Appearance
2024-12-02
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Fast Bipartitioned Hybrid Adder Utilizing Carry Select and Carry Lookahead Logic | Padmanabhan Balasubramanian, Douglas L. Maskell | 2024-12-02 | 下载 | We present a novel fast bipartitioned hybrid adder (FBHA) that utilizes carry-select and carry-lookahead logic. The proposed FBHA is an accurate adder with a significant part and a less significant pa... |
| Agentic-HLS: An agentic reasoning based high-level synthesis system using large language models (AI for EDA workshop 2024) | Ali Emre Oztas, Mahdi Jelodari | 2024-12-02 | 下载 | Our aim for the ML Contest for Chip Design with HLS 2024 was to predict the validity, running latency in the form of cycle counts, utilization rate of BRAM (util-BRAM), utilization rate of lookup tabl... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Stably computable relations and predicates | James Aspnes | 2024-12-02 | 下载 | A population protocol stably computes a relation R(x,y) if its output always stabilizes and R(x,y) holds if and only if y is a possible output for input x. |
| Hamava: Fault-tolerant Reconfigurable Geo-Replication on Heterogeneous Clusters | Tejas Mane, Xiao Li, Mohammad Sadoghi, Mohsen Lesani | 2024-12-02 | 下载 | Fault-tolerant replicated database systems consume less energy than the compute-intensive proof-of-work blockchain. Thus, they are promising technologies for the building blocks that assemble global f... |
| HPRM: High-Performance Robotic Middleware for Intelligent Autonomous Systems | Jacky Kwok, Shulu Li, Marten Lohstroh, Edward A. Lee | 2024-12-02 | 下载 | The rise of intelligent autonomous systems, especially in robotics and autonomous agents, has created a critical need for robust communication middleware that can ensure real-time processing of extens... |
| Review of Mathematical Optimization in Federated Learning | Shusen Yang, Fangyuan Zhao, Zihao Zhou, Liang Shi, Xuebin Ren, Zongben Xu | 2024-12-02 | 下载 | Federated Learning (FL) has been becoming a popular interdisciplinary research area in both applied mathematics and information sciences. Mathematically, FL aims to collaboratively optimize aggregate ... |
| Near-Optimal Resilient Labeling Schemes | Keren Censor-Hillel, Einav Huberman | 2024-12-02 | 下载 | Labeling schemes are a prevalent paradigm in various computing settings. In such schemes, an oracle is given an input graph and produces a label for each of its nodes, enabling the labels to be used f... |
| FlexSP: Accelerating Large Language Model Training via Flexible Sequence Parallelism | Yujie Wang, Shiju Wang, Shenhan Zhu, Fangcheng Fu, Xinyi Liu, Xuefeng Xiao, Huixia Li, Jiashi Li, Faming Wu, Bin Cui | 2024-12-02 | 下载 | Extending the context length (i.e., the maximum supported sequence length) of LLMs is of paramount significance. To facilitate long context training of LLMs, sequence parallelism has emerged as an ess... |
| FedAH: Aggregated Head for Personalized Federated Learning | Pengzhan Zhou, Yuepeng He, Yijun Zhai, Kaixin Gao, Chao Chen, Zhida Qin, Chong Zhang, Songtao Guo | 2024-12-02 | 下载 | Recently, Federated Learning (FL) has gained popularity for its privacy-preserving and collaborative learning capabilities. Personalized Federated Learning (PFL), building upon FL, aims to address the... |
| FedPAW: Federated Learning with Personalized Aggregation Weights for Urban Vehicle Speed Prediction | Yuepeng He, Pengzhan Zhou, Yijun Zhai, Fang Qu, Zhida Qin, Mingyan Li, Songtao Guo | 2024-12-02 | 下载 | Vehicle speed prediction is crucial for intelligent transportation systems, promoting more reliable autonomous driving by accurately predicting future vehicle conditions. |
| PASTA-4-PHT: A Pipeline for Automated Security and Technical Audits for the Personal Health Train | Sascha Welten, Karl Kindermann, Ahmet Polat, Martin Görz, Maximilian Jugl, Laurenz Neumann, Alexander Neumann, Johannes Lohmöller, Jan Pennekamp, Stefan Decker | 2024-12-02 | 下载 | With the introduction of data protection regulations, the need for innovative privacy-preserving approaches to process and analyse sensitive data has become apparent. |
| Coded Distributed (Batch) Matrix Multiplication over Galois Ring via RMFE | Yi Kuang, Jiang Li, Songsong Li, Chaoping Xing | 2024-12-02 | 下载 | Coded Distributed Matrix Multiplication (CDMM) is a distributed matrix multiplication (DMM) for large-scale matrices through a coding scheme such that any worker node among all worker nodes ca... |
| INTELLECT-1 Technical Report | Sami Jaghouar, Jack Min Ong, Manveer Basra, Fares Obeid, Jannik Straube, Michael Keiblinger, Elie Bakouch, Lucas Atkins, Maziyar Panahi, Charles Goddard, Max Ryabinin, Johannes Hagemann | 2024-12-02 | 下载 | In this report, we introduce INTELLECT-1, the first 10 billion parameter language model collaboratively trained across the globe, demonstrating that large-scale model training is no longer confined to... |
| AI Benchmarks and Datasets for LLM Evaluation | Todor Ivanov, Valeri Penchev | 2024-12-02 | 下载 | LLMs demand significant computational resources for both pre-training and fine-tuning, requiring distributed computing capabilities due to their large model sizes \cite{sastry2024computing}. |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Development and Application of a Decentralized Domain Name Service | Guang Yang | 2024-12-02 | 下载 | The current Domain Name System (DNS), as a core infrastructure of the internet, exhibits several shortcomings: its centralized architecture leads to censorship risks and single points of failure, maki... |
| A slot-based energy storage decision-making approach for optimal Off-Grid telecommunication operator | Youssef Ait El Mahjoub, Jean-Michel Fourneau | 2024-12-02 | 下载 | This paper proposes a slot-based energy storage approach for decision-making in the context of an Off-Grid telecommunication operator. We consider network systems powered by solar panels, where harves... |
| Optimizing LoRa for Edge Computing with TinyML Pipeline for Channel Hopping | Marla Grunewald, Mounir Bensalem, Admela Jukan | 2024-12-02 | 下载 | We propose to integrate long-distance LongRange (LoRa) communication solution for sending the data from IoT to the edge computing system, by taking advantage of its unlicensed nature and the potential... |
| Enhanced Time Division Duplexing Slot Allocation and Scheduling in Non-Terrestrial Networks | Alessandro Traspadini, Marco Giordani, Michele Zorzi | 2024-12-02 | 下载 | The integration of non-terrestrial networks (NTNs) and terrestrial networks (TNs) is fundamental for extending connectivity to rural and underserved areas that lack coverage from traditional cellular ... |
| Outstanding framework for simulating and generating anchor trajectory in wireless sensor networks | Abdelhady Naguib | 2024-12-02 | 下载 | This paper proposes a framework that has the ability to animate and generate different scenarios for the mobility of a movable anchor which can follow various paths in wireless sensor networks (WSNs). |
| EH from V2X Communications: the Price of Uncertainty and the Impact of Platooning | Federico Librino, Paolo Santi | 2024-12-02 | 下载 | In this paper, we explore how radio frequency energy from vehicular communications can be exploited by an energy harvesting device (EHD) placed alongside the road to deliver data packets through wirel... |
| Optimizing Microservices Placement in the Cloud-to-Edge Continuum: A Comparative Analysis of App and Service Based Approaches | Miguel Mota-Cruz, João H Santos, José F Macedo, Karima Velasquez, David Perez Abreu | 2024-12-02 | 下载 | In the ever-evolving landscape of computing, the advent of edge and fog computing has revolutionized data processing by bringing it closer to end-users. |
| Age of Information in Random Access Networks with Energy Harvesting | Fangming Zhao, Nikolaos Pappas, Meng Zhang, Howard H. Yang | 2024-12-02 | 下载 | We study the age of information (AoI) in a random access network consisting of multiple source-destination pairs, where each source node is empowered by energy harvesting capability. |
cs.OS - Operating Systems
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Blindfold: Confidential Memory Management by Untrusted Operating System | Caihua Li, Seung-seob Lee, Lin Zhong | 2024-12-02 | 下载 | Confidential Computing (CC) has received increasing attention in recent years as a mechanism to protect user data from untrusted operating systems (OSes). |
cs.PF - Performance
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Optimizing LoRa for Edge Computing with TinyML Pipeline for Channel Hopping | Marla Grunewald, Mounir Bensalem, Admela Jukan | 2024-12-02 | 下载 | We propose to integrate long-distance LongRange (LoRa) communication solution for sending the data from IoT to the edge computing system, by taking advantage of its unlicensed nature and the potential... |