Skip to content

2025-07-17

cs.AR - Architecture

标题作者发布日期PDF摘要
WIP: Turning Fake Chips into Learning OpportunitiesHaniye Mehraban, Saad Azmeen-ur-Rahman, John Hu2025-07-17下载This work-in-progress paper presents a case study in which counterfeit TL074 operational amplifiers, discovered in a junior level electronics course, became the basis for a hands on learning experienc...
MC2^2A: Enabling Algorithm-Hardware Co-Design for Efficient Markov Chain Monte Carlo AccelerationShirui Zhao, Jun Yin, Lingyun Yao, Martin Andraud, Wannes Meert, Marian Verhelst2025-07-17下载An increasing number of applications are exploiting sampling-based algorithms for planning, optimization, and inference. The Markov Chain Monte Carlo (MCMC) algorithms form the computational backbone ...
An ultra-low-power CGRA for accelerating Transformers at the edgeRohit Prasad2025-07-17下载Transformers have revolutionized deep learning with applications in natural language processing, computer vision, and beyond. However, their computational demands make it challenging to deploy them on...

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Checkmate: Zero-Overhead Model Checkpointing via Network Gradient ReplicationAnkit Bhardwaj, Weiyang Wang, Jeremy Carin, Adam Belay, Manya Ghobadi2025-07-17下载This paper presents Checkmate, a system that enables per-iteration checkpointing in DNN training without any training slowdown. The traditional approach to checkpointing requires a pause in training t...
Faster Multi-Source Reachability and Approximate Distances via Shortcuts, Hopsets and Matrix MultiplicationMichael Elkin, Chhaya Trehan2025-07-17下载Given an nn-vertex mm-edge digraph G=(V,E)G = (V,E) and a subset SVS \subseteq V of |S| = n^σ (for some 0 \le σ\le 1) designated sources, the S×VS \times V reachability problem is to compute the set...
Just Verification of Mutual Exclusion AlgorithmsRob van Glabbeek, Bas Luttik, Myrthe Spronck2025-07-17下载We verify the correctness of a variety of mutual exclusion algorithms through model checking. We look at algorithms where communication is via shared read/write registers, where those registers can be...
FedGA: A Fair Federated Learning Framework Based on the Gini CoefficientShanBin Liu2025-07-17下载Fairness has emerged as one of the key challenges in federated learning. In horizontal federated settings, data heterogeneity often leads to substantial performance disparities across clients, raising...
Autonomous Resource Management in Microservice Systems via Reinforcement LearningYujun Zou, Nia Qi, Yingnan Deng, Zhihao Xue, Ming Gong, Wuyang Zhang2025-07-17下载This paper proposes a reinforcement learning-based method for microservice resource scheduling and optimization, aiming to address issues such as uneven resource allocation, high latency, and insuffic...
Comparative Evaluation of PyTorch, JAX, SciPy, and Neal for Solving QUBO Problems at ScalePei-Kun Yang2025-07-17下载Quadratic Unconstrained Binary Optimization (QUBO) is a versatile framework for modeling combinatorial optimization problems. This study benchmarks five software-based QUBO solvers: Neal, PyTorch (CPU...
PolyServe: Efficient Multi-SLO Serving at ScaleKan Zhu, Haiyang Shi, Le Xu, Jiaxin Shan, Arvind Krishnamurthy, Baris Kasikci, Liguang Xie2025-07-17下载Advances in Large Language Models (LLMs) have led to a surge of LLM-powered applications. These applications have diverse token-generation latency requirements.
Building State Machine Replication Using Practical Network SynchronyYiliang Wan, Nitin Shivaraman, Akshaye Shenoi, Xiang Liu, Tao Luo, Jialin Li2025-07-17下载Distributed systems, such as state machine replication, are critical infrastructures for modern applications. Practical distributed protocols make minimum assumptions about the underlying network: The...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
PHASE: Passive Human Activity Simulation EvaluationSteven Lamp, Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson2025-07-17下载Cybersecurity simulation environments, such as cyber ranges, honeypots, and sandboxes, require realistic human behavior to be effective, yet no quantitative method exists to assess the behavioral fide...
NetForge: A Programmable Substrate for Bottleneck-Centric Network Data GenerationJaber Daneshamooz, Satyandra Guthula, Jessica Nguyen, William Chen, Sanjay Chandrasekaran, Ankit Gupta, Arpit Gupta, Walter Willinger2025-07-17下载The behavior of Internet applications is shaped by congestion dynamics at bottleneck links, yet data capturing application behavior across diverse bottleneck regimes remains scarce.
Bidirectional Age of Incorrect Information: A Performance Metric for Status Updates in Virtual Dynamic EnvironmentsChiara Schiavo, Manuele Favero, Alessandro Buratto, Leonardo Badia2025-07-17下载Virtual dynamic environments (VDEs) such as the Metaverse and digital twins (DTs) require proper representation of the interacting entities to map their characteristics within the simulated or augment...
Predictability-Aware Motion Prediction for Edge XR via High-Order Error-State Kalman FilteringZiyu Zhong, Björn Landfeldt, Günter Alce, Hector A Caltenco2025-07-17下载As 6G networks are developed and defined, offloading of XR applications is emerging as one of the strong new use cases. The reduced 6G latency coupled with edge processing infrastructure will for the ...
RIDAS: A Multi-Agent Framework for AI-RAN with Representation- and Intention-Driven AgentsKuiyuan Ding, Caili Guo, Yang Yang, Jianzhang Guo2025-07-17下载Sixth generation (6G) networks demand tight integration of artificial intelligence (AI) into radio access networks (RANs) to meet stringent quality of service (QoS) and resource efficiency requirement...
Feasibility of Energy Neutral Wildlife Tracking using Multi-Source Energy HarvestingSamer Nasser, Henrique Duarte Moura, Dragan Subotic, Ritesh Kumar Singh, Maarten Weyn, Jeroen Famaey2025-07-17下载Long-term wildlife tracking is crucial for biodiversity monitoring, but energy limitations pose challenges, especially for animal tags, where replacing batteries is impractical and stressful for the a...
Energy-Efficient RSMA-enabled Low-altitude MEC Optimization Via Generative AI-enhanced Deep Reinforcement LearningXudong Wang, Hongyang Du, Lei Feng, Kaibin Huang2025-07-17下载The growing demand for low-latency computing in 6G is driving the use of UAV-based low-altitude mobile edge computing (MEC) systems. However, limited spectrum often leads to severe uplink interference...
Learning-Based Interface for Semantic Communication with Bit Importance AwarenessWenzheng Kong, Wenyi Zhang2025-07-17下载Joint source-channel coding (JSCC) is an effective approach for semantic communication. However, current JSCC methods are difficult to integrate with existing communication network architectures, wher...
Intent-Based Network for RAN Management with Large Language ModelsFransiscus Asisi Bimo, Maria Amparo Canaveras Galdon, Chun-Kai Lai, Ray-Guang Cheng, Edwin K. P. Chong2025-07-17下载Advanced intelligent automation becomes an important feature to deal with the increased complexity in managing wireless networks. This paper proposes a novel automation approach of intent-based networ...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
Design and Reliability of a User Space Write-Ahead Log in RustVitor K. F. Pellegatti, Gustavo M. D. Vieira2025-07-17下载Write-ahead logs (WALs) are a fundamental fault-tolerance technique found in many areas of computer science. WALs must be reliable while maintaining high performance, because all operations will be wr...

基于 VitePress 构建