Appearance
2024-05-09
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Efficiently Synthesizing Lowest Cost Rewrite Rules for Instruction Selection | Ross Daly, Caleb Donovick, Caleb Terrill, Jackson Melchert, Priyanka Raina, Clark Barrett, Pat Hanrahan | 2024-05-09 | 下载 | Compiling programs to an instruction set architecture (ISA) requires a set of rewrite rules that map patterns consisting of compiler instructions to patterns consisting of ISA instructions. |
| Simultaneous Many-Row Activation in Off-the-Shelf DRAM Chips: Experimental Characterization and Analysis | Ismail Emir Yuksel, Yahya Can Tugrul, F. Nisa Bostanci, Geraldo F. Oliveira, A. Giray Yaglikci, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez-Luna, Mohammad Sadrosadati, Onur Mutlu | 2024-05-09 | 下载 | We experimentally analyze the computational capability of commercial off-the-shelf (COTS) DRAM chips and the robustness of these capabilities under various timing delays between DRAM commands, data pa... |
| TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans | Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | 2024-05-09 | 下载 | Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many security threats, like p... |
| Shape-Optimized Electrooptic Beam Scanners: Experiment | Jennifer C. Fang, M. J. Kawas, J. Zou, V. Gopalan, T. E. Schlesinger, Daniel D. Stancil | 2024-05-09 | 下载 | A new horn-shaped electrooptic scanner is described with significantly improved scanning sensitivity over rectangular-shaped devices. In the new device, the shape of the scanner is chosen to follow th... |
| FloorSet -- a VLSI Floorplanning Dataset with Design Constraints of Real-World SoCs | Uday Mallappa, Hesham Mostafa, Mikhail Galkin, Mariano Phielipp, Somdeb Majumdar | 2024-05-09 | 下载 | Floorplanning for systems-on-a-chip (SoCs) and its sub-systems is a crucial and non-trivial step of the physical design flow. It represents a difficult combinatorial optimization problem. |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Advancing Anomaly Detection in Computational Workflows with Active Learning | Krishnan Raghavan, George Papadimitriou, Hongwei Jin, Anirban Mandal, Mariam Kiran, Prasanna Balaprakash, Ewa Deelman | 2024-05-09 | 下载 | A computational workflow, also known as workflow, consists of tasks that are executed in a certain order to attain a specific computational campaign. |
| Deferred Objects to Enhance Smart Contract Programming with Optimistic Parallel Execution | George Mitenkov, Igor Kabiljo, Zekun Li, Alexander Spiegelman, Satyanarayana Vusirikala, Zhuolun Xiang, Aleksandar Zlateski, Nuno P. Lopes, Rati Gelashvili | 2024-05-09 | 下载 | One of the main bottlenecks of blockchains is smart contract execution. To increase throughput, modern blockchains try to execute transactions in parallel. |
| A trustless society? A political look at the blockchain vision | Rainer Rehak | 2024-05-09 | 下载 | A lot of business and research effort currently deals with the so called decentralised ledger technology blockchain. Putting it to use carries the tempting promise to make the intermediaries of social... |
| Zero-consistency root emulation for unprivileged container image build | Reid Priedhorsky, Michael Jennings, Megan Phinney | 2024-05-09 | 下载 | Do Linux distribution package managers need the privileged operations they request to actually happen? Apparently not, at least for building container images for HPC applications. |
| Simultaneous Many-Row Activation in Off-the-Shelf DRAM Chips: Experimental Characterization and Analysis | Ismail Emir Yuksel, Yahya Can Tugrul, F. Nisa Bostanci, Geraldo F. Oliveira, A. Giray Yaglikci, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez-Luna, Mohammad Sadrosadati, Onur Mutlu | 2024-05-09 | 下载 | We experimentally analyze the computational capability of commercial off-the-shelf (COTS) DRAM chips and the robustness of these capabilities under various timing delays between DRAM commands, data pa... |
| Knowledge Connectivity Requirements for Solving BFT Consensus with Unknown Participants and Fault Threshold (Extended Version) | Hasan Heydari, Robin Vassantlal, Alysson Bessani | 2024-05-09 | 下载 | Consensus stands as a fundamental building block for constructing reliable and fault-tolerant distributed services. The increasing demand for high-performance and scalable blockchain protocols has bro... |
| Age Aware Scheduling for Differentially-Private Federated Learning | Kuan-Yu Lin, Hsuan-Yin Lin, Yu-Pin Hsu, Yu-Chih Huang | 2024-05-09 | 下载 | This paper explores differentially-private federated learning (FL) across time-varying databases, delving into a nuanced three-way tradeoff involving age, accuracy, and differential privacy (DP). |
| Compressed Bayesian Federated Learning for Reliable Passive Radio Sensing in Industrial IoT | Luca Barbieri, Stefano Savazzi, Monica Nicoli | 2024-05-09 | 下载 | Bayesian Federated Learning (FL) has been recently introduced to provide well-calibrated Machine Learning (ML) models quantifying the uncertainty of their predictions. |
| Deploying Graph Neural Networks in Wireless Networks: A Link Stability Viewpoint | Jun Li, Weiwei Zhang, Kang Wei, Guangji Chen, Long Shi, Wen Chen | 2024-05-09 | 下载 | As an emerging artificial intelligence technology, graph neural networks (GNNs) have exhibited promising performance across a wide range of graph-related applications. |
| A Scene-aware Models Adaptation Scheme for Cross-scene Online Inference on Mobile Devices | Yunzhe Li, Hongzi Zhu, Zhuohong Deng, Yunlong Cheng, Zimu Zheng, Liang Zhang, Shan Chang, Minyi Guo | 2024-05-09 | 下载 | Emerging Artificial Intelligence of Things (AIoT) applications desire online prediction using deep neural network (DNN) models on mobile devices. |
| Fractional Payment Transactions: Executing Payment Transactions in Parallel with Less than f+1 Validations | Rida Bazzi, Sara Tucci-Piergiovanni | 2024-05-09 | 下载 | We consider the problem of supporting payment transactions in an asynchronous system in which up to validators are subject to Byzantine failures under the control of an adaptive adversary. |
| Experience and Analysis of Scalable High-Fidelity Computational Fluid Dynamics on Modular Supercomputing Architectures | Martin Karp, Estela Suarez, Jan H. Meinke, Måns I. Andersson, Philipp Schlatter, Stefano Markidis, Niclas Jansson | 2024-05-09 | 下载 | The never-ending computational demand from simulations of turbulence makes computational fluid dynamics (CFD) a prime application use case for current and future exascale systems. |
| Supercomputers as a Continous Medium | Martin Karp, Niclas Jansson, Philipp Schlatter, Stefano Markidis | 2024-05-09 | 下载 | As supercomputers' complexity has grown, the traditional boundaries between processor, memory, network, and accelerators have blurred, making a homogeneous computer model, in which the overall compute... |
| HarmonyBatch: Batching multi-SLO DNN Inference with Heterogeneous Serverless Functions | Jiabin Chen, Fei Xu, Yikun Gu, Li Chen, Fangming Liu, Zhi Zhou | 2024-05-09 | 下载 | Deep Neural Network (DNN) inference on serverless functions is gaining prominence due to its potential for substantial budget savings. Existing works on serverless DNN inference solely optimize batchi... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Quantum Secure Anonymous Communication Networks | Mohammad Saidur Rahman, Stephen DiAdamo, Miralem Mehic, Charles Fleming | 2024-05-09 | 下载 | Anonymous communication networks (ACNs) enable Internet browsing in a way that prevents the accessed content from being traced back to the user. |
| Protocols to Code: Formal Verification of a Next-Generation Internet Router | João C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix A. Wolf, Marco Eilers, Christoph Sprenger, David Basin, Peter Müller, Adrian Perrig | 2024-05-09 | 下载 | We present the first formally-verified Internet router, which is part of the SCION Internet architecture. SCION routers run a cryptographic protocol for secure packet forwarding in an adversarial envi... |
| Trustworthy AI-Generative Content for Intelligent Network Service: Robustness, Security, and Fairness | Siyuan Li, Xi Lin, Yaju Liu, Xiang Chen, Jianhua Li | 2024-05-09 | 下载 | AI-generated content (AIGC) models, represented by large language models (LLM), have revolutionized content creation. High-speed next-generation communication technology is an ideal platform for provi... |
| Small-Scale Testbed for Evaluating C-V2X Applications on 5G Cellular Networks | Kaj Munhoz Arfvidsson, Kleio Fragkedaki, Frank J. Jiang, Vandana Narri, Hans-Cristian Lindh, Karl H. Johansson, Jonas Mårtensson | 2024-05-09 | 下载 | In this work, we present a small-scale testbed for evaluating the real-life performance of cellular V2X (C-V2X) applications on 5G cellular networks. |
| Age of Information and Energy Consumption in IoT: an Experimental Evaluation | Federico Cristofani, Valerio Luconi, Alessio Vecchio | 2024-05-09 | 下载 | The Age of Information (AoI) is an end-to-end metric frequently used to understand how "fresh" the information about a remote system is. In this paper, we present an experimental study of the relation... |
| Depth Awakens: A Depth-perceptual Attention Fusion Network for RGB-D Camouflaged Object Detection | Xinran Liua, Lin Qia, Yuxuan Songa, Qi Wen | 2024-05-09 | 下载 | Camouflaged object detection (COD) presents a persistent challenge in accurately identifying objects that seamlessly blend into their surroundings. |
| LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks | Hao Ren, Jiaojiao Jiang | 2024-05-09 | 下载 | As the calculation of centrality in complex networks becomes increasingly vital across technological, biological, and social systems, precise and scalable ranking methods are essential for understandi... |
| Shape-Optimized Electrooptic Beam Scanners: Experiment | Jennifer C. Fang, M. J. Kawas, J. Zou, V. Gopalan, T. E. Schlesinger, Daniel D. Stancil | 2024-05-09 | 下载 | A new horn-shaped electrooptic scanner is described with significantly improved scanning sensitivity over rectangular-shaped devices. In the new device, the shape of the scanner is chosen to follow th... |
| Generative Model for Joint Resource Management in Multi-Cell Multi-Carrier NOMA Networks | Elhadj Moustapha Diallo | 2024-05-09 | 下载 | In this work, we design a generative artificial intelligence (GAI) -based framework for joint resource allocation, beamforming, and power allocation in multi-cell multi-carrier non-orthogonal multiple... |
| Performance Prediction of On-NIC Network Functions with Multi-Resource Contention and Traffic Awareness | Shaofeng Wu, Qiang Su, Zhixiong Niu, Hong Xu | 2024-05-09 | 下载 | Network function (NF) offloading on SmartNICs has been widely used in modern data centers, offering benefits in host resource saving and programmability. |
| An Overview of Machine Learning-Enabled Optimization for Reconfigurable Intelligent Surfaces-Aided 6G Networks: From Reinforcement Learning to Large Language Models | Hao Zhou, Chengming Hu, Xue Liu | 2024-05-09 | 下载 | Reconfigurable intelligent surface (RIS) becomes a promising technique for 6G networks by reshaping signal propagation in smart radio environments. |
cs.OS - Operating Systems
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Zero-consistency root emulation for unprivileged container image build | Reid Priedhorsky, Michael Jennings, Megan Phinney | 2024-05-09 | 下载 | Do Linux distribution package managers need the privileged operations they request to actually happen? Apparently not, at least for building container images for HPC applications. |