Appearance
2025-05-07
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Veritas: Deterministic Verilog Code Synthesis from LLM-Generated Conjunctive Normal Form | Prithwish Basu Roy, Akashdeep Saha, Manaar Alam, Johann Knechtel, Michail Maniatakos, Ozgur Sinanoglu, Ramesh Karri | 2025-05-07 | 下载 | Automated Verilog code synthesis poses significant challenges and typically demands expert oversight. Traditional high-level synthesis (HLS) methods often fail to scale for real-world designs. |
| Flexing RISC-V Instruction Subset Processors to Extreme Edge | Alireza Raisiardali, Konstantinos Iordanou, Jedrzej Kufel, Kowshik Gudimetla, Kris Myny, Emre Ozer | 2025-05-07 | 下载 | This paper presents an automated approach for designing processors that support a subset of the RISC-V instruction set architecture (ISA) for a new class of applications at Extreme Edge. |
| Edge-GPU Based Face Tracking for Face Detection and Recognition Acceleration | Asma Baobaid, Mahmoud Meribout | 2025-05-07 | 下载 | Cost-effective machine vision systems dedicated to real-time and accurate face detection and recognition in public places are crucial for many modern applications. |
| Leveraging Simultaneous Usage of Edge GPU Hardware Engines for Video Face Detection and Recognition | Asma Baobaid, Mahmoud Meribout | 2025-05-07 | 下载 | Video face detection and recognition in public places at the edge is required in several applications, such as security reinforcement and contactless access to authorized venues. |
| Accelerating Triangle Counting with Real Processing-in-Memory Systems | Lorenzo Asquini, Manos Frouzakis, Juan Gómez-Luna, Mohammad Sadrosadati, Onur Mutlu, Francesco Silvestri | 2025-05-07 | 下载 | Triangle Counting (TC) is a procedure that involves enumerating the number of triangles within a graph. It has important applications in numerous fields, such as social or biological network analysis ... |
| Onboard Optimization and Learning: A Survey | Monirul Islam Pavel, Siyi Hu, Mahardhika Pratama, Ryszard Kowalczyk | 2025-05-07 | 下载 | Onboard learning is a transformative approach in edge AI, enabling real-time data processing, decision-making, and adaptive model training directly on resource-constrained devices without relying on c... |
| SpeedLLM: An FPGA Co-design of Large Language Model Inference Accelerator | Peipei Wang, Wu Guan, Liping Liang, Zhijun Wang, Hanqing Luo, Zhibin Zhang | 2025-05-07 | 下载 | This paper introduces SpeedLLM, a neural network accelerator designed on the Xilinx Alevo U280 platform and optimized for the Tinyllama framework to enhance edge computing performance. |
| In-Situ Hardware Error Detection Using Specification-Derived Petri Net Models and Behavior-Derived State Sequences | Tomonari Tanaka, Takumi Uezono, Kohei Suenaga, Masanori Hashimoto | 2025-05-07 | 下载 | In hardware accelerators used in data centers and safety-critical applications, soft errors and resultant silent data corruption significantly compromise reliability, particularly when upsets occur in... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| HiPerRAG: High-Performance Retrieval Augmented Generation for Scientific Insights | Ozan Gokdemir, Carlo Siebenschuh, Alexander Brace, Azton Wells, Brian Hsu, Kyle Hippe, Priyanka V. Setty, Aswathy Ajith, J. Gregory Pauloski, Varuni Sastry, Sam Foreman, Huihuo Zheng, Heng Ma, Bharat Kale, Nicholas Chia, Thomas Gibbs, Michael E. Papka, Thomas Brettin, Francis J. Alexander, Anima Anandkumar, Ian Foster, Rick Stevens, Venkatram Vishwanath, Arvind Ramanathan | 2025-05-07 | 下载 | The volume of scientific literature is growing exponentially, leading to underutilized discoveries, duplicated efforts, and limited cross-disciplinary collaboration. |
| ORBIT-2: Scaling Exascale Vision Foundation Models for Weather and Climate Downscaling | Xiao Wang, Jong-Youl Choi, Takuya Kurihaya, Isaac Lyngaas, Hong-Jun Yoon, Xi Xiao, David Pugmire, Ming Fan, Nasik M. Nafi, Aristeidis Tsaris, Ashwin M. Aji, Maliha Hossain, Mohamed Wahib, Dali Wang, Peter Thornton, Prasanna Balaprakash, Moetasim Ashfaq, Dan Lu | 2025-05-07 | 下载 | Sparse observations and coarse-resolution climate models limit effective regional decision-making, underscoring the need for robust downscaling. |
| Big Data Architecture for Large Organizations | Fathima Nuzla Ismail, Abira Sengupta, Shanika Amarasoma | 2025-05-07 | 下载 | The exponential growth of big data has transformed how large organisations leverage information to drive innovation, optimise processes, and maintain competitive advantages. |
| Exploring Influence Factors on LLM Suitability for No-Code Development of End User IoT Applications | Minghe Wang, Alexandra Kapp, Trever Schirmer, Tobias Pfandzelter, David Bermbach | 2025-05-07 | 下载 | No-Code Development Platforms (NCDPs) empower non-technical end users to build applications tailored to their specific demands without writing code. |
| Optimal Deterministic Rendezvous in Labeled Lines | Yann Bourreau, Ananth Narayanan, Alexandre Nolin | 2025-05-07 | 下载 | In a rendezvous task, some mobile agents dispersed in a network have to gather at an arbitrary common site. We consider the rendezvous problem on the infinite labeled line, with agents, without co... |
| Comparing CPU and GPU compute of PERMANOVA on MI300A | Igor Sfiligoi | 2025-05-07 | 下载 | Comparing the tradeoffs of CPU and GPU compute for memory-heavy algorithms is often challenging, due to the drastically different memory subsystems on host CPUs and discrete GPUs. |
| FDA-Opt: Communication-Efficient Federated Fine-Tuning of Language Models | Michail Theologitis, Vasilis Samoladas, Antonios Deligiannakis | 2025-05-07 | 下载 | Federated Learning (FL) enables the utilization of vast, previously inaccessible data sources. At the same time, pre-trained Language Models (LMs) have taken the world by storm and for good reason. |
| An Asynchronous Distributed-Memory Parallel Algorithm for k-mer Counting | Souvadra Hati, Akihiro Hayashi, Richard Vuduc | 2025-05-07 | 下载 | This paper describes a new asynchronous algorithm and implementation for the problem of k-mer counting (KC), which concerns quantifying the frequency of length k substrings in a DNA sequence. |
| Accelerating Triangle Counting with Real Processing-in-Memory Systems | Lorenzo Asquini, Manos Frouzakis, Juan Gómez-Luna, Mohammad Sadrosadati, Onur Mutlu, Francesco Silvestri | 2025-05-07 | 下载 | Triangle Counting (TC) is a procedure that involves enumerating the number of triangles within a graph. It has important applications in numerous fields, such as social or biological network analysis ... |
| Learning-Based Approaches for Job Shop Scheduling Problems: A Review | Karima Rihane, Adel Dabah, Abdelhakim AitZai | 2025-05-07 | 下载 | Job Shop Scheduling (JSS) is one of the most studied combinatorial optimization problems. It involves scheduling a set of jobs with predefined processing constraints on a set of machines to achieve a ... |
| FRAIN to Train: A Fast-and-Reliable Solution for Decentralized Federated Learning | Sanghyeon Park, Soo-Mook Moon | 2025-05-07 | 下载 | Federated learning (FL) enables collaborative model training across distributed clients while preserving data locality. Although FedAvg pioneered synchronous rounds for global model averaging, slower ... |
| Mazzaroth: A High-Throughput DAG Consensus with State Root | Haohan Li | 2025-05-07 | 下载 | Nakamoto Consensus achieves a decentralized ledger through a single-chain blockchain, assuming a maximum network delay, which limits block generation speed, resulting in low throughput. |
| Maxing Out the SVM: Performance Impact of Memory and Program Cache Sizes in the Agave Validator | Turan Vural, Yuki Yuminaga, Alex Petrosyan, Ben Livshits | 2025-05-07 | 下载 | In this paper we analyze some of the bottlenecks in the execution pipeline of Solana's Agave validator client, focusing on RAM and program cache usage under mainnet conditions. |
| Plexus: Taming Billion-edge Graphs with 3D Parallel Full-graph GNN Training | Aditya K. Ranjan, Siddharth Singh, Cunyang Wei, Abhinav Bhatele | 2025-05-07 | 下载 | Graph neural networks (GNNs) leverage the connectivity and structure of real-world graphs to learn intricate properties and relationships between nodes. |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Impact of Weather on Satellite Communication: Evaluating Starlink Resilience | Muhammad Asad Ullah, Antti Heikkinen, Mikko Uitto, Antti Anttonen, Konstantin Mikhaylov | 2025-05-07 | 下载 | Satellite communications have emerged as one of the most feasible solutions to provide global wireless coverage and connect the unconnected. Starlink dominates the market with over 7,000 operational s... |
| Pipelining Split Learning in Multi-hop Edge Networks | Wei Wei, Zheng Lin, Tao Li, Xuanheng Li, Xianhao Chen | 2025-05-07 | 下载 | To support large-scale model training, split learning (SL) enables multiple edge devices/servers to share the intensive training workload. However, most existing works on SL focus solely on two-tier m... |
| Design and Evaluation of an NDN-Based Network for Distributed Digital Twins | Chen Chen, Zihan Jia, Ze Wang, Lin Cui, Fung Po Tso | 2025-05-07 | 下载 | Digital twins (DT) have received significant attention due to their numerous benefits, such as real-time data analytics and cost reduction in production. |
| Joint Task Offloading and Channel Allocation in Spatial-Temporal Dynamic for MEC Networks | Tianyi Shi, Tiankui Zhang, Jonathan Loo, Rong Huang, Yapeng Wang | 2025-05-07 | 下载 | Computation offloading and resource allocation are critical in mobile edge computing (MEC) systems to handle the massive and complex requirements of applications restricted by limited resources. |
| On-Device LLM for Context-Aware Wi-Fi Roaming | Ju-Hyung Lee, Yanqing Lu, Klaus Doppler | 2025-05-07 | 下载 | Roaming in Wireless LAN (Wi-Fi) is a critical yet challenging task for maintaining seamless connectivity in dynamic mobile environments. Conventional threshold-based or heuristic schemes often fail, l... |
| LLMs' Suitability for Network Security: A Case Study of STRIDE Threat Modeling | AbdulAziz AbdulGhaffar, Ashraf Matrawy | 2025-05-07 | 下载 | Artificial Intelligence (AI) is expected to be an integral part of next-generation AI-native 6G networks. With the prevalence of AI, researchers have identified numerous use cases of AI in network sec... |
| Satellite-Assisted Low-Altitude Economy Networking: Concepts, Applications, and Opportunities | Shizhao He, Jiacheng Wang, Ying-Chang Liang, Geng Sun, Dusit Niyato | 2025-05-07 | 下载 | The low-altitude economy (LAE) is a new economic paradigm that leverages low-altitude vehicles (LAVs) to perform diverse missions across diverse areas. |
| Shadow Wireless Intelligence: Large Language Model-Driven Reasoning in Covert Communications | Yuanai Xie, Zhaozhi Liu, Xiao Zhang, Shihua Zhang, Rui Hou, Minrui Xu, Ruichen Zhang, Dusit Niyato | 2025-05-07 | 下载 | Covert Communications (CC) can secure sensitive transmissions in industrial, military, and mission-critical applications within 6G wireless networks. |
cs.PF - Performance
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Multiserver-job Response Time under Multilevel Scaling | Isaac Grosof, Hayriye Ayhan | 2025-05-07 | 下载 | We study the multiserver-job setting in the load-focused multilevel scaling limit, where system load approaches capacity much faster than the growth of the number of servers . |
| Comparing CPU and GPU compute of PERMANOVA on MI300A | Igor Sfiligoi | 2025-05-07 | 下载 | Comparing the tradeoffs of CPU and GPU compute for memory-heavy algorithms is often challenging, due to the drastically different memory subsystems on host CPUs and discrete GPUs. |