Appearance
2024-09-28
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification | Yao Hsiao, Nikos Nikoleris, Artem Khyzha, Dominic P. Mulligan, Gustavo Petri, Christopher W. Fletcher, Caroline Trippel | 2024-09-28 | 下载 | The Check tools automate formal memory consistency model and security verification of processors by analyzing abstract models of microarchitectures, called μSPEC models. |
| Co-design of a novel CMOS highly parallel, low-power, multi-chip neural network accelerator | W Hokenmaier, R Jurasek, E Bowen, R Granger, D Odom | 2024-09-28 | 下载 | Why do security cameras, sensors, and siri use cloud servers instead of on-board computation? The lack of very-low-power, high-performance chips greatly limits the ability to field untethered edge dev... |
| Developing Cost-Effective Drones for 5G Non-Terrestrial Network Research and Experimentation | Carlos de Quinto Cáceres, Andrés Navarro, Alejandro Leonardo García Navarro, Tomás Martínez, Gabriel Otero, José Alberto Hernández | 2024-09-28 | 下载 | In this article, we describe the components and procedures for building a drone ready for networking experimentation. In particular, our drone design includes multiple technologies and elements such a... |
| Analog In-Memory Computing Attention Mechanism for Fast and Energy-Efficient Large Language Models | Nathan Leroux, Paul-Philipp Manea, Chirag Sudarshan, Jan Finkbeiner, Sebastian Siegel, John Paul Strachan, Emre Neftci | 2024-09-28 | 下载 | Transformer networks, driven by self-attention, are central to Large Language Models. In generative Transformers, self-attention uses cache memory to store token projections, avoiding recomputation at... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Co-design of a novel CMOS highly parallel, low-power, multi-chip neural network accelerator | W Hokenmaier, R Jurasek, E Bowen, R Granger, D Odom | 2024-09-28 | 下载 | Why do security cameras, sensors, and siri use cloud servers instead of on-board computation? The lack of very-low-power, high-performance chips greatly limits the ability to field untethered edge dev... |
| Leveraging MTD to Mitigate Poisoning Attacks in Decentralized FL with Non-IID Data | Chao Feng, Alberto Huertas Celdrán, Zien Zeng, Zi Ye, Jan von der Assen, Gerome Bovet, Burkhard Stiller | 2024-09-28 | 下载 | Decentralized Federated Learning (DFL), a paradigm for managing big data in a privacy-preserved manner, is still vulnerable to poisoning attacks where malicious clients tamper with data or models. |
| Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance | Qingming Zeng, Mo Li, Ximing Fu, Chuanyi Liu, Hui Jiang | 2024-09-28 | 下载 | Byzantine Fault Tolerant (BFT) consensus, a cornerstone of blockchain technology, has seen significant advancements. While existing BFT protocols ensure security guarantees, they often suffer from eff... |
| HybridFlow: A Flexible and Efficient RLHF Framework | Guangming Sheng, Chi Zhang, Zilingfeng Ye, Xibin Wu, Wang Zhang, Ru Zhang, Yanghua Peng, Haibin Lin, Chuan Wu | 2024-09-28 | 下载 | Reinforcement Learning from Human Feedback (RLHF) is widely used in Large Language Model (LLM) alignment. Traditional RL can be modeled as a dataflow, where each node represents computation of a neura... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Jupyter Notebook Attacks Taxonomy: Ransomware, Data Exfiltration, and Security Misconfiguration | Phuong Cao | 2024-09-28 | 下载 | Open-science collaboration using Jupyter Notebooks may expose expensively trained AI models, high-performance computing resources, and training data to security vulnerabilities, such as unauthorized a... |
| Temporal Consistency of Data and Information in Cyber-Physical Systems | Hermann Kopetz, Wilfried Steiner | 2024-09-28 | 下载 | In a large cyber-physical system, a temporal inconsistency of an output value can arise if there is a non-negligible delay between the instant when a sensor value is acquired from the environment and ... |
| Sharing-Based Channel Access Procedure For Next Generation of Wireless LAN | Qing Xia, Salvatore Talarico | 2024-09-28 | 下载 | This paper proposes a new channel access procedure to mitigate the channel access contention in next generation of Wireless Local-Area Networks (WLANs) by allowing cooperation among devices belonging ... |
cs.OS - Operating Systems
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Energy-Efficient Computation with DVFS using Deep Reinforcement Learning for Multi-Task Systems in Edge Computing | Xinyi Li, Ti Zhou, Haoyu Wang, Man Lin | 2024-09-28 | 下载 | Finding an optimal energy-efficient policy that is adaptable to underlying edge devices while meeting deadlines for tasks has always been challenging. |
cs.PF - Performance
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Energy-Efficient Software Development: A Multi-dimensional Empirical Analysis of Stack Overflow | Bihui Jin, Heng Li, Pengyu Nie, Ying Zou | 2024-09-28 | 下载 | Energy consumption of software applications has emerged as a critical concern for developers to contemplate in their daily development processes. |