Skip to content

2025-12-06

cs.AR - Architecture

标题作者发布日期PDF摘要
Approximate Multiplier Induced Error Propagation in Deep Neural NetworksA. M. H. H. Alahakoon, Hassaan Saadat, Darshana Jayasinghe, Sri Parameswaran2025-12-06下载Deep Neural Networks (DNNs) rely heavily on dense arithmetic operations, motivating the use of Approximate Multipliers (AxMs) to reduce energy consumption in hardware accelerators.
A 33.6-136.2 TOPS/W Nonlinear Analog Computing-In-Memory Macro for Multi-bit LSTM Accelerator in 65 nm CMOSJunyi Yang, Xinyu Luo, Ye Ke, Zheng Wang, Hongyang Shang, Shuai Dong, Zhengnan Fu, Xiaofeng Yang, Hongjie Liu, Arindam Basu2025-12-06下载The energy efficiency of analog computing-in-memory (ACIM) accelerator for recurrent neural networks, particularly long short-term memory (LSTM) network, is limited by the high proportion of nonlinear...
An Energy-Efficient RFET-Based Stochastic Computing Neural Network AcceleratorSheng Lu, Qianhou Qu, Sungyong Jung, Qilian Liang, Chenyun Pan2025-12-06下载Stochastic computing (SC) offers significant reductions in hardware complexity for traditional convolutional neural networks(CNNs). However, despite its advantages, stochastic computing neural network...
DUET: Agentic Design Understanding via Experimentation and TestingGus Henry Smith, Sandesh Adhikary, Vineet Thumuluri, Karthik Suresh, Vivek Pandit, Kartik Hegde, Hamid Shojaei, Chandra Bhagavatula2025-12-06下载AI agents powered by large language models (LLMs) are being used to solve increasingly complex software engineering challenges, but struggle with hardware design tasks.

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
A-3PO: Accelerating Asynchronous LLM Training with Staleness-aware Proximal Policy ApproximationXiaocan Li, Shiliang Wu, Zheng Shen2025-12-06下载Decoupled PPO has been a successful reinforcement learning (RL) algorithm to deal with the high data staleness under the asynchronous RL setting.
Vec-LUT: Vector Table Lookup for Parallel Ultra-Low-Bit LLM Inference on Edge DevicesXiangyu Li, Chengyu Yin, Weijun Wang, Jianyu Wei, Ting Cao, Yunxin Liu2025-12-06下载Large language models (LLMs) are increasingly deployed on edge devices. To meet strict resource constraints, real-world deployment has pushed LLM quantization from 8-bit to 4-bit, 2-bit, and now 1.
A study of the spectrum resource leasing method based on ERC4907 extensionZhiming Liang, Bin Chen, Litao Ye, Chen Sun, Shuo Wang, Zhe Peng2025-12-06下载The ERC4907 standard enables rentable Non-Fungible Tokens (NFTs) but is limited to single-user, single-time-slot authorization, which severely limits its applicability and efficiency in decentralized ...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
Programmable and GPU-Accelerated Edge Inference for Real-Time ISAC on NVIDIA ARC-OTADavide Villa, Mauro Belgiovine, Nicholas Hedberg, Michele Polese, Chris Dick, Tommaso Melodia2025-12-06下载The transition of cellular networks to (i) software-based systems on commodity hardware and (ii) platforms for services beyond connectivity introduces critical system-level challenges.
Web Technologies Security in the AI Era: A Survey of CDN-Enhanced DefensesMehrab Hosain, Sabbir Alom Shuvo, Matthew Ogbe, Md Shah Jalal Mazumder, Yead Rahman, Md Azizul Hakim, Anukul Pandey2025-12-06下载The modern web stack, which is dominated by browser-based applications and API-first backends, now operates under an adversarial equilibrium where automated, AI-assisted attacks evolve continuously.

cs.OS - Operating Systems

标题作者发布日期PDF摘要
Defending Event-Triggered Systems against Out-of-Envelope EnvironmentsMarcus Völp, Mohammad Ibrahim Alkoudsi, Azin Bayrami Asl, Kristin Krüger, Julio Rodrigues Mendonca da Neto, Gerhard Fohler2025-12-06下载The design of real-time systems is based on assumptions about environmental conditions in which they will operate. We call this their safe operational envelope. Violation of these assumptions, i.e.

cs.PF - Performance

标题作者发布日期PDF摘要
Web Technologies Security in the AI Era: A Survey of CDN-Enhanced DefensesMehrab Hosain, Sabbir Alom Shuvo, Matthew Ogbe, Md Shah Jalal Mazumder, Yead Rahman, Md Azizul Hakim, Anukul Pandey2025-12-06下载The modern web stack, which is dominated by browser-based applications and API-first backends, now operates under an adversarial equilibrium where automated, AI-assisted attacks evolve continuously.

基于 VitePress 构建