Skip to content

2025-09-19

cs.AR - Architecture

标题作者发布日期PDF摘要
Belenos: Bottleneck Evaluation to Link Biomechanics to Novel Computing OptimizationsHana Chitsaz, Johnson Umeike, Amirmahdi Namjoo, Babak N. Safa, Bahar Asgari2025-09-19下载Finite element simulations are essential in biomechanics, enabling detailed modeling of tissues and organs. However, architectural inefficiencies in current hardware and software stacks limit performa...
Symbolic Timing Analysis of Digital Circuits Using Analytic Delay FunctionsEra Thaqi, Dennis Eigner, Arman Ferdowsi, Ulrich Schmid2025-09-19下载We propose a novel approach to symbolic timing analysis for digital integrated circuits based on recently developed analytic delay formulas for 2-input NOR, NAND, and Muller-C gates by Ferdowsi et al.
Automatic Microarchitecture-Aware Custom Instruction Design for RISC-V ProcessorsEvgenii Rezunov, Niko Zurstraßen, Lennart M. Reimann, Rainer Leupers2025-09-19下载An Application-Specific Instruction Set Processor(ASIP) is a specialized microprocessor that provides a trade-off between the programmability of a General Purpose Processor (GPP) and the performance a...
CLASS: A Controller-Centric Layout Synthesizer for Dynamic Quantum CircuitsYu Chen, Yilun Zhao, Bing Li, He Li, Mengdi Wang, Yinhe Han, Ying Wang2025-09-19下载Layout Synthesis for Quantum Computing (LSQC) is a critical component of quantum design tools. Traditional LSQC studies primarily focus on optimizing for reduced circuit depth by adopting a device-cen...

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
WarpSpeed: A High-Performance Library for Concurrent GPU Hash TablesHunter McCoy, Prashant Pandey2025-09-19下载GPU hash tables are increasingly used to accelerate data processing, but their limited functionality restricts adoption in large-scale data processing applications.
B5GRoam: A Zero Trust Framework for Secure and Efficient On-Chain B5G RoamingMohamed Abdessamed Rezazi, Mouhamed Amine Bouchiha, Ahmed Mounsf Rafik Bendada, Yacine Ghamri-Doudane2025-09-19下载Roaming settlement in 5G and beyond networks demands secure, efficient, and trustworthy mechanisms for billing reconciliation between mobile operators.
Personalized Federated Heat-Kernel Enhanced Multi-View Clustering via Advanced Tensor Decomposition TechniquesKristina P. Sinaga2025-09-19下载This paper introduces mathematical frameworks that address the challenges of multi-view clustering in federated learning environments. The objective is to integrate optimization techniques based on ne...
Odontoceti: Ultra-Fast DAG Consensus with Two Round CommitmentPreston Vander Vos2025-09-19下载Users of blockchains value scalability, expecting fast confirmations and immediate transaction processing. Odontoceti, the latest in DAG-based consensus, addresses these concerns by prioritizing low l...
Robust LLM Training Infrastructure at ByteDanceBorui Wan, Gaohong Liu, Zuquan Song, Jun Wang, Yun Zhang, Guangming Sheng, Shuguang Wang, Houmin Wei, Chenyuan Wang, Weiqiang Lou, Xi Yang, Mofan Zhang, Kaihua Jiang, Cheng Ren, Xiaoyun Zhi, Menghan Yu, Zhe Nan, Zhuolin Zheng, Baoquan Zhong, Qinlong Wang, Huan Yu, Jinxin Chi, Wang Zhang, Yuhan Li, Zixian Du, Sida Zhao, Yongqiang Zhang, Jingzhe Tang, Zherui Liu, Chuan Wu, Yanghua Peng, Haibin Lin, Wencong Xiao, Xin Liu, Liang Xiang2025-09-19下载The training scale of large language models (LLMs) has reached tens of thousands of GPUs and is still continuously expanding, enabling faster learning of larger models.
How Exclusive are Ethereum Transactions? Evidence from non-winning blocksVabuk Pahari, Andrea Canidio2025-09-19下载We analyze 15,097 blocks proposed for inclusion in Ethereum's blockchain over an eight-minute window on December 3, 2024, during which 38 blocks were added to the chain.
RLinf: Flexible and Efficient Large-scale Reinforcement Learning via Macro-to-Micro Flow TransformationChao Yu, Yuanqing Wang, Zhen Guo, Hao Lin, Si Xu, Hongzhi Zang, Quanlu Zhang, Yongji Wu, Chunyang Zhu, Junhao Hu, Zixiao Huang, Mingjie Wei, Yuqing Xie, Ke Yang, Bo Dai, Zhexuan Xu, Jiakun Du, Xiangyuan Wang, Xu Fu, Letong Shi, Zhihao Liu, Kang Chen, Weilin Liu, Gang Liu, Boxun Li, Jianlei Yang, Zhi Yang, Guohao Dai, Yu Wang2025-09-19下载Reinforcement learning (RL) has demonstrated immense potential in advancing artificial general intelligence, agentic intelligence, and embodied intelligence.
Efficient Pre-Training of LLMs via Topology-Aware Communication Alignment on More Than 9600 GPUsGuoliang He, Youhe Jiang, Wencong Xiao, Kaihua Jiang, Shuguang Wang, Jun Wang, Zixian Du, Zhuo Jiang, Xinlei Zhang, Binhang Yuan, Eiko Yoneki2025-09-19下载The scaling law for large language models (LLMs) depicts that the path towards machine intelligence necessitates training at large scale. Thus, companies continuously build large-scale GPU clusters, a...
ToFU: Transforming How Federated Learning Systems Forget User DataVan-Tuan Tran, Hong-Hanh Nguyen-Le, Quoc-Viet Pham2025-09-19下载Neural networks unintentionally memorize training data, creating privacy risks in federated learning (FL) systems, such as inference and reconstruction attacks on sensitive data.
Angelfish: Leader, DAG, or Anywhere in BetweenQianyu Yu, Giuliano Losa, Nibesh Shrestha, Xuechao Wang2025-09-19下载To maximize performance, many modern blockchain systems rely on eventually-synchronous, Byzantine fault-tolerant (BFT) consensus protocols. Two protocol designs have emerged in this space: protocols t...
FedHK-MVFC: Federated Heat Kernel Multi-View ClusteringKristina P. Sinaga2025-09-19下载In the realm of distributed artificial intelligence (AI) and privacy-focused medical applications, this paper proposes a multi-view clustering framework that links quantum field theory with federated ...
Inference Offloading for Cost-Sensitive Binary Classification at the EdgeVishnu Narayanan Moothedath, Umang Agarwal, Umeshraja N, James Richard Gross, Jaya Prakash Champati, Sharayu Moharir2025-09-19下载We focus on a binary classification problem in an edge intelligence system where false negatives are more costly than false positives. The system has a compact, locally deployed model, which is supple...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
B5GRoam: A Zero Trust Framework for Secure and Efficient On-Chain B5G RoamingMohamed Abdessamed Rezazi, Mouhamed Amine Bouchiha, Ahmed Mounsf Rafik Bendada, Yacine Ghamri-Doudane2025-09-19下载Roaming settlement in 5G and beyond networks demands secure, efficient, and trustworthy mechanisms for billing reconciliation between mobile operators.
ConCap: Practical Network Traffic Generation for (ML- and) Flow-based Intrusion Detection SystemsMiel Verkerken, Laurens D'hooge, Bruno Volckaert, Filip De Turck, Giovanni Apruzzese2025-09-19下载Network Intrusion Detection Systems (NIDS) have been studied in research for almost four decades. Yet, despite thousands of papers claiming scientific advances, a non-negligible number of recent works...
A Robust Scheduling of Cyclic Traffic for Integrated Wired and Wireless Time-Sensitive NetworksÖzgür Ozan Kaynak, Andreas Kassler, Andreas Fischer, Ognjen Dobrijevic, Fabio D'Andreagiovanni2025-09-19下载Time-Sensitive Networking (TSN) is a toolbox of technologies that enable deterministic communication over Ethernet. A key area has been TSN's time-aware traffic shaping (TAS), which supports stringent...
Smart Interrupted Routing Based on Multi-head Attention Mask Mechanism-Driven MARL in Software-defined UASNsZhenyu Wang, Chuan Lin, Guangjie Han, Shengchao Zhu, Ruoyuan Wu, Tongwei Zhang2025-09-19下载Routing-driven timely data collection in Underwater Acoustic Sensor Networks (UASNs) is crucial for marine environmental monitoring, disaster warning and underwater resource exploration, etc.
Flying Drones to Locate Cyber-Attackers in LoRaWAN Metropolitan NetworksMatteo Repetto, Enrico Cambiaso, Fabio Patrone, Sandro Zappatore2025-09-19下载Today, many critical services and industrial systems rely on wireless networks for interaction with the IoT, hence becoming vulnerable to a broad number of cyber-threats.
Hybrid Deep Learning-Federated Learning Powered Intrusion Detection System for IoT/5G Advanced Edge Computing NetworkRasil Baidar, Sasa Maric, Robert Abbas2025-09-19下载The exponential expansion of IoT and 5G-Advanced applications has enlarged the attack surface for DDoS, malware, and zero-day intrusions. We propose an intrusion detection system that fuses a convolut...
WiFiSim: Simulating WiFi Probe Requests via AOSP Analysis and Device Behavior ModelingLifei Hao, Yue Cheng, Min Wang, Bing Jia, Baoqi Huang2025-09-19下载WiFi probe request (PR) frames encode fine-grained device interactions and serve as a critical basis for mobility and crowd analytics. However, pervasive MAC address randomization and the scarcity of ...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
To Unpack or Not to Unpack: Living with Packers to Enable Dynamic Analysis of Android AppsMohammad Hossein Asghari, Lianying Zhao2025-09-19下载Android apps have become a valuable target for app modifiers and imitators due to its popularity and being trusted with highly sensitive data.

基于 VitePress 构建