

.

Video steganography using encrypted payload for satellite communication


(Aerospace Conference 2017) [PDF] [RG]

.

Missing 'Middle Scenarios' Uncovering Nuanced Conditions in Latin America's Housing Crisis


(Cityscape 2017) [PDF] [RG]

.

Dynamic power allocation using Stackelberg game in a wireless sensor network


(Aerospace Conference 2016) [PDF] [RG]

.

Automatic image annotation using a hybrid engine


(Indicon 2015) [PDF] [RG]








Posters

  • FHE [PDF]
  • JAXED [PDF]
  • Pi-Tiles (Graduate Innovator Award) [PDF]
  • The Prime Hexagon (Best Poster Award) [PDF]











What is KTB Wiki?

KTB Wiki, because the best way to store your knowledge is in an indexed SQL database.

This website was built on KTB Wiki. KTB wiki is my side project/attempt to consolidate knowledge gained during my Ph.D. journey. Though many other platforms provide similar service, the process of creating KTB Wiki was a learning experience since it taught me concepts of indexing, load balancing, and in-memory file systems. KTB Wiki was built using MediaWiki and is intended for research purposes only.




















Interesting Reads