Skip to content

2025-04-09

cs.AR - Architecture

标题作者发布日期PDF摘要
CiMBA: Accelerating Genome Sequencing through On-Device Basecalling via Compute-in-MemoryWilliam Andrew Simon, Irem Boybat, Riselda Kodra, Elena Ferro, Gagandeep Singh, Mohammed Alser, Shubham Jain, Hsinyu Tsai, Geoffrey W. Burr, Onur Mutlu, Abu Sebastian2025-04-09下载As genome sequencing is finding utility in a wide variety of domains beyond the confines of traditional medical settings, its computational pipeline faces two significant challenges.
ShadowBinding: Realizing Effective Microarchitectures for In-Core Secure Speculation SchemesAmund Bergland Kvalsvik, Magnus Själander2025-04-09下载Secure speculation schemes have shown great promise in the war against speculative side-channel attacks, and will be a key building block for developing secure, high-performance architectures moving f...
Neural Signal Compression using RAMAN tinyML Accelerator for BCI ApplicationsAdithya Krishna, Sohan Debnath, Madhuvanthi Srivatsav, André van Schaik, Mahesh Mehendale, Chetan Singh Thakur2025-04-09下载High-quality, multi-channel neural recording is indispensable for neuroscience research and clinical applications. Large-scale brain recordings often produce vast amounts of data that must be wireless...
Introducing the Arm-membench Throughput BenchmarkCyrill Burth, Markus Velten, Robert Schöne2025-04-09下载Application performance of modern day processors is often limited by the memory subsystem rather than actual compute capabilities. Therefore, data throughput specifications play a key role in modeling...
Artificial intelligence in creating, representing or expressing an immersive soundscapeRima Ayoubi, Laurent Lescop, Sang Bum Park2025-04-09下载In today's tech-driven world, significant advancements in artificial intelligence and virtual reality have emerged. These developments drive research into exploring their intersection in the realm of ...
Beyond Moore's Law: Harnessing the Redshift of Generative AI with Effective Hardware-Software Co-DesignAmir Yazdanbakhsh2025-04-09下载For decades, Moore's Law has served as a steadfast pillar in computer architecture and system design, promoting a clear abstraction between hardware and software.

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Conthereum: Concurrent Ethereum Optimized Transaction Scheduling for Multi-Core ExecutionAtefeh Zareh Chahoki, Maurice Herlihy, Marco Roveri2025-04-09下载Conthereum is a concurrent Ethereum solution for intra-block parallel transaction execution, enabling validators to utilize multi-core infrastructure and transform the sequential execution model of Et...
A New Execution Model and Executor for Adaptively Optimizing the Performance of Parallel Algorithms Using HPX Runtime SystemKarame Mohammadiporshokooh, Steven R. Brandt, Hartmut Kaiser2025-04-09下载Developing parallel algorithms efficiently requires careful management of concurrency across diverse hardware architectures. C++ executors provide a standardized interface that simplifies the developm...
Buffer Centering for bittide Synchronization via Frame RotationSanjay Lall, Tammo Spalink2025-04-09下载Maintaining consistent time in distributed systems is a fundamental challenge. The bittide system addresses this by providing logical synchronization through a decentralized control mechanism that obs...
When Federated Learning Meets Quantum Computing: Survey and Research OpportunitiesAakar Mathur, Ashish Gupta, Sajal K. Das2025-04-09下载Quantum Federated Learning (QFL) is an emerging field that harnesses advances in Quantum Computing (QC) to improve the scalability and efficiency of decentralized Federated Learning (FL) models.
ICPS: Real-Time Resource Configuration for Cloud Serverless Functions Considering AffinityLong Chen, Xinshuai Hua, Jinquan Zhang, Wenshuai Li, Xiaoping Li, Shijie Guo2025-04-09下载Serverless computing, with its operational simplicity and on-demand scalability, has become a preferred paradigm for deploying workflow applications.

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp's Handshake MechanismGabriel K. Gegenhuber, Philipp É. Frenzel, Maximilian Günther, Aljosha Judmayer2025-04-09下载WhatsApp, the world's largest messaging application, uses a version of the Signal protocol to provide end-to-end encryption (E2EE) with strong security guarantees, including Perfect Forward Secrecy (P...
Enabling Continuous 5G Connectivity in Aircraft through Low Earth Orbit SatellitesRaúl Parada, Victor Monzon Baeza, Carlos Horcajo Fernández de Gamboa, Rocío Serrano Camacho, Carlos Monzo2025-04-09下载As air travel demand increases, uninterrupted high-speed internet access becomes essential. However, current satellite-based systems face latency and connectivity challenges.
Leveraging Machine Learning Techniques in Intrusion Detection Systems for Internet of ThingsSaeid Jamshidi, Amin Nikanjam, Nafi Kawser Wazed, Foutse Khomh2025-04-09下载As the Internet of Things (IoT) continues to expand, ensuring the security of connected devices has become increasingly critical. Traditional Intrusion Detection Systems (IDS) often fall short in mana...
Self-organisation of common good usage and an application to Internet servicesDiogo L. Pires, Vincenzo Mancuso, Paolo Castagno, Marco Ajmone Marsan2025-04-09下载Natural and human-made common goods present key challenges due to their susceptibility to degradation, overuse, or congestion. We explore the self-organisation of their usage when individuals have acc...
Bridging Research and Standardization: Innovations and Methodology for 6G Standard ContributionsFrancesca Conserva, Fabio Busacca, Corrado Puligheddu, Simone Bizzarri, Maurizio Fodrini, Giampaolo Cuozzo, Riccardo Marini2025-04-09下载The transition towards 6G presents unique challenges and opportunities in mobile networks design and standardization. Addressing these challenges requires a robust methodology for analyzing and select...
SigChord: Sniffing Wide Non-sparse Multiband Signals for Terrestrial and Non-terrestrial Wireless NetworksJinbo Peng, Junwen Duan, Zheng Lin, Haoxuan Yuan, Yue Gao, Zhe Chen2025-04-09下载While unencrypted information inspection in physical layer (e.g., open headers) can provide deep insights for optimizing wireless networks, the state-of-the-art (SOTA) methods heavily depend on full s...

cs.PF - Performance

标题作者发布日期PDF摘要
Towards a Higher Roofline for Matrix-Vector Multiplication in Matrix-Free HOSFEMZijian Cao, Qiao Sun, Tiangong Zhang, Huiyuan Li2025-04-09下载Modern GPGPUs provide massive arithmetic throughput, yet many scientific kernels remain limited by memory bandwidth. In particular, repeatedly loading precomputed auxiliary data wastes abundant comput...
Introducing the Arm-membench Throughput BenchmarkCyrill Burth, Markus Velten, Robert Schöne2025-04-09下载Application performance of modern day processors is often limited by the memory subsystem rather than actual compute capabilities. Therefore, data throughput specifications play a key role in modeling...

基于 VitePress 构建