Appearance
2026-01-26
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Is Finer Better? The Limits of Microscaling Formats in Large Language Models | Andrea Fasoli, Monodeep Kar, Chi-Chun Liu, Swagath Venkataramani, Viji Srinivasan, Leland Chang, Naigang Wang | 2026-01-26 | 下载 | Microscaling data formats leverage per-block tensor quantization to enable aggressive model compression with limited loss in accuracy. Unlocking their potential for efficient training and inference ne... |
| Configurable p-Neurons Using Modular p-Bits | Saleh Bunaiyan, Mohammad Alsharif, Abdelrahman S. Abdelrahman, Hesham ElSawy, Suraj S. Cheema, Suhaib A. Fahmy, Kerem Y. Camsari, Feras Al-Dirini | 2026-01-26 | 下载 | Probabilistic bits (p-bits) have recently been employed in neural networks (NNs) as stochastic neurons with sigmoidal probabilistic activation functions. |
| From Fuzzy to Exact: The Halo Architecture for Infinite-Depth Reasoning via Rational Arithmetic | Hansheng Ren | 2026-01-26 | 下载 | The prevailing scaling paradigm of Large Language Models (LLMs) rests on a substrate of "Fuzzy" floating-point arithmetic. To mitigate the inherent instability of this approximate foundation, modern a... |
| Lifecycle Cost-Effectiveness Modeling for Redundancy-Enhanced Multi-Chiplet Architectures | Zizhen Liu, Fangzhiyi Wang, Mengdi Wang, Jing Ye, Hayden Kwok-Hay So, Cheng Liu, Huawei Li | 2026-01-26 | 下载 | The growing demand for compute-intensive applications has made multi-chiplet architectures a promising alternative to monolithic designs, offering improved scalability and manufacturing flexibility. |
| RTeAAL Sim: Using Tensor Algebra to Represent and Accelerate RTL Simulation (Extended Version) | Yan Zhu, Boru Chen, Christopher W. Fletcher, Nandeeka Nayak | 2026-01-26 | 下载 | RTL simulation on CPUs remains a persistent bottleneck in hardware design. State-of-the-art simulators embed the circuit directly into the simulation binary, resulting in long compilation times and ex... |
| CIM-Tuner: Balancing the Compute and Storage Capacity of SRAM-CIM Accelerator via Hardware-mapping Co-exploration | Jinwu Chen, Yuhui Shi, He Wang, Zhe Jiang, Jun Yang, Xin Si, Zhenhua Zhu | 2026-01-26 | 下载 | As an emerging type of AI computing accelerator, SRAM Computing-In-Memory (CIM) accelerators feature high energy efficiency and throughput. However, various CIM designs and under-explored mapping stra... |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Trustworthy Scheduling for Big Data Applications | Dimitrios Tomaras, Vana Kalogeraki, Dimitrios Gunopulos | 2026-01-26 | 下载 | Recent advances in modern containerized execution environments have resulted in substantial benefits in terms of elasticity and more efficient utilization of computing resources. |
| Mind the Boundary: Stabilizing Gemini Enterprise A2A via a Cloud Run Hub Across Projects and Accounts | Takao Morita | 2026-01-26 | 下载 | Enterprise conversational UIs increasingly need to orchestrate heterogeneous backend agents and tools across project and account boundaries in a secure and reproducible way. |
| On the Bandwidth Consumption of Blockchains | Andrei Lebedev, Vincent Gramoli | 2026-01-26 | 下载 | With the advent of blockchain technology, the number of proposals has boomed. The network traffic imposed by these blockchain proposals increases the cost of hosting nodes. |
| An Adaptive Purification Controller for Quantum Networks: Dynamic Protocol Selection and Multipartite Distillation | Pranav Kulkarni, Leo Sünkel, Michael Kölle | 2026-01-26 | 下载 | Efficient entanglement distribution is a cornerstone of the Quantum Internet. However, physical link parameters such as photon loss, memory coherence time, and gate error rates fluctuate dynamically, ... |
| Federated Inference for Heterogeneous LLM Communication and Collaboration | Zihan Chen, Zeshen Li, Howard H. Yang, Tony Q. S. Quek, Jihong Park | 2026-01-26 | 下载 | Given the limited performance and efficiency of on-device Large Language Models (LLMs), the collaborations between multiple LLMs enable desirable performance enhancements, in which data, tokens, and m... |
| Rhea: Detecting Privilege-Escalated Evasive Ransomware Attacks Using Format-Aware Validation in the Cloud | Beom Heyn Kim, Seok Min Hong, Mohammad Mannan | 2026-01-26 | 下载 | Ransomware variants increasingly combine privilege escalation with sophisticated evasion strategies such as intermittent encryption, low-entropy encryption, and imitation attacks. |
| An Initial Evaluation of Distributed Graph Algorithms using NWGraph and HPX | Karame Mohammadiporshokooh, Panagiotis Syskakis, Hartmut Kaiser | 2026-01-26 | 下载 | Graphs are central to modeling relationships in scientific computing, data analysis, and AI/ML, but their growing scale can exceed the memory and compute capacity of single nodes, requiring distribute... |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Design and Evaluation of Next-Generation Cellular Networks through Digital and Physical Open and Programmable Platforms | Davide Villa | 2026-01-26 | 下载 | The evolution of the Radio Access Network (RAN) in 5G and 6G technologies marks a shift toward open, programmable, and softwarized architectures, driven by the Open RAN paradigm. |
| Optimizing Network Topology Efficiency: A Resource-Centric Analysis of Non-Blocking Architectures | Jia Xu Wei, Wei Wei | 2026-01-26 | 下载 | In modern network design, "efficiency" is often conflated with raw performance metrics like latency or aggregate throughput. This paper proposes a resource-centric definition of efficiency, isolating ... |
| Intent2QoS: Language Model-Driven Automation of Traffic Shaping Configurations | Sudipta Acharya, Burak Kantarci | 2026-01-26 | 下载 | Traffic shaping and Quality of Service (QoS) enforcement are critical for managing bandwidth, latency, and fairness in networks. These tasks often rely on low-level traffic control settings, which req... |
| Benchmarking Machine Learning Models for IoT Malware Detection under Data Scarcity and Drift | Jake Lyon, Ehsan Saeedizade, Shamik Sengupta | 2026-01-26 | 下载 | The rapid expansion of the Internet of Things (IoT) in domains such as smart cities, transportation, and industrial systems has heightened the urgency of addressing their security vulnerabilities. |
| An ISAC-ready Full-Duplex Backscatter Architecture for the mmWave IoT | Skanda Harisha, Jimmy G. D. Hester, Aline Eid | 2026-01-26 | 下载 | Achieving long-range, high-rate, concurrent two-way mmWave communication with power-constrained IoT devices is fundamental to scaling future ubiquitous sensing systems, yet the substantial power deman... |
| AI-Driven Fuzzing for Vulnerability Assessment of 5G Traffic Steering Algorithms | Seyed Bagher Hashemi Natanzi, Hossein Mohammadi, Bo Tang, Vuk Marojevic | 2026-01-26 | 下载 | Traffic Steering (TS) dynamically allocates user traffic across cells to enhance Quality of Experience (QoE), load balance, and spectrum efficiency in 5G networks. |
| COMETS: Coordinated Multi-Destination Video Transmission with In-Network Rate Adaptation | Yulong Zhang, Ying Cui, Zili Meng, Abhishek Kumar, Dirk Kutscher | 2026-01-26 | 下载 | Large-scale video streaming events attract millions of simultaneous viewers, stressing existing delivery infrastructures. Client-driven adaptation reacts slowly to shared congestion, while server-base... |
| An LLM-Agent-Based Framework for Age of Information Optimization in Heterogeneous Random Access Networks | Fang Liu, Erchao Zhu, Jiedan Tan, Jingwen Tong, Taotao Wang, Shengli Zhang | 2026-01-26 | 下载 | With the rapid expansion of the Internet of Things (IoT) and heterogeneous wireless networks, the Age of Information (AoI) has emerged as a critical metric for evaluating the performance of real-time ... |
| On the Bandwidth Consumption of Blockchains | Andrei Lebedev, Vincent Gramoli | 2026-01-26 | 下载 | With the advent of blockchain technology, the number of proposals has boomed. The network traffic imposed by these blockchain proposals increases the cost of hosting nodes. |
| Integrating HAPS, LEO, and Terrestrial Networks: A Cost-Performance Study for IoT Connectivity | Jean Michel de Souza Sant'Ana, Felipe Augusto Tondo, Nurul Huda Mahmood, Aamir Mahmood | 2026-01-26 | 下载 | This work evaluates the potential of High-Altitude Platform Stations (HAPS) and Low Earth Orbit (LEO) satellites as alternative or complementary systems to enhance Internet of Things (IoT) connectivit... |
| CovertComBench: A First Domain-Specific Testbed for LLMs in Wireless Covert Communication | Zhaozhi Liu, Jiaxin Chen, Yuanai Xie, Yuna Jiang, Minrui Xu, Xiao Zhang, Pan Lai, Zan Zhou | 2026-01-26 | 下载 | The integration of Large Language Models (LLMs) into wireless networks presents significant potential for automating system design. However, unlike conventional throughput maximization, Covert Communi... |
| Validation of a Software-Defined 100-Gb/s RDMA Streaming Architecture for Ultrafast Optoacoustic and Ultrasound Imaging | Federico Villani, Christian Vogt, Luca Specht, Jero Schmid, Xiang Liu, Andrea Cossettini, Daniel Razansky, Luca Benini | 2026-01-26 | 下载 | Optoacoustic (OA) imaging has emerged as a powerful investigation tool, with demonstrated applicability in oncology, neuroscience, and cardiovascular biology. |
| A Mechanical Wi-Fi Antenna Device for Automatic Orientation Tuning with Bayesian Optimization | Akihito Taya, Yuuki Nishiyama, Kaoru Sezaki | 2026-01-26 | 下载 | Wi-Fi access points have been widely deployed in homes, offices, and public spaces. Some APs allow users to adjust the antenna orientation to improve communication performance by optimizing antenna po... |
| Vision-Language-Model-Guided Differentiable Ray Tracing for Fast and Accurate Multi-Material RF Parameter Estimation | Zerui Kang, Yishen Lim, Zhouyou Gu, Seung-Woo Ko, Tony Q. S. Quek, Jihong Park | 2026-01-26 | 下载 | Accurate radio-frequency (RF) material parameters are essential for electromagnetic digital twins in 6G systems, yet gradient-based inverse ray tracing (RT) remains sensitive to initialization and cos... |
| Contact Plan Design For Optical Interplanetary Communications | Jason Gerard, Juan A. Fraire, Sandra Cespedes | 2026-01-26 | 下载 | Space exploration missions generate rapidly increasing volumes of scientific telemetry that far exceed the capacity of today's manually scheduled, RF-based deep-space infrastructure. |
| Accelerating Update Broadcasts Over LoRaWAN Downlink via D2D Cooperation | Anshika Singh, Siddhartha S. Borkotoky | 2026-01-26 | 下载 | Broadcast distribution of updates (e.g., security patches, machine learning models) from a server to end devices (EDs) is a critical requirement in the Internet of Things (IoT). |
| Diffusion Model-based Reinforcement Learning for Version Age of Information Scheduling: Average and Tail-Risk-Sensitive Control | Haoyuan Pan, Sizhao Chen, Zhaorui Wang, Tse-Tin Chan | 2026-01-26 | 下载 | Ensuring timely and semantically accurate information delivery is critical in real-time wireless systems. While Age of Information (AoI) quantifies temporal freshness, Version Age of Information (VAoI... |
cs.OS - Operating Systems
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Rhea: Detecting Privilege-Escalated Evasive Ransomware Attacks Using Format-Aware Validation in the Cloud | Beom Heyn Kim, Seok Min Hong, Mohammad Mannan | 2026-01-26 | 下载 | Ransomware variants increasingly combine privilege escalation with sophisticated evasion strategies such as intermittent encryption, low-entropy encryption, and imitation attacks. |
cs.PF - Performance
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| KeyMemRT Compiler and Runtime: Unlocking Memory-Scalable FHE | Eymen Ünay, Björn Franke, Jackson Woodruff | 2026-01-26 | 下载 | Fully Homomorphic Encryption (FHE) enables privacy preserving computation but it suffers from high latency and memory consumption. The computations are secured with special keys called rotation keys w... |
| On the Bandwidth Consumption of Blockchains | Andrei Lebedev, Vincent Gramoli | 2026-01-26 | 下载 | With the advent of blockchain technology, the number of proposals has boomed. The network traffic imposed by these blockchain proposals increases the cost of hosting nodes. |