Appearance
2024-05-19
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| OFHE: An Electro-Optical Accelerator for Discretized TFHE | Mengxin Zheng, Cheng Chu, Qian Lou, Nathan Youngblood, Mo Li, Sajjad Moazeni, Lei Jiang | 2024-05-19 | 下载 | This paper presents \textit{OFHE}, an electro-optical accelerator designed to process Discretized TFHE (DTFHE) operations, which encrypt multi-bit messages and support homomorphic multiplications, loo... |
| Enabling full-speed random access to the entire memory on the A100 GPU | Alden Walker | 2024-05-19 | 下载 | We describe some features of the A100 memory architecture. In particular, we give a technique to reverse-engineer some hardware layout information. |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| The Limits and Potentials of Local SGD for Distributed Heterogeneous Learning with Intermittent Communication | Kumar Kshitij Patel, Margalit Glasgow, Ali Zindari, Lingxiao Wang, Sebastian U. Stich, Ziheng Cheng, Nirmit Joshi, Nathan Srebro | 2024-05-19 | 下载 | Local SGD is a popular optimization method in distributed learning, often outperforming other algorithms in practice, including mini-batch SGD. |
| A Starting Point for Dynamic Community Detection with Leiden Algorithm | Subhajit Sahu | 2024-05-19 | 下载 | Real-world graphs often evolve over time, making community or cluster detection a crucial task. In this technical report, we extend three dynamic approaches - Naive-dynamic (ND), Delta-screening (DS),... |
| Full private delegated quantum computing tailored from user to industry | Alejandro Mata Ali, Adriano Mauricio Lusso, Edgar Mencia | 2024-05-19 | 下载 | In this paper, we present a set of private and secure delegated quantum computing protocols and techniques tailored to user-level and industry-level use cases, depending on the computational resources... |
| Securing Health Data on the Blockchain: A Differential Privacy and Federated Learning Framework | Daniel Commey, Sena Hounsinou, Garth V. Crosby | 2024-05-19 | 下载 | This study proposes a framework to enhance privacy in Blockchain-based Internet of Things (BIoT) systems used in the healthcare sector. The framework addresses the challenge of leveraging health data ... |
| A Model Consistency-Based Countermeasure to GAN-Based Data Poisoning Attack in Federated Learning | Wei Sun, Bo Gao, Ke Xiong, Yuwei Wang, Pingyi Fan, Khaled Ben Letaief | 2024-05-19 | 下载 | In federated learning (FL), although the original intention of available but not visible data is to allay data privacy concerns, it potentially brings new security threats, particularly poisoning atta... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Optimizing Underwater IoT Routing with Multi-Criteria Decision Making and Uncertainty Weights | Ali Karkehabadi, Mitra Bakhshi, Seyed Behnam Razavian | 2024-05-19 | 下载 | Effective data routing is vital in the Internet of Things (IoT) paradigm, especially in underwater mobile sensor networks where inefficiency can lead to significant resource consumption. |
| Machine Learning & Wi-Fi: Unveiling the Path Towards AI/ML-Native IEEE 802.11 Networks | Francesc Wilhelmi, Szymon Szott, Katarzyna Kosek-Szott, Boris Bellalta | 2024-05-19 | 下载 | Artificial intelligence (AI) and machine learning (ML) are nowadays mature technologies considered essential for driving the evolution of future communications systems. |
| NetMamba: Efficient Network Traffic Classification via Pre-training Unidirectional Mamba | Tongze Wang, Xiaohui Xie, Wenduo Wang, Chuyi Wang, Youjian Zhao, Yong Cui | 2024-05-19 | 下载 | Network traffic classification is a crucial research area aiming to enhance service quality, streamline network management, and bolster cybersecurity. |
| A Model Consistency-Based Countermeasure to GAN-Based Data Poisoning Attack in Federated Learning | Wei Sun, Bo Gao, Ke Xiong, Yuwei Wang, Pingyi Fan, Khaled Ben Letaief | 2024-05-19 | 下载 | In federated learning (FL), although the original intention of available but not visible data is to allay data privacy concerns, it potentially brings new security threats, particularly poisoning atta... |
cs.PF - Performance
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Enabling full-speed random access to the entire memory on the A100 GPU | Alden Walker | 2024-05-19 | 下载 | We describe some features of the A100 memory architecture. In particular, we give a technique to reverse-engineer some hardware layout information. |