Appearance
2024-10-03
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| AiBAT: Artificial Intelligence/Instructions for Build, Assembly, and Test | Benjamin Nuernberger, Anny Liu, Heather Stefanini, Richard Otis, Amanda Towler, R. Peter Dillon | 2024-10-03 | 下载 | Instructions for Build, Assembly, and Test (IBAT) refers to the process used whenever any operation is conducted on hardware, including tests, assembly, and maintenance. |
| Custom Non-Linear Model Predictive Control for Obstacle Avoidance in Indoor and Outdoor Environments | Lara Laban, Mariusz Wzorek, Piotr Rudol, Tommy Persson | 2024-10-03 | 下载 | Navigating complex environments requires Unmanned Aerial Vehicles (UAVs) and autonomous systems to perform trajectory tracking and obstacle avoidance in real-time. |
| Online GPU Energy Optimization with Switching-Aware Bandits | Xiongxiao Xu, Solomon Abera Bekele, Brice Videau, Kai Shu | 2024-10-03 | 下载 | Energy consumption has become a bottleneck for future computing architectures, from wearable devices to leadership-class supercomputers. Existing energy management techniques largely target CPUs, even... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| FedPeWS: Personalized Warmup via Subnetworks for Enhanced Heterogeneous Federated Learning | Nurbek Tastan, Samuel Horvath, Martin Takac, Karthik Nandakumar | 2024-10-03 | 下载 | Statistical data heterogeneity is a significant barrier to convergence in federated learning (FL). While prior work has advanced heterogeneous FL through better optimization objectives, these methods ... |
| EinDecomp: Decomposition of Declaratively-Specified Machine Learning and Numerical Computations for Parallel Execution | Daniel Bourgeois, Zhimin Ding, Dimitrije Jankov, Jiehui Li, Mahmoud Sleem, Yuxin Tang, Jiawen Yao, Xinyu Yao, Chris Jermaine | 2024-10-03 | 下载 | We consider the problem of automatically decomposing operations over tensors or arrays so that they can be executed in parallel on multiple devices. We address two, closely-linked questions. |
| Online GPU Energy Optimization with Switching-Aware Bandits | Xiongxiao Xu, Solomon Abera Bekele, Brice Videau, Kai Shu | 2024-10-03 | 下载 | Energy consumption has become a bottleneck for future computing architectures, from wearable devices to leadership-class supercomputers. Existing energy management techniques largely target CPUs, even... |
| Disaggregated Memory with SmartNIC Offloading: a Case Study on Graph Processing | Jacob Wahlgren, Gabin Schieffer, Maya Gokhale, Roger Pearce, Ivy Peng | 2024-10-03 | 下载 | Disaggregated memory breaks the boundary of monolithic servers to enable memory provisioning on demand. Using network-attached memory to provide memory expansion for memory-intensive applications on c... |
| Federated k-Core Decomposition: A Secure Distributed Approach | Bin Guo, Emil Sekerinski, Lingyang Chu | 2024-10-03 | 下载 | As one of the most well-studied cohesive subgraph models, the -core is widely used to find graph nodes that are central'' or important'' in many applications, such as biological networks, socia... |
| Fair Decentralized Learning | Sayan Biswas, Anne-Marie Kermarrec, Rishi Sharma, Thibaud Trinca, Martijn de Vos | 2024-10-03 | 下载 | Decentralized learning (DL) is an emerging approach that enables nodes to collaboratively train a machine learning model without sharing raw data. |
| An Edge-Computing based Industrial Gateway for Industry 4.0 using ARM TrustZone Technology | Sandeep Gupta | 2024-10-03 | 下载 | Secure and efficient communication to establish a seamless nexus between the five levels of a typical automation pyramid is paramount to Industry 4.0. |
| Temporal Predictive Coding for Gradient Compression in Distributed Learning | Adrian Edin, Zheng Chen, Michel Kieffer, Mikael Johansson | 2024-10-03 | 下载 | This paper proposes a prediction-based gradient compression method for distributed learning with event-triggered communication. Our goal is to reduce the amount of information transmitted from the dis... |
| Personalized Federated Learning for Generative AI-Assisted Semantic Communications | Yubo Peng, Feibo Jiang, Li Dong, Kezhi Wang, Kun Yang | 2024-10-03 | 下载 | Semantic Communication (SC) focuses on transmitting only the semantic information rather than the raw data. This approach offers an efficient solution to the issue of spectrum resource utilization cau... |
| LLM-Pilot: Characterize and Optimize Performance of your LLM Inference Services | Małgorzata Łazuka, Andreea Anghel, Thomas Parnell | 2024-10-03 | 下载 | As Large Language Models (LLMs) are rapidly growing in popularity, LLM inference services must be able to serve requests from thousands of users while satisfying performance requirements. |
| Model-guided Fuzzing of Distributed Systems | Ege Berkay Gulcan, Burcu Kulahcioglu Ozkan, Rupak Majumdar, Srinidhi Nagendra | 2024-10-03 | 下载 | We present a coverage-guided testing algorithm for distributed systems implementations. Our main innovation is the use of an abstract formal model of the system that is used to define coverage. |
| Selection Guidelines for Geo-Replicated SMR Protocols: A Communication Pattern-based Latency Modeling Approach | Kohya Shiozaki, Junya Nakamura | 2024-10-03 | 下载 | State machine replication (SMR) is a replication technique that ensures fault tolerance by duplicating a service. Geo-replicated SMR is an enhanced version of SMR that distributes replicas in separate... |
| MTDNS: Moving Target Defense for Resilient DNS Infrastructure | Abdullah Aydeger, Pei Zhou, Sanzida Hoque, Marco Carvalho, Engin Zeydan | 2024-10-03 | 下载 | One of the most critical components of the Internet that an attacker could exploit is the DNS (Domain Name System) protocol and infrastructure. |
| Extracting the Potential of Emerging Hardware Accelerators for Symmetric Eigenvalue Decomposition | Hansheng Wang, Lu Shi, Zhekai duan, Panruo Wu, Liwei Guo, Shaoshuai Zhang | 2024-10-03 | 下载 | Benefiting from the advancement of hardware accelerators such as GPUs, deep neural networks and scientific computing applications can achieve superior performance. |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Digital Twin for O-RAN Towards 6G | Huan X. Nguyen, Kexuan Sun, Duc To, Quoc-Tuan Vien, Tuan Anh Le | 2024-10-03 | 下载 | In future wireless systems of beyond 5G and 6G, addressing diverse applications with varying quality requirements is essential. Open Radio Access Network (O-RAN) architectures offer the potential for ... |
| Data Similarity-Based One-Shot Clustering for Multi-Task Hierarchical Federated Learning | Abdulmoneam Ali, Ahmed Arafa | 2024-10-03 | 下载 | We address the problem of cluster identity estimation in a hierarchical federated learning setting in which users work toward learning different tasks. |
| User-centric Immersive Communications in 6G: A Data-oriented Framework via Digital Twin | Conghao Zhou, Shisheng Hu, Jie Gao, Xinyu Huang, Weihua Zhuang, Xuemin Shen | 2024-10-03 | 下载 | In this article, we present a novel user-centric service provision for immersive communications (IC) in 6G to deal with the uncertainty of individual user behaviors while satisfying unique requirement... |
| Research Directions and Modeling Guidelines for Industrial Internet of Things Applications | Giampaolo Cuozzo, Enrico Testi, Salvatore Riolo, Luciano Miuccio, Gianluca Cena, Gianni Pasolini, Luca De Nardis, Daniela Panno, Marco Chiani, Maria-Gabriella Di Benedetto, Enrico Buracchini, Roberto Verdone | 2024-10-03 | 下载 | The Industrial Internet of Things (IIoT) paradigm has emerged as a transformative force, revolutionizing industrial processes by integrating advanced wireless technologies into traditional procedures ... |
| Machine Learning Approaches for Active Queue Management: A Survey, Taxonomy, and Future Directions | Mohammad Parsa Toopchinezhad, Mahmood Ahmadi | 2024-10-03 | 下载 | Active Queue Management (AQM), a network-layer congestion control technique endorsed by the Internet Engineering Task Force (IETF), encourages routers to discard packets before the occurrence of buffe... |
| Optimal Digital Twinning of Random Systems with Twinning Rate Constraints | Caglar Tunc | 2024-10-03 | 下载 | With the massive advancements in processing power, Digital Twins (DTs) have become powerful tools to monitor and analyze physical entities. However, due to the potentially very high number of Physical... |
| Load Balancing-based Topology Adaptation for Integrated Access and Backhaul Networks | Raul Victor de O. Paiva, Fco. Italo G. Carvalho, Fco. Rafael M. Lima, Victor F. Monteiro, Diego A. Sousa, Darlan C. Moreira, Tarcisio F. Maciel, Behrooz Makki | 2024-10-03 | 下载 | Integrated access and backhaul (IAB) technology is a flexible solution for network densification. IAB nodes can also be deployed in moving nodes such as buses and trains, i.e., mobile IAB (mIAB). |
| Cellular Network Densification: a System-level Analysis with IAB, NCR and RIS | Gabriel C. M. da Silva, Victor F. Monteiro, Diego A. Sousa, Darlan C. Moreira, Tarcisio F. Maciel, Fco. Rafael M. Lima, Behrooz Makki | 2024-10-03 | 下载 | As the number of user equipments increases in fifth generation (5G) and beyond, it is desired to densify the cellular network with auxiliary nodes assisting the base stations. |
| AirTags for Human Localization, Not Just Objects | Mohamed I. Hany, Hamada Rizk, Moustafa Youssef | 2024-10-03 | 下载 | Indoor localization has become increasingly important due to its wide-ranging applications in indoor navigation, emergency services, the Internet of Things (IoT), and accessibility for individuals wit... |
| Federated Reinforcement Learning to Optimize Teleoperated Driving Networks | Filippo Bragato, Marco Giordani, Michele Zorzi | 2024-10-03 | 下载 | Several sixth generation (6G) use cases have tight requirements in terms of reliability and latency, in particular teleoperated driving (TD). To address those requirements, Predictive Quality of Servi... |
| MTDNS: Moving Target Defense for Resilient DNS Infrastructure | Abdullah Aydeger, Pei Zhou, Sanzida Hoque, Marco Carvalho, Engin Zeydan | 2024-10-03 | 下载 | One of the most critical components of the Internet that an attacker could exploit is the DNS (Domain Name System) protocol and infrastructure. |
| Resource Allocation Based on Optimal Transport Theory in ISAC-Enabled Multi-UAV Networks | Yufeng Zheng, Lixin Li, Wensheng Lin, Wei Liang, Qinghe Du, Zhu Han | 2024-10-03 | 下载 | This paper investigates the resource allocation optimization for cooperative communication with non-cooperative localization in integrated sensing and communications (ISAC)-enabled multi-unmanned aeri... |
| SC-CDM: Enhancing Quality of Image Semantic Communication with a Compact Diffusion Model | Kexin Zhang, Lixin Li, Wensheng Lin, Yuna Yan, Wenchi Cheng, Zhu Han | 2024-10-03 | 下载 | Semantic Communication (SC) is an emerging technology that has attracted much attention in the sixth-generation (6G) mobile communication systems. |
| Lossy Cooperative UAV Relaying Networks: Outage Probability Analysis and Location Optimization | Ya Lian, Wensheng Lin, Lixin Li, Fucheng Yang, Zhu Han, Tad Matsumoto | 2024-10-03 | 下载 | In this paper, performance of a lossy cooperative unmanned aerial vehicle (UAV) relay communication system is analyzed. In this system, the UAV relay adopts lossy forward (LF) strategy and the receive... |