Skip to content

2026-01-26

cs.AR - Architecture

标题作者发布日期PDF摘要
Is Finer Better? The Limits of Microscaling Formats in Large Language ModelsAndrea Fasoli, Monodeep Kar, Chi-Chun Liu, Swagath Venkataramani, Viji Srinivasan, Leland Chang, Naigang Wang2026-01-26下载Microscaling data formats leverage per-block tensor quantization to enable aggressive model compression with limited loss in accuracy. Unlocking their potential for efficient training and inference ne...
Configurable p-Neurons Using Modular p-BitsSaleh Bunaiyan, Mohammad Alsharif, Abdelrahman S. Abdelrahman, Hesham ElSawy, Suraj S. Cheema, Suhaib A. Fahmy, Kerem Y. Camsari, Feras Al-Dirini2026-01-26下载Probabilistic bits (p-bits) have recently been employed in neural networks (NNs) as stochastic neurons with sigmoidal probabilistic activation functions.
From Fuzzy to Exact: The Halo Architecture for Infinite-Depth Reasoning via Rational ArithmeticHansheng Ren2026-01-26下载The prevailing scaling paradigm of Large Language Models (LLMs) rests on a substrate of "Fuzzy" floating-point arithmetic. To mitigate the inherent instability of this approximate foundation, modern a...
Lifecycle Cost-Effectiveness Modeling for Redundancy-Enhanced Multi-Chiplet ArchitecturesZizhen Liu, Fangzhiyi Wang, Mengdi Wang, Jing Ye, Hayden Kwok-Hay So, Cheng Liu, Huawei Li2026-01-26下载The growing demand for compute-intensive applications has made multi-chiplet architectures a promising alternative to monolithic designs, offering improved scalability and manufacturing flexibility.
RTeAAL Sim: Using Tensor Algebra to Represent and Accelerate RTL Simulation (Extended Version)Yan Zhu, Boru Chen, Christopher W. Fletcher, Nandeeka Nayak2026-01-26下载RTL simulation on CPUs remains a persistent bottleneck in hardware design. State-of-the-art simulators embed the circuit directly into the simulation binary, resulting in long compilation times and ex...
CIM-Tuner: Balancing the Compute and Storage Capacity of SRAM-CIM Accelerator via Hardware-mapping Co-explorationJinwu Chen, Yuhui Shi, He Wang, Zhe Jiang, Jun Yang, Xin Si, Zhenhua Zhu2026-01-26下载As an emerging type of AI computing accelerator, SRAM Computing-In-Memory (CIM) accelerators feature high energy efficiency and throughput. However, various CIM designs and under-explored mapping stra...

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Trustworthy Scheduling for Big Data ApplicationsDimitrios Tomaras, Vana Kalogeraki, Dimitrios Gunopulos2026-01-26下载Recent advances in modern containerized execution environments have resulted in substantial benefits in terms of elasticity and more efficient utilization of computing resources.
Mind the Boundary: Stabilizing Gemini Enterprise A2A via a Cloud Run Hub Across Projects and AccountsTakao Morita2026-01-26下载Enterprise conversational UIs increasingly need to orchestrate heterogeneous backend agents and tools across project and account boundaries in a secure and reproducible way.
On the Bandwidth Consumption of BlockchainsAndrei Lebedev, Vincent Gramoli2026-01-26下载With the advent of blockchain technology, the number of proposals has boomed. The network traffic imposed by these blockchain proposals increases the cost of hosting nodes.
An Adaptive Purification Controller for Quantum Networks: Dynamic Protocol Selection and Multipartite DistillationPranav Kulkarni, Leo Sünkel, Michael Kölle2026-01-26下载Efficient entanglement distribution is a cornerstone of the Quantum Internet. However, physical link parameters such as photon loss, memory coherence time, and gate error rates fluctuate dynamically, ...
Federated Inference for Heterogeneous LLM Communication and CollaborationZihan Chen, Zeshen Li, Howard H. Yang, Tony Q. S. Quek, Jihong Park2026-01-26下载Given the limited performance and efficiency of on-device Large Language Models (LLMs), the collaborations between multiple LLMs enable desirable performance enhancements, in which data, tokens, and m...
Rhea: Detecting Privilege-Escalated Evasive Ransomware Attacks Using Format-Aware Validation in the CloudBeom Heyn Kim, Seok Min Hong, Mohammad Mannan2026-01-26下载Ransomware variants increasingly combine privilege escalation with sophisticated evasion strategies such as intermittent encryption, low-entropy encryption, and imitation attacks.
An Initial Evaluation of Distributed Graph Algorithms using NWGraph and HPXKarame Mohammadiporshokooh, Panagiotis Syskakis, Hartmut Kaiser2026-01-26下载Graphs are central to modeling relationships in scientific computing, data analysis, and AI/ML, but their growing scale can exceed the memory and compute capacity of single nodes, requiring distribute...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
Design and Evaluation of Next-Generation Cellular Networks through Digital and Physical Open and Programmable PlatformsDavide Villa2026-01-26下载The evolution of the Radio Access Network (RAN) in 5G and 6G technologies marks a shift toward open, programmable, and softwarized architectures, driven by the Open RAN paradigm.
Optimizing Network Topology Efficiency: A Resource-Centric Analysis of Non-Blocking ArchitecturesJia Xu Wei, Wei Wei2026-01-26下载In modern network design, "efficiency" is often conflated with raw performance metrics like latency or aggregate throughput. This paper proposes a resource-centric definition of efficiency, isolating ...
Intent2QoS: Language Model-Driven Automation of Traffic Shaping ConfigurationsSudipta Acharya, Burak Kantarci2026-01-26下载Traffic shaping and Quality of Service (QoS) enforcement are critical for managing bandwidth, latency, and fairness in networks. These tasks often rely on low-level traffic control settings, which req...
Benchmarking Machine Learning Models for IoT Malware Detection under Data Scarcity and DriftJake Lyon, Ehsan Saeedizade, Shamik Sengupta2026-01-26下载The rapid expansion of the Internet of Things (IoT) in domains such as smart cities, transportation, and industrial systems has heightened the urgency of addressing their security vulnerabilities.
An ISAC-ready Full-Duplex Backscatter Architecture for the mmWave IoTSkanda Harisha, Jimmy G. D. Hester, Aline Eid2026-01-26下载Achieving long-range, high-rate, concurrent two-way mmWave communication with power-constrained IoT devices is fundamental to scaling future ubiquitous sensing systems, yet the substantial power deman...
AI-Driven Fuzzing for Vulnerability Assessment of 5G Traffic Steering AlgorithmsSeyed Bagher Hashemi Natanzi, Hossein Mohammadi, Bo Tang, Vuk Marojevic2026-01-26下载Traffic Steering (TS) dynamically allocates user traffic across cells to enhance Quality of Experience (QoE), load balance, and spectrum efficiency in 5G networks.
COMETS: Coordinated Multi-Destination Video Transmission with In-Network Rate AdaptationYulong Zhang, Ying Cui, Zili Meng, Abhishek Kumar, Dirk Kutscher2026-01-26下载Large-scale video streaming events attract millions of simultaneous viewers, stressing existing delivery infrastructures. Client-driven adaptation reacts slowly to shared congestion, while server-base...
An LLM-Agent-Based Framework for Age of Information Optimization in Heterogeneous Random Access NetworksFang Liu, Erchao Zhu, Jiedan Tan, Jingwen Tong, Taotao Wang, Shengli Zhang2026-01-26下载With the rapid expansion of the Internet of Things (IoT) and heterogeneous wireless networks, the Age of Information (AoI) has emerged as a critical metric for evaluating the performance of real-time ...
On the Bandwidth Consumption of BlockchainsAndrei Lebedev, Vincent Gramoli2026-01-26下载With the advent of blockchain technology, the number of proposals has boomed. The network traffic imposed by these blockchain proposals increases the cost of hosting nodes.
Integrating HAPS, LEO, and Terrestrial Networks: A Cost-Performance Study for IoT ConnectivityJean Michel de Souza Sant'Ana, Felipe Augusto Tondo, Nurul Huda Mahmood, Aamir Mahmood2026-01-26下载This work evaluates the potential of High-Altitude Platform Stations (HAPS) and Low Earth Orbit (LEO) satellites as alternative or complementary systems to enhance Internet of Things (IoT) connectivit...
CovertComBench: A First Domain-Specific Testbed for LLMs in Wireless Covert CommunicationZhaozhi Liu, Jiaxin Chen, Yuanai Xie, Yuna Jiang, Minrui Xu, Xiao Zhang, Pan Lai, Zan Zhou2026-01-26下载The integration of Large Language Models (LLMs) into wireless networks presents significant potential for automating system design. However, unlike conventional throughput maximization, Covert Communi...
Validation of a Software-Defined 100-Gb/s RDMA Streaming Architecture for Ultrafast Optoacoustic and Ultrasound ImagingFederico Villani, Christian Vogt, Luca Specht, Jero Schmid, Xiang Liu, Andrea Cossettini, Daniel Razansky, Luca Benini2026-01-26下载Optoacoustic (OA) imaging has emerged as a powerful investigation tool, with demonstrated applicability in oncology, neuroscience, and cardiovascular biology.
A Mechanical Wi-Fi Antenna Device for Automatic Orientation Tuning with Bayesian OptimizationAkihito Taya, Yuuki Nishiyama, Kaoru Sezaki2026-01-26下载Wi-Fi access points have been widely deployed in homes, offices, and public spaces. Some APs allow users to adjust the antenna orientation to improve communication performance by optimizing antenna po...
Vision-Language-Model-Guided Differentiable Ray Tracing for Fast and Accurate Multi-Material RF Parameter EstimationZerui Kang, Yishen Lim, Zhouyou Gu, Seung-Woo Ko, Tony Q. S. Quek, Jihong Park2026-01-26下载Accurate radio-frequency (RF) material parameters are essential for electromagnetic digital twins in 6G systems, yet gradient-based inverse ray tracing (RT) remains sensitive to initialization and cos...
Contact Plan Design For Optical Interplanetary CommunicationsJason Gerard, Juan A. Fraire, Sandra Cespedes2026-01-26下载Space exploration missions generate rapidly increasing volumes of scientific telemetry that far exceed the capacity of today's manually scheduled, RF-based deep-space infrastructure.
Accelerating Update Broadcasts Over LoRaWAN Downlink via D2D CooperationAnshika Singh, Siddhartha S. Borkotoky2026-01-26下载Broadcast distribution of updates (e.g., security patches, machine learning models) from a server to end devices (EDs) is a critical requirement in the Internet of Things (IoT).
Diffusion Model-based Reinforcement Learning for Version Age of Information Scheduling: Average and Tail-Risk-Sensitive ControlHaoyuan Pan, Sizhao Chen, Zhaorui Wang, Tse-Tin Chan2026-01-26下载Ensuring timely and semantically accurate information delivery is critical in real-time wireless systems. While Age of Information (AoI) quantifies temporal freshness, Version Age of Information (VAoI...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
Rhea: Detecting Privilege-Escalated Evasive Ransomware Attacks Using Format-Aware Validation in the CloudBeom Heyn Kim, Seok Min Hong, Mohammad Mannan2026-01-26下载Ransomware variants increasingly combine privilege escalation with sophisticated evasion strategies such as intermittent encryption, low-entropy encryption, and imitation attacks.

cs.PF - Performance

标题作者发布日期PDF摘要
KeyMemRT Compiler and Runtime: Unlocking Memory-Scalable FHEEymen Ünay, Björn Franke, Jackson Woodruff2026-01-26下载Fully Homomorphic Encryption (FHE) enables privacy preserving computation but it suffers from high latency and memory consumption. The computations are secured with special keys called rotation keys w...
On the Bandwidth Consumption of BlockchainsAndrei Lebedev, Vincent Gramoli2026-01-26下载With the advent of blockchain technology, the number of proposals has boomed. The network traffic imposed by these blockchain proposals increases the cost of hosting nodes.

基于 VitePress 构建