This disclosure relates to the field of computer technologies, and in particular, to a computational graph optimization method and apparatus.
A computational graph is a multi-graph structure representing a computing task and a data flow process of an application. Application code may be converted into a computational graph corresponding to the application code according to a preset computational graph conversion rule. A graph transformation refers to a processing manner of adjusting a structure of a computational graph corresponding to an application while keeping input/output of the application and an internal logical relationship of the application unchanged. Therefore, several graph transformations are performed on the computational graph corresponding to the application, so that the application can be optimized, for example, execution efficiency of the application is improved. A target computational graph can be obtained after several graph transformations are performed on the computational graph corresponding to the application code, and optimized application code can be obtained by converting the target computational graph according to the preset computational graph conversion rule.
Usually, a process of optimizing a computational graph in a graph transformation manner is a loop iterative optimization process. However, in some approaches, when optimizing a computational graph in each iterative transformation, a user needs to master various preset graph transformation manners and combine actual optimization experience to select a proper graph transformation manner to perform a graph transformation on a to-be-optimized computational graph, so as to optimize the computational graph, and further optimize an application corresponding to the computational graph. In such a method for optimizing a computational graph in a graph transformation manner, a graph transformation manner used for optimizing a computational graph in each iteration is manually selected based on optimization experience and a degree to which the user masters the graph transformation manner. Consequently, optimization efficiency is low.
Based on this, how to improve efficiency of optimizing the computational graph in the graph transformation manner is a technical problem to be urgently resolved in the conventional technology.
This disclosure provides a computational graph optimization method and apparatus. The method can improve efficiency of optimizing a computational graph in a graph transformation manner.
To achieve the objective, this disclosure provides the following technical solutions.
According to a first aspect, a computational graph optimization method is performed by a computational graph optimization apparatus. The method includes: obtaining a first computational graph obtained through conversion based on to-be-optimized code; and performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph. The target computational graph is a computational graph obtained by optimizing the first computational graph.
According to the computational graph optimization method, automatic optimization of a computational graph can be implemented in a manner of iterative transformation of the computational graph. Therefore, compared with a computational graph optimization method that requires manual intervention, the method can improve computational graph optimization efficiency, and further improve optimization efficiency of an application corresponding to the computational graph. In addition, the graph transformation manner can determine an optimization objective of the application. The optimization objective may be optimization of a running speed of the application, optimization of adaptability after the application is migrated to a computing system, or the like. In this way, different optimization objectives can be implemented based on different graph transformation manners to improve the method.
In a possible design, the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph” includes: in any one of the plurality of iterative transformations, performing, based on a performance evaluation policy, performance evaluation on a computational graph obtained through a transformation in at least one of the plurality of preset graph transformation manners; and determining the target computational graph based on a performance evaluation result.
In another possible design, the foregoing performance evaluation policy includes: performing performance evaluation on the computational graph based on a quantity of calculation operations and a quantity of memory access operations that are of an abstract syntax tree (AST) corresponding to the computational graph; or performing performance evaluation on the computational graph based on running time of executable code corresponding to the computational graph.
According to the foregoing two possible designs, in the method, when a computational graph is automatically optimized, a computational graph with optimal performance obtained through each iterative transformation may be found by using a performance evaluation policy in an iterative transformation process. In this way, a final target computational graph may be determined based on an optimal computational graph obtained through each iterative transformation. This implements an objective of improving an optimization degree of an application corresponding to the computational graph.
In another possible design, the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph” further includes: for any one of the plurality of iterative transformations, selecting, based on a search policy, a to-be-optimized computational graph in a next iterative transformation of the any iterative transformation from a plurality of computational graphs obtained through the any iterative transformation; and performing, based on the plurality of preset graph transformation manners, the plurality of iterative transformations on the to-be-optimized computational graph in the next iterative transformation, to obtain the target computational graph.
In another possible design, the search policy includes: determining, in the plurality of computational graphs based on performance of the computational graphs, the to-be-optimized computational graph in the next iterative transformation.
According to the foregoing two possible designs, in the method, when a computational graph is automatically optimized, a computational graph with better performance is selected in an iterative transformation process as a to-be-optimized computational graph in a next iterative transformation of a current iterative transformation based on performance of a computational graph obtained after the current iterative transformation. This can improve an optimization degree of an application corresponding to the computational graph.
In another possible design, the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph” further includes: in any iterative transformation except a first iterative transformation in the plurality of iterative transformations, removing, based on a pruning policy, an invalid graph transformation manner from a candidate graph transformation manner used to transform a computational graph; and performing the plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners in which the invalid graph transformation manner is removed, to obtain the target computational graph. The candidate graph transformation manner includes at least one of the plurality of preset graph transformation manners.
In another possible design, the pruning policy includes at least one of the following policies: a quantity of times of loop tiling performed on same loop logic exceeds a preset threshold; loop interchange is performed on two same pieces of loop logic for a plurality of times; same loop logic is first expanded and then collapsed, or is first collapsed and then expanded; or same loop logic is first fissed and then fused, or is first fused and then fissed.
According to the foregoing two possible designs, in the method, an invalid graph transformation manner in a candidate graph transformation manner used to transform a computational graph can be removed from any iterative transformation except the first iterative transformation. This avoids an iterative transformation rollback caused by the invalid graph transformation manner, and further improves loop convergence efficiency of iteratively optimizing the computational graph.
A “candidate graph transformation manner used to transform a computational graph in a current iterative transformation” may be referred to as a “current candidate graph transformation manner”, and a “graph transformation manner used to transform a computational graph in an iterative transformation before the current iterative transformation” may be referred to as a “previous graph transformation manner”. In this case, the invalid graph transformation manner may be a graph transformation manner in which the current candidate graph transformation manner and the previous graph transformation manner are mutually inverse, or the current graph transformation manner is a graph transformation manner in which an invalid condition is met.
For example, in the previous graph transformation manner, a loop 1 is collapsed, and in the current candidate graph transformation manner, the loop 1 is expanded. In this case, it indicates that the current candidate graph transformation manner and the previous graph transformation manner are mutually inverse, that is, the current candidate graph transformation manner is invalid.
For another example, in three previous graph transformation manners of the previous graph transformation manner, loop tiling has been performed on the loop 1 for three times, and in the current candidate graph transformation manner, loop tiling is performed on the loop 1. If the invalid condition is that a maximum threshold of loop tiling performed on a same loop is 3, the current candidate graph transformation manner meets the invalid condition, that is, the current candidate graph transformation manner is invalid.
In another possible design, the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph” includes: determining m candidate graph transformation manners from the plurality of preset graph transformation manners; transforming the first computational graph based on each of the m candidate graph transformation manners, to obtain m second computational graphs; and determining the target computational graph based on the m second computational graphs. The m candidate graph transformation manners match a subgraph in the first computational graph, m is a positive integer, and the m second computational graphs are in a one-to-one correspondence with the m candidate graph transformation manners.
In another possible design, the “determining the target computational graph based on the m second computational graphs” includes: determining a first candidate target computational graph in the m second computational graphs, where performance of the first candidate target computational graph is better than performance of a computational graph other than the first candidate target computational graph in the m second computational graphs; and determining the target computational graph based on the first candidate target computational graph.
The two possible designs implement a first iterative transformation process in the method for iteratively optimizing a computational graph. In this process, the first candidate target computational graph is used as an alternative target computational graph, and is used for determining the target computational graph from all candidate target computational graphs obtained in an iterative optimization process.
In another possible design, the “determining the target computational graph based on the m second computational graphs” further includes: determining a third computational graph in the m second computational graphs; determining n candidate graph transformation manners from the plurality of preset graph transformation manners based on the third computational graph; then transforming the third computational graph based on each of the n candidate graph transformation manners, to obtain n fourth computational graphs; determining a second candidate target computational graph in the n fourth computational graphs; and then determining the target computational graph based on the first candidate computational graph and the second candidate target computational graph. The n candidate graph transformation manners match a subgraph in the third computational graph, and n is a positive integer. The n candidate graph transformation manners are in a one-to-one correspondence with the n fourth computational graphs. Performance of the second candidate target computational graph is better than performance of a computational graph other than the second candidate target computational graph in the n fourth computational graphs.
The possible design implements a second iterative transformation process in the method for iteratively optimizing a computational graph. In this process, the second candidate target computational graph is used as an alternative target computational graph, and is used for determining the target computational graph from all candidate target computational graphs (for example, the first candidate target computational graph) obtained in the iterative optimization process.
In another possible design, the “determining a first candidate target computational graph in the m second computational graphs” includes: collecting statistics on a quantity of calculation operations and a quantity of memory access operations that are of m ASTs corresponding to the m second computational graphs; and determining the first candidate target computational graph in the m second computational graphs based on the quantity of calculation operations and the quantity of memory access operations that are of the m ASTs. A quantity of calculation operations and a quantity of memory access operations that are of any one of the m ASTs indicate performance of a second computational graph corresponding to the any AST.
In another possible design, the “determining a first candidate target computational graph in the m second computational graphs” includes: determining running time of m pieces of executable code corresponding to the m second computational graphs; and determining the first candidate target computational graph in the m second computational graphs based on the running time of the m pieces of executable code. Running time of any one of the m pieces of executable code indicates performance of a second computational graph corresponding to the any piece of executable code.
In another possible design, the “determining a third computational graph in the m second computational graphs” includes: determining the third computational graph in the m second computational graphs based on performance of the m second computational graphs. There is at least one third computational graph.
According to the foregoing several possible designs, in the method, a quantity of calculation operations and a quantity of memory access operations that are of an AST corresponding to a computational graph may be counted, or running time of executable code corresponding to the computational graph may be determined, to determine performance of the computational graph obtained after the computational graph is transformed in a graph transformation manner. Therefore, in one aspect, a target computational graph with optimal performance globally (that is, after iterative transformation convergence) can be determined based on a computational graph with optimal performance determined in each iterative transformation, so that an optimization degree of an application corresponding to the computational graph can be improved. In another aspect, in the method, a better computational graph may be determined as a to-be-optimized computational graph in a next iterative transformation of the current iterative transformation based on determined performance advantages and disadvantages of the computational graph transformed in the graph transformation manner. In this way, the optimization degree of the application corresponding to the computational graph can be improved.
In another possible design, the “determining n candidate graph transformation manners from the plurality of preset graph transformation manners based on the third computational graph” includes: determining j initial candidate graph transformation manners from the plurality of preset graph transformation manners based on the third computational graph and according to a subgraph matching rule. Then, the m candidate graph transformation manners are determined from the j initial candidate graph transformation manners based on the pruning policy. The j candidate graph transformation manners match a subgraph in the third computational graph, and j is an integer greater than or equal to n. The pruning policy is used to remove an invalid graph transformation manner from the j initial candidate graph transformation manners.
According to the possible design, in the method, an invalid graph transformation manner in a candidate graph transformation manner used to transform a computational graph can be removed based on the pruning policy. This avoids an iterative transformation rollback caused by the invalid graph transformation manner, and further improves loop convergence efficiency of iteratively optimizing the computational graph.
In another possible design, the “obtaining a first computational graph” includes: receiving the first computational graph input by a user.
In another possible design, the “obtaining a first computational graph” includes: obtaining the to-be-optimized code; and converting the to-be-optimized code into the first computational graph according to a preset conversion rule.
In another possible design, before the “converting the to-be-optimized code into the first computational graph according to a preset conversion rule”, the method further includes: receiving the preset conversion rule input by a user.
According to the foregoing three possible designs, the method may provide different manners of obtaining the first computational graph, so that the method can be improved.
In another possible design, before the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph”, the method further includes: receiving a preset graph transformation manner input by the user.
Because a graph transformation manner is used to determine an optimization objective of an application corresponding to a computational graph, according to this possible design, in the method provided, an optimization objective expected by the user can be achieved based on the graph transformation manner designed by the user based on an optimization objective of the user. This improves user experience.
In another possible design, the method further includes: outputting the target computational graph.
In another possible design, the method further includes: determining target code based on the target computational graph; compiling the target code to obtain target executable code; and outputting the target executable code. The target code is code obtained by optimizing the to-be-optimized code.
According to the foregoing two possible designs, in the method, different outputs can be provided for the user based on a requirement of the user, so that user experience is improved.
According to a second aspect, a method for providing a computational graph optimization service includes: receiving a first computational graph sent by a user end; performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph; and sending the target computational graph to the user end. The first computational graph is obtained through conversion based on to-be-optimized code, and the target computational graph is a computational graph obtained by optimizing the first computational graph.
In a possible design, the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph” includes: in any one of the plurality of iterative transformations, performing, based on a performance evaluation policy, performance evaluation on a computational graph obtained through a transformation in at least one of the plurality of preset graph transformation manners; and determining the target computational graph based on a performance evaluation result.
In another possible design, the foregoing performance evaluation policy includes: performing performance evaluation on the computational graph based on a quantity of calculation operations and a quantity of memory access operations that are of an abstract syntax tree AST corresponding to the computational graph; or performing performance evaluation on the computational graph based on running time of executable code corresponding to the computational graph.
In another possible design, the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph” further includes: for any one of the plurality of iterative transformations, selecting, based on a search policy, a to-be-optimized computational graph in a next iterative transformation of the any iterative transformation from a plurality of computational graphs obtained through the any iterative transformation; and performing, based on the plurality of preset graph transformation manners, the plurality of iterative transformations on the to-be-optimized computational graph in the next iterative transformation, to obtain the target computational graph.
In another possible design, the search policy includes: determining, in the plurality of computational graphs based on performance of the computational graphs, the to-be-optimized computational graph in the next iterative transformation.
In another possible design, the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph” further includes: in any iterative transformation except a first iterative transformation in the plurality of iterative transformations, removing, based on a pruning policy, an invalid graph transformation manner from a candidate graph transformation manner used to transform a computational graph; and performing the plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners in which the invalid graph transformation manner is removed, to obtain the target computational graph. The candidate graph transformation manner includes at least one of the plurality of preset graph transformation manners.
In another possible design, the pruning policy includes at least one of the following policies: a quantity of times of loop tiling performed on same loop logic exceeds a preset threshold; loop interchange is performed on two same pieces of loop logic for a plurality of times; same loop logic is first expanded and then collapsed, or is first collapsed and then expanded; or same loop logic is first fissed and then fused, or is first fused and then fissed.
In another possible design, before the “performing a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph”, the method further includes: receiving a preset graph transformation manner sent by the user end.
For descriptions of beneficial effects of any one of the second aspect and the possible designs of the second aspect, refer to the technical solutions provided in the first aspect or the corresponding possible design of the first aspect. Details are not described herein again.
According to a third aspect, a computational graph optimization apparatus includes: an obtaining unit configured to obtain a first computational graph, where the first computational graph is obtained through conversion based on to-be-optimized code; and a processing unit configured to perform a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph. The target computational graph is a computational graph obtained by optimizing the first computational graph.
In another possible design, the processing unit is further configured to: in any one of the plurality of iterative transformations, perform, based on a performance evaluation policy, performance evaluation on a computational graph obtained through a transformation in at least one of the plurality of preset graph transformation manners. The apparatus further includes a determining unit configured to determine the target computational graph based on a performance evaluation result.
In another possible design, for any one of the plurality of iterative transformations, the processing unit is further configured to: select, based on a search policy, a to-be-optimized computational graph in a next iterative transformation of the any iterative transformation from a plurality of computational graphs obtained through the any iterative transformation; and perform, based on the plurality of preset graph transformation manners, the plurality of iterative transformations on the to-be-optimized computational graph in the next iterative transformation, to obtain the target computational graph.
In another possible design, in any iterative transformation except a first iterative transformation in the plurality of iterative transformations, the processing unit is further configured to: remove, based on a pruning policy, an invalid graph transformation manner from the plurality of preset graph transformation manners used to transform a computational graph; and perform the plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners in which the invalid graph transformation manner is removed, to obtain the target computational graph.
In another possible design, the foregoing performance evaluation policy includes: performing performance evaluation on the computational graph based on a quantity of calculation operations and a quantity of memory access operations that are of an abstract syntax tree AST corresponding to the computational graph; or performing performance evaluation on the computational graph based on running time of executable code corresponding to the computational graph.
In another possible design, the search policy includes: determining, in the plurality of computational graphs based on performance of the computational graphs, the to-be-optimized computational graph in the next iterative transformation.
In another possible design, the pruning policy includes at least one of the following policies: a quantity of times of loop tiling performed on same loop logic exceeds a preset threshold; loop interchange is performed on two same pieces of loop logic for a plurality of times; same loop logic is first expanded and then collapsed, or is first collapsed and then expanded; or same loop logic is first fissed and then fused, or is first fused and then fissed.
In another possible design, the determining unit is further configured to determine m candidate graph transformation manners from the plurality of preset graph transformation manners. The m candidate graph transformation manners match a subgraph in the first computational graph, and m is a positive integer. The processing unit is further configured to transform the first computational graph based on each of the m candidate graph transformation manners, to obtain m second computational graphs. The m second computational graphs are in a one-to-one correspondence with the m candidate graph transformation manners. The determining unit is further configured to determine the target computational graph based on the m second computational graphs.
In another possible design, the determining unit is further configured to: determine a first candidate target computational graph in the m second computational graphs, where performance of the first candidate target computational graph is better than performance of a computational graph other than the first candidate target computational graph in the m second computational graphs; and determine the target computational graph based on the first candidate target computational graph.
In another possible design, the determining unit is further configured to: determine a third computational graph in the m second computational graphs; and determine n candidate graph transformation manners from the plurality of preset graph transformation manners based on the third computational graph. The n candidate graph transformation manners match a subgraph in the third computational graph, and n is a positive integer. The processing unit is further configured to transform the third computational graph based on each of the n candidate graph transformation manners, to obtain n fourth computational graphs. The n fourth computational graphs are in a one-to-one correspondence with the n candidate graph transformation manners. The determining unit is further configured to: determine a second candidate target computational graph in the n fourth computational graphs; and determine the target computational graph based on the first candidate computational graph and the second candidate target computational graph. Performance of the second candidate target computational graph is better than performance of a computational graph other than the second candidate target computational graph in the n fourth computational graphs.
In another possible design, the apparatus further includes a receiving unit configured to receive the first computational graph input by a user.
In another possible design, the obtaining unit is further configured to obtain the to-be-optimized code. The processing unit is further configured to convert the to-be-optimized code into the first computational graph according to an obtained preset conversion rule.
In another possible design, the receiving unit is further configured to: before converting the to-be-optimized code into the first computational graph according to the preset conversion rule, receive the preset conversion rule input by a user.
In another possible design, the receiving unit is further configured to: before performing a plurality of iterative transformations on the first computational graph based on the plurality of preset graph transformation manners, to obtain the target computational graph, receive a preset graph transformation manner input by the user.
In another possible design, the apparatus further includes an output unit configured to output the target computational graph.
In another possible design, the determining unit is further configured to determine target code based on the target computational graph. The target code is code obtained by optimizing the to-be-optimized code. The processing unit is further configured to compile the target code to obtain target executable code. The output unit is further configured to output the target executable code.
For descriptions of beneficial effects of any one of the third aspect and the possible designs of the third aspect, refer to the technical solutions provided in the first aspect or the corresponding possible design of the first aspect. Details are not described herein again.
According to a fourth aspect, an apparatus for providing a computational graph optimization service includes: a receiving unit configured to receive a first computational graph that is sent by a user end and obtained through conversion based on to-be-optimized code; a processing unit configured to perform a plurality of iterative transformations on the received first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph; and a sending unit configured to send the target computational graph to the user end. The target computational graph is a computational graph obtained by optimizing the first computational graph.
For descriptions of beneficial effects of any one of the fourth aspect and the possible designs of the fourth aspect, refer to the technical solutions provided in the second aspect or the corresponding possible design of the second aspect. Details are not described herein again.
According to a fifth aspect, a computational graph optimization apparatus includes a memory and one or more processors, where the memory is coupled to the processor. The memory is configured to store computer instructions. The processor is configured to invoke the computer instructions, to perform any method according to any one of the first aspect or the possible designs of the first aspect.
According to a sixth aspect, an apparatus for providing a computational graph optimization service includes a memory and one or more processors, where the memory is coupled to the processor. The memory is configured to store computer instructions. The processor is configured to invoke the computer instructions, to perform any method according to any one of the second aspect or the possible designs of the second aspect.
According to a seventh aspect, a computer-readable storage medium, for example, a non-transient computer-readable storage medium stores a computer program (or instructions). When the computer program (or the instructions) is/are run on a computer, the computer is enabled to perform any method according to any one of the possible implementations of the first aspect or the second aspect.
According to an eighth aspect, computer program product runs on a computer, any method according to any possible implementation of the first aspect or the second aspect is performed.
According to a ninth aspect, a chip system includes a processor. The processor is configured to: invoke, from a memory, a computer program stored in the memory, and run the computer program, to perform any method according to the implementation of the first aspect or the second aspect.
It may be understood that any one of the apparatus, the computer storage medium, the computer program product, the chip system, or the like provided above may be applied to a corresponding method provided above. Therefore, for beneficial effects that can be achieved by the apparatus, the computer storage medium, the computer program product, the chip system, or the like, refer to the beneficial effects of the corresponding method. Details are not described herein again.
Names of the computational graph optimization apparatus and the apparatus for providing a computational graph optimization service constitute no limitation on devices or functional modules. In an actual implementation, these devices or functional modules may appear with other names. Each device or functional module falls within the scope defined by the claims and their equivalent technologies in this disclosure, provided that a function of the device or functional module is similar to that described in this disclosure.
These aspects or other aspects are more concise and comprehensible in the following descriptions.
To better understand embodiments, the following describes some terms or technologies used in embodiments.
(1) Computational Graph
A computational graph is a language that describes a function through a graph structure.
Usually, a computational graph may include a plurality of nodes and edges between the nodes. The node of the computational graph may represent content such as data, a variable, an expression, code with different semantics, and/or an operation, and certainly is not limited thereto. An edge of the computational graph may represent a data flow direction between nodes, or represent a logical relationship between nodes.
The code with different semantics may be, for example, code with loop logic semantics. In embodiments, code with loop logic semantics is referred to as loop logic for short.
For example,
As shown in
The node 11 indicates input data of the computational graph 10, and the node 17 indicates output data obtained after an operation of each node in the computational graph 10 is performed on the input data.
The node 12 and the node 16 represent first-layer loop logic in the computational graph 10. The node 12 is a start point of the first-layer loop logic, and the node 16 is an end point of the first-layer loop logic.
The node 13 and the node 15 represent second-layer loop logic in the computational graph 10. The node 13 is a start point of the second-layer loop logic, and the node 15 is an end point of the second-layer loop logic.
It can be seen from
The node 14 represents an operation that needs to be performed inside the loop logic in the computational graph 10, for example, an addition operation shown in
In addition, as shown in
It should be understood that one computational graph may include a plurality of subgraphs, different subgraphs are formed by different nodes and edges, and different subgraphs are connected by using different logical relationships or operations, to implement a logical function that can be implemented by the computational graph.
(2) Graph Transformation Manner
The graph transformation manner usually indicates to perform a preset operation on a given computational graph.
It should be understood that one graph transformation manner corresponds to only one given computational graph. Different graph transformation manners may correspond to a same given computational graph.
The preset operation may be an operation of performing loop tiling on loop logic in the given computational graph by using a preset step, may be an operation of performing loop interchange on loop logic in the given computational graph, may be an operation of performing loop collapse on loop logic in the given computational graph, may be an operation of eliminating redundant variables in the given computational graph, or the like, and is not limited thereto.
The preset step may be a quantity of cycles of single-layer loop logic. A specific value of the preset step is not limited in embodiments. For example, the preset step may be 16, that is, the quantity of cycles of the single-layer loop logic is 16. Certainly, the preset step may alternatively be 128, that is, the quantity of cycles of the single-layer loop logic is 128, and so on.
It should be understood that for loop logic that includes only single-layer loop logic, a step of the loop logic is a quantity of cycles of the single-layer loop logic. For loop logic that includes a plurality of layers of nested loop logic, a step of the loop logic is a quantity of cycles of innermost loop logic in the plurality of layers of nested loop logic.
For example, if a graph transformation manner 1 indicates to perform a loop tiling operation on loop logic 1 in a given computational graph by using a step of 16 bits, that is, the graph transformation manner 1 indicates to tile the loop logic 1 in the given computational graph into two or more pieces of loop logic. The two or more pieces of loop logic are sequentially nested, and a quantity of cycles of innermost nested loop logic is 16, that is, a loop step of the two or more pieces of sequentially nested loop logic is 16.
For example, if a quantity of cycles of the loop logic 1 is 32, the loop logic 1 may be tiled into subloop logic 1 and subloop logic 2 based on the graph transformation manner 1. The subloop logic 2 may be nested inside the subloop logic 1. In addition, a quantity of cycles of the subloop logic 2 that is used as the inner loop logic is 16, and a quantity of cycles of the subloop logic 1 that is used as the outer loop logic is 2.
For another example, a graph transformation manner 2 may indicate to perform a loop interchange operation on loop logic 1 and loop logic 2 in a given computational graph.
For example, the loop logic 1 and the loop logic 2 in the given computational graph are nested two-layer loop logic, the outer loop logic is the loop logic 1, and the inner loop logic is the loop logic 2. In this case, the given computational graph is transformed in the graph transformation manner 2, so that the outer loop logic and the inner loop logic can be exchanged. That is, after the given computational graph is transformed in the graph transformation manner 2, the outer loop logic is the loop logic 2, and the inner loop logic is the loop logic 1.
For another example, a graph transformation manner 3 may indicate to perform a loop collapse operation on loop logic 1 and loop logic 2 in a given computational graph, so as to collapse nested two-layer loop logic into single-layer loop logic. The loop logic 1 may be the inner loop logic of the loop logic 2, or the loop logic 2 is the inner loop logic of the loop logic 1.
For example, the loop logic 1 and the loop logic 2 in the given computational graph are nested two-layer loop logic, a variable in the loop logic 1 is x, and a variable in the loop logic 2 is y. In this case, after the given computational graph is transformed in the graph transformation manner 3, the nested loop logic 1 and loop logic 2 are collapsed into single-layer loop logic, and the single-layer loop logic includes the variable x and the variable y.
For another example, a graph transformation manner 4 may indicate to eliminate a redundant variable 1 in a given computational graph. Alternatively, the graph transformation manner 4 may indicate to eliminate a redundant variable 2 in the given computational graph, or the like.
(3) Other Terms
In embodiments, the word “example” or “for example” represents giving an example, an illustration, or a description. Any embodiment or design scheme described as an “example” or “for example” in embodiments should not be explained as being more preferred or having more advantages than another embodiment or design scheme. Exactly, use of the word “example”, “for example” or the like is intended to present a relative concept in a specific manner.
The terms “first” and “second” in embodiments are merely intended for a purpose of description, and shall not be understood as an indication or implication of relative importance or implicit indication of a quantity of indicated technical features. Therefore, a feature limited by “first” or “second” may explicitly or implicitly include one or more features. In the descriptions, unless otherwise stated, “a plurality of” means two or more than two.
The phrase “at least one” means one or more, and the phrase “a plurality of” means two or more. For example, a plurality of second packets mean two or more second packets. Terms “system” and “network” may be used interchangeably in this specification.
It should be understood that the terms used in the descriptions of various examples in this specification are merely intended to describe specific examples, but are not intended to constitute a limitation. The terms “one” (“a” and “an”) and “the” of singular forms used in the descriptions of various examples and the appended claims are also intended to include plural forms, unless otherwise specified in the context clearly.
It should be further understood that, the term “and/or” used in this specification indicates and includes any or all possible combinations of one or more items in associated listed items. The term “and/or” describes an association relationship between associated objects and represents that three relationships may exist. For example, A and/or B may represent the following three cases: Only A exists, both A and B exist, and only B exists. In addition, the character “/” generally indicates an “or” relationship between the associated objects.
It should be further understood that sequence numbers of processes do not mean execution sequences in embodiments. The execution sequences of the processes should be determined based on functions and internal logic of the processes, and should not be construed as any limitation on the implementation processes of embodiments.
It should be understood that determining B based on A does not mean that B is determined based on only A, and B may alternatively be determined based on A and/or other information.
It should be further understood that the term “include” (or referred to as “includes”, “including”, “comprises”, and/or “comprising”), when being used in this specification, specifies the presence of stated features, integers, steps, operations, elements, and/or components, but does not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should be further understood that the term “if” may be interpreted as a meaning “when” (“when” or “upon”), “in response to determining”, or “in response to detecting”. Similarly, according to the context, the phrase “if it is determined that” or “if (a stated condition or event) is detected” may be interpreted as a meaning of “when it is determined that”, “in response to determining”, “when (a stated condition or event) is detected”, or “in response to detecting (a stated condition or event)”.
It should be understood that “one embodiment”, “an embodiment”, and “a possible implementation” mentioned in the entire specification mean that particular features, structures, or characteristics related to an embodiment or the implementations are included in at least one embodiment. Therefore, “in one embodiment”, “in an embodiment”, or “in a possible implementation” appearing throughout this specification does not necessarily mean a same embodiment. In addition, these particular features, structures, or characteristics may be combined in one or more embodiments by using any appropriate manner.
When an application developed based on a computing system (for example, a computing system a) runs on another computing system (for example, a computing system b), because architecture designs of different computing systems are different, when the application runs on the computing system b, performance of the application is not optimal, for example, execution efficiency is low.
That is, when an application developed based on a computing system is migrated to another computing system for running, a problem of low application performance occurs.
In this case, application code can generally be optimized, so that the application can run at optimal performance on the computing system b.
To implement optimal running of an application on different computing systems, a computational graph may generally be transformed in a graph transformation manner designed based on the different computing systems, so as to optimize the computational graph corresponding to the application. In this way, an optimized application can be obtained by converting and optimizing the computational graph according to a computational graph transformation rule. It should be understood that the optimized application can run optimally on the different computing systems.
For example, an application a developed based on the computing system a needs to be migrated to the computing system b for running. In this case, graph transformation may be performed on a computational graph corresponding to the application a in a graph transformation manner designed based on the computing system b, so as to implement optimization of the computational graph corresponding to the application a, and further implement optimization of the application a. In this way, an optimized application a can run optimally on the computing system b.
It should be understood that, because a computational graph transformation manner can implement decoupling of an application from a computing system, when the application is optimized by using the computational graph transformation manner, the optimization efficiency is high compared with that when source code of the application is separately optimized for different computing systems.
Step 1: A computing device obtains a to-be-optimized computational graph.
Step 2: The computing device determines, in a plurality of preset graph transformation manners according to a subgraph matching rule, whether there is at least one graph transformation manner that matches a subgraph in the to-be-optimized computational graph.
Step 2 to Step 4 are performed if there is at least one graph transformation manner that matches the subgraph in the to-be-optimized computational graph. The computational graph optimization ends if there is no at least one graph transformation manner that matches the subgraph in the to-be-optimized computational graph.
For detailed descriptions of how the computing device determines, in the plurality of preset graph transformation manners according to the subgraph matching rule, whether there is at least one graph transformation manner that matches the subgraph in the to-be-optimized computational graph, refer to the following description. Details are not described herein again.
Step 3: The computing device outputs, to a user, the determined at least one graph transformation manner and a subgraph that is in the to-be-optimized computational graph and that matches each of the at least one graph transformation manner.
Step 4: The user selects, based on optimization experience and graph transformation knowledge, a target graph transformation manner from the at least one graph transformation manner, and inputs the target graph transformation manner into the computing device.
In response, the computing device obtains the target graph transformation manner.
Step 5: The computing device transforms the to-be-optimized computational graph in the obtained target graph transformation manner, to obtain a target computational graph, uses the target computational graph as a new to-be-optimized computational graph, and repeatedly performs step 2 to step 5.
It can be learned that, in the computational graph optimization method described in
In addition, when computational graph optimization is performed by using the method described in
An iterative transformation rollback means that a previous graph transformation manner and a subsequent graph transformation manner that are used to transform any subgraph in the computational graph are mutually inverse, so that a subgraph that is successively transformed by using the previous graph transformation manner and the subsequent graph transformation manner is the same as a subgraph that is not successively transformed by using the previous graph transformation manner and the subsequent graph transformation manner. The previous graph transformation manner and the subsequent graph transformation manner may be continuous, or may be discontinuous. This is not limited.
That the graph transformation manners are mutually inverse means that operations performed on a same object in a given computational graph in the two graph transformation manners are mutually inverse. In this way, after the computational graph is transformed by using two inverse graph transformation manners, a structure of the computational graph remains unchanged.
For example, a graph transformation manner 1 indicates to expand a loop logic 1 in a given computational graph into a loop logic 11 and a loop logic 12, and a graph transformation manner 2 indicates to collapse the loop logic 11 and the loop logic 12 in the given computational graph into the loop logic 1. In this case, the graph transformation manner 1 and the graph transformation manner 2 are mutually inverse. That is, after the given computational graph is transformed in the graph transformation manner 1 and the graph transformation manner 2, a structure of the given computational graph remains unchanged.
In this way, when a computational graph is iteratively optimized, for a cth iterative transformation, a subgraph a1 in a computational graph a is transformed into a subgraph a2 by using the graph transformation manner 1. Then, in a (c+1)th iterative transformation, the subgraph a2 is transformed in the graph transformation manner 2 that is mutually inverse to the graph transformation manner 1, and an obtained subgraph is the subgraph a1. In this case, the iterative transformation rollback occurs in the process of iteratively optimizing the computational graph.
Based on this, an embodiment provides a computational graph optimization method. In the method, automatic optimization and iterative transformation are combined to implement automation of computational graph optimization. In addition, in a process of computational graph optimization, an invalid graph transformation manner is removed by using a pruning policy, so that a problem that a loop of iterative transformation cannot converge due to an iterative transformation rollback can be avoided.
An embodiment further provides a computational graph optimization apparatus. The computational graph optimization apparatus is configured to implement the foregoing computational graph optimization method. The computational graph optimization apparatus may be any computing device with a computing processing capability. The computing device may be, for example, a computer, a PC, a notebook computer, or a server. This is not limited.
Optionally, the foregoing computational graph optimization method may be implemented by using an application (app) installed on the computing device, for example, a client application of the computational graph optimization apparatus, or a browser.
The application may be an embedded application (namely, a system application of the computing device) installed on the computing device, or may be a downloadable application.
The embedded application is an application provided by an operating system of the computing device (such as a computer or a mobile phone). For example, the embedded application may be an application installed on the computing device before delivery.
The downloadable application is an application that can provide its own communication connection (for example, an IP Multimedia Subsystem (IMS) connection). The downloadable application is an app that may be pre-installed on the computing device, or may be a third-party app that is downloaded by a user and installed on the computing device. For example, the downloadable application may be a computational graph optimization app, an application optimization app that includes a computational graph optimization function module, or the like.
Optionally, the foregoing computational graph optimization method may be a functional module of a program compiler. In this way, when compiling source code of an application into machine-executable code, the program compiler may simultaneously optimize a computational graph corresponding to the application, to optimize the application. This is not limited.
The processor 31 is a control center of the computer device 30, and may be a general-purpose central processing unit (CPU), another general-purpose processor, or the like. The general-purpose processor may be a microprocessor, any conventional processor, or the like.
In an example, the processor 31 may include one or more CPUs, for example, a CPU 0 and a CPU 1 that are shown in
The memory 32 may be a read-only memory (ROM) or another type of static storage device capable of storing static information and instructions, or a random-access memory (RAM) or another type of dynamic storage device capable of storing information and instructions; or may be an electrically erasable programmable read-only memory (EEPROM), a magnetic disk storage medium or another magnetic storage device, or any other medium capable of carrying or storing expected program code in a form of an instruction or a data structure and capable of being accessed by a computer. However, this is not limited herein.
In a possible implementation, the memory 32 may be independent of the processor 31. The memory 32 may be connected to the processor 31 through the bus 35, and is configured to store data, instructions, or program code. When invoking and executing the instructions or the program code stored in the memory 32, the processor 31 can implement the computational graph optimization method provided in embodiments.
In another possible implementation, the memory 32 may alternatively be integrated with the processor 31.
The input/output interface 33 is configured to implement human-computer interaction between a user and the computing device 30, for example, implement text interaction or voice interaction between a user and the computing device.
For example, the input/output interface 33 may be a touchscreen, a keyboard, a mouse, or the like, and text interaction between the user and the computing device may be implemented by using the touchscreen, the keyboard, or the mouse.
For another example, the input/output interface 33 may alternatively be an audio module, and the audio module may include a speaker, a microphone, and the like. Certainly, this is not limited herein. In this way, the audio module can implement voice interaction between the user and the computing device.
The communication interface 34 is configured to connect the computer device 30 to another device (such as a server) through a communication network. The communication network may be the Ethernet, a radio access network (RAN), a wireless local area network (WLAN), or the like. The communication interface 34 may include a receiving unit configured to receive data and a sending unit configured to send data.
The bus 35 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be classified into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line represents the bus in
It should be noted that a structure shown in
The following describes in detail the computational graph optimization method provided in embodiments with reference to the accompanying drawings.
S101: Obtain a first computational graph.
The first computational graph is a computational graph obtained after to-be-optimized code is converted according to a preset conversion rule. The first computational graph includes a plurality of subgraphs.
The to-be-optimized code may be source code of an application that needs to migrate a computing system, or may be source code of a function module in an application that needs to migrate a computing system, or may be any source code that can implement a specific function and that needs to migrate a computing system, or source code of an application that may require performance optimization. This is not limited. The application that may require performance optimization may be an application that needs to improve running efficiency. This is not limited. The application may be a high-performance computing (HPC) application, a cloud computing application, an artificial intelligence (AI) application, or the like. This is not limited.
The preset conversion rule is a preset computational graph conversion rule, and is used to convert code into a computational graph. The preset conversion rule is not specifically limited in this embodiment.
In a possible implementation, an optimization apparatus may first obtain the to-be-optimized code, and then convert the to-be-optimized code according to the foregoing preset conversion rule, to obtain the first computational graph.
The optimization apparatus may receive, through an input/output interface (for example, the input/output interface 33 shown in
In this case, optionally, the optimization apparatus may be preset with the foregoing preset conversion rule. In this way, the optimization apparatus may convert the obtained to-be-optimized code according to the preset conversion rule, to obtain the first computational graph, that is, the optimization apparatus obtains the first computational graph.
Optionally, the optimization apparatus may receive, through the input/output interface (for example, the input/output interface 33 shown in
For example,
As shown in (a) in
When the user selects the option “default conversion rule” by operating an input interface such as a mouse or a keyboard of the optimization apparatus, it indicates that the user indicates the optimization apparatus to convert the to-be-optimized code according to a preset computational graph conversion rule, to obtain the first computational graph.
It should be understood that the computational graph conversion rule preset in the optimization apparatus herein may be the foregoing preset conversion rule.
When the user selects the option “user-defined conversion rule” by operating the input interface such as the mouse or the keyboard of the optimization apparatus, it indicates that the user indicates the optimization apparatus to convert the to-be-optimized code according to a user-defined computational graph conversion rule, to obtain the first computational graph.
In this case, as shown in (b) in
In another possible implementation, any computing device with a computing processing capability may convert the to-be-optimized code according to the preset conversion rule, to obtain the first computational graph.
In this case, optionally, the computing device may send the first computational graph to the optimization apparatus through the communication interface of the computing device. In response, the optimization apparatus may receive the first computational graph by using a receiving unit in the communication interface (for example, the communication interface 34 shown in
Optionally, the user may input, into the optimization apparatus through the input/output interface (for example, the input/output interface 33 shown in
S102: Determine whether a candidate graph transformation manner exists in a plurality of preset graph transformation manners, where the candidate graph transformation manner matches a subgraph in the first computational graph.
Specifically, the optimization apparatus may determine, according to a subgraph matching rule, whether the candidate graph transformation manner exists in the plurality of preset graph transformation manners.
The subgraph matching rule indicates a logical relationship of a given computational graph corresponding to a graph transformation manner. Therefore, one graph transformation manner corresponds to only one subgraph matching rule. Because different graph transformation manners may correspond to a same given computational graph, the plurality of preset graph transformation manners may correspond to one or more subgraph matching rules. This is not limited.
For any one of the plurality of preset graph transformation manners, a subgraph matching rule corresponding to the any preset graph transformation manner is used to determine, in the first computational graph, whether a subgraph matching the any preset graph transformation manner exists.
If the optimization apparatus determines that any subgraph in the first computational graph has a same graph structure as a given computational graph corresponding to the any preset graph transformation manner, and a logical relationship in the any subgraph meets a subgraph matching rule corresponding to the any preset graph transformation manner, the optimization apparatus determines that the any subgraph is the subgraph matching the any preset graph transformation manner, that is, the subgraph matching the any preset graph transformation manner exists in the first computational graph.
For example, a preset graph transformation manner 1 indicates to perform a preset operation on a given computational graph 1, that is, a given computational graph corresponding to the preset graph transformation manner 1 is the given computational graph 1. In addition, a subgraph matching rule corresponding to the preset graph transformation manner 1 is a subgraph matching rule 1. In this case, if the optimization apparatus determines that a subgraph 1 in the first computational graph has a same graph structure as the given computational graph 1, and a logical relationship in the subgraph 1 meets the subgraph matching rule 1, the optimization apparatus determines that the subgraph 1 is a subgraph matching the preset graph transformation manner 1.
In this way, when the optimization apparatus determines, according to the subgraph matching rule, that a subgraph matching the any preset graph transformation manner exists in the first computational graph, the optimization apparatus determines the any preset graph transformation manner as a candidate graph transformation manner.
For m preset graph transformation manners in the plurality of preset graph transformation manners, when the optimization apparatus determines, according to a subgraph determining rule, that a subgraph matching the m preset graph transformation manners exists in the first computational graph, the optimization apparatus determines the m preset graph transformation manners as m candidate graph transformation manners, where m is a positive integer.
The m candidate graph transformation manners may match a same subgraph, or may match different subgraphs. This is not limited in this embodiment.
That is, when there is a candidate graph transformation manner in the plurality of preset graph transformation manners, the optimization apparatus performs S102 to S104.
When the optimization apparatus determines, according to the subgraph determining rule, that the subgraph matching the any preset graph transformation manner does not exist in the first computational graph, it indicates that no candidate graph transformation manner exists in the plurality of preset graph transformation manners. That is, the optimization apparatus determines, according to the subgraph matching rule, that no candidate graph transformation manner exists in the plurality of preset graph transformation manners.
In this case, the optimization apparatus ends the computational graph optimization process, that is, a loop of iteratively optimizing the first computational graph converges. For a description of a process of iteratively optimizing the first computational graph, refer to the following description. Details are not described herein again.
The plurality of preset graph transformation manners and a subgraph matching rule corresponding to the plurality of preset graph transformation manners may be graph transformation manners and a corresponding subgraph matching rule that are preset in the optimization apparatus, or may be graph transformation manners and a corresponding subgraph matching rule that are input by the user and received by the optimization apparatus through the input/output interface. This is not limited.
Certainly, a part of the preset graph transformation manners in the plurality of preset graph transformation manners and a subgraph matching rule corresponding to the part of the preset graph transformation manners may be graph transformation manners and a corresponding subgraph matching rule that are preset in the optimization apparatus. The other part of the preset graph transformation manners in the plurality of preset graph transformation manners and a subgraph matching rule corresponding to the other part of the preset graph transformation manners may be graph transformation manners and a corresponding subgraph matching rule that are input by the user and received by the optimization apparatus through the input/output interface. Sources of the plurality of preset graph transformation manners and the subgraph matching rule corresponding to the plurality of preset graph transformation manners are not specifically limited in this embodiment.
For a process in which the optimization apparatus receives, through the input/output interface, the preset graph transformation manner and the corresponding subgraph matching rule that are input by the user, refer to the foregoing description of receiving, by the optimization apparatus through the input/output interface, the user-defined computational graph conversion rule input by the user. Details are not described again.
S103: Transform the first computational graph based on each of the m determined candidate graph transformation manners, to obtain m second computational graphs.
Specifically, the optimization apparatus transforms the first computational graph by using each of the m determined candidate graph transformation manners, to obtain the m second computational graphs.
It should be understood that, for any one of the m candidate graph transformation manners, the optimization apparatus transforms the first computational graph by using the any candidate graph transformation manner, and essentially, the any candidate graph transformation manner is used to transform a subgraph matching the any candidate graph transformation manner in the first computational graph. In this way, after performing an operation indicated by the any candidate graph transformation manner on the subgraph, the optimization apparatus can obtain a new subgraph corresponding to the subgraph.
For example, the any candidate graph transformation manner is a candidate graph transformation manner 1. The optimization apparatus transforms the first computational graph by using the candidate graph transformation manner 1, and essentially, the candidate graph transformation manner 1 is used to transform the subgraph 1 matching the candidate graph transformation manner 1 in the first computational graph. In this way, the optimization apparatus can obtain a subgraph 2 after performing an operation indicated by the candidate graph transformation manner 1 on the subgraph 1. The subgraph 2 is a new subgraph corresponding to the subgraph 1.
In this way, after the first computational graph is transformed in the any candidate graph transformation manner, the second computational graph including the new subgraph may be obtained. It can be learned that one second computational graph can be obtained after the first computational graph is transformed in one candidate graph transformation manner.
Therefore, the m second computational graphs can be obtained after the first computational graph is transformed in each of the m candidate graph transformation manners. That is, a quantity of the second computational graphs is the same as a quantity of candidate graph transformation manners, and the m second computational graphs are in a one-to-one correspondence with the m candidate graph transformation manners.
For example, if a value of m is 3, a quantity of candidate graph transformation manners determined by the optimization apparatus is 3. For example, the three candidate graph transformation manners are respectively a candidate graph transformation manner 1, a candidate graph transformation manner 2, and a candidate graph transformation manner 3. In this case, the optimization apparatus may obtain three second computational graphs after transforming the first computational graph by using each of the three candidate graph transformation manners.
Specifically, the optimization apparatus may transform the first computational graph by using the candidate graph transformation manner 1, to obtain a computational graph 1. The optimization apparatus may transform the first computational graph by using the candidate graph transformation manner 2, to obtain a computational graph 2. The optimization apparatus may transform the first computational graph by using the candidate graph transformation manner 3, to obtain a computational graph 3. The computational graph 1, the computational graph 2, and the computational graph 3 are the foregoing three second computational graphs.
It is easy to understand that a difference between the first computational graph and the second computational graph is a difference between a subgraph matching a candidate graph transformation manner in the first computational graph and a new subgraph obtained after the subgraph is transformed by using the candidate graph transformation manner. The candidate graph transformation manner may be any one of the m candidate graph transformation manners.
S104: Determine a candidate target computational graph in the m second computational graphs, and determine a third computational graph. Then, the third computational graph is used as a new first computational graph, and S102 to S104 are repeatedly performed.
Optionally, the optimization apparatus may determine the candidate target computational graph based on performance of the m second computational graphs.
The candidate target computational graph may be a computational graph with optimal performance in the m second computational graphs, that is, performance of the candidate target computational graph is better than performance of a computational graph other than the candidate target computational graph in the m second computational graphs.
That is, the m second computational graphs are obtained after subgraphs corresponding to the m candidate graph transformation manners in the first computational graph are respectively transformed based on the m candidate graph transformation manners. When applications corresponding to the m second computational graphs are executed, performance of the applications varies. The performance may be, for example, running speeds of the applications. According to the method provided in this embodiment, the optimization apparatus may determine a second computational graph with optimal performance in the m second computational graphs, and use the second computational graph as a candidate target computational graph obtained through a current iterative transformation.
It should be understood that, when performance of the second computational graph is better, performance of an application corresponding to the second computational graph is better, for example, execution efficiency of the application is higher.
Optionally, the optimization apparatus may evaluate performance of the m computational graphs by determining running time of executable code corresponding to the m second computational graphs.
Specifically, the optimization apparatus may separately compile the m second computational graphs, to obtain m pieces of executable code corresponding to the m second computational graphs. The executable code is usually binary code that can be recognized and executed by a machine.
It should be understood that in this case, a compilation module is preset in the optimization apparatus. In this way, after performing S103 to obtain the m second computational graphs, the optimization apparatus may compile the m second computational graphs by using the compilation module, to obtain the m pieces of executable code corresponding to the m second computational graphs.
Then, the optimization apparatus may determine running time of the m pieces of executable code by running the m pieces of executable code.
It should be understood that running time of executable code is inversely proportional to performance of a computational graph corresponding to the executable code. In other words, shorter running time of executable code indicates better performance of a computational graph corresponding to the executable code.
In this way, the optimization apparatus may determine, as a candidate target computational graph (corresponding to a first candidate computational graph in this embodiment), a second computational graph corresponding to determined executable code with the shortest running time. In other words, the optimization apparatus determines the second computational graph with optimal performance in the m second computational graphs as the candidate target computational graph.
Optionally, the optimization apparatus may separately convert the m second computational graphs into corresponding AST, and collect statistics on a quantity of calculation operations and a quantity of memory access operations that are of an AST corresponding to each second computational graph, to evaluate performance of the m second computational graphs.
The memory access operation includes a read operation and/or a write operation performed on a memory or a cache.
The m second computational graphs may be converted to obtain m ASTs, and the m second computational graphs are in a one-to-one correspondence with the m ASTs.
Any second computational graph in the m second computational graphs is used as an example. The optimization apparatus may convert the any second computational graph into program code through conversion reverse to the foregoing described preset conversion rule. Then, the optimization apparatus may construct, based on the program code, an AST corresponding to the any second computational graph. For a related description of the preset conversion rule, refer to the foregoing description. Details are not described herein again. A process of constructing the AST based on the program code is not described in detail in this embodiment.
Then, the optimization apparatus collects statistics on a quantity of calculation operations and a quantity of memory access operations that are of the AST corresponding to the any second computational graph. In this way, the optimization apparatus can evaluate performance of the second computational graph based on the quantity of calculation operations and the quantity of memory access operations that are of the AST corresponding to the any second computational graph.
It should be understood that, a smaller quantity of calculation operations and a smaller quantity of memory access operations that are of the AST indicate higher code execution efficiency of an application corresponding to the AST. In this case, it indicates that performance of the second computational graph corresponding to the AST is better. Similarly, a larger quantity of calculation operations and a larger quantity of memory access operations that are of the AST indicate lower code execution efficiency of the application corresponding to the AST. In this case, it indicates that performance of the second computational graph corresponding to the AST is poorer.
In other words, in the m ASTs obtained by converting the m second computational graphs, a second computational graph corresponding to an AST with a largest quantity of calculation operations and a largest quantity of memory access operations is a computational graph with worst performance in the m second computational graphs. Similarly, in the m ASTs obtained by converting the m second computational graphs, a second computational graph corresponding to an AST with a smallest quantity of calculation operations and a smallest quantity of memory access operations is a computational graph with optimal performance in the m second computational graphs.
In this way, the optimization apparatus may determine, as the candidate target computational graph (corresponding to the first candidate computational graph in this embodiment), the second computational graph corresponding to the AST with the smallest quantity of calculation operations and the smallest quantity of memory access operations. In other words, the optimization apparatus determines the second computational graph with optimal performance in the m second computational graphs as the candidate target computational graph.
As shown in
The two read operations include two read operations performed to read, from a memory/cache, two values on which an add operation needs to be performed. The two values on which an add operation needs to be performed include a result of [b×(c−d)], and a result of 22. The one write operation includes one write operation for writing a result of the add operation to the memory/cache.
A layer-2 node of the AST 60 includes two calculation operations and five memory access operations. The two calculation operations include one add operation and one square operation (that is, an exponential operation whose exponent (pow) is 2). The five memory access operations include three read operations and two write operations.
The three read operations include two read operations performed to read, from the memory/cache, two values on which an add operation needs to be performed and one operation of reading, from the memory/cache, a value on which a pow operation needs to be performed. The two values on which an add operation needs to be performed include a, and a result of [b×(c−d)].
The two write operations include one write operation for writing a result of the add operation to the memory and one operation of writing a result of the pow operation to the memory.
A layer-3 node of the AST 60 includes one calculation operation and three memory access operations. The one calculation operation includes one multiply (mul) operation. The three memory access operations include two read operations and one write operation.
The two read operations include two read operations performed to read, from the memory/cache, two values on which a mul operation needs to be performed. The two values on which a mul operation needs to be performed include b, and a result of (c−d). The one write operation includes one write operation for writing a result of the mul operation to the memory/cache.
A layer-4 node of the AST 60 includes one calculation operation and three memory access operations. The one calculation operation includes one subtraction (sub) operation. The three memory access operations include two read operations and one write operation.
The two read operations include two read operations performed to read, from the memory/cache, two values on which a sub operation needs to be performed. The two values on which a sub operation needs to be performed include c and d. The one write operation includes one write operation for writing a result of the sub operation to the memory/cache.
In this way, a coefficient of calculation operations and a coefficient of memory access operations that are of each layer in the AST 60 are counted, to obtain the quantity of calculation operations and the quantity of memory access operations that are of the AST 60. It can be learned from the foregoing description that the quantity of calculation operations and the quantity of memory access operations that are of the AST 60 are respectively: the quantity of calculation operations=1+2+1+1=5, and the quantity of memory access operations=3+5+3+3=14. That is, the quantity of calculation operations of the AST 60 is 5, and the quantity of memory access operations of the AST 60 is 14.
Then, the optimization apparatus may select one or more computational graphs from the m second computational graphs as the third computational graph, that is, determine the third computational graph from the m second computational graphs. The third computational graph is used as a to-be-optimized computational graph in a next iterative transformation of a current iterative transformation in an iterative optimization method provided in this embodiment.
In a possible implementation, the optimization apparatus may sort the m second computational graphs in descending order of performance based on performance evaluation results of the m second computational graphs. In this way, the optimization apparatus may determine top p second computational graphs as the third computational graph, where p is a positive integer less than or equal to m.
Optionally, it can be learned from the foregoing description that shorter running time of executable code corresponding to the second computational graph indicates better performance of the second computational graph. Therefore, the optimization apparatus may sort the running time of the m pieces of executable code corresponding to the m second computational graphs in ascending order, so that the m second computational graphs can be sorted in descending order of performance.
Optionally, it can be learned from the foregoing description that a larger quantity of calculation operations and a larger quantity of memory access operations of the AST indicate poorer performance of the second computational graph corresponding to the AST. Therefore, the optimization apparatus may sort, in ascending order, the counted quantity of calculation operations and the counted quantity of memory access operations that are of the m ASTs corresponding to the m second computational graphs, so that the m second computational graphs can be sorted in descending order of performance.
In this way, the optimization apparatus may determine, as the third computational graph, p second computational graph corresponding to top p ASTs in the m ASTs in terms of the quantity of calculation operations and the quantity of memory access operations.
It can be learned that there may be one third computational graph. In this case, the third computational graph is a second computational graph with optimal performance in the m second computational graphs. Certainly, there may alternatively be a plurality of third computational graphs, for example, p third computational graphs. In this case, the p third computational graphs are top p second computational graphs in the m second computational graphs that are sorted in descending order of performance.
In another possible implementation, the optimization apparatus may alternatively determine any one or more of the m second computational graphs as the third computational graph. This is not limited in this embodiment.
After determining the third computational graph, the optimization apparatus uses the third computational graph as a new first computational graph, and repeatedly performs S102 to S104 until the optimization apparatus determines, when performing S102, that a graph transformation manner matching the subgraph in the first computational graph does not exist in the plurality of preset graph transformation manners.
It can be learned that the optimization apparatus may repeatedly perform steps S102 to S104, to implement an iterative transformation of the first computational graph. It should be understood that, after one transformation is performed on the first computational graph in a candidate graph transformation manner that is determined by the optimization apparatus and that matches the first computational graph, optimization is performed once. In this way, the first computational graph is iteratively transformed, that is, the first computational graph is iteratively optimized.
That is, for any iterative transformation of a plurality of iterative transformations, the optimization apparatus may select, based on a search policy, a to-be-optimized computational graph in a next iterative transformation of the any iterative transformation from a plurality of computational graphs obtained through the any iterative transformation. Then, based on the foregoing plurality of preset graph transformation manners, the optimization apparatus repeatedly performs steps S102 to S104, so that the plurality of iterative transformations can be performed on the to-be-optimized computational graph in the next iterative transformation, to obtain an optimized target computational graph.
The search policy may be sorting the plurality of computational graphs in descending order of performance based on performance of the plurality of computational graphs obtained through the any iterative transformation, to select one or more computational graphs whose performance is ranked top as the to-be-optimized computational graph in the next iterative transformation of the any iterative transformation. Certainly, the search policy may alternatively be randomly selecting, as the to-be-optimized computational graph in the next iterative transformation of the any iterative transformation, one or more computational graphs from the plurality of computational graphs obtained through the any iterative transformation.
It should be understood that the foregoing description in which the optimization apparatus determines the running time of the executable code corresponding to the m second computational graphs, and the counted quantity of calculation operations and the counted quantity of memory access operations that are of the m ASTs corresponding to the m second computational graphs, to evaluate performance of the m second computational graphs is merely an example. Alternatively, the optimization apparatus may use any other performance evaluation method to evaluate performance of the m second computational graphs. This is not limited in this embodiment.
It is easy to understand that a process in which the optimization apparatus performs iterative optimization on the first computational graph includes the plurality of iterative transformations. For a first iterative transformation, that is, when the optimization apparatus performs S102 to S104 for the first time, a candidate target computational graph corresponding to the first iterative transformation, and p third computational graphs may be obtained.
For a second iterative transformation, that is, when the optimization apparatus uses a third computational graph determined in the first iterative transformation as a new first computational graph, and performs S102 to S104 for the second time, a candidate target computational graph corresponding to the second iterative transformation, and at least one third computational graph may be obtained.
By analogy, for a CO iterative transformation, that is, when the optimization apparatus uses a third computational graph determined in a (q−1)th iterative transformation as a new first computational graph, and performs S102 to S104 for the CO time, a candidate target computational graph corresponding to the CO iterative transformation, and at least one third computational graph may be obtained, where q is a positive integer.
When a value of p is 1, it indicates that the optimization apparatus may obtain one third computational graph in each iterative transformation. In this case, for two consecutive iterative transformations in the method provided in this embodiment, a third computational graph obtained by performing the previous iterative transformation is a first computational graph that needs to be input for performing the subsequent iterative transformation. In addition, in this case, one candidate target computational graph is obtained through each iterative transformation.
It can be learned that, when only one third computational graph is obtained when the optimization apparatus performs any iterative transformation, it indicates that a next iterative transformation of the any iterative transformation includes only one branch iterative transformation. When a process in which the optimization apparatus iteratively optimizes the first computational graph includes q iterative transformations, the optimization apparatus may determine q candidate target computational graphs.
For example,
As shown in
Because the optimization apparatus obtains one candidate target computational graph when performing each iterative transformation, the optimization apparatus may obtain a candidate target computational graph 1 after performing the first iterative transformation, may obtain a candidate target computational graph 2 after performing the second iterative transformation, . . . , may obtain a candidate target computational graph q−1 after performing the (q−1)th iterative transformation, and may obtain a candidate target computational graph q after performing the qth iterative transformation.
When a value of p is greater than 1, it indicates that the optimization apparatus may obtain a plurality of third computational graphs in any iterative transformation. In this case, for two consecutive iterative transformations in the method provided in this embodiment, a plurality of third computational graphs obtained by performing the previous iterative transformation are separately used as a plurality of first computational graphs that need to be input for performing, in parallel, a plurality of branch iterative transformations in the subsequent iterative transformation.
In other words, the subsequent iterative transformation includes a plurality of branch iterative transformations, and a first computational graph that needs to be input for each branch iterative transformation in the plurality of branch iterative transformations is a third computational graph in a plurality of third computational graphs obtained by performing the previous iterative transformation. In addition, a quantity of the plurality of branch iterative transformations is the same as a quantity of the plurality of third computational graphs obtained by performing the previous iterative transformation.
It should be understood that each branch iterative transformation in the plurality of branch iterative transformations includes steps S102 to S104. In this way, when performing each branch iterative transformation in the plurality of branch iterative transformations, the optimization apparatus may obtain one candidate target computational graph. That is, a plurality of candidate target computational graphs may be correspondingly obtained based on the plurality of branch iterative transformations.
For example,
As shown in
For the second iterative transformation, if one third computational graph is obtained after S102 to S104 are performed in the branch iterative transformation 21, and two third computational graphs are obtained after S102 to S104 are performed in the branch iterative transformation 22, a third iterative transformation includes three (that is, 1+2=3) branch iterative transformations (including a branch iterative transformation 31, a branch iterative transformation 32, and a branch iterative transformation 33).
In this way, the optimization apparatus may use the third computational graph obtained through the branch iterative transformation 21 as a first computational graph that needs to be input in the branch iterative transformation 31 in the third iterative transformation, and may respectively use the two third computational graphs obtained through the branch iterative transformation 22 as first computational graphs that need to be input in two branch iterative transformations (including the branch iterative transformation 32 and the branch iterative transformation 33) in the third iterative transformation, to implement computational graph optimization through the second iterative transformation.
For the third iterative transformation, if two third computational graphs are obtained after S102 to S104 are performed in the branch iterative transformation 31, three third computational graphs are obtained after S102 to S104 are performed in the branch iterative transformation 32, and one third computational graph is obtained after S102 to S104 are performed in the branch iterative transformation 33, a fourth iterative transformation includes six (that is, 2+3+1=3) branch iterative transformations (including a branch iterative transformation 41, a branch iterative transformation 42, a branch iterative transformation 43, a branch iterative transformation 44, a branch iterative transformation 45, and a branch iterative transformation 46).
In this way, the optimization apparatus may respectively use the two third computational graphs obtained through the branch iterative transformation 31 as first computational graphs that need to be input in two branch iterative transformations (including the branch iterative transformation 41 and the branch iterative transformation 42) in the fourth iterative transformation, may respectively use the three third computational graphs obtained through the branch iterative transformation 32 as first computational graphs that need to be input in three branch iterative transformations (including the branch iterative transformation 43, the branch iterative transformation 44, and the branch iterative transformation 45) in the fourth iterative transformation, and may use the third computational graph obtained through the branch iterative transformation 33 as a first computational graph that needs to be input in the branch iterative transformation 46 in the fourth iterative transformation, to implement computational graph optimization through the third iterative transformation.
The optimization apparatus may obtain one candidate target computational graph when performing each branch iterative transformation. Therefore, for the first iterative transformation, the first iterative transformation includes only one iterative transformation, that is, it may be considered that the first iterative transformation includes only one branch iterative transformation. In this way, by performing the first iterative transformation, the optimization apparatus may obtain one candidate target computational graph, for example, obtain a candidate target computational graph 11.
For the second iterative transformation, the second iterative transformation includes two branch iterative transformations. In this way, by performing the second iterative transformation, the optimization apparatus may obtain two candidate target computational graphs, for example, obtain a candidate target computational graph 21 and a candidate target computational graph 22.
For the third iterative transformation, the third iterative transformation includes three branch iterative transformations. In this way, by performing the third iterative transformation, the optimization apparatus may obtain three candidate target computational graphs, for example, obtain a candidate target computational graph 31, a candidate target computational graph 32, and a candidate target computational graph 33.
For the fourth iterative transformation, the fourth iterative transformation includes six branch iterative transformations. In this way, by performing the fourth iterative transformation, the optimization apparatus may obtain six candidate target computational graphs, for example, obtain a candidate target computational graph 41, a candidate target computational graph 42, a candidate target computational graph 43, a candidate target computational graph 44, a candidate target computational graph 45, and a candidate target computational graph 46.
Further, the optimization apparatus may remove an invalid graph transformation manner from at least one candidate graph transformation manner determined by the optimization apparatus when performing S102 in each iterative transformation, starting from performing the second iterative transformation.
The invalid graph transformation manner includes a graph transformation manner that has no transformation effect and a graph transformation manner that may cause an iterative transformation rollback. For the description of the iterative transformation rollback, refer to the foregoing description. Details are not described herein again.
In this way, in a process of iteratively optimizing the first computational graph, the optimization apparatus can avoid a problem that a loop of the iterative transformation cannot converge due to the iterative transformation rollback caused by the invalid graph transformation manner, so that convergence efficiency of iteratively optimizing the first computational graph is improved.
For a process in which the optimization apparatus removes the invalid graph transformation manner from the at least one candidate graph transformation manner determined by the optimization apparatus when performing S102 in each iterative transformation, starting from performing the second iterative transformation, refer to the following description. Details are not described herein again.
S105: Determine a target computational graph in all candidate target computational graphs obtained when the first computational graph is iteratively optimized.
It can be learned from the description of S104 that, in a process in which the optimization apparatus iteratively optimizes the first computational graph, one or more candidate target computational graphs may be obtained in each iterative transformation. In this way, the optimization apparatus may determine the target computational graph in all the candidate target computational graphs obtained in a process of starting to optimize the first computational graph until the end of the iterative optimization. Performance of the target computational graph is better than performance of a candidate target computational graph other than the target computational graph in all the candidate target computational graphs.
In a possible implementation, the optimization apparatus may determine the target computational graph based on all the obtained candidate target computational graphs after the iterative optimization ends.
Optionally, after the iterative optimization ends, the optimization apparatus may determine the target computational graph based on a quantity of calculation operations and a quantity of memory access operations that are of ASTs corresponding to all the obtained candidate target computational graphs.
A quantity of calculation operations and a quantity of memory access operations that are of an AST corresponding to the target computational graph are less than a quantity of calculation operations and a quantity of memory access operations that are of an AST corresponding to the candidate target computational graph other than the target computational graph in all the candidate target computational graphs. That is, performance of the target computational graph is better than performance of the candidate target computational graph other than the target computational graph in all the candidate target computational graphs.
In another possible implementation, the optimization apparatus may determine, in an iterative optimization process, the target computational graph based on a candidate target computational graph obtained through each iterative transformation.
Optionally, the optimization apparatus may determine, in the iterative optimization process, the target computational graph based on a quantity of calculation operations and a quantity of memory access operations that are of an AST corresponding to the candidate target computational graph obtained through each iterative transformation.
For a brief description, the following uses an example in which the optimization apparatus obtains only one third computational graph after each iterative transformation is performed, to describe a process in which the optimization apparatus determines, in the iterative optimization process, the target computational graph based on the quantity of calculation operations and the quantity of memory access operations that are of the AST corresponding to the candidate target computational graph obtained through each iterative transformation. In this case, there is only one branch iterative transformation in a next iterative transformation of each iterative transformation, and the optimization apparatus may obtain only one candidate target computational graph after each iterative transformation is performed.
Specifically, the optimization apparatus may first determine, as the target computational graph, a first candidate target computational graph obtained after the first iterative transformation is performed.
Then, after obtaining a second candidate target computational graph by performing the second iterative transformation, the optimization apparatus determines whether performance of the second candidate target computational graph is better than that of the target computational graph. If the performance of the second candidate target computational graph is better than that of the target computational graph, the target computational graph is updated, that is, the second candidate target computational graph is used as a new target computational graph. If the performance of the second candidate target computational graph is worse than that of the target computational graph, the target computational graph is not updated.
Then, after obtaining a third candidate target computational graph by performing the third iterative transformation, the optimization apparatus determines whether performance of the third candidate target computational graph is better than that of a latest target computational graph. If the performance of the third candidate target computational graph is better than that of the target computational graph, the target computational graph is updated, that is, the third candidate target computational graph is used as a new target computational graph. If the performance of the third candidate target computational graph is worse than that of the target computational graph, the target computational graph is not updated.
Similarly, after obtaining a qth candidate target computational graph by performing the qth iterative transformation, the optimization apparatus determines whether performance of the qth candidate target computational graph is better than that of a latest target computational graph. If the performance of the CO candidate target computational graph is better than that of the target computational graph, the target computational graph is updated, that is, the CO candidate target computational graph is used as a new target computational graph. If the performance of the qth candidate target computational graph is worse than that of the target computational graph, the target computational graph is not updated.
This continues until the loop of the iterative transformation performed by the optimization apparatus converges. In this case, the latest target computational graph determined by the optimization apparatus is the target computational graph obtained after the optimization apparatus iteratively optimizes the first computational graph.
It can be learned from the foregoing description that, after performing, in any one of the plurality of iterative transformations, performance evaluation on a computational graph obtained through a transformation in at least one of the plurality of preset graph transformation manners, the optimization apparatus may determine, based on an obtained performance evaluation result, a candidate target computational graph obtained through the any iterative transformation. Then, based on all the candidate target computational graphs, a computational graph with optimal performance in the candidate target graphs may be determined as the target computational graph.
S106: Output the target computational graph.
In a possible implementation, the optimization apparatus may directly output the target computational graph to the user.
In another possible implementation, the optimization apparatus may convert the target computational graph into target code according to a conversion rule reverse to the foregoing described preset conversion rule. Then, the optimization apparatus outputs the target code to the user.
The preset conversion rule is used to convert code into a computational graph, and the conversion rule reverse to the preset conversion rule is used to convert a computational graph into code. For a related description of the preset conversion rule, refer to the foregoing description. Details are not described herein again.
In still another possible implementation, the optimization apparatus first converts the target computational graph into target code according to a conversion rule reverse to the foregoing described preset conversion rule. Then, the optimization apparatus may compile the target code, to obtain machine-executable code corresponding to the target code. Then, the optimization apparatus outputs the machine-executable code to the user.
A process of compiling the target code is not described in this embodiment.
Optionally, a compilation tool may be preset in the optimization apparatus. In this way, after the optimization apparatus first converts the target computational graph into the target code according to the conversion rule reverse to the foregoing described preset conversion rule, the optimization apparatus may compile the target code based on the compilation tool, to obtain the machine-executable code corresponding to the target code.
Optionally, the optimization apparatus may obtain the compilation tool in advance. In this way, after the optimization apparatus first converts the target computational graph into the target code according to the conversion rule reverse to the foregoing described preset conversion rule, the optimization apparatus may compile the target code based on the compilation tool, to obtain the machine-executable code corresponding to the target code.
For example, before optimizing the first computational graph, the optimization apparatus may obtain, through the input/output interface or the communication interface, the compilation tool uploaded by the user. In this way, after the optimization apparatus converts the target computational graph into the target code according to the conversion rule reverse to the foregoing described preset conversion rule, the optimization apparatus may compile the target code based on the compilation tool, to obtain the machine-executable code corresponding to the target code.
It should be understood that the compilation tool may be any compilation tool that can compile the target code into the machine-executable code. The compilation tool is not specifically limited in this embodiment.
The foregoing describes the computational graph optimization method provided in embodiments. The following describes a process in which the optimization apparatus removes an invalid graph transformation manner from at least one candidate graph transformation manner determined by the optimization apparatus when performing S102 in each iterative transformation, starting from performing the second iterative transformation.
It should be understood that, for distinguishing description, in the following embodiments, a graph transformation manner that is determined by the optimization apparatus in the plurality of preset graph transformation manners according to the subgraph matching rule and that matches the subgraph in the first computational graph is referred to as an initial candidate graph transformation manner. In addition, an initial candidate graph transformation manner in which the invalid graph transformation manner is removed is referred to as the candidate graph transformation manner.
It should be understood that, when the optimization apparatus performs S102 for the first time, the initial candidate graph transformation manner determined by the optimization apparatus is the candidate graph transformation manner.
In this way, when the optimization apparatus performs S102 to S104 for the second time after performing S101 to S104 for the first time, in S102, the optimization apparatus may remove, based on a pruning policy, the invalid graph transformation manner from one or more determined initial candidate graph transformation manners, to obtain the candidate graph transformation manner when performing S103.
S104a: Determine a candidate target computational graph and a third computational graph in the m second computational graphs, and determine the third computational graph as a new first computational graph.
Specifically, for a process in which the optimization apparatus determines the candidate target computational graph and the third computational graph in the m second computational graphs, refer to the foregoing description. Details are not described herein again.
Then, when the optimization apparatus performs S102 to S104 for the second time, S102 performed in each iterative transformation may be replaced with S102a.
S102a: Determine whether an initial candidate graph transformation manner exists in the plurality of preset graph transformation manners, where the initial candidate graph transformation manner matches a subgraph in the new first computational graph.
For a process in which the optimization apparatus determines whether the initial candidate graph transformation manner exists in the plurality of preset graph transformation manners, refer to the foregoing description of determining, by the optimization apparatus, whether the candidate graph transformation manner exists in the plurality of preset graph transformation manners in S102. Details are not described herein again.
When the optimization apparatus determines that the initial candidate graph transformation manner exists in the plurality of preset graph transformation manners, S102b is performed.
S102b: Determine, based on a pruning policy, whether the candidate graph transformation manner exists in the initial candidate graph transformation manner.
When a value of a quantity of initial candidate graph transformation manners is j, the optimization apparatus determines, based on the pruning policy, whether the candidate graph transformation manner exists in the j initial candidate graph transformation manners. The pruning policy is used to remove an invalid graph transformation manner from the j initial candidate graph transformation manners.
Specifically, the optimization apparatus may remove, based on the pruning policy and a graph transformation manner used to transform to obtain a current first computational graph, an invalid graph transformation manner from the j initial candidate graph transformation manners, and further determine whether the candidate graph transformation manner exists.
It should be understood that the current first computational graph is a third computational graph obtained through a previous iterative transformation of a current iterative transformation. In this case, the graph transformation manner used to transform to obtain the current first computational graph is a graph transformation manner in which a first computational graph in the previous iterative transformation is transformed into the third computational graph in the previous iterative transformation.
For example, if the current iterative transformation is a second iterative transformation, the current first computational graph is a first computational graph of the second iterative transformation, that is, a third computational graph obtained through a first iterative transformation. In this case, the graph transformation manner used to transform the current first computational graph is a graph transformation manner in which a first computational graph in the first iterative transformation is transformed into the third computational graph in the first iterative transformation.
In this way, when the graph transformation manner used to transform the current first computational graph and any initial candidate graph transformation manner in the j initial candidate graph transformation manners meet the pruning policy, the any initial candidate graph transformation manner is determined as an invalid graph transformation manner. In this way, the optimization apparatus may remove the invalid graph transformation manner from the j initial candidate graph transformation manners based on the pruning policy.
When a quantity of invalid graph transformation manners is j, it indicates that all of the j initial candidate graph transformation manners are invalid graph transformation manners, that is, no candidate graph transformation manner exists in the j initial candidate graph transformation manners. In this case, the optimization apparatus ends the computational graph optimization process, that is, a process of iteratively optimizing the first computational graph converges. For a description of a process of iteratively optimizing the first computational graph, refer to the foregoing description. Details are not described herein again.
When a quantity of invalid graph transformation manners is less than j, it indicates that a part of the j initial candidate graph transformation manners are invalid graph transformation manners, that is, n candidate graph transformation manners exist in the j initial candidate graph transformation manners, where n is a positive integer less than j. In this case, the optimization apparatus executes S103 and S104.
Specifically, the pruning policy may include at least one of the following policies 1 to 6. Policies 1 to 4 are described in detail as follows:
Policy 1: A quantity of times of loop tiling performed on same loop logic exceeds a preset threshold.
Loop tiling is a preset operation performed on loop logic in a given computational graph in a graph transformation manner, and the loop tiling indicates to tile the loop logic in the given computational graph into two or more layers of nested loop logic by using a preset step. Specifically, for a description of the preset step, refer to the foregoing description. Details are not described herein again.
When loop tiling is performed on same loop logic in a given computational graph for a plurality of times, if a loop step of the loop logic in the current given computational graph is greater than a preset step of loop tiling in a graph transformation manner, the graph transformation manner is invalid.
For example,
As shown in (a) in
As shown in (b) in
In this case, for the computational graph 2, if the computational graph 2 continues to be transformed by using the graph transformation manner 1, because the tiling step in the graph transformation manner 1 is 16 bits, and a loop step of the computational graph 2 is also 16 bits, the graph transformation manner 2 is an invalid graph transformation manner for the computational graph 2.
The loop logic 1 in the computational graph 1 and the nested loop logic formed by the loop logic 2 and the loop logic 3 in the computational graph 2 are essentially the same loop logic. That is, if loop tiling is performed for a plurality of times on the same loop logic, for example, a quantity of times of loop tiling exceeds a preset threshold, loop tiling may be invalid, that is, a graph transformation manner indicating loop tiling may be invalid.
Therefore, it is prohibited to perform loop tiling on the same loop logic for a plurality of times. That is, for the same loop logic in the computational graph, it is prohibited to perform a graph transformation manner that indicates to perform a loop tiling operation for a plurality of times.
In this way, when the graph transformation manner used to transform the current first computational graph and any initial candidate graph transformation manner in the j initial candidate graph transformation manners meet the policy 1, the optimization apparatus determines that the any initial candidate graph transformation manner is an invalid graph transformation manner.
Policy 2: Loop interchange is performed on two same pieces of loop logic for a plurality of times.
Loop interchange is another preset operation performed on loop logic in a given computational graph in a graph transformation manner, and the loop interchange indicates to exchange positions of two pieces of loop logic in the given computational graph. For a specific description of the loop interchange, refer to the foregoing description. Details are not described herein again.
If loop interchange is performed on two same pieces of loop logic twice, two graph transformation manners indicating to perform the loop interchange twice are graph transformation manners that are mutually inverse. That is, after the loop interchange is performed on the two pieces of loop logic once, the loop interchange is performed on the two pieces of loop logic again, and the two pieces of loop logic are restored to a state in which the loop interchange is not performed, that is, performing of the second loop interchange is invalid.
For example,
If a graph transform manner 1 indicates to perform a loop interaction operation on loop logic 1 and loop logic 2 in a given computational graph, as shown in (a) in
As shown in (b) in
It can be seen from
Therefore, for same loop logic, if loop interchange has been performed once, it is prohibited to perform loop interchange again. In other words, for the same loop logic, it is prohibited to perform loop interchange for a plurality of times. That is, for the same loop logic in a computational graph, it is prohibited to perform a graph transformation manner that indicates to perform loop interchange for a plurality of times.
In this way, when the graph transformation manner used to transform the current first computational graph and any initial candidate graph transformation manner in the j initial candidate graph transformation manners meet the policy 2, the optimization apparatus determines that the any initial candidate graph transformation manner is an invalid graph transformation manner.
Policy 3: Same loop logic is first expanded and then collapsed, or is first collapsed and then expanded.
The expansion or collapse operation performed on loop logic is another preset operation performed on the loop logic in a given computational graph in a graph transformation manner.
The expansion operation performed on the loop logic means expanding one piece of loop logic including a plurality of variables (for example, s variables, where s is a positive integer) into a plurality of pieces of loop logic including one variable, or into a plurality of pieces of loop logic including a plurality of variables (for example, t variables, where t is a positive integer less than s). This is not limited.
The collapse operation performed on the loop logic is collapsing a plurality of pieces of loop logic including one or more variables into one piece of loop logic including a plurality of variables.
For example,
In this case, as shown in (a) in
When the graph transformation manner 2 matches the computational graph 2, after the computational graph 2 is transformed by using the graph transformation manner 2, the loop logic 2 including a variable (for example, x) and the loop logic 3 including a variable (for example, y) that are included in the computational graph 2 are combined into the loop logic 1 including two variables (for example, x and y). That is, after the computational graph 2 is transformed in the graph transformation manner 2, the computational graph 3 shown in (c) in
It can be seen from
The loop logic 1 in the computational graph 1 and the nested loop logic formed by the loop logic 2 and the loop logic 3 in the computational graph 2 are essentially the same loop logic. That is, if an expansion operation is performed on the same loop logic before a collapse operation is performed, the collapse operation is invalid. Similarly, if a collapse operation is performed on the same loop logic before an expansion operation is performed, the expansion operation is invalid.
It can be learned that a graph transformation manner indicating to perform an expansion operation on loop logic and a graph transformation manner indicating perform a collapse operation on the loop logic are mutually inverse.
Therefore, it is prohibited to first expand and then collapse the same loop logic. Similarly, it is prohibited to first collapse and then expand the same loop logic.
That is, for the same loop logic in a computational graph, it is prohibited to first perform a graph transformation manner that indicates to expand the loop logic, and then perform a graph transformation manner that indicates to collapse the loop logic. Similarly, for the same loop logic in a computational graph, it is prohibited to first perform a graph transformation manner that indicates to collapse the loop logic, and then perform a graph transformation manner that indicates to expand the loop logic.
In this way, when the graph transformation manner used to transform the current first computational graph and any initial candidate graph transformation manner in the j initial candidate graph transformation manners meet the policy 3, the optimization apparatus determines that the any initial candidate graph transformation manner is an invalid graph transformation manner.
Policy 4: Same loop logic is first fissed and then fused, or first fused and then fissed.
A fission or fusion operation performed on loop logic is another preset operation performed on the loop logic in a given computational graph in a graph transformation manner.
The fission operation performed on the loop logic means fissing loop logic that needs to perform a plurality of (for example, s) operations internally into a plurality of pieces of loop logic that perform only one operation internally, or into a plurality of pieces of loop logic that need to perform a plurality of (for example, t, where t<s) operations internally. This is not limited.
The fusion operation performed on the loop logic means fusing a plurality of pieces of loop logic that need to perform one or more operations internally into a piece of loop logic that needs to perform a plurality of operations internally.
For example,
In this case, as shown in (a) in
When the graph transformation manner 2 matches the computational graph 2, after the computational graph 2 is transformed by using the graph transformation manner 2, the loop logic 2 that needs to perform one operation (for example, the operation 1) internally and the loop logic 3 that needs to perform one operation (for example, the operation 2) internally that are included in the computational graph 2 are fused into the loop logic 1 that needs to perform two operations (for example, the operation 1 and the operation 2) internally. That is, after the computational graph 2 is transformed in the graph transformation manner 2, the computational graph 3 shown in (c) in
It can be seen from
The loop logic 1 in the computational graph 1 and the serial loop logic formed by the loop logic 2 and the loop logic 3 in the computational graph 2 are essentially the same loop logic. That is, if a fission operation is performed on the same loop logic before a fusion operation is performed, the fusion operation is invalid. Similarly, if a fusion operation is performed on the same loop logic before a fission operation is performed, the fission operation is invalid.
It can be learned that a graph transformation manner indicating to perform a fission operation on loop logic and a graph transformation manner indicating to perform a fusion operation on the loop logic are mutually inverse.
Therefore, it is prohibited to first fiss and then fuse the same loop logic. Similarly, it is prohibited to first fuse and then fiss the same loop logic.
That is, for the same loop logic in a computational graph, it is prohibited to first perform a graph transformation manner that indicates to fiss the loop logic, and then perform a graph transformation manner that indicates to fuse the loop logic. Similarly, for the same loop logic in a computational graph, it is prohibited to first perform a graph transformation manner that indicates to fuse the loop logic, and then perform a graph transformation manner that indicates to fiss the loop logic.
In this way, when the graph transformation manner used to transform the current first computational graph and any initial candidate graph transformation manner in the j initial candidate graph transformation manners meet the policy 4, the optimization apparatus determines that the any initial candidate graph transformation manner is an invalid graph transformation manner.
In this way, by using the foregoing policies 1 to 4, the optimization apparatus may determine, in the j initial candidate graph transformation manners, whether the candidate graph transformation manner exists. The candidate graph transformation manner is a graph transformation manner other than an invalid graph transformation manner in the j initial candidate graph transformation manners.
It should be understood that, if the current iterative transformation is the qth iterative transformation, the graph transformation manner used to transform the current first computational graph includes a graph transformation manner used to transform the first computational graph into the third computational graph in all iterative transformations before the qth iterative transformation.
For example, if a value of q is 3, the current iterative transformation is a third iterative transformation. In this case, the graph transformation manner used to transform the current first computational graph includes a graph transformation manner 1 in which the first computational graph is transformed into the third computational graph in the second iterative transformation. The third computational graph is the first computational graph in the third iterative transformation. In addition, the graph transformation manner used to transform the current first computational graph further includes a graph transformation manner 2 in which the first computational graph is transformed into the computational graph in the first iterative transformation. The third computational graph is the first computational graph in the second iterative transformation.
For more clear description of determining the invalid graph transformation manner in the j initial candidate graph transformation manners based on the pruning policy, for example, refer to
As shown in
It can be learned that Manner 11 and Manner 21 meet the policy 2 in the foregoing pruning policy. In addition, if a value of a preset threshold in the policy 1 in the foregoing pruning policy is 1, Manner 12 and Manner 22 meet the policy 1 in the foregoing pruning policy.
In this way, the optimization apparatus may determine Manner 21 and Manner 22 in the initial candidate graph transformation manners as invalid graph transformation manners, and determine graph transformation manners other than Manner 21 and Manner 22 in the initial candidate graph transformation manners as candidate graph transformation manners. That is, the candidate graph transformation manners include Manner 23, Manner 24, Manner 25, and Manner 26.
Then, S103 and S104 are performed, and S105 and S106 are performed. Details are not described again.
It should be understood that, when the optimization apparatus performs S103 in the second iterative transformation, the optimization apparatus transforms the first computational graph (namely, the third computational graph in the first iterative transformation) based on each of the n candidate graph transformation manners determined in S102b, to obtain n second computational graphs (corresponding to the fourth computational graph in this embodiment).
Further, when the optimization apparatus performs S104 in the second iterative transformation, the optimization apparatus may convert the n second computational graphs determined in S103 into n ASTs, and determine, as a candidate target computational graph, a second computational graph corresponding to an AST with the smallest quantity of calculation operations and the smallest quantity of memory access operations in the n ASTs. For a related description of the AST, refer to the foregoing description. Details are not described herein again.
It can be learned that, in any iterative transformation except the first iterative transformation in the plurality of iterative transformations, the optimization apparatus may remove, based on the pruning policy, the invalid graph transformation manner from the plurality of preset graph transformation manners used to transform the computational graph. In this way, the optimization apparatus may perform the plurality of iterative transformations on a to-be-optimized first computational graph based on a plurality of preset graph transformation manners in which the invalid graph transformation manner is removed, to obtain the target computational graph.
So far, this embodiment provides a computational graph optimization method. In the method, computational graph optimization is automatically implemented by using a plurality of iterative transformations. In addition, according to the method, the invalid graph transformation manner is removed based on the pruning policy in the process of iteratively optimizing the computational graph. This avoids an iterative transformation rollback caused by the invalid graph transformation manner, and further improves loop convergence efficiency of iteratively optimizing the computational graph.
To deepen understanding of the method provided in this embodiment, the following describes the computational graph optimization method provided in this embodiment with reference to specific scenarios.
Scenario 1
A function implemented by using the computational graph optimization method provided in this embodiment may be used as a function module of a compilation tool. In this way, when source code that is of an application and that is written based on a high-level language is compiled into machine-executable code by using the compilation tool, optimization of the application may be implemented by using the computational graph optimization method provided in this embodiment.
The compilation tool with a computational graph optimization function may be preset in any computing device with a computing processing capability. In this way, a user may input to-be-compiled program source code into the computing device through an input/output interface of the computing device.
Then, the computing device runs the compilation tool and inputs the to-be-compiled program source code into the compilation tool. In this way, a computational graph optimization module in the compilation tool may perform steps S101 to S106 shown in
Scenario 2
The computational graph optimization method provided in this embodiment may be implemented by using an optimization app installed on a computing device.
In this way, by running the optimization app, the computing device may perform steps S101 to S106 shown in
Scenario 3
A function implemented by using the computational graph optimization method provided in this embodiment may be used as an optimization function of a computing device. For example, the function may be implemented by using a chip that is preset in the computing device and that can implement the computational graph optimization method provided in this embodiment. In this way, the computing device may perform steps S101 to S106 shown in
Optionally, the computing device may be a server (or cloud) device.
For example, a user may send an optimization request to the server (or cloud) device by using a client device, where the optimization request is used to request to optimize code of to-be-optimized application. In this case, the optimization request includes the code of the to-be-optimized application. Alternatively, the optimization request is used to request to optimize a computational graph corresponding to the to-be-optimized application. In this case, the optimization request includes the computational graph corresponding to the to-be-optimized application.
Then, the server (or cloud) device may perform, based on the received optimization request, steps S101 to S106 shown in
Then, the server (or cloud) device may send a computational graph, code, or executable binary code of an optimized application to the client device.
In conclusion, this embodiment provides a computational graph optimization method. In the method, computational graph optimization is implemented in a manner of automatic iterative transformation. In this embodiment, when a computational graph with optimal performance is searched for in an iterative transformation process, an optimal iterative combination of graph transformation manners used to transform a computational graph is found, and a computational graph obtained through transformation in the graph transformation manner in the iterative combination is an optimized computational graph. Therefore, compared with a manual computational graph optimization method that requires manual intervention, the method provided in this embodiment improves optimization efficiency.
In addition, according to the method provided in this embodiment, the invalid graph transformation manner is removed based on the pruning policy in the process of iteratively optimizing the computational graph. This avoids an iterative transformation rollback caused by the invalid graph transformation manner, and further improves loop convergence efficiency of iteratively optimizing the computational graph.
The foregoing mainly describes the solutions provided in embodiments from the perspective of the methods. To implement the foregoing functions, corresponding hardware structures and/or software modules for performing the functions are included. A person skilled in the art should easily be aware that, in combination with units and algorithm steps of the examples described in embodiments disclosed in this specification, this disclosure may be implemented by hardware or a combination of hardware and computer software. Whether a function is performed by hardware or hardware driven by computer software depends on particular applications and design constraints of the technical solutions. A person skilled in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of this disclosure.
In embodiments, the computational graph optimization apparatus may be divided into function modules based on the foregoing method examples. For example, each function module may be obtained through division based on each corresponding function, or two or more functions may be integrated into one processing module. The integrated module may be implemented in a form of hardware, or may be implemented in a form of a software functional module. It should be noted that, in embodiments, module division is an example, and is merely a logical function division. In an actual implementation, another division manner may be used.
The obtaining unit 151 is configured to obtain a first computational graph obtained through conversion based on to-be-optimized code. The processing unit 152 is configured to perform a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph. The target computational graph is a computational graph obtained by optimizing the first computational graph.
In an example, with reference to
Optionally, the computational graph optimization apparatus 150 further includes a determining unit 153. The processing unit 152 is further configured to: in any one of the plurality of iterative transformations, perform, based on a performance evaluation policy, performance evaluation on a computational graph obtained through a transformation in at least one of the plurality of preset graph transformation manners. The determining unit 153 is configured to determine the target computational graph based on a performance evaluation result.
In an example, with reference to
Optionally, the foregoing performance evaluation policy includes: performing performance evaluation on the computational graph based on a quantity of calculation operations and a quantity of memory access operations that are of an abstract syntax tree AST corresponding to the computational graph; or performing performance evaluation on the computational graph based on running time of executable code corresponding to the computational graph.
Optionally, for any one of the plurality of iterative transformations, the processing unit 152 is further configured to: select, based on a search policy, a to-be-optimized computational graph in a next iterative transformation of the any iterative transformation from a plurality of computational graphs obtained through the any iterative transformation; and perform, based on the plurality of preset graph transformation manners, the plurality of iterative transformations on the to-be-optimized computational graph in the next iterative transformation, to obtain the target computational graph.
Optionally, the search policy includes: determining, in the plurality of computational graphs based on performance of the computational graphs, the to-be-optimized computational graph in the next iterative transformation.
In an example, with reference to
Optionally, in any iterative transformation except a first iterative transformation in the plurality of iterative transformations, the processing unit 152 is further configured to: remove, based on a pruning policy, an invalid graph transformation manner from candidate graph transformation manners used to transform a computational graph; and perform the plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners in which the invalid graph transformation manner is removed, to obtain the target computational graph. The candidate graph transformation manner includes at least one of the plurality of preset graph transformation manners.
In an example, with reference to
Optionally, the pruning policy includes at least one of the following policies: a quantity of times of loop tiling performed on same loop logic exceeds a preset threshold; loop interchange is performed on two same pieces of loop logic for a plurality of times; same loop logic is first expanded and then collapsed, or is first collapsed and then expanded; or same loop logic is first fissed and then fused, or is first fused and then fissed.
Optionally, the determining unit 153 is further configured to determine m candidate graph transformation manners from the plurality of preset graph transformation manners. The m candidate graph transformation manners match a subgraph in the first computational graph, and m is a positive integer. The processing unit 152 is further configured to transform the first computational graph based on each of the m candidate graph transformation manners, to obtain m second computational graphs. The m second computational graphs are in a one-to-one correspondence with the m candidate graph transformation manners. The determining unit 153 is further configured to determine the target computational graph based on the m second computational graphs.
In an example, with reference to
Optionally, the determining unit 153 is further configured to determine a first candidate target computational graph in the m second computational graphs. Performance of the first candidate target computational graph is better than performance of a computational graph other than the first candidate target computational graph in the m second computational graphs. The determining unit 153 is further configured to determine the target computational graph based on the first candidate target computational graph.
In an example, with reference to
Optionally, the determining unit 153 is further configured to: determine a third computational graph in the m second computational graphs; and determine n candidate graph transformation manners from the plurality of preset graph transformation manners based on the third computational graph. The n candidate graph transformation manners match a subgraph in the third computational graph, and n is a positive integer. The processing unit 152 is further configured to transform the third computational graph based on each of the n candidate graph transformation manners, to obtain n fourth computational graphs. The n fourth computational graphs are in a one-to-one correspondence with the n candidate graph transformation manners. The determining unit 153 is further configured to determine a second candidate target computational graph in the n fourth computational graphs. Performance of the second candidate target computational graph is better than performance of a computational graph other than the second candidate target computational graph in the n fourth computational graphs. The determining unit 153 is further configured to determine the target computational graph based on the first candidate computational graph and the second candidate target computational graph.
In an example, with reference to
Optionally, the computational graph optimization apparatus 150 further includes a receiving unit 154 configured to receive the first computational graph input by a user.
In an example, with reference to
Optionally, the obtaining unit 151 is further configured to obtain the to-be-optimized code. The processing unit 152 is further configured to convert the to-be-optimized code into the first computational graph according to a preset conversion rule.
In an example, with reference to
Optionally, the receiving unit 154 is further configured to: before converting the to-be-optimized code into the first computational graph according to the preset conversion rule, receive the preset conversion rule input by a user.
In an example, with reference to
Optionally, the receiving unit 154 is further configured to: before performing the plurality of iterative transformations on the first computational graph based on the plurality of preset graph transformation manners, to obtain the target computational graph, receive a preset graph transformation manner input by the user.
In an example, with reference to
Optionally, the computational graph optimization apparatus 150 further includes an output unit 155 configured to output the target computational graph.
In an example, with reference to
Optionally, the determining unit 153 is further configured to determine target code based on the target computational graph. The target code is code obtained by optimizing the to-be-optimized code. The processing unit 152 is further configured to compile the target code to obtain target executable code. The output unit 155 is further configured to output the target executable code.
In an example, with reference to
For specific descriptions of the foregoing optional manners, refer to the foregoing method embodiments. Details are not described herein again. In addition, for descriptions of any of explanations and beneficial effects of the computational graph optimization apparatus 150 provided above, refer to the foregoing corresponding method embodiments. Details are not described again.
In an example, with reference to
The receiving unit 161 is configured to receive a first computational graph that is sent by a user end and obtained through conversion based on to-be-optimized code. The processing unit 162 is configured to perform a plurality of iterative transformations on the first computational graph based on a plurality of preset graph transformation manners, to obtain a target computational graph. The target computational graph is a computational graph obtained by optimizing the first computational graph. The sending unit 163 is configured to send the target computational graph to the user end.
For specific descriptions of the foregoing optional manners, refer to the foregoing method embodiments. Details are not described herein again. In addition, for descriptions of any of explanations and beneficial effects of the apparatus 160 for providing a computational graph optimization service provided above, refer to the foregoing corresponding method embodiments. Details are not described again.
In an example, with reference to
An embodiment further provides a chip system 170. As shown in
The processor 171 and the interface circuit 172 may be interconnected through a line. For example, the interface circuit 172 may be configured to receive a signal (for example, obtain a first computational graph). For another example, the interface circuit 172 may be configured to send a signal to another apparatus (for example, the processor 171). For example, the interface circuit 172 may read instructions stored in the memory, and send the instructions to the processor 171. When the instructions are executed by the processor 171, a computational graph optimization apparatus may be enabled to perform the steps in the foregoing embodiments. Certainly, the chip system 170 may further include another discrete component. This is not specifically limited in this embodiment.
Another embodiment further provides a computer-readable storage medium. The computer-readable storage medium stores instructions. When the instructions are run on a computational graph optimization apparatus, the computational graph optimization apparatus performs steps performed by the computational graph optimization apparatus in the method process shown in the foregoing method embodiments.
In some embodiments, the disclosed methods may be implemented as computer program instructions encoded in a machine-readable format on a computer-readable storage medium or encoded on another non-transitory medium or product.
In an embodiment, the computer program product is provided by using a signal bearer medium 180. The signal bearer medium 180 may include one or more program instructions. When the one or more program instructions are run by one or more processors, the functions or a part of the functions described in
In some examples, the signal bearer medium 180 may include a computer-readable medium 181, for example, but not limited to, a hard disk drive, a compact disc (CD), a digital video disc (DVD), a digital tape, a memory, a ROM, or a RAM.
In some implementations, the signal bearer medium 180 may include a computer-recordable medium 182, for example, but not limited to, a memory, a read/write (R/W) CD, or an R/W DVD.
In some implementations, the signal bearer medium 180 may include a communication medium 183, for example, but not limited to, a digital and/or analog communication medium (for example, an optical fiber cable, a waveguide, a wired communication link, or a wireless communication link).
The signal bearer medium 180 may be conveyed by a wireless-form communication medium 183 (for example, a wireless communication medium that complies with the Institute of Electrical and Electronics Engineers (IEEE) 1902.11 standard or another transmission protocol). The one or more program instructions may be, for example, computer-executable instructions or logic implementation instructions.
In some examples, a computational graph optimization apparatus such as that described in
It should be understood that the arrangement described herein is merely used as an example. Thus, a person skilled in the art appreciates that another arrangement and another element (for example, a machine, an interface, a function, a sequence, and an array of functions) can be used to replace the arrangement, and some elements may be omitted together depending on an expected result. In addition, many of the described elements are functional entities that can be implemented as discrete or distributed components, or implemented in any suitable combination at any suitable position in combination with another component.
All or some of the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof. When a software program is used to implement embodiments, embodiments may be implemented completely or partially in a form of a computer program product. The computer program product includes one or more computer instructions. When computer-executable instructions are executed on a computer, the procedures or functions according to embodiments are all or partially generated. The computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable apparatuses. The computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a web site, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line (DSL)) or wireless (for example, infrared, radio, or microwave) manner. The computer-readable storage medium may be any usable medium accessible by a computer, or a data storage device, such as a server or a data center, integrating one or more usable media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, a DVD), a semiconductor medium (for example, a solid-state disk (SSD)), or the like.
The foregoing descriptions are merely specific implementations of the present disclosure, but are not intended to limit the protection scope of the present disclosure. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed shall fall within the protection scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.
Number | Date | Country | Kind |
---|---|---|---|
202110025059.6 | Jan 2021 | CN | national |
This is a continuation of Int'l Patent App. No. PCT/CN2021/142219, filed on Dec. 28, 2021, which claims priority to Chinese Patent App. No. 202110025059.6, filed on Jan. 8, 2021, both of which are hereby incorporated by reference in their entireties.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2021/142219 | Dec 2021 | US |
Child | 18348536 | US |