Skip to content

2025-01-07

cs.AR - Architecture

标题作者发布日期PDF摘要
FedKD-hybrid: Federated Hybrid Knowledge Distillation for Lithography Hotspot DetectionYuqi Li, Xingyou Lin, Kai Zhang, Chuanguang Yang, Zhongliang Guo, Jianping Gou, Yanli Li2025-01-07下载Federated Learning (FL) provides novel solutions for machine learning (ML)-based lithography hotspot detection (LHD) under distributed privacy-preserving settings.

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Unraveling Responsiveness of Chained BFT Consensus with Network DelayYining Tang, Qihang Luo, Runchao Han, Jianyu Niu, Chen Feng, Yinqian Zhang2025-01-07下载With the advancement of blockchain technology, chained Byzantine Fault Tolerant (BFT) protocols have been increasingly adopted in practical systems, making their performance a crucial aspect of the st...
On the Locality of Hall's TheoremSebastian Brandt, Yannic Maus, Ananth Narayanan, Florian Schager, Jara Uitto2025-01-07下载The last five years of research on distributed graph algorithms have seen huge leaps of progress, both regarding algorithmic improvements and impossibility results: new strong lower bounds have emerge...
Homomorphic Encryption in Healthcare Industry Applications for Protecting Data PrivacyJ. S. Rauthan2025-01-07下载Focussing on two different use cases-Quality Control methods in industrial contexts and Neural Network algorithms for healthcare diagnostics-this research investigates the inclusion of Fully Homomorph...
Metric Criticality Identification for Cloud MicroservicesAkanksha Singal, Divya Pathak, Kaustabha Ray, Felix George, Mudit Verma, Pratibha Moogi2025-01-07下载Modern cloud-native applications built on microservice architectures present unprecedented challenges for system monitoring and alerting. Site Reliability Engineers (SREs) face the daunting challenge ...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
Comparison of STR and EMLSR Performance in Wi-Fi 7 MLOAishwarya Choorakuzhiyil, Kevin Ho, Sara Reyes2025-01-07下载This project compares the performance of simultaneous transmit and receive (STR) and enhanced multi-link single radio (EMLSR) within Multi-Link Operation (MLO) in Wi-Fi 7 networks.
MixNet: A Runtime Reconfigurable Optical-Electrical Fabric for Distributed Mixture-of-Experts TrainingXudong Liao, Yijun Sun, Han Tian, Xinchen Wan, Yilun Jin, Zilong Wang, Zhenghang Ren, Xinyang Huang, Wenxue Li, Kin Fai Tse, Zhizhen Zhong, Guyue Liu, Ying Zhang, Xiaofeng Ye, Yiming Zhang, Kai Chen2025-01-07下载Mixture-of-Expert (MoE) models outperform conventional models by selectively activating different subnets, named experts, on a per-token basis.
SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile MemoryArslan Tariq Syed, Mohamed Chahine Ghanem, Elhadj Benkhelifa, Fauzia Idrees Abro2025-01-07下载The increasing sophistication of modern cyber threats, particularly file-less malware relying on living-off-the-land techniques, poses significant challenges to traditional detection mechanisms.
Bayesian EM Digital Twins Channel EstimationLorenzo Del Moro, Francesco Linsalata, Marouan Mizmizi, Maurizio Magarini, Damiano Badini, Umberto Spagnolini2025-01-07下载This letter proposes a Bayesian channel estimation method that leverages on the a priori information provided by the Electromagnetic Digital Twin's (EM-DT) representation of the environment.
IEEE 802.11bn Multi-AP Coordinated Spatial Reuse with Hierarchical Multi-Armed BanditsMaksymilian Wojnar, Wojciech Ciezobka, Katarzyna Kosek-Szott, Krzysztof Rusek, Szymon Szott, David Nunez, Boris Bellalta2025-01-07下载Coordination among multiple access points (APs) is integral to IEEE 802.11bn (Wi-Fi 8) for managing contention in dense networks. This letter explores the benefits of Coordinated Spatial Reuse (C-SR) ...
Dynamic Authentication and Granularized Authorization with a Cross-Domain Zero Trust Architecture for Federated Learning in Large-Scale IoT NetworksXiaoyu Ma, Fang Fang, Xianbin Wang2025-01-07下载With the increasing number of connected devices and complex networks involved, current domain-specific security techniques become inadequate for diverse large-scale Internet of Things (IoT) systems ap...
Extending Internet Access Over LoRa for Internet of Things and Critical ApplicationsAtonu Ghosh, Devadeep Misra, Hirdesh Mewada2025-01-07下载LoRa bridges the gap between remote locations and mainstream networks, enabling large-scale Internet of Things (IoT) deployments. Despite the recent advancements around LoRa, Internet access over this...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile MemoryArslan Tariq Syed, Mohamed Chahine Ghanem, Elhadj Benkhelifa, Fauzia Idrees Abro2025-01-07下载The increasing sophistication of modern cyber threats, particularly file-less malware relying on living-off-the-land techniques, poses significant challenges to traditional detection mechanisms.

基于 VitePress 构建