Existing approaches to distributed matrix computations involve allocating coded combinations of submatrices to worker nodes, to build resilience to stragglers and/or enhance privacy. In this study, we consider the challenge of preserving input sparsity in such approaches to retain the associated computational efficiency enhancements. First, we find a lower bound on the weight of coding, i.e., the number of submatrices to be combined to obtain coded submatrices to provide the resilience to the maximum possible number of stragglers (for given number of nodes and their storage constraints). Next we propose a distributed matrix computation scheme which meets this exact lower bound on the weight of the coding. Further, we develop controllable tr...
Distributed matrix computations (matrix-vector and matrix-matrix multiplications) are at the heart o...
We consider the problem of secure distributed matrix multiplication (SDMM). Coded computation has be...
Coded computing is a method for mitigating straggling workers in a centralized computing network, by...
The overall execution time of distributed matrix computations is often dominated by slow worker node...
We consider the problem of maintaining sparsity in private distributed storage of confidential machi...
Distributed matrix multiplication is widely used in several scientific domains. It is well recognize...
We consider a scenario involving computations over a massive dataset stored distributedly across mul...
In distributed computing systems, it is well recognized that worker nodes that are slow (called stra...
The current BigData era routinely requires the processing of large scale data on massive distributed...
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often...
Coded computation techniques provide robustness against straggling workers in distributed computing....
Coded computation is an emerging research area that leverages concepts from erasure coding to mitiga...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
Distributed computing systems are well-known to suffer from the problem of slow or failed nodes; the...
Data and analytics capabilities have made a leap forward in recent years. The volume of available da...
Distributed matrix computations (matrix-vector and matrix-matrix multiplications) are at the heart o...
We consider the problem of secure distributed matrix multiplication (SDMM). Coded computation has be...
Coded computing is a method for mitigating straggling workers in a centralized computing network, by...
The overall execution time of distributed matrix computations is often dominated by slow worker node...
We consider the problem of maintaining sparsity in private distributed storage of confidential machi...
Distributed matrix multiplication is widely used in several scientific domains. It is well recognize...
We consider a scenario involving computations over a massive dataset stored distributedly across mul...
In distributed computing systems, it is well recognized that worker nodes that are slow (called stra...
The current BigData era routinely requires the processing of large scale data on massive distributed...
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often...
Coded computation techniques provide robustness against straggling workers in distributed computing....
Coded computation is an emerging research area that leverages concepts from erasure coding to mitiga...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
Distributed computing systems are well-known to suffer from the problem of slow or failed nodes; the...
Data and analytics capabilities have made a leap forward in recent years. The volume of available da...
Distributed matrix computations (matrix-vector and matrix-matrix multiplications) are at the heart o...
We consider the problem of secure distributed matrix multiplication (SDMM). Coded computation has be...
Coded computing is a method for mitigating straggling workers in a centralized computing network, by...