Appearance
2024-07-10
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Flexible and Cost-Effective Spherical to Cartesian Coordinate Conversion Using 3-D CORDIC Algorithm on FPGA | Nadia Salem, Sami Serhan, Khawla Al-Tarawneh, Ra'fat Al-Msie'deen | 2024-07-10 | 下载 | In computer science, transforming spherical coordinates into Cartesian coordinates is an important mathematical operation. The CORDIC (Coordinate Rotation Digital Computer) iterative algorithm can per... |
| An investigation of the Online Payment and Banking System Apps in Bangladesh | Shahriar Hasan Mickey, Muhammad Nur Yanhaona | 2024-07-10 | 下载 | Presently, Bangladesh is expending substantial efforts to digitize its national infrastructure, with a significant emphasis on achieving this goal through mobile applications that facilitate online pa... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Extending DD-αAMG on heterogeneous machines | Gustavo Ramirez-Hidalgo, Lianhua He, Ke-Long Zhang | 2024-07-10 | 下载 | Multigrid solvers are the standard in modern scientific computing simulations. Domain Decomposition Aggregation-Based Algebraic Multigrid, also known as the DD-αAMG solver, is a successful realizati... |
| OpenDiLoCo: An Open-Source Framework for Globally Distributed Low-Communication Training | Sami Jaghouar, Jack Min Ong, Johannes Hagemann | 2024-07-10 | 下载 | OpenDiLoCo is an open-source implementation and replication of the Distributed Low-Communication (DiLoCo) training method for large language models. |
| Harnessing Integrated CPU-GPU System Memory for HPC: a first look into Grace Hopper | Gabin Schieffer, Jacob Wahlgren, Jie Ren, Jennifer Faj, Ivy Peng | 2024-07-10 | 下载 | Memory management across discrete CPU and GPU physical memory is traditionally achieved through explicit GPU allocations and data copy or unified virtual memory. |
| Exploring the Boundaries of On-Device Inference: When Tiny Falls Short, Go Hierarchical | Adarsh Prasad Behera, Paulius Daubaris, Iñaki Bravo, José Gallego, Roberto Morabito, Joerg Widmer, Jaya Prakash Varma Champati | 2024-07-10 | 下载 | On-device inference holds great potential for increased energy efficiency, responsiveness, and privacy in edge ML systems. However, due to less capable ML models that can be embedded in resource-limit... |
| Fine-Tuning Large Language Models with User-Level Differential Privacy | Zachary Charles, Arun Ganesh, Ryan McKenna, H. Brendan McMahan, Nicole Mitchell, Krishna Pillutla, Keith Rush | 2024-07-10 | 下载 | We investigate practical and scalable algorithms for training large language models (LLMs) with user-level differential privacy (DP) in order to provably safeguard all the examples contributed by each... |
| High-Performance Sorting-Based k-mer Counting in Distributed Memory with Flexible Hybrid Parallelism | Yifan Li, Giulia Guidi | 2024-07-10 | 下载 | In generating large quantities of DNA data, high-throughput sequencing technologies require advanced bioinformatics infrastructures for efficient data analysis. |
| A Transverse-Read-assisted Fast Valid-Bits Collection in Stochastic Computing MACs for Energy-Efficient in-RTM DNNs | Jihe Wang, Zhiying Zhang, Xingwu Dong, Danghui Wang | 2024-07-10 | 下载 | It looks very attractive to coordinate racetrack-memory (RM) and stochastic-computing (SC) jointly to build an ultra-low power neuron-architecture. |
| Federated PCA on Grassmann Manifold for IoT Anomaly Detection | Tung-Anh Nguyen, Long Tan Le, Tuan Dung Nguyen, Wei Bao, Suranga Seneviratne, Choong Seon Hong, Nguyen H. Tran | 2024-07-10 | 下载 | With the proliferation of the Internet of Things (IoT) and the rising interconnectedness of devices, network security faces significant challenges, especially from anomalous activities. |
| BoostCom: Towards Efficient Universal Fully Homomorphic Encryption by Boosting the Word-wise Comparisons | Ardhi Wiratama Baskara Yudha, Jiaqi Xue, Qian Lou, Huiyang Zhou, Yan Solihin | 2024-07-10 | 下载 | Fully Homomorphic Encryption (FHE) allows for the execution of computations on encrypted data without the need to decrypt it first, offering significant potential for privacy-preserving computational ... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| On the impact of VR/AR applications on optical transport networks: First experiments with Meta Quest 3 gaming and conferencing application | C. de Quinto, A. Navarro, G. Otero, N. Koneva, J. A. Hernández, M. Quagliotti, A. Sánchez-Macian, F. Arpanaei, P. Reviriego, Ó. González de Dios, J. M. Rivas-Moscoso, E. Riccardi, D. Larrabeiti | 2024-07-10 | 下载 | With the advent of next-generation AR/VR headsets, many of them with affordable prices, telecom operators have forecasted an explosive growth of traffic in their networks. |
| Joint UPF and Edge Applications Placement and Routing in 5G & Beyond | Endri Goshi, Hasanin Harkous, Shohreh Ahvar, Rastin Pries, Fidan Mehmeti, Wolfgang Kellerer | 2024-07-10 | 下载 | The development of 5G networks has enabled support for a vast number of applications with stringent traffic requirements, both in terms of communication and computation. |
| Resource Allocation for Twin Maintenance and Computing Task Processing in Digital Twin Vehicular Edge Computing Network | Yu Xie, Qiong Wu, Pingyi Fan, Nan Cheng, Wen Chen, Jiangzhou Wang, Khaled B. Letaief | 2024-07-10 | 下载 | As a promising technology, vehicular edge computing (VEC) can provide computing and caching services by deploying VEC servers near vehicles. However, VEC networks still face challenges such as high ve... |
| Learning-based Power Control for Secure Covert Semantic Communication | Yansheng Liu, Jinbo Wen, Zongyao Zhang, Kun Zhu, Yang Zhang, Jiangtian Nie, Jiawen Kang | 2024-07-10 | 下载 | Despite progress in semantic communication (SemCom), research on SemCom security is still in its infancy. To bridge this gap, we propose a general covert SemCom framework for wireless networks, reduci... |
| Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol | Md Ruman Islam, Raja Hasnain Anwar, Spyridon Mastorakis, Muhammad Taqi Raza | 2024-07-10 | 下载 | Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access to these applications without compromising the application-... |
| In-Orbit Processing or Not? Sunlight-Aware Task Scheduling for Energy-Efficient Space Edge Computing Networks | Weisen Liu, Zeqi Lai, Qian Wu, Hewu Li, Qi Zhang, Zonglun Li, Yuanjie Li, Jun Liu | 2024-07-10 | 下载 | With the rapid evolution of space-borne capabilities, space edge computing (SEC) is becoming a new computation paradigm for future integrated space and terrestrial networks. |
cs.PF - Performance
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| S2MPJ and CUTEst optimization problems for Matlab, Python and Julia | Serge Gratton, Philippe L. Toint | 2024-07-10 | 下载 | A new decoder for the SIF test problems of the CUTEst collection is described, which produces problem files allowing the computation of values and derivatives of the objective function and constraints... |
| Employing Software Diversity in Cloud Microservices to Engineer Reliable and Performant Systems | Nazanin Akhtarian, Hamzeh Khazaei, Marin Litoiu | 2024-07-10 | 下载 | In the ever-shifting landscape of software engineering, we recognize the need for adaptation and evolution to maintain system dependability. As each software iteration potentially introduces new chall... |