Skip to content

2025-04-22

cs.AR - Architecture

标题作者发布日期PDF摘要
The Dawn of Disaggregation and the Coherence Conundrum: A Call for Federated CoherenceJaewan Hong, Marcos K. Aguilera, Emmanuel Amaro, Vincent Liu, Aurojit Panda, Ion Stoica2025-04-22下载Disaggregated memory is an upcoming data center technology that will allow nodes (servers) to share data efficiently. Sharing data creates a debate on the level of cache coherence the system should pr...
COBRA: Algorithm-Architecture Co-optimized Binary Transformer Accelerator for Edge InferenceYe Qiao, Zhiheng Chen, Yian Wang, Yifan Zhang, Yunzhe Deng, Sitao Huang2025-04-22下载Transformer-based models have demonstrated superior performance in various fields, including natural language processing and computer vision. However, their enormous model size and high demands in com...
TeLLMe: An Energy-Efficient Ternary LLM Accelerator for Prefilling and Decoding on Edge FPGAsYe Qiao, Zhiheng Chen, Yifan Zhang, Yian Wang, Sitao Huang2025-04-22下载Deploying large language models (LLMs) on edge platforms is challenged by their high computational and memory demands. Although recent low-bit quantization methods (e.g.
FPGA-Based Neural Network Accelerators for Space Applications: A SurveyPedro Antunes, Artur Podobas2025-04-22下载Space missions are becoming increasingly ambitious, necessitating high-performance onboard spacecraft computing systems. In response, field-programmable gate arrays (FPGAs) have garnered significant i...
EFFACT: A Highly Efficient Full-Stack FHE Acceleration PlatformYi Huang, Xinsheng Gong, Xiangyu Kong, Dibei Chen, Jianfeng Zhu, Wenping Zhu, Liangwei Li, Mingyu Gao, Shaojun Wei, Aoyang Zhang, Leibo Liu2025-04-22下载Fully Homomorphic Encryption (FHE) is a set of powerful cryptographic schemes that allows computation to be performed directly on encrypted data with an unlimited depth.
Insights from Verification: Training a Verilog Generation LLM with Reinforcement Learning with Testbench FeedbackNing Wang, Bingkun Yao, Jie Zhou, Yuchen Hu, Xi Wang, Nan Guan, Zhe Jiang2025-04-22下载Large language models (LLMs) have shown strong performance in Verilog generation from natural language description. However, ensuring the functional correctness of the generated code remains a signifi...
BBAL: A Bidirectional Block Floating Point-Based Quantisation Accelerator for Large Language ModelsXiaomeng Han, Yuan Cheng, Jing Wang, Junyang Lu, Hui Wang, X. x. Zhang, Ning Xu, Dawei Yang, Zhe Jiang2025-04-22下载Large language models (LLMs), with their billions of parameters, pose substantial challenges for deployment on edge devices, straining both memory capacity and computational resources.
Zoozve: A Strip-Mining-Free RISC-V Vector Extension with Arbitrary Register Grouping Compilation Support (WIP)Siyi Xu, Limin Jiang, Yintao Liu, Yihao Shen, Yi Shi, Shan Cao, Zhiyuan Jiang2025-04-22下载Vector processing is crucial for boosting processor performance and efficiency, particularly with data-parallel tasks. The RISC-V "V" Vector Extension (RVV) enhances algorithm efficiency by supporting...
VeriCoder: Enhancing LLM-Based RTL Code Generation through Functional Correctness ValidationAnjiang Wei, Huanmi Tan, Tarun Suresh, Daniel Mendoza, Thiago S. F. X. Teixeira, Ke Wang, Caroline Trippel, Alex Aiken2025-04-22下载Recent advances in Large Language Models (LLMs) have sparked growing interest in applying them to Electronic Design Automation (EDA) tasks, particularly Register Transfer Level (RTL) code generation.

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
The Dawn of Disaggregation and the Coherence Conundrum: A Call for Federated CoherenceJaewan Hong, Marcos K. Aguilera, Emmanuel Amaro, Vincent Liu, Aurojit Panda, Ion Stoica2025-04-22下载Disaggregated memory is an upcoming data center technology that will allow nodes (servers) to share data efficiently. Sharing data creates a debate on the level of cache coherence the system should pr...
Two-Fold Byzantine Fault Tolerance Algorithm: Byzantine Consensus in BlockchainMohammad R. Shakournia, Pooya Jamshidi, Hamid Reza Faragardi, Nasser Yazdani2025-04-22下载Blockchain technology offers a decentralized and secure method for storing and authenticating data, rendering it well-suited for various applications such as digital currencies, supply chain managemen...
Towards a Distributed Federated Learning Aggregation Placement using Particle Swarm IntelligenceAmir Ali-Pour, Sadra Bekrani, Laya Samizadeh, Julien Gascon-Samson2025-04-22下载Federated learning has become a promising distributed learning concept with extra insurance on data privacy. Extensive studies on various models of Federated learning have been done since the coinage ...
Charting the Uncharted: The Landscape of Monero Peer-to-Peer NetworkYu Gao, Matija Piškorec, Yu Zhang, Nicolò Vallarano, Claudio J. Tessone2025-04-22下载The Monero blockchain enables anonymous transactions through advanced cryptography in its peer-to-peer network, which underpins decentralization, security, and trustless interactions.
StreamRL: Scalable, Heterogeneous, and Elastic RL for LLMs with Disaggregated Stream GenerationYinmin Zhong, Zili Zhang, Xiaoniu Song, Hanpeng Hu, Chao Jin, Bingyang Wu, Nuo Chen, Yukun Chen, Yu Zhou, Changyi Wan, Hongyu Zhou, Yimin Jiang, Yibo Zhu, Daxin Jiang2025-04-22下载Reinforcement learning (RL) has become the core post-training technique for large language models (LLMs). RL for LLMs involves two stages: generation and training.
FailLite: Failure-Resilient Model Serving for Resource-Constrained Edge EnvironmentsLi Wu, Walid A. Hanafy, Tarek Abdelzaher, David Irwin, Jesse Milzman, Prashant Shenoy2025-04-22下载Model serving systems have become popular for deploying deep learning models for various latency-sensitive inference tasks. While traditional replication-based methods have been used for failure-resil...
Collaborative Split Federated Learning with Parallel Training and AggregationYiannis Papageorgiou, Yannis Thomas, Alexios Filippakopoulos, Ramin Khalili, Iordanis Koutsopoulos2025-04-22下载Federated learning (FL) operates based on model exchanges between the server and the clients, and it suffers from significant client-side computation and communication burden.
Residual-Evasive Attacks on ADMM in Distributed OptimizationSabrina Bruckmeier, Huadong Mo, James Qin2025-04-22下载This paper presents two attack strategies designed to evade detection in ADMM-based systems by preventing significant changes to the residual during the attacked iteration.
SeaLLM: Service-Aware and Latency-Optimized Resource Sharing for Large Language Model InferenceYihao Zhao, Jiadun Chen, Peng Sun, Lei Li, Xuanzhe Liu, Xin Jin2025-04-22下载Large language models (LLMs) with different architectures and sizes have been developed. Serving each LLM with dedicated GPUs leads to resource waste and service inefficiency due to the varying demand...
Towards True Work-Efficiency in Parallel Derandomization: MIS, Maximal Matching, and Hitting SetMohsen Ghaffari, Christoph Grunau2025-04-22下载Derandomization is one of the classic topics studied in the theory of parallel computations, dating back to the early 1980s. Despite much work, all known techniques lead to deterministic algorithms th...
DR.FIX: Automatically Fixing Data Races at Industry ScaleFarnaz Behrang, Zhizhou Zhang, Georgian-Vlad Saioc, Peng Liu, Milind Chabbi2025-04-22下载Data races are a prevalent class of concurrency bugs in shared-memory parallel programs, posing significant challenges to software reliability and reproducibility.
Scaling Neural-Network-Based Molecular Dynamics with Long-Range Electrostatic Interactions to 51 Nanoseconds per DayJianxiong Li, Beining Zhang, Mingzhen Li, Siyu Hu, Jinzhe Zeng, Lijun Liu, Guojun Yuan, Zhan Wang, Guangming Tan, Weile Jia2025-04-22下载Neural network-based molecular dynamics (NNMD) simulations incorporating long-range electrostatic interactions have significantly extended the applicability to heterogeneous and ionic systems, enablin...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
BAROC: Concealing Packet Losses in LSNs with Bimodal Behavior Awareness for Livecast IngestionHaoyuan Zhao, Jianxin Shi, Guanzhen Wu, Hao Fang, Yi Ching Chou, Long Chen, Feng Wang, Jiangchuan Liu2025-04-22下载The advent of Low-Earth Orbit satellite networks (LSNs), exemplified by initiatives like \emph{Starlink}, \emph{OneWeb} and \emph{Kuiper}, has ushered in a new era of ``Internet from Space" global con...
Two-Fold Byzantine Fault Tolerance Algorithm: Byzantine Consensus in BlockchainMohammad R. Shakournia, Pooya Jamshidi, Hamid Reza Faragardi, Nasser Yazdani2025-04-22下载Blockchain technology offers a decentralized and secure method for storing and authenticating data, rendering it well-suited for various applications such as digital currencies, supply chain managemen...
Towards a Distributed Federated Learning Aggregation Placement using Particle Swarm IntelligenceAmir Ali-Pour, Sadra Bekrani, Laya Samizadeh, Julien Gascon-Samson2025-04-22下载Federated learning has become a promising distributed learning concept with extra insurance on data privacy. Extensive studies on various models of Federated learning have been done since the coinage ...
Monero Peer-to-peer Network Topology AnalysisYu Gao, Yu Zhang, Matija Piškorec, Claudio J. Tessone2025-04-22下载Monero, a privacy-focused cryptocurrency, employs a decentralized peer-to-peer (P2P) network that plays a critical role in transaction propagation and consensus formation.
A Comparative and Measurement-Based Study on Real-Time Network KPI Extraction Methods for 5G and Beyond ApplicationsBatuhan Kaplan, Samed Keşir, Ahmet Faruk Coşkun2025-04-22下载Key performance indicators (KPIs), which can be extracted from the standardized interfaces of network equipment defined by current standards, constitute a primary data source that can be leveraged in ...
Aerial Active STAR-RIS-assisted Satellite-Terrestrial Covert CommunicationsChuang Zhang, Geng Sun, Jiahui Li, Jiacheng Wang, Ruichen Zhang, Dusit Niyato, Shiwen Mao, Abbas Jamalipour2025-04-22下载An integration of satellites and terrestrial networks is crucial for enhancing performance of next generation communication systems. However, the networks are hindered by the long-distance path loss a...
Modelling and Performance Analysis of Non-Primary Channel Access in Wi-Fi NetworksBoris Bellalta, Francesc Wilhelmi, Lorenzo Galati-Giordano, Giovanni Geraci2025-04-22下载This paper aims to improve our understanding of the performance of the Non-Primary Channel Access (NPCA) mechanism, a new feature introduced in IEEE 802.
RRC Signaling Storm Detection in O-RANDang Kien Nguyen, Rim El Malki, Filippo Rebecchi2025-04-22下载The Open Radio Access Network (O-RAN) marks a significant shift in the mobile network industry. By transforming a traditionally vertically integrated architecture into an open, data-driven one, O-RAN ...
Research on Cloud Platform Network Traffic Monitoring and Anomaly Detection System based on Large Language ModelsZe Yang, Yihong Jin, Juntian Liu, Xinhe Xu, Yihan Zhang, Shuyang Ji2025-04-22下载The rapidly evolving cloud platforms and the escalating complexity of network traffic demand proper network traffic monitoring and anomaly detection to ensure network security and performance.
State-Aware IoT Scheduling Using Deep Q-Networks and Edge-Based CoordinationQingyuan He, Chang Liu, Juecen Zhan, Weiqiang Huang, Ran Hao2025-04-22下载This paper addresses the challenge of energy efficiency management faced by intelligent IoT devices in complex application environments. A novel optimization method is proposed, combining Deep Q-Netwo...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
Adaptive and Efficient Dynamic Memory Management for Hardware EnclavesVijay Dhanraj, Harpreet Singh Chawla, Tao Zhang, Daniel Manila, Eric Thomas Schneider, Erica Fu, Mona Vij, Chia-Che Tsai, Donald E. Porter2025-04-22下载The second version of Intel Software Guard Extensions (Intel SGX), or SGX2, adds dynamic management of enclave memory and threads. The first version required the address space and thread counts to be ...
Guillotine: Hypervisors for Isolating Malicious AIsJames Mickens, Sarah Radway, Ravi Netravali2025-04-22下载As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society.

基于 VitePress 构建