NGEMM: Optimizing GEMM for Deep Learning via Compiler-based Techniques

10/01/2019 ∙ by Wenlei Bao, et al. ∙ Microsoft 0

Quantization has emerged to be an effective way to significantly boost the performance of deep neural networks (DNNs) by utilizing low-bit computations. Despite having lower numerical precision, quantized DNNs are able to reduce both memory bandwidth and computation cycles with little losses of accuracy. Integer GEMM (General Matrix Multiplication) is critical to running quantized DNN models efficiently, as GEMM operations often dominate the computations in these models. Various approaches have been developed by leveraging techniques such as vectorization and memory layout to improve the performance of integer GEMM. However, these existing approaches are not fast enough in certain scenarios. We developed NGEMM, a compiler-based GEMM implementation for accelerating lower-precision training and inference. NGEMM has better use of the vector units by avoiding unnecessary vector computation that is introduced during tree reduction. Our experimental results showed that NGEMM outperformed the state-of-art BLAS libraries such as MKL by an average of 1.4x. We have applied NGEMM to a number of production services in Microsoft



There are no comments yet.


page 2

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

1 Introduction

In the past few years, deep neural networks (DNNs) have demonstrated great success in various domains such as natural language processing 

Howard and Ruder (2018); Radford et al. (2018), speech recognition Deng et al. (2013); Anwar et al. (2015)

and computer vision 

Simonyan and Zisserman (2014); Szegedy et al. (2015). The increasing size and complexity of DNN models have become an impediment to the deployment of these models on edge devices where latency is often a hard requirement. Even for cloud platforms like Azure, AWS and Google Cloud, where more computational resources are available, complex models such as BERT Devlin et al. (2018) may still cause long service time and high cost for both training and inference.

Quantization has emerged to be an effective way to significantly improve the performance of DNN models by utilizing low-bit computations Krishnamoorthi (2018); Jacob et al. (2018); Rastegari et al. (2016b); Han et al. (2015); Lin et al. (2016). By converting the weights and activations of a DNN model from high-precision floating point values to low-precision representations, quantization is able to reduce the model size and hence requires less memory for running the model. Smaller memory footprint can have better cache behavior, because more intermediate computation results can be kept in the cache for re-use. Moreover, computations on lower numerical representations such as 8-bit integers almost always need fewer clock cycles on contemporary general purpose CPUs and GPUs, compared with their high precision counterparts such as 32-bit floating point.

GEMM operations often dominate the computation for training or inferencing DNN models Jia (2014). Consequently, high performant integer GEMM has great impact to the efficiency of quantized DNN models, where high-precision floating point matrix elements are converted to low-bit such as 8-bit integers. Recently, there have been increasing efforts in developing high-performance low-precision GEMM libraries, such as FBGEMM Deng. (2018), gemmlowp Jacob and others (2017) and MKL 22, where various techniques such as vectorization and memory layout are applied to optimize GEMM computation. However, these solutions are still not fast enough in certain scenarios.

We developed NGEMM, an optimized GEMM implementation for DNN models based on compiler techniques. NGEMM can provide high performance GEMM computation with different low-precision representations for various target machines. Our experimental results showed that NGEMM outperformed MKL by an average of 1.4x. NGEMM has been used in a number of Microsoft production services.

In the rest of the paper, we will be focusing on Intel X86 CPUs, which are ubiquitous in modern computing systems. However, our methodology is widely applicable and not just specific to Intel CPUs.

2 Background

In this section, we briefly discuss the conventional approach to implementing low-precision GEMM.

2.1 Conventional Approach

Figure 1: Conventional GEMM

Figure 1 shows the conventional approach Rodriguez et al. (2018) to conduct low-precision GEMM. Matrix A is the weight matrix with size of , and is typically determined from the training. Matrix B is input matrix, which contains the input data. Matrix C is the result. In low-precision GEMM, matrices A and B are the ones with low numerical precision such as 8- or 16-bit, while matrix C is in higher precision like 32-bit. Throughout the example below, we will use unsigned 8-bit integers for matrix A and signed 8-bit integers for matrix B. Other integer types have similar processes.

In Figure 1, ➀, ➁ and ➂ are the typical phases to perform GEMM vector reduction, which computes the dot product of one row from matrix A and one column from matrix B to produce one element of matrix C. Phase ➀ shows the process of converting low-precision values to higher precision. VPMADDUBSW takes two 8-bit integer vectors, and , which contain unsigned and signed integers loaded from matrix A and B, respectively. It then multiplies each unsigned 8-bit integer in and the corresponding signed 8-bit integer in , produces a signed 16-bit integer. Lastly, it adds adjacent pairs of the 16-bit integers to generate another vector :

After that, VPMADDWD takes and a unit vector to perform horizontal reduction, which produces a signed 32-bit integer vector :

where each 32-bit value in comes from four 8-bit values, thus . The result of phase ➀ is a 32-bit integer vector with size of .

Note that the vector width (i.e. the number of cubes in the vector) in Figure 1 is just for illustration purpose. The actual width depends on the data type and target machine. For example, on an AVX-2 machine, where the vector width is 256 bits, the vector size of is . In contrast, for an AVX512 machine, becomes .

Phase ➁ repeats the computation in Phase ➀ multiple times for the rest of the bytes of the same row from matrix A and the same column from matrix B. Each repetition produces a 32-bit vector , which will be accumulated using instruction VPADDD. This phase gives us: .

Phase ➂ sums all of the 32-bit integers within the vector using tree-reduction to generate one final element in matrix C (shown as the black cube). There are different ways to achieve this phase depends on instructions used. One approach is to use VPHADDD, which is the instruction to horizontally add adjacent pairs of 32-bit integers. Depending on vector width, multiple VPHADDD are needed to accumulate the integer values and generate the final value. The other approach is to utilize the VPSHFD instruction, which shuffles the 32-bit integers within the vector, with following VPADDD to accumulate corresponding values to generate the final result.

Finally, phase ➀ ➁ ➂ are applied to all rows of matrix A and columns of matrix B to generate the whole matrix C. Although these phases change the common reduction order of GEMM, they are typically applicable in integer computation unless overflow happens due to a very large , which is rare for most DNN models, where ranges from 100s to 1000s.

3 Methodology

3.1 Proposed Approach

The conventional approach described in the previous section is straightforward to perform low-precision GEMM computation. However, it is not optimal because the vector units are not fully used during the tree-reduction phase ➂. Therefore, we propose NGEMM, which has better use of the vector units by avoiding non-efficient vector computation such as tree-reduction.

Figure 2: NGEMM

Figure 2 shows the details of our proposed approach. We use the same configuration as that we used for the conventional approach: matrix A is the weight matrix, matrix B is the input matrix, and matrix C is the result matrix. Matrices A and B are in low numerical precision, and matrix C has 32-bit full precision.

Similar to phase ➀ in the conventional approach, phase ❶ computes partial results from two vectors, and , using VPMADDUBSW and VPMADDWD. However, the shapes of the loaded data are different from the conventional approach even with the same vector length. In this illustration, its shape is , which is determined by the vector width and the width of horizontal reduction in practise. For example, the shape is for AVX2. Because both dimensions are shorter than the vector width, loads of access non-contiguous memory, which may compromise memory bandwidth. To resolve the issue, we apply data layout transformation (see Sec 3.1.1) to force to be fully contiguous in memory.

Furthermore, because vector has shorter length than (), we broadcast to :

where has the same width as . Since we have as an example in Figure 2 (two elements during load of matrix B), we also use that for simplicity, which give us: . Consequently, and will be as follows:

The second phase ❷ accumulates all the partial results of to directly form the final result vector in matrix C.

Figure 2 also shows the two more partial results obtained by applying phases ❶ and ❷ to the same part of A but different two vectors of B. The same computation will be applied to the entire A and B and obtain the final result matrix C.

Compared with phases ➀ ➁ ➂ of the conventional approach, our approach only has phases ❶ and ❷ but missing the tree-reduction phase, which is implicitly finished through the vector additions in phase ❷.

Our proposed approach is not limited to GEMM operations, but benefits other similar computations such as GEMV. Moreover, it is also applicable to GEMM operations with other types such as signed 16-bit or unsigned 8-bit integers.

3.1.1 Data Layout

We describe the data layout used by our proposed approach in detail. The layout is mainly for the weight matrix in a DNN model, e.g. matrix A in our examples. Therefore, data marshalling can often be performed offline. For those uncommon cases where both matrices are inputs, we can simply perform online packing with extra overhead.

Figure 3: NGEMM inner layout for weight matrix

Figure 3 and Figure 4 demonstrates the two-level hierarchy of the layout used in NGEMM. Figure 3 shows various inner layouts in NGEMM, where the top row display the original vector access. Assuming the memory address grows horizontally, the original vector loads the contiguous elements from the memory. Vector width depends on hardware instructions and data types as displayed in Figure 3:

The bottom row draws the inner layout, which determines the data access pattern for the matrix. Instead of accessing data from a single row or column, inner layout will first access elements along dimension and then move to next row, and repeat this process times along M dimension. This kind of memory access forms a small zigzag pattern, which is known as Morton code Morton (1966). Usually, and are determined by hardware instructions and data type:

The size of simply implies the number of elements needed to be accumulated to a single 32-bit value in phase (❶).

Figure 4 illustrates the outer layout pattern in NGEMM for weight matrix. The outer layout can be combined with loop optimizations such as loop tiling to deliver better performance. Loop tiling is a classic loop transformation technique to maximize parallelism and improve cache locality Hong et al. (2016); Bao et al. (2017b, a). It has been widely adopted in various BLAS libraries to optimize intensive computation such as GEMM.

Figure 4 (a) shows the outer layout without loop tiling applied, which iterate the inner layout pattern first through M dimension and then K dimension for the whole matrix. It is worth mentioning that if columns or rows are not multiple of or

, we simply pad 0-element, respectively.

(a) Outer layout without tiling (b) Outer layout with tiling
Figure 4: NGEMM outer layout for weight matrix

Figure 4 (b) shows the tiling with a tile size -by- combined with the layout for matrix A, where denote tiling sizes along dimension of the GEMM. In our tiling scheme, -by- typically contains multiple -by-. Thus the tiling size selection of becomes , where is the tiling size along dimension N. The outer layout then is to iterate the tile pattern through the whole matrix.

Moreover, we also apply inter- and intra- tile level optimizations. For inter-tile level, we perform loop unrolling to increase locality and reduce loop control overhead within a tile. For intra-tile level, different loop permutation can be used, which corresponds to the outer layout iterate order described previously. Overall, the loop tiling size and permutation are a typical search-space-exploration problem, which can be solved by techniques such as auto-tuning.

3.2 Latency Analysis

In this part, we perform the latency analysis between the conventional approach and our NGEMM. Note, here, we only considers the computation cost, but ignores the cost of loads/stores, since after data layout transformation, memory accesses in the both methods have become contiguous.

Assume the matrix sizes are the same as previous section, i.e. with vector width . The latency of the conventional approach can be calculated as follows:

where and are the total cost for phase ➀ and ➁ in the conventional approach respectively. Here, is the latency cost of tree-reduction computation , and is constant parameter.

For our proposed NGEMM with layout size , the latency is as follows:

where latency(❶) and latency(❷) are the time cost of phase ❶ and ❷ in NGEMM. The speedup ratio between these two can be expressed as:


where phases of ➀ ➁ and ❶ ❷ have the same latency cost, and their latency can be noted as . Then equation (1) can be expressed as:


where represents the reduction dimension in the step of vector width of matrix multiplication, is the vector width and is constant parameter.

From equation (2), we can observe that the speedup is relevant to reduction dimension and vector width. The longer vector width and the shorter reduction dimension will result in better speedup. It is worth mentioning that the trend of increasing vector width continues in new generation of processors.

4 Implementation

We implemented single-threaded NGEMM by leveraging TVM Chen et al. (2018)tensorize schedule primitive that replaces partial computation code with the corresponding intrinsics in LLVM Lattner and Adve (2004). It can be easily extended to support multi-threading by parallelizing the outermost loop. We modified TVM code to properly handle tail condition during code generation, which is important for certain loop transformation techniques Bao et al. (2016b); Bao (2018). Furthermore, we added several LLVM intrinsics that were not supported by TVM. It is worthwhile to mention that our NGEMM is not limited to TVM. The same techniques can be implemented in other compiler-based frameworks  N. Rotem, J. Fix, S. Abdulrasool, G. Catron, S. Deng, R. Dzhabarov, N. Gibson, J. Hegeman, M. Lele, R. Levenstein, et al. (2018); 1.

Layout The layout of the weight matrix has been prepacked offline, and the marshalled matrix is fed as a constant initializer to the inference runtime. NGEMM generates different layouts for the weight matrix based on numerical precision requirements and supported instruction sets.

Loop Optimization The optimal loop tiling sizes and permutation orders are determined through compiler auto-tuning. NGEMM generates the best choice based on matrix sizes, target machines and numerical precision.

Moreover, it is straightforward to explore more extensions such as operation fusion with the help of compiler techniques. DNN models have pre- and post-GEMM operations, which can be fused together with GEMM to increase cache locality and thus improve performance.

5 Evaluation

We evaluated NGEMM’s performance against MKLDNN (MKLML) v0.21111This version of MKL fixed certain performance issues in previous versions.. Our NGEMM was implemented in ONNX Runtime Microsoft (2018), using a custom version of TVM with LLVM 6.0.1. The experiments were conducted on a machine with 8-core 2.3GHz Intel Xeon E5-2673V4 processor with AVX2 support. The machine has Ubuntu 16.04 and GCC version of 6.5. No frequency scaling (DVFS) related techniques were used in the experiments Bao et al. (2016a); Farkas et al. (2000). The performance numbers were obtained using the performance test tool of the onnxruntime.

Figure 5: Performance Speedups of NGEMM vs MKL(single-threaded cblas_gemm_s8u8s32) over different sizes

Figure 5 shows the speedups of NGEMM over MKL (single-threaded cblas_gemm_s8u8s32

routine) on various problem sizes with the type of 8-bit integers. The last bar in the figure is the geometric mean of the NGEMM speedups across all the problem sizes. And NGEMM demonstrated a geometric mean of 1.4x speedups compared to MKL.

As shown in the graph, NGEMM has better performance compared to MKL for all the problem sizes we chosen. But the speedup varies, small batch sizes have larger benefits, where the batch size is the matrix M dimension. During the evaluation, we find that even for large batch size, NGEMM still shows around 1.1X speedups compared to MKL.

It is worth mentioning that the actual performance benefits of NGEMM might vary for deep learning models. That is because that real models have not just GEMM-related operations. There are quite many other computations such as element-wise computations, which also take considerable time. In our experiments of real production models, we saw NGEMM could delivered up to 1.3X speedups over MKL for these models.

6 Related work

Many research studies Vanhoucke et al. (2011); Rastegari et al. (2016a); Mellempudi et al. (2017); Das et al. (2018) have shown that low numerical precision can be applied to DNN models with minimal to no accuracy losses. Quantization techniques have been adopted by many DNN frameworks to improve training and inference performance. XLA (Accelerated linear algebra) Leary and Wang (2017)

is a compiler backend for TensorFlow 

Abadi et al. (2016), which supports various optimizations including quantization and generate machine instructions for different targets. Glow Rotem et al. (2018)

is a machine learning compiler, which consumes neural network graphs, performs high-level graph optimizations and low-level machine-dependent optimizations for diverse hardware targets. Glow also supports quantization with various bit-widths. TVM 

Chen et al. (2018), another compiler stack for deep learning, compiles the model into low-level IR and performs loop optimizations. It supports multiple hardware backends and quantization with different bit-widths. Our work, NGEMM, incorporates with Microsoft ONNX Runtime Microsoft (2018).

Many BLAS libraries, meanwhile, have implemented low precision GEMM for various architectures. Intel MKL (Math Kernel Library) Wang et al. (2014) provides well tuned 8- and 16-bit GEMM kernels, which is widely adopted across many DNN frameworks as a CPU vendor library. NVIDIA cuBLAS library Nvidia (2008) provides GPU counterparts on NVIDIA GPUs. FBGEMM Deng. (2018) is a reduced-precision linear algebra library for deep learning inference, and is integrated into Caffe2. Gemmlowp Jacob and others (2017) is a library that only supports low-precision GEMM. In addition to execution time, it is also optimized to minimize the power consumption, which is crucial for edge devices.

Other than TVM used implementing our proposed techniques in the paper, general-purpose code generation frameworks Chen et al. (2008); Püschel et al. (2004); Chang et al. (2016); Chang (2017); De Gonzalo et al. (2019), and domain-specific languages Ragan-Kelley et al. (2013); Sujeeth et al. (2014), are also capable to adopt our techniques for optimizing GEMM routines.

7 Conclusion

In this paper, we present NGEMM, an optimized low-precision GEMM implementation based on compiler techniques. Compared to the conventional approach adopted by contemporary BLAS libraries, our approach does not require tree reduction and hence has better performance. We implemented a hierarchical layout for the weight matrix to further improve the latency. Our evaluation on various problem sizes demonstrate an average of 1.4X speedup over state-of-the-art MKL library. A number of production models also show up to 1.3X speedup using NGEMM compared to MKL.


  • [1] (2019) "Multi-level intermediate representation" compiler infrastructure. Note: Cited by: §4.
  • M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard, et al. (2016) Tensorflow: a system for large-scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp. 265–283. Cited by: §6.
  • S. Anwar, K. Hwang, and W. Sung (2015)

    Fixed point optimization of deep convolutional neural networks for object recognition

    In 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1131–1135. Cited by: §1.
  • W. Bao, P. Rawat, M. Kong, S. Krishnamoorthy, L. Pouchet, and P. Sadayappan (2017a) Efficient cache simulation for aine computations. In International Workshop on Languages and Compilers for Parallel Computing (LCPC’17), Cited by: §3.1.1.
  • W. Bao, C. Hong, S. Chunduri, S. Krishnamoorthy, L. Pouchet, F. Rastello, and P. Sadayappan (2016a) Static and dynamic frequency scaling on multicore CPUs. ACM Transactions on Architecture and Code Optimization (TACO) 13 (4), pp. 51. Cited by: §5.
  • W. Bao, S. Krishnamoorthy, L. Pouchet, F. Rastello, and P. Sadayappan (2016b) Polycheck: dynamic verification of iteration space transformations on affine programs. In ACM SIGPLAN Notices, Vol. 51, pp. 539–554. Cited by: §4.
  • W. Bao, S. Krishnamoorthy, L. Pouchet, and P. Sadayappan (2017b) Analytical modeling of cache behavior for affine programs. Proceedings of the ACM on Programming Languages 2 (POPL), pp. 32. Cited by: §3.1.1.
  • W. Bao (2018) Compiler techniques for transformation verification, energy efficiency and cache modeling. Ph.D. Thesis, The Ohio State University. Cited by: §4.
  • L. Chang, I. E. Hajj, C. Rodrigues, J. Gómez-Luna, and W. Hwu (2016) Efficient kernel synthesis for performance portable programming. In The 49th Annual IEEE/ACM International Symposium on Microarchitecture, pp. 12:1–12:13. Cited by: §6.
  • L. Chang (2017) Toward performance portability for CPUs and GPUs through algorithmic compositions. Ph.D. Thesis, University of Illinois. Cited by: §6.
  • C. Chen, J. Chame, and M. Hall (2008) CHiLL: a framework for composing high-level loop transformations. Technical report Cited by: §6.
  • T. Chen, T. Moreau, Z. Jiang, L. Zheng, E. Yan, H. Shen, M. Cowan, L. Wang, Y. Hu, L. Ceze, et al. (2018) TVM: an automated end-to-end optimizing compiler for deep learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18), pp. 578–594. Cited by: §4, §6.
  • D. Das, N. Mellempudi, D. Mudigere, D. Kalamkar, S. Avancha, K. Banerjee, S. Sridharan, K. Vaidyanathan, B. Kaul, E. Georganas, A. Heinecke, P. Dubey, J. Corbal, N. Shustrov, R. Dubtsov, E. Fomenko, and V. Pirogov (2018) Mixed precision training of convolutional neural networks using integer operations. External Links: 1802.00930 Cited by: §6.
  • S. G. De Gonzalo, S. Huang, J. Gómez-Luna, S. Hammond, O. Mutlu, and W. Hwu (2019) Automatic generation of warp-level primitives and atomic instructions for fast and portable parallel reduction on GPUs. In Proceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization, pp. 73–84. Cited by: §6.
  • L. Deng, G. Hinton, and B. Kingsbury (2013) New types of deep neural network learning for speech recognition and related applications: an overview. In 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8599–8603. Cited by: §1.
  • S. Deng. (2018) Open-sourcing FBGEMM for state-of-the-art server-side inference. Note: Cited by: §1, §6.
  • J. Devlin, M. Chang, K. Lee, and K. Toutanova (2018) Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805. Cited by: §1.
  • K. I. Farkas, J. Flinn, G. Back, D. Grunwald, and J. M. Anderson (2000) Quantifying the energy consumption of a pocket computer and a java virtual machine. ACM SIGMETRICS Performance Evaluation Review 28 (1), pp. 252–263. Cited by: §5.
  • S. Han, J. Pool, J. Tran, and W. Dally (2015) Learning both weights and connections for efficient neural network. In Advances in neural information processing systems, pp. 1135–1143. Cited by: §1.
  • C. Hong, W. Bao, A. Cohen, S. Krishnamoorthy, L. Pouchet, F. Rastello, J. Ramanujam, and P. Sadayappan (2016) Effective padding of multidimensional arrays to avoid cache conflict misses. In ACM SIGPLAN Notices, Vol. 51, pp. 129–144. Cited by: §3.1.1.
  • J. Howard and S. Ruder (2018) Universal language model fine-tuning for text classification. arXiv preprint arXiv:1801.06146. Cited by: §1.
  • [22] (2019) Intel math kernel library. Note: Cited by: §1.
  • B. Jacob, S. Kligys, B. Chen, M. Zhu, M. Tang, A. Howard, H. Adam, and D. Kalenichenko (2018) Quantization and training of neural networks for efficient integer-arithmetic-only inference. In

    Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition

    pp. 2704–2713. Cited by: §1.
  • B. Jacob et al. (2017) Gemmlowp: a small self-contained low-precision GEMM library.(2017). Cited by: §1, §6.
  • Y. Jia (2014) Learning semantic image representations at a large scale. Ph.D. Thesis, UC Berkeley. Cited by: §1.
  • R. Krishnamoorthi (2018) Quantizing deep convolutional networks for efficient inference: A whitepaper. CoRR abs/1806.08342. External Links: Link, 1806.08342 Cited by: §1.
  • C. Lattner and V. Adve (2004) LLVM: a compilation framework for lifelong program analysis & transformation. In Proceedings of the international symposium on Code generation and optimization: feedback-directed and runtime optimization, pp. 75. Cited by: §4.
  • C. Leary and T. Wang (2017) XLA: tensorflow, compiled. TensorFlow Dev Summit. Cited by: §6.
  • D. Lin, S. Talathi, and S. Annapureddy (2016) Fixed point quantization of deep convolutional networks. In International Conference on Machine Learning, pp. 2849–2858. Cited by: §1.
  • N. Mellempudi, A. Kundu, D. Das, D. Mudigere, and B. Kaul (2017) Mixed low-precision deep learning inference using dynamic fixed point. External Links: 1701.08978 Cited by: §6.
  • Microsoft (2018) Onnx runtime: cross-platform, high performance scoring engine for ml models. Note: Cited by: §5, §6.
  • G. M. Morton (1966) A computer oriented geodetic data base and a new technique in file sequencing. Cited by: §3.1.1.
  • C. Nvidia (2008) Cublas library. NVIDIA Corporation, Santa Clara, California 15 (27), pp. 31. Cited by: §6.
  • M. Püschel, J. M. Moura, B. Singer, J. Xiong, J. Johnson, D. Padua, M. Veloso, and R. W. Johnson (2004) Spiral: a generator for platform-adapted libraries of signal processing alogorithms. International Journal of High Performance Computing Applications 18 (1), pp. 21–45. Cited by: §6.
  • A. Radford, K. Narasimhan, T. Salimans, and I. Sutskever (2018)

    Improving language understanding with unsupervised learning

    Technical report Technical report, OpenAI. Cited by: §1.
  • J. Ragan-Kelley, C. Barnes, A. Adams, S. Paris, F. Durand, and S. Amarasinghe (2013) Halide: a language and compiler for optimizing parallelism, locality, and recomputation in image processing pipelines. ACM SIGPLAN Notices 48 (6), pp. 519–530. Cited by: §6.
  • M. Rastegari, V. Ordonez, J. Redmon, and A. Farhadi (2016a) XNOR-net: imagenet classification using binary convolutional neural networks. Lecture Notes in Computer Science, pp. 525–542. External Links: ISBN 9783319464930, ISSN 1611-3349, Link, Document Cited by: §6.
  • M. Rastegari, V. Ordonez, J. Redmon, and A. Farhadi (2016b) Xnor-net: imagenet classification using binary convolutional neural networks. In European Conference on Computer Vision, pp. 525–542. Cited by: §1.
  • A. Rodriguez, E. Segal, E. Meiri, E. Fomenko, Y. J. Kim, H. Shen, and B. Ziv (2018) Lower numerical precision deep learning inference and training. Intel White Paper. Cited by: §2.1.
  • N. Rotem, J. Fix, S. Abdulrasool, G. Catron, S. Deng, R. Dzhabarov, N. Gibson, J. Hegeman, M. Lele, R. Levenstein, et al. (2018) Glow: graph lowering compiler techniques for neural networks. arXiv preprint arXiv:1805.00907. Cited by: §4, §6.
  • K. Simonyan and A. Zisserman (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556. Cited by: §1.
  • A. K. Sujeeth, K. J. Brown, H. Lee, T. Rompf, H. Chafi, M. Odersky, and K. Olukotun (2014) Delite: a compiler architecture for performance-oriented embedded domain-specific languages. ACM Transactions on Embedded Computing Systems 13 (4s), pp. 134:1–134:25. Cited by: §6.
  • C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich (2015) Going deeper with convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1–9. Cited by: §1.
  • V. Vanhoucke, A. Senior, and M. Z. Mao (2011) Improving the speed of neural networks on CPUs. Cited by: §6.
  • E. Wang, Q. Zhang, B. Shen, G. Zhang, X. Lu, Q. Wu, and Y. Wang (2014) Intel math kernel library. In High-Performance Computing on the Intel® Xeon Phi™, pp. 167–188. Cited by: §6.