Skip to content

2024-08-20

cs.AR - Architecture

标题作者发布日期PDF摘要
Revisiting VerilogEval: A Year of Improvements in Large-Language Models for Hardware Code GenerationNathaniel Pinckney, Christopher Batten, Mingjie Liu, Haoxing Ren, Brucek Khailany2024-08-20下载The application of large-language models (LLMs) to digital hardware code generation is an emerging field, with most LLMs primarily trained on natural language and software code.
Hardware Implementation of Projection-Aggregation Decoders for Reed-Muller CodesMarzieh Hashemipour-Nazari, Andrea Nardi-Dei, Kees Goossens, Alexios Balatsoukas-Stimming2024-08-20下载This paper presents the hardware implementation of two variants of projection-aggregation-based decoding of Reed-Muller (RM) codes, namely unique projection aggregation (UPA) and collapsed projection ...
Design and Implementation of a Takum Arithmetic Hardware CodecLaslo Hunhold2024-08-20下载The takum machine number format has been recently proposed as an enhancement over the posit number format, which is considered a promising alternative to the IEEE 754 floating-point standard.

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Towards the Unmanned Aerial Vehicle Traffic Management Systems (UTMs): Security Risks and ChallengesKonstantinos Spalas2024-08-20下载Every aspect of our life depends on the ability to communicate effectively. Organizations that manage to establish communication routines, protocols and means thrive.
Decentralized Distributed Graph Coloring II: degree+1-Coloring Virtual GraphsMaxime Flin, Magnús M. Halldórsson, Alexandre Nolin2024-08-20下载Graph coloring is fundamental to distributed computing. We give the first general treatment of the coloring of virtual graphs, where the graph HH to be colored is locally embedded within the communic...
Hyperproperty-Preserving Register Specifications (Extended Version)Yoav Ben Shimon, Ori Lahav, Sharon Shoham2024-08-20下载Reasoning about hyperproperties of concurrent implementations, such as the guarantees these implementations provide to randomized client programs, has been a long-standing challenge.
Towards a Standardized Representation for Deep Learning Collective AlgorithmsJinsun Yoo, William Won, Meghan Cowan, Nan Jiang, Benjamin Klenk, Srinivas Sridharan, Tushar Krishna2024-08-20下载The explosion of machine learning model size has led to its execution on distributed clusters at a very large scale. Many works have tried to optimize the process of producing collective algorithms an...
GreediRIS: Scalable Influence Maximization using Distributed Streaming Maximum CoverReet Barik, Wade Cappa, S M Ferdous, Marco Minutoli, Mahantesh Halappanavar, Ananth Kalyanaraman2024-08-20下载Influence maximization--the problem of identifying a subset of k influential seeds (vertices) in a network--is a classical problem in network science with numerous applications.
Asynchronous Fault-Tolerant Distributed Proper Coloring of GraphsAlkida Balliu, Pierre Fraigniaud, Patrick Lambein-Monette, Dennis Olivetti, Mikael Rabie2024-08-20下载We revisit asynchronous computing in networks of crash-prone processes, under the asynchronous variant of the standard LOCAL model, recently introduced by Fraigniaud et al. [DISC 2022].
Robust Regression with Ensembles Communicating over Noisy ChannelsYuval Ben-Hur, Yuval Cassuto2024-08-20下载As machine-learning models grow in size, their implementation requirements cannot be met by a single computer system. This observation motivates distributed settings, in which intermediate computation...
Single Bridge Formation in Self-Organizing Particle SystemsShunhao Oh, Joseph Briones, Jacob Calvert, Noah Egan, Dana Randall, Andréa W. Richa2024-08-20下载Local interactions of uncoordinated individuals produce the collective behaviors of many biological systems, inspiring much of the current research in programmable matter.
Bridging Memory Gaps: Scaling Federated Learning for Heterogeneous ClientsYebo Wu, Jingguang Li, Chunlin Tian, Kahou Tam, Li Li, Chengzhong Xu2024-08-20下载Federated Learning (FL) enables multiple clients to collaboratively train a shared model while preserving data privacy. However, the high memory demand during model training severely limits the deploy...
The Power of Abstract MAC Layer: A Fault-tolerance PerspectiveQinzi Zhang, Lewis Tseng2024-08-20下载This paper studies the power of the "abstract MAC layer" model in a single-hop asynchronous network. The model captures primitive properties of modern wireless MAC protocols.
On the Power of Graphical Reconfigurable CircuitsYuval Emek, Yuval Gil, Noga Harlev2024-08-20下载We introduce the \emph{graphical reconfigurable circuits (GRC)} model as an abstraction for distributed graph algorithms whose communication scheme is based on local mechanisms that collectively const...
Decreasing verification radius in local certificationLaurent Feuilloley, Jan Janoušek, Jan Matyáš Křišťan, Josef Erik Sedláček2024-08-20下载This paper deals with local certification, specifically locally checkable proofs: given a graph property, the task is to certify whether a graph satisfies the property.
Resource-Efficient Personal Large Language Models Fine-Tuning with Collaborative Edge ComputingShengyuan Ye, Bei Ouyang, Tianyi Qian, Liekang Zeng, Jingyi Li, Jiangsu Du, Xiaowen Chu, Guoliang Xing, Xu Chen2024-08-20下载Large language models (LLMs) have unlocked a plethora of powerful applications at the network edge, such as intelligent personal assistants. Data privacy and security concerns have prompted a shift to...
Almost Optimal Algorithms for Token Collision in Anonymous NetworksSirui Bai, Xinyu Fu, Xudong Wu, Penghui Yao, Chaodong Zheng2024-08-20下载In distributed systems, situations often arise where some nodes each holds a collection of tokens, and all nodes collectively need to determine whether all tokens are distinct.

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
Post-Quantum Secure UE-to-UE CommunicationsSanzida Hoque, Abdullah Aydeger, Engin Zeydan2024-08-20下载The rapid development of quantum computing poses a significant threat to the security of current cryptographic systems, including those used in User Equipment (UE) for mobile communications.
Deep Reinforcement Learning for Network Energy Saving in 6G and Beyond NetworksDinh-Hieu Tran, Nguyen Van Huynh, Soumeya Kaada, Van Nhan Vo, Eva Lagunas, Symeon Chatzinotas2024-08-20下载Network energy saving has received great attention from operators and vendors to reduce energy consumption and CO2 emissions to the environment as well as significantly reduce costs for mobile network...
KeySpace: Enhancing Public Key Infrastructure for Interplanetary NetworksJoshua Smailes, Filip Futera, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic2024-08-20下载As the use of satellites continues to grow, new networking paradigms are emerging to support the scale and long distance communication inherent to these networks.
Resource-Efficient Personal Large Language Models Fine-Tuning with Collaborative Edge ComputingShengyuan Ye, Bei Ouyang, Tianyi Qian, Liekang Zeng, Jingyi Li, Jiangsu Du, Xiaowen Chu, Guoliang Xing, Xu Chen2024-08-20下载Large language models (LLMs) have unlocked a plethora of powerful applications at the network edge, such as intelligent personal assistants. Data privacy and security concerns have prompted a shift to...
Smart Contract Coordinated Privacy Preserving Crowd-Sensing CampaignsLuca Bedogni, Stefano Ferretti2024-08-20下载Crowd-sensing has emerged as a powerful data retrieval model, enabling diverse applications by leveraging active user participation. However, data availability and privacy concerns pose significant ch...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
Delegation with Trust<T>: A Scalable, Type- and Memory-Safe Alternative to LocksNoaman Ahmad, Ben Baenen, Chen Chen, Jakob Eriksson2024-08-20下载We present Trust<T>, a general, type- and memory-safe alternative to locking in concurrent programs. Instead of synchronizing multi-threaded access to an object of type T with a lock, the programmer m...

cs.PF - Performance

标题作者发布日期PDF摘要
Delegation with Trust<T>: A Scalable, Type- and Memory-Safe Alternative to LocksNoaman Ahmad, Ben Baenen, Chen Chen, Jakob Eriksson2024-08-20下载We present Trust<T>, a general, type- and memory-safe alternative to locking in concurrent programs. Instead of synchronizing multi-threaded access to an object of type T with a lock, the programmer m...
A Closer Look at Data Augmentation Strategies for Finetuning-Based Low/Few-Shot Object DetectionVladislav Li, Georgios Tsoumplekas, Ilias Siniosoglou, Vasileios Argyriou, Anastasios Lytos, Eleftherios Fountoukidis, Panagiotis Sarigiannidis2024-08-20下载Current methods for low- and few-shot object detection have primarily focused on enhancing model performance for detecting objects. One common approach to achieve this is by combining model finetuning...

基于 VitePress 构建