Appearance
2025-07-17
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| WIP: Turning Fake Chips into Learning Opportunities | Haniye Mehraban, Saad Azmeen-ur-Rahman, John Hu | 2025-07-17 | 下载 | This work-in-progress paper presents a case study in which counterfeit TL074 operational amplifiers, discovered in a junior level electronics course, became the basis for a hands on learning experienc... |
| MCA: Enabling Algorithm-Hardware Co-Design for Efficient Markov Chain Monte Carlo Acceleration | Shirui Zhao, Jun Yin, Lingyun Yao, Martin Andraud, Wannes Meert, Marian Verhelst | 2025-07-17 | 下载 | An increasing number of applications are exploiting sampling-based algorithms for planning, optimization, and inference. The Markov Chain Monte Carlo (MCMC) algorithms form the computational backbone ... |
| An ultra-low-power CGRA for accelerating Transformers at the edge | Rohit Prasad | 2025-07-17 | 下载 | Transformers have revolutionized deep learning with applications in natural language processing, computer vision, and beyond. However, their computational demands make it challenging to deploy them on... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Checkmate: Zero-Overhead Model Checkpointing via Network Gradient Replication | Ankit Bhardwaj, Weiyang Wang, Jeremy Carin, Adam Belay, Manya Ghobadi | 2025-07-17 | 下载 | This paper presents Checkmate, a system that enables per-iteration checkpointing in DNN training without any training slowdown. The traditional approach to checkpointing requires a pause in training t... |
| Faster Multi-Source Reachability and Approximate Distances via Shortcuts, Hopsets and Matrix Multiplication | Michael Elkin, Chhaya Trehan | 2025-07-17 | 下载 | Given an -vertex -edge digraph and a subset of |S| = n^σ (for some 0 \le σ\le 1) designated sources, the reachability problem is to compute the set... |
| Just Verification of Mutual Exclusion Algorithms | Rob van Glabbeek, Bas Luttik, Myrthe Spronck | 2025-07-17 | 下载 | We verify the correctness of a variety of mutual exclusion algorithms through model checking. We look at algorithms where communication is via shared read/write registers, where those registers can be... |
| FedGA: A Fair Federated Learning Framework Based on the Gini Coefficient | ShanBin Liu | 2025-07-17 | 下载 | Fairness has emerged as one of the key challenges in federated learning. In horizontal federated settings, data heterogeneity often leads to substantial performance disparities across clients, raising... |
| Autonomous Resource Management in Microservice Systems via Reinforcement Learning | Yujun Zou, Nia Qi, Yingnan Deng, Zhihao Xue, Ming Gong, Wuyang Zhang | 2025-07-17 | 下载 | This paper proposes a reinforcement learning-based method for microservice resource scheduling and optimization, aiming to address issues such as uneven resource allocation, high latency, and insuffic... |
| Comparative Evaluation of PyTorch, JAX, SciPy, and Neal for Solving QUBO Problems at Scale | Pei-Kun Yang | 2025-07-17 | 下载 | Quadratic Unconstrained Binary Optimization (QUBO) is a versatile framework for modeling combinatorial optimization problems. This study benchmarks five software-based QUBO solvers: Neal, PyTorch (CPU... |
| PolyServe: Efficient Multi-SLO Serving at Scale | Kan Zhu, Haiyang Shi, Le Xu, Jiaxin Shan, Arvind Krishnamurthy, Baris Kasikci, Liguang Xie | 2025-07-17 | 下载 | Advances in Large Language Models (LLMs) have led to a surge of LLM-powered applications. These applications have diverse token-generation latency requirements. |
| Building State Machine Replication Using Practical Network Synchrony | Yiliang Wan, Nitin Shivaraman, Akshaye Shenoi, Xiang Liu, Tao Luo, Jialin Li | 2025-07-17 | 下载 | Distributed systems, such as state machine replication, are critical infrastructures for modern applications. Practical distributed protocols make minimum assumptions about the underlying network: The... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| PHASE: Passive Human Activity Simulation Evaluation | Steven Lamp, Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson | 2025-07-17 | 下载 | Cybersecurity simulation environments, such as cyber ranges, honeypots, and sandboxes, require realistic human behavior to be effective, yet no quantitative method exists to assess the behavioral fide... |
| NetForge: A Programmable Substrate for Bottleneck-Centric Network Data Generation | Jaber Daneshamooz, Satyandra Guthula, Jessica Nguyen, William Chen, Sanjay Chandrasekaran, Ankit Gupta, Arpit Gupta, Walter Willinger | 2025-07-17 | 下载 | The behavior of Internet applications is shaped by congestion dynamics at bottleneck links, yet data capturing application behavior across diverse bottleneck regimes remains scarce. |
| Bidirectional Age of Incorrect Information: A Performance Metric for Status Updates in Virtual Dynamic Environments | Chiara Schiavo, Manuele Favero, Alessandro Buratto, Leonardo Badia | 2025-07-17 | 下载 | Virtual dynamic environments (VDEs) such as the Metaverse and digital twins (DTs) require proper representation of the interacting entities to map their characteristics within the simulated or augment... |
| Predictability-Aware Motion Prediction for Edge XR via High-Order Error-State Kalman Filtering | Ziyu Zhong, Björn Landfeldt, Günter Alce, Hector A Caltenco | 2025-07-17 | 下载 | As 6G networks are developed and defined, offloading of XR applications is emerging as one of the strong new use cases. The reduced 6G latency coupled with edge processing infrastructure will for the ... |
| RIDAS: A Multi-Agent Framework for AI-RAN with Representation- and Intention-Driven Agents | Kuiyuan Ding, Caili Guo, Yang Yang, Jianzhang Guo | 2025-07-17 | 下载 | Sixth generation (6G) networks demand tight integration of artificial intelligence (AI) into radio access networks (RANs) to meet stringent quality of service (QoS) and resource efficiency requirement... |
| Feasibility of Energy Neutral Wildlife Tracking using Multi-Source Energy Harvesting | Samer Nasser, Henrique Duarte Moura, Dragan Subotic, Ritesh Kumar Singh, Maarten Weyn, Jeroen Famaey | 2025-07-17 | 下载 | Long-term wildlife tracking is crucial for biodiversity monitoring, but energy limitations pose challenges, especially for animal tags, where replacing batteries is impractical and stressful for the a... |
| Energy-Efficient RSMA-enabled Low-altitude MEC Optimization Via Generative AI-enhanced Deep Reinforcement Learning | Xudong Wang, Hongyang Du, Lei Feng, Kaibin Huang | 2025-07-17 | 下载 | The growing demand for low-latency computing in 6G is driving the use of UAV-based low-altitude mobile edge computing (MEC) systems. However, limited spectrum often leads to severe uplink interference... |
| Learning-Based Interface for Semantic Communication with Bit Importance Awareness | Wenzheng Kong, Wenyi Zhang | 2025-07-17 | 下载 | Joint source-channel coding (JSCC) is an effective approach for semantic communication. However, current JSCC methods are difficult to integrate with existing communication network architectures, wher... |
| Intent-Based Network for RAN Management with Large Language Models | Fransiscus Asisi Bimo, Maria Amparo Canaveras Galdon, Chun-Kai Lai, Ray-Guang Cheng, Edwin K. P. Chong | 2025-07-17 | 下载 | Advanced intelligent automation becomes an important feature to deal with the increased complexity in managing wireless networks. This paper proposes a novel automation approach of intent-based networ... |
cs.OS - Operating Systems
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Design and Reliability of a User Space Write-Ahead Log in Rust | Vitor K. F. Pellegatti, Gustavo M. D. Vieira | 2025-07-17 | 下载 | Write-ahead logs (WALs) are a fundamental fault-tolerance technique found in many areas of computer science. WALs must be reliable while maintaining high performance, because all operations will be wr... |