Appearance
2025-09-19
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Belenos: Bottleneck Evaluation to Link Biomechanics to Novel Computing Optimizations | Hana Chitsaz, Johnson Umeike, Amirmahdi Namjoo, Babak N. Safa, Bahar Asgari | 2025-09-19 | 下载 | Finite element simulations are essential in biomechanics, enabling detailed modeling of tissues and organs. However, architectural inefficiencies in current hardware and software stacks limit performa... |
| Symbolic Timing Analysis of Digital Circuits Using Analytic Delay Functions | Era Thaqi, Dennis Eigner, Arman Ferdowsi, Ulrich Schmid | 2025-09-19 | 下载 | We propose a novel approach to symbolic timing analysis for digital integrated circuits based on recently developed analytic delay formulas for 2-input NOR, NAND, and Muller-C gates by Ferdowsi et al. |
| Automatic Microarchitecture-Aware Custom Instruction Design for RISC-V Processors | Evgenii Rezunov, Niko Zurstraßen, Lennart M. Reimann, Rainer Leupers | 2025-09-19 | 下载 | An Application-Specific Instruction Set Processor(ASIP) is a specialized microprocessor that provides a trade-off between the programmability of a General Purpose Processor (GPP) and the performance a... |
| CLASS: A Controller-Centric Layout Synthesizer for Dynamic Quantum Circuits | Yu Chen, Yilun Zhao, Bing Li, He Li, Mengdi Wang, Yinhe Han, Ying Wang | 2025-09-19 | 下载 | Layout Synthesis for Quantum Computing (LSQC) is a critical component of quantum design tools. Traditional LSQC studies primarily focus on optimizing for reduced circuit depth by adopting a device-cen... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| WarpSpeed: A High-Performance Library for Concurrent GPU Hash Tables | Hunter McCoy, Prashant Pandey | 2025-09-19 | 下载 | GPU hash tables are increasingly used to accelerate data processing, but their limited functionality restricts adoption in large-scale data processing applications. |
| B5GRoam: A Zero Trust Framework for Secure and Efficient On-Chain B5G Roaming | Mohamed Abdessamed Rezazi, Mouhamed Amine Bouchiha, Ahmed Mounsf Rafik Bendada, Yacine Ghamri-Doudane | 2025-09-19 | 下载 | Roaming settlement in 5G and beyond networks demands secure, efficient, and trustworthy mechanisms for billing reconciliation between mobile operators. |
| Personalized Federated Heat-Kernel Enhanced Multi-View Clustering via Advanced Tensor Decomposition Techniques | Kristina P. Sinaga | 2025-09-19 | 下载 | This paper introduces mathematical frameworks that address the challenges of multi-view clustering in federated learning environments. The objective is to integrate optimization techniques based on ne... |
| Odontoceti: Ultra-Fast DAG Consensus with Two Round Commitment | Preston Vander Vos | 2025-09-19 | 下载 | Users of blockchains value scalability, expecting fast confirmations and immediate transaction processing. Odontoceti, the latest in DAG-based consensus, addresses these concerns by prioritizing low l... |
| Robust LLM Training Infrastructure at ByteDance | Borui Wan, Gaohong Liu, Zuquan Song, Jun Wang, Yun Zhang, Guangming Sheng, Shuguang Wang, Houmin Wei, Chenyuan Wang, Weiqiang Lou, Xi Yang, Mofan Zhang, Kaihua Jiang, Cheng Ren, Xiaoyun Zhi, Menghan Yu, Zhe Nan, Zhuolin Zheng, Baoquan Zhong, Qinlong Wang, Huan Yu, Jinxin Chi, Wang Zhang, Yuhan Li, Zixian Du, Sida Zhao, Yongqiang Zhang, Jingzhe Tang, Zherui Liu, Chuan Wu, Yanghua Peng, Haibin Lin, Wencong Xiao, Xin Liu, Liang Xiang | 2025-09-19 | 下载 | The training scale of large language models (LLMs) has reached tens of thousands of GPUs and is still continuously expanding, enabling faster learning of larger models. |
| How Exclusive are Ethereum Transactions? Evidence from non-winning blocks | Vabuk Pahari, Andrea Canidio | 2025-09-19 | 下载 | We analyze 15,097 blocks proposed for inclusion in Ethereum's blockchain over an eight-minute window on December 3, 2024, during which 38 blocks were added to the chain. |
| RLinf: Flexible and Efficient Large-scale Reinforcement Learning via Macro-to-Micro Flow Transformation | Chao Yu, Yuanqing Wang, Zhen Guo, Hao Lin, Si Xu, Hongzhi Zang, Quanlu Zhang, Yongji Wu, Chunyang Zhu, Junhao Hu, Zixiao Huang, Mingjie Wei, Yuqing Xie, Ke Yang, Bo Dai, Zhexuan Xu, Jiakun Du, Xiangyuan Wang, Xu Fu, Letong Shi, Zhihao Liu, Kang Chen, Weilin Liu, Gang Liu, Boxun Li, Jianlei Yang, Zhi Yang, Guohao Dai, Yu Wang | 2025-09-19 | 下载 | Reinforcement learning (RL) has demonstrated immense potential in advancing artificial general intelligence, agentic intelligence, and embodied intelligence. |
| Efficient Pre-Training of LLMs via Topology-Aware Communication Alignment on More Than 9600 GPUs | Guoliang He, Youhe Jiang, Wencong Xiao, Kaihua Jiang, Shuguang Wang, Jun Wang, Zixian Du, Zhuo Jiang, Xinlei Zhang, Binhang Yuan, Eiko Yoneki | 2025-09-19 | 下载 | The scaling law for large language models (LLMs) depicts that the path towards machine intelligence necessitates training at large scale. Thus, companies continuously build large-scale GPU clusters, a... |
| ToFU: Transforming How Federated Learning Systems Forget User Data | Van-Tuan Tran, Hong-Hanh Nguyen-Le, Quoc-Viet Pham | 2025-09-19 | 下载 | Neural networks unintentionally memorize training data, creating privacy risks in federated learning (FL) systems, such as inference and reconstruction attacks on sensitive data. |
| Angelfish: Leader, DAG, or Anywhere in Between | Qianyu Yu, Giuliano Losa, Nibesh Shrestha, Xuechao Wang | 2025-09-19 | 下载 | To maximize performance, many modern blockchain systems rely on eventually-synchronous, Byzantine fault-tolerant (BFT) consensus protocols. Two protocol designs have emerged in this space: protocols t... |
| FedHK-MVFC: Federated Heat Kernel Multi-View Clustering | Kristina P. Sinaga | 2025-09-19 | 下载 | In the realm of distributed artificial intelligence (AI) and privacy-focused medical applications, this paper proposes a multi-view clustering framework that links quantum field theory with federated ... |
| Inference Offloading for Cost-Sensitive Binary Classification at the Edge | Vishnu Narayanan Moothedath, Umang Agarwal, Umeshraja N, James Richard Gross, Jaya Prakash Champati, Sharayu Moharir | 2025-09-19 | 下载 | We focus on a binary classification problem in an edge intelligence system where false negatives are more costly than false positives. The system has a compact, locally deployed model, which is supple... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| B5GRoam: A Zero Trust Framework for Secure and Efficient On-Chain B5G Roaming | Mohamed Abdessamed Rezazi, Mouhamed Amine Bouchiha, Ahmed Mounsf Rafik Bendada, Yacine Ghamri-Doudane | 2025-09-19 | 下载 | Roaming settlement in 5G and beyond networks demands secure, efficient, and trustworthy mechanisms for billing reconciliation between mobile operators. |
| ConCap: Practical Network Traffic Generation for (ML- and) Flow-based Intrusion Detection Systems | Miel Verkerken, Laurens D'hooge, Bruno Volckaert, Filip De Turck, Giovanni Apruzzese | 2025-09-19 | 下载 | Network Intrusion Detection Systems (NIDS) have been studied in research for almost four decades. Yet, despite thousands of papers claiming scientific advances, a non-negligible number of recent works... |
| A Robust Scheduling of Cyclic Traffic for Integrated Wired and Wireless Time-Sensitive Networks | Özgür Ozan Kaynak, Andreas Kassler, Andreas Fischer, Ognjen Dobrijevic, Fabio D'Andreagiovanni | 2025-09-19 | 下载 | Time-Sensitive Networking (TSN) is a toolbox of technologies that enable deterministic communication over Ethernet. A key area has been TSN's time-aware traffic shaping (TAS), which supports stringent... |
| Smart Interrupted Routing Based on Multi-head Attention Mask Mechanism-Driven MARL in Software-defined UASNs | Zhenyu Wang, Chuan Lin, Guangjie Han, Shengchao Zhu, Ruoyuan Wu, Tongwei Zhang | 2025-09-19 | 下载 | Routing-driven timely data collection in Underwater Acoustic Sensor Networks (UASNs) is crucial for marine environmental monitoring, disaster warning and underwater resource exploration, etc. |
| Flying Drones to Locate Cyber-Attackers in LoRaWAN Metropolitan Networks | Matteo Repetto, Enrico Cambiaso, Fabio Patrone, Sandro Zappatore | 2025-09-19 | 下载 | Today, many critical services and industrial systems rely on wireless networks for interaction with the IoT, hence becoming vulnerable to a broad number of cyber-threats. |
| Hybrid Deep Learning-Federated Learning Powered Intrusion Detection System for IoT/5G Advanced Edge Computing Network | Rasil Baidar, Sasa Maric, Robert Abbas | 2025-09-19 | 下载 | The exponential expansion of IoT and 5G-Advanced applications has enlarged the attack surface for DDoS, malware, and zero-day intrusions. We propose an intrusion detection system that fuses a convolut... |
| WiFiSim: Simulating WiFi Probe Requests via AOSP Analysis and Device Behavior Modeling | Lifei Hao, Yue Cheng, Min Wang, Bing Jia, Baoqi Huang | 2025-09-19 | 下载 | WiFi probe request (PR) frames encode fine-grained device interactions and serve as a critical basis for mobility and crowd analytics. However, pervasive MAC address randomization and the scarcity of ... |
cs.OS - Operating Systems
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| To Unpack or Not to Unpack: Living with Packers to Enable Dynamic Analysis of Android Apps | Mohammad Hossein Asghari, Lianying Zhao | 2025-09-19 | 下载 | Android apps have become a valuable target for app modifiers and imitators due to its popularity and being trusted with highly sensitive data. |