Appearance
2024-02-27
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection | Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson | 2024-02-27 | 下载 | This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. |
| GraphMatch: Subgraph Query Processing on FPGAs | Jonas Dann, Tobias Götz, Daniel Ritter, Jana Giceva, Holger Fröning | 2024-02-27 | 下载 | Efficiently finding subgraph embeddings in large graphs is crucial for many application areas like biology and social network analysis. Set intersections are the predominant and most challenging aspec... |
| SSRESF: Sensitivity-aware Single-particle Radiation Effects Simulation Framework in SoC Platforms based on SVM Algorithm | Meng Liu, Shuai Li, Fei Xiao, Ruijie Wang, Chunxue Liu, Liang Wang | 2024-02-27 | 下载 | The ever-expanding scale of integrated circuits has brought about a significant rise in the design risks associated with radiation-resistant integrated circuit chips. |
| PreRoutGNN for Timing Prediction with Order Preserving Partition: Global Circuit Pre-training, Local Delay Learning and Attentional Cell Modeling | Ruizhe Zhong, Junjie Ye, Zhentao Tang, Shixiong Kai, Mingxuan Yuan, Jianye Hao, Junchi Yan | 2024-02-27 | 下载 | Pre-routing timing prediction has been recently studied for evaluating the quality of a candidate cell placement in chip design. It involves directly estimating the timing metrics for both pin-level (... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| SmartQC: An Extensible DLT-Based Framework for Trusted Data Workflows in Smart Manufacturing | Alan McGibney, Tharindu Ranathunga, Roman Pospisil | 2024-02-27 | 下载 | Recent developments in Distributed Ledger Technology (DLT), including Blockchain offer new opportunities in the manufacturing domain, by providing mechanisms to automate trust services (digital identi... |
| Highly-Efficient Persistent FIFO Queues | Panagiota Fatourou, Nikos Giachoudis, George Mallis | 2024-02-27 | 下载 | In this paper, we study the question whether techniques employed, in a conventional system, by state-of-the-art concurrent algorithms to avoid contended hot spots are still efficient for recoverable c... |
| SoK: Cryptocurrency Wallets -- A Security Review and Classification based on Authentication Factors | Ivan Homoliak, Martin Perešíni | 2024-02-27 | 下载 | In this work, we review existing cryptocurrency wallet solutions with regard to authentication methods and factors from the user's point of view. |
| Compass: A Decentralized Scheduler for Latency-Sensitive ML Workflows | Yuting Yang, Andrea Merlina, Weijia Song, Tiancheng Yuan, Ken Birman, Roman Vitenberg | 2024-02-27 | 下载 | We consider ML query processing in distributed systems where GPU-enabled workers coordinate to execute complex queries: a computing style often seen in applications that interact with users in support... |
| FedUV: Uniformity and Variance for Heterogeneous Federated Learning | Ha Min Son, Moon-Hyun Kim, Tai-Myoung Chung, Chao Huang, Xin Liu | 2024-02-27 | 下载 | Federated learning is a promising framework to train neural networks with widely distributed data. However, performance degrades heavily with heterogeneously distributed data. |
| PureLottery: Fair and Bias-Resistant Leader Election with a Novel Single-Elimination Tournament Algorithm | Jonas Ballweg | 2024-02-27 | 下载 | Leader Election (LE) is crucial in distributed systems and blockchain technology, ensuring one participant acts as the leader. Traditional LE methods often depend on distributed random number generati... |
| A Scalable Multi-Layered Blockchain Architecture for Enhanced EHR Sharing and Drug Supply Chain Management | Reza Javan, Mehrzad Mohammadi, Mohammad Beheshti-Atashgah, Mohammad Reza Aref | 2024-02-27 | 下载 | In recent years, the healthcare sector's transition to digital platforms has intensified concerns over data security, privacy, and scalability. |
| Massive parallelization and performance enhancement of an immersed boundary method based unsteady flow solver | Rahul Sundar, Dipanjan Majumdar, Chhote Lal Shah, Sunetra Sarkar | 2024-02-27 | 下载 | High-fidelity simulations of unsteady fluid flow are now possible with advancements in high-performance computing hardware and software frameworks. |
| Application of Machine Learning Optimization in Cloud Computing Resource Scheduling and Management | Yifan Zhang, Bo Liu, Yulu Gong, Jiaxin Huang, Jingyu Xu, Weixiang Wan | 2024-02-27 | 下载 | In recent years, cloud computing has been widely used. Cloud computing refers to the centralized computing resources, users through the access to the centralized resources to complete the calculation,... |
| Deep Reinforcement Learning (DRL)-based Methods for Serverless Stream Processing Engines: A Vision, Architectural Elements, and Future Directions | Maria R. Read, Chinmaya Dehury, Satish Narayana Srirama, Rajkumar Buyya | 2024-02-27 | 下载 | Streaming applications are becoming widespread across an extensive range of business domains as an increasing number of sources continuously produce data that need to be processed and analysed in real... |
| Smart HPA: A Resource-Efficient Horizontal Pod Auto-scaler for Microservice Architectures | Hussain Ahmad, Christoph Treude, Markus Wagner, Claudia Szabo | 2024-02-27 | 下载 | Microservice architectures have gained prominence in both academia and industry, offering enhanced agility, reusability, and scalability. To simplify scaling operations in microservice architectures, ... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Reducing Unnecessary Alerts in Pedestrian Protection Systems Based on P2V Communications | Ignacio Soto, Felipe Jimenez, Maria Calderon, Jose E. Naranjo, Jose J. Anaya | 2024-02-27 | 下载 | There are different proposals in the literature on how to protect pedestrians using warning systems to alert drivers of their presence. They can be based on onboard perception systems or wireless comm... |
| Securing OPEN-RAN Equipment Using Blockchain-Based Supply Chain Verification | Ali Mehrban, Mostafa Jani | 2024-02-27 | 下载 | The disaggregated and multi-vendor nature of OPEN-RAN networks introduces new supply chain security risks, making equipment authenticity and integrity crucial challenges. |
| HBF MU-MIMO with Interference-Aware Beam Pair Link Allocation for Beyond-5G mm-Wave Networks | Aleksandar Ichkov, Alexander Wietfeld, Marina Petrova, Ljiljana Simić | 2024-02-27 | 下载 | Hybrid beamforming (HBF) multi-user multiple-input multiple-output (MU-MIMO) is a key technology for unlocking the directional millimeter-wave (mm-wave) nature for spatial multiplexing beyond current ... |
| Emergency Caching: Coded Caching-based Reliable Map Transmission in Emergency Networks | Zeyu Tian, Lianming Xu, Liang Li, Li Wang, Aiguo Fei | 2024-02-27 | 下载 | Many rescue missions demand effective perception and real-time decision making, which highly rely on effective data collection and processing. |
| CycloWatt: An Affordable, TinyML-enhanced IoT Device Revolutionizing Cycling Power Metrics | Victor Luder, Sizhen Bian, Michele Magno | 2024-02-27 | 下载 | Cycling power measurement is an indispensable metric with profound implications for cyclists' performance and fitness levels. It empowers riders with real-time feedback, supports precise training regi... |
| Wykorzystanie rekonfigurowalnych matryc antenowych wraz z informacją kontekstową | Łukasz Kułacz, Adrian Kliks | 2024-02-27 | 下载 | Reconfigurable intelligent surfaces can be successfully used to control the radio environment. Simple control of the reflection angle of the signal from the surface allows maximization or minimization... |
| A Survey of Network Protocol Fuzzing: Model, Techniques and Directions | Shihao Jiang, Yu Zhang, Junqiang Li, Hongfang Yu, Long Luo, Gang Sun | 2024-02-27 | 下载 | As one of the most successful and effective software testing techniques in recent years, fuzz testing has uncovered numerous bugs and vulnerabilities in modern software, including network protocol sof... |
| Outdoor Environment Reconstruction with Deep Learning on Radio Propagation Paths | Hrant Khachatrian, Rafayel Mkrtchyan, Theofanis P. Raptis | 2024-02-27 | 下载 | Conventional methods for outdoor environment reconstruction rely predominantly on vision-based techniques like photogrammetry and LiDAR, facing limitations such as constrained coverage, susceptibility... |