Skip to content

2024-09-28

cs.AR - Architecture

标题作者发布日期PDF摘要
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security VerificationYao Hsiao, Nikos Nikoleris, Artem Khyzha, Dominic P. Mulligan, Gustavo Petri, Christopher W. Fletcher, Caroline Trippel2024-09-28下载The Check tools automate formal memory consistency model and security verification of processors by analyzing abstract models of microarchitectures, called μSPEC models.
Co-design of a novel CMOS highly parallel, low-power, multi-chip neural network acceleratorW Hokenmaier, R Jurasek, E Bowen, R Granger, D Odom2024-09-28下载Why do security cameras, sensors, and siri use cloud servers instead of on-board computation? The lack of very-low-power, high-performance chips greatly limits the ability to field untethered edge dev...
Developing Cost-Effective Drones for 5G Non-Terrestrial Network Research and ExperimentationCarlos de Quinto Cáceres, Andrés Navarro, Alejandro Leonardo García Navarro, Tomás Martínez, Gabriel Otero, José Alberto Hernández2024-09-28下载In this article, we describe the components and procedures for building a drone ready for networking experimentation. In particular, our drone design includes multiple technologies and elements such a...
Analog In-Memory Computing Attention Mechanism for Fast and Energy-Efficient Large Language ModelsNathan Leroux, Paul-Philipp Manea, Chirag Sudarshan, Jan Finkbeiner, Sebastian Siegel, John Paul Strachan, Emre Neftci2024-09-28下载Transformer networks, driven by self-attention, are central to Large Language Models. In generative Transformers, self-attention uses cache memory to store token projections, avoiding recomputation at...

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Co-design of a novel CMOS highly parallel, low-power, multi-chip neural network acceleratorW Hokenmaier, R Jurasek, E Bowen, R Granger, D Odom2024-09-28下载Why do security cameras, sensors, and siri use cloud servers instead of on-board computation? The lack of very-low-power, high-performance chips greatly limits the ability to field untethered edge dev...
Leveraging MTD to Mitigate Poisoning Attacks in Decentralized FL with Non-IID DataChao Feng, Alberto Huertas Celdrán, Zien Zeng, Zi Ye, Jan von der Assen, Gerome Bovet, Burkhard Stiller2024-09-28下载Decentralized Federated Learning (DFL), a paradigm for managing big data in a privacy-preserved manner, is still vulnerable to poisoning attacks where malicious clients tamper with data or models.
Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault ToleranceQingming Zeng, Mo Li, Ximing Fu, Chuanyi Liu, Hui Jiang2024-09-28下载Byzantine Fault Tolerant (BFT) consensus, a cornerstone of blockchain technology, has seen significant advancements. While existing BFT protocols ensure security guarantees, they often suffer from eff...
HybridFlow: A Flexible and Efficient RLHF FrameworkGuangming Sheng, Chi Zhang, Zilingfeng Ye, Xibin Wu, Wang Zhang, Ru Zhang, Yanghua Peng, Haibin Lin, Chuan Wu2024-09-28下载Reinforcement Learning from Human Feedback (RLHF) is widely used in Large Language Model (LLM) alignment. Traditional RL can be modeled as a dataflow, where each node represents computation of a neura...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
Jupyter Notebook Attacks Taxonomy: Ransomware, Data Exfiltration, and Security MisconfigurationPhuong Cao2024-09-28下载Open-science collaboration using Jupyter Notebooks may expose expensively trained AI models, high-performance computing resources, and training data to security vulnerabilities, such as unauthorized a...
Temporal Consistency of Data and Information in Cyber-Physical SystemsHermann Kopetz, Wilfried Steiner2024-09-28下载In a large cyber-physical system, a temporal inconsistency of an output value can arise if there is a non-negligible delay between the instant when a sensor value is acquired from the environment and ...
Sharing-Based Channel Access Procedure For Next Generation of Wireless LANQing Xia, Salvatore Talarico2024-09-28下载This paper proposes a new channel access procedure to mitigate the channel access contention in next generation of Wireless Local-Area Networks (WLANs) by allowing cooperation among devices belonging ...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
Energy-Efficient Computation with DVFS using Deep Reinforcement Learning for Multi-Task Systems in Edge ComputingXinyi Li, Ti Zhou, Haoyu Wang, Man Lin2024-09-28下载Finding an optimal energy-efficient policy that is adaptable to underlying edge devices while meeting deadlines for tasks has always been challenging.

cs.PF - Performance

标题作者发布日期PDF摘要
Energy-Efficient Software Development: A Multi-dimensional Empirical Analysis of Stack OverflowBihui Jin, Heng Li, Pengyu Nie, Ying Zou2024-09-28下载Energy consumption of software applications has emerged as a critical concern for developers to contemplate in their daily development processes.

基于 VitePress 构建