Skip to content

2026-02-18

cs.AR - Architecture

标题作者发布日期PDF摘要
GDEV-AI: A Generalized Evaluation of Deep Learning Inference Scaling and Architectural SaturationKathiravan Palaniappan2026-02-18下载The deployment of deep learning inference in production environments continues to grow, where throughput, latency, and hardware efficiency are critical.
Data-Rate-Aware High-Speed CNN Inference on FPGAsTobias Habermann, Martin Kumm2026-02-18下载Dataflow-based CNN accelerators on FPGAs achieve low latency and high throughput by mapping computations of each layer directly to corresponding hardware units.
Performance Analysis of Edge and In-Sensor AI Processors: A Comparative ReviewLuigi Capogrosso, Pietro Bonazzi, Michele Magno2026-02-18下载This review examines the rapidly evolving landscape of ultra-low-power edge processors, covering heterogeneous Systems-on-Chips (SoCs), neural accelerators, near-sensor and in-sensor architectures, an...
Energy-Efficient p-Bit-Based Fully-Connected Quantum-Inspired Simulated Annealer with Dual BRAM ArchitectureNaoya Onizawa, Taiga Kubuta, Duckgyu Shin, Takahiro Hanyu2026-02-18下载Probabilistic bits (p-bits) offer an energy-efficient hardware abstraction for stochastic optimization; however, existing p-bit-based simulated annealing accelerators suffer from poor scalability and ...

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Heterogeneous Federated Fine-Tuning with Parallel One-Rank AdaptationZikai Zhang, Rui Hu, Jiahao Xu2026-02-18下载Large Language Models (LLMs) have demonstrated remarkable effectiveness in adapting to downstream tasks through fine-tuning. Federated Learning (FL) extends this capability by enabling collaborative f...
Read-Modify-Writable Snapshots from Read/Write operationsArmando Castañeda, Braulio Ramses Hernández Martínez2026-02-18下载In the context of asynchronous concurrent shared-memory systems, a snapshot algorithm allows failure-prone processes to concurrently and atomically write on the entries of a shared array MEM , and als...
FlowPrefill: Decoupling Preemption from Prefill Scheduling Granularity to Mitigate Head-of-Line Blocking in LLM ServingChia-chi Hsieh, Zan Zong, Xinyang Chen, Jianjiang Li, Jidong Zhai, Lijie Wen2026-02-18下载The growing demand for large language models (LLMs) requires serving systems to handle many concurrent requests with diverse service level objectives (SLOs).
SRFed: Mitigating Poisoning Attacks in Privacy-Preserving Federated Learning with Heterogeneous DataYiwen Lu2026-02-18下载Federated Learning (FL) enables collaborative model training without exposing clients' private data, and has been widely adopted in privacy-sensitive scenarios.
Privacy-Aware Split Inference with Speculative Decoding for Large Language Models over Wide-Area NetworksMichael Cunningham2026-02-18下载We present a practical system for privacy-aware large language model (LLM) inference that splits a transformer between a trusted local GPU and an untrusted cloud GPU, communicating only intermediate a...
How Reliable is Your Service at the Extreme Edge? Analytical Modeling of Computational ReliabilityMHD Saria Allahham, Hossam S. Hassanein2026-02-18下载Extreme Edge Computing (XEC) distributes streaming workloads across consumer-owned devices, exploiting their proximity to users and ubiquitous availability.
Load Balanced Parallel Node Generation for Meshless Numerical MethodsJon Vehovar, Miha Rot, Matjaž Depolli, Gregor Kosec2026-02-18下载Meshless methods are used to solve partial differential equations by approximating differential operators at a node as a weighted sum of values at its neighbours.
push0: Scalable and Fault-Tolerant Orchestration for Zero-Knowledge Proof GenerationMohsen Ahmadvand, Rok Pajnič, Ching-Lun Chiu2026-02-18下载Zero-knowledge proof generation imposes stringent timing and reliability constraints on blockchain systems. For ZK-rollups, delayed proofs cause finality lag and economic loss; for Ethereum's emerging...
DistributedEstimator: Distributed Training of Quantum Neural Networks via Circuit CuttingPrabhjot Singh, Adel N. Toosi, Rajkumar Buyya2026-02-18下载Circuit cutting decomposes a large quantum circuit into a collection of smaller subcircuits. The outputs of these subcircuits are then classically reconstructed to recover the original expectation val...
Near-optimal population protocols on bounded-degree treesJoel Rybicki, Jakob Solnerzik, Robin Vacus2026-02-18下载We investigate space-time trade-offs for population protocols in sparse interaction graphs. In complete interaction graphs, optimal space-time trade-offs are known for the leader election and exact ma...
Closing Africa's Early Warning Gap: AI Weather Forecasting for Disaster PreventionQness Ndlovu2026-02-18下载In January 2026, torrential rains killed 200-300 people across Southern Africa, exposing a critical reality: 60% of the continent lacks effective early warning systems due to infrastructure costs.
LLM-Driven Intent-Based Privacy-Aware Orchestration Across the Cloud-Edge ContinuumZijie Su, Muhammed Tawfiqul Islam, Mohammad Goudarzi, Adel N. Toosi2026-02-18下载With the rapid advancement of large language models (LLMs), efficiently serving LLM inference under limited GPU resources has become a critical challenge.

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
HyRA: A Hybrid Resource Allocation Framework for RAN SlicingMohammad Zangooei, Bo Sun, Noura Limam, Raouf Boutaba2026-02-18下载The advent of 5G and the emergence of 6G networks demand unprecedented flexibility and efficiency in Radio Access Network (RAN) resource management to satisfy diverse service-level agreements (SLAs).
The Role of Common Randomness Replication in Symmetric PIR on Graph-Based Replicated SystemsShreya Meel, Sennur Ulukus2026-02-18下载In symmetric private information retrieval (SPIR), a user communicates with multiple servers to retrieve from them a message in a database, while not revealing the message index to any individual serv...
Fast-MCS: A Scalable Open-Source Tool to Find Minimal Cut SetsShakthivelu Janardhanan, Yaxuan Chen, Wolfgang Kellerer, Carmen Mas-Machuca2026-02-18下载A network is represented as a graph consisting of nodes and edges. A cut set for a source-destination pair in a network is a set of elements that, when failed, cause the source-destination pair to los...
Energy Efficiency Testing and Modeling of a Commercial O-RAN SystemN. K. Shankaranarayanan, Akash Gupta, Zhuohuan Li, Sarat Puthenpura, Jens Sohn, Ivan Seskar, Sreenidhi Parthasarathy, Wilfred Luiz, Jeffrey Williamson, VenkataReddy Varra, Prasanthi Maddala, Alex Stancu2026-02-18下载Network energy efficiency is of critical importance to mobile network operators for economic and ecological reasons. The advent of the O-RAN architecture has brought disaggregation and virtualization,...
Attending to Routers Aids Indoor Wireless LocalizationAyush Roy, Tahsin Fuad Hassan, Roshan Ayyalasomayajula, Vishnu Suresh Lokhande2026-02-18下载Modern machine learning-based wireless localization using Wi-Fi signals continues to face significant challenges in achieving groundbreaking performance across diverse environments.
Towards Secure and Interoperable Data Spaces for 6G: The 6G-DALI ApproachDimitrios Amaxilatis, Themistoklis Sarantakos, Nikolaos Tsironis, Vasileios Theodorou, Christos Verikoukis2026-02-18下载The next generation of mobile networks, 6G, is expected to enable data-driven services at unprecedented scale and complexity, with stringent requirements for trust, interoperability, and automation.
Scalable Base Station Configuration via Bayesian Optimization with Block Coordinate DescentKakeru Takamori, Koya Sato2026-02-18下载This paper proposes a scalable Bayesian optimization (BO) framework for dense base-station (BS) configuration design. BO can find an optimal BS configuration by iterating parameter search, channel sim...
A Multihop Rendezvous Protocol for Cognitive Radio-based Emergency Response NetworkZahid Ali, Saritha Unnikrishnan, Eoghan Furey, Ian McLoughlin, Saim Ghafoor2026-02-18下载This paper addresses the challenge of efficient rendezvous in multihop cognitive radio networks, where existing channel-hopping algorithms designed for single-hop scenarios incur increased delay and c...
How Reliable is Your Service at the Extreme Edge? Analytical Modeling of Computational ReliabilityMHD Saria Allahham, Hossam S. Hassanein2026-02-18下载Extreme Edge Computing (XEC) distributes streaming workloads across consumer-owned devices, exploiting their proximity to users and ubiquitous availability.
Multi-Agent Meta-Advisor for UAV Fleet Trajectory Design in Vehicular NetworksLeonardo Spampinato, Lorenzo Mario Amorosa, Enrico Testi, Chiara Buratti, Riccardo Marini2026-02-18下载Future vehicular networks require continuous connectivity to serve highly mobile users in urban environments. To mitigate the coverage limitations of fixed terrestrial macro base stations (MBS) under ...
Periodic Scheduling of Grouped Time-Triggered Signals on a Single ResourceJosef Grus, Zdeněk Hanzálek, Claire Hanen2026-02-18下载Time-triggered messages are of crucial importance in modern communication networks. Offline-generated schedules, which specify start times for periodic messages, enable us to achieve deterministic beh...
Collaborative Safe Bayesian OptimizationAlina Castell Blasco, Maxime Bouton2026-02-18下载Mobile networks require safe optimization to adapt to changing conditions in traffic demand and signal transmission quality, in addition to improving service performance metrics.
Auction-Based RIS Allocation With DRL: Controlling the Cost-Performance Trade-OffMartin Mark Zan, Stefan Schwarz2026-02-18下载We study the allocation of reconfigurable intelligent surfaces (RISs) in a multi-cell wireless network, where base stations compete for control of shared RIS units deployed at the cell edges.
Edge Learning via Federated Split Decision Transformers for Metaverse Resource AllocationFatih Temiz, Shavbo Salehi, Melike Erol-Kantarci2026-02-18下载Mobile edge computing (MEC) based wireless metaverse services offer an untethered, immersive experience to users, where the superior quality of experience (QoE) needs to be achieved under stringent la...
Collection: UAV-Based Wireless Multi-modal Measurements from AERPAW Autonomous Data Mule (AADM) Challenge in Digital Twin and Real-World EnvironmentsMd Sharif Hossen, Cole Dickerson, Ozgur Ozdemir, Anil Gurses, Mohamed Rabeek Sarbudeen, Thomas Zajkowski, Ahmed Manavi Alam, Everett Tucker, William Bjorndahl, Fred Solis, Sadaf Javed, Anirudh Kamath, Xiangyao Tang, Joarder Jafor Sadique, Kevin Liu Hermstein, Kaies Al Mahmud, Jose Angel Sanchez Viloria, Skyler Hawkins, Yuqing Cui, Annoy Dey, Yuchen Liu, Ali Gurbuz, Joseph Camp, Rizwan Ahmad, Jacobus van der Merwe, Ahmed Ibrahim Mohamed, Gil Zussman, Mehmet Kurum, Namuduri Kamesh, Zhangyu Guan, Dimitris Pados, George Sklivanitis, Ismail Guvenc, Mihail Sichitiu, Magreth Mushi, Rudra Dutta2026-02-18下载In this work, we present an unmanned aerial vehicle (UAV) wireless dataset collected as part of the AERPAW Autonomous Aerial Data Mule (AADM) challenge, organized by the NSF Aerial Experimentation and...
Managing Credible Anonymous Identities in Web 3.0 Services: A Scalable On-Chain Admission Framework with Recursive Proof AggregationZibin Lin, Taotao Wang, Shengli Zhang, Long Shi, Shui Yu2026-02-18下载Open Web 3.0 platforms increasingly operate as \emph{service ecosystems} (e.g., DeFi, DAOs, and decentralized social applications) where \emph{admission control} and \emph{account provisioning} must b...

cs.PF - Performance

标题作者发布日期PDF摘要
GDEV-AI: A Generalized Evaluation of Deep Learning Inference Scaling and Architectural SaturationKathiravan Palaniappan2026-02-18下载The deployment of deep learning inference in production environments continues to grow, where throughput, latency, and hardware efficiency are critical.

基于 VitePress 构建