Skip to content

2026-04-09

cs.AR - Architecture

标题作者发布日期PDF摘要
Memory Wall is not gone: A Critical Outlook on Memory Architecture in Digital Neuromorphic ComputingAmirreza Yousefzadeh, Sameed Sohail, Ana Lucia Varbanescu2026-04-09下载The rapid advancement of neuromorphic technology aims to address the memory wall challenge inherent in conventional von Neumann architectures.
PG-MDP: Profile-Guided Memory Dependence Prediction for Area-Constrained CoresLuke Panayi, Johan Jino, Sebastian S. Kim, Alberto Ros, Alexandra Jimborean, Jim Whittaker, Martin Berger, Paul Kelly2026-04-09下载Memory Dependence Prediction (MDP) is a speculative technique to determine which stores, if any, a given load will depend on. Area-constrained cores are increasingly relevant in various applications s...
Wattlytics: A Web Platform for Co-Optimizing Performance, Energy, and TCO in HPC ClustersAyesha Afzal, Georg Hager, Gerhard Wellein2026-04-09下载The escalating computational demands and energy footprint of GPU-accelerated computing systems complicate informed design and operational decisions.
A Full-Stack Performance Evaluation Infrastructure for 3D-DRAM-based LLM AcceleratorsCong Li, Chenhao Xue, Yi Ren, Xiping Dong, Yu Cheng, Yinbo Hu, Fujun Bai, Yixin Guo, Xiping Jiang, Qiang Wu, Zhi Yang, Zhe Cheng, Yuan Xie, Guangyu Sun2026-04-09下载Large language models (LLMs) exhibit memory-intensive behavior during decoding, making it a key bottleneck in LLM inference. To accelerate decoding execution, hybrid-bonding-based 3D-DRAM has been ado...
The Hyperscale Lottery: How State-Space Models Have Sacrificed Edge EfficiencyRobin Geens, Jonas De Schouwer, Marian Verhelst, Thierry Tambe2026-04-09下载The Hardware Lottery posits that research directions are dictated by available silicon compute platforms. We identify a derivative phenomenon, the Hyperscale Lottery, where model architectures are opt...
Optimization of 32-bit Unsigned Division by Constants on 64-bit TargetsShigeo Mitsunari, Takashi Hoshino2026-04-09下载Granlund and Montgomery proposed an optimization method for unsigned integer division by constants [3]. Their method (called the GM method in this paper) was further improved in part by works such as ...
Reduced-Mass Orbital AI Inference via Integrated Solar, Compute, and Radiator PanelsStephen Gaalema, Samuel Indyk, Clinton Staley2026-04-09下载We describe and analyze a distributed compute architecture for SSO computational satellites that can potentially provide >100 kW compute power per launched metric ton (including deployment and statio...

cs.DC - Distributed, Parallel, and Cluster Computing

标题作者发布日期PDF摘要
Sensor Placement for Tsunami Early Warning via Large-Scale Bayesian Optimal Experimental DesignSreeram Venkat, Stefan Henneking, Omar Ghattas2026-04-09下载Real-time tsunami early warning relies on distributed sensor networks to infer seismic sources and seafloor motion. Optimizing these networks via Bayesian optimal experimental design (OED) is exceptio...
Taming GPU Underutilization via Static Partitioning and Fine-grained CPU OffloadingGabin Schieffer, Ruimin Shi, Jie Ren, Ivy Peng2026-04-09下载Advances in GPU compute throughput and memory capacity brings significant opportunities to a wide range of workloads. However, efficiently utilizing these resources remains challenging, particularly b...
NL-CPS: Reinforcement Learning-Based Kubernetes Control Plane Placement in Multi-Region ClustersSajid Alam, Amjad Ullah, Ze Wang2026-04-09下载The placement of Kubernetes control-plane nodes is critical to ensuring cluster reliability, scalability, and performance, and therefore represents a significant deployment challenge in heterogeneous,...
City-Scale Visibility Graph Analysis via GPU-Accelerated HyperBallAlex Hodge, Melissa Barrientos Trinanes2026-04-09下载Visibility Graph Analysis (VGA) is a key space syntax method for understanding how spatial configuration shapes human movement, but its reliance on all-pairs BFS computation limits practical applicati...
Asynchronous Quantum Distributed Computing: Causality, Snapshots, and Global OperationsSiddhartha Visveswara Jayanti, Anand Natarajan2026-04-09下载We initiate the study of asynchronous quantum distributed systems, focusing on the case of implementing atomic quantum global operations that can be decomposed into a collection of local operations on...
Scheduling Coflows in Multi-Core OCS Networks with Performance GuaranteeXin Wang, Hong Shen, Hui Tian, Dong Wang2026-04-09下载Coflow provides a key application-layer abstraction for capturing communication patterns, enabling the efficient coordination of parallel data flows to reduce job completion times in distributed syste...
Wattlytics: A Web Platform for Co-Optimizing Performance, Energy, and TCO in HPC ClustersAyesha Afzal, Georg Hager, Gerhard Wellein2026-04-09下载The escalating computational demands and energy footprint of GPU-accelerated computing systems complicate informed design and operational decisions.
LegoDiffusion: Micro-Serving Text-to-Image Diffusion WorkflowsLingyun Yang, Suyi Li, Tianyu Feng, Xiaoxiao Jiang, Zhipeng Di, Weiyi Lu, Kan Liu, Yinghao Yu, Tao Lan, Guodong Yang, Lin Qu, Liping Zhang, Wei Wang2026-04-09下载Text-to-image generation executes a diffusion workflow comprising multiple models centered on a base diffusion model. Existing serving systems treat each workflow as an opaque monolith, provisioning, ...
LogAct: Enabling Agentic Reliability via Shared LogsMahesh Balakrishnan, Ashwin Bharambe, Davide Testuggine, David Geraghty, David Mao, Vidhya Venkat, Ilya Mironov, Rithesh Baradi, Gayathri Aiyer, Victoria Dudin2026-04-09下载Agents are LLM-driven components that can mutate environments in powerful, arbitrary ways. Extracting guarantees for the execution of agents in production environments can be challenging due to asynch...
Administrative Decentralization in Edge-Cloud Multi-Agent for Mobile AutomationSenyao Li, Zhigang Zuo, Haozhao Wang, Junyu Chen, Zhanbo Jin, Ruixuan LI2026-04-09下载Collaborative edge-cloud frameworks have emerged as the main- stream paradigm for mobile automation, mitigating the latency and privacy risks inherent to monolithic cloud agents.
Reduced-Mass Orbital AI Inference via Integrated Solar, Compute, and Radiator PanelsStephen Gaalema, Samuel Indyk, Clinton Staley2026-04-09下载We describe and analyze a distributed compute architecture for SSO computational satellites that can potentially provide >100 kW compute power per launched metric ton (including deployment and statio...

cs.NI - Networking and Internet Architecture

标题作者发布日期PDF摘要
eBandit: Kernel-Driven Reinforcement Learning for Adaptive Video StreamingMahdi Alizadeh2026-04-09下载User-space Adaptive Bitrate (ABR) algorithms cannot see the transport layer signals that matter most, such as minimum RTT and instantaneous delivery rate, and they respond to network changes only afte...
Balancing Functionality and GDPR-Driven Privacy in ISAC Trajectory SharingZexin Fang, Bin Han, Zhuojun Tian, Hans D. Schotten2026-04-09下载Integrated Sensing and Communications (ISAC) enables trajectory sharing that enhances beamforming, resource allocation, and cooperative perception, yet raises fundamental privacy concerns under the Ge...
Quality-Aware Denoising of Ultra-Short TDoA Measurements for 5G-NR UAV LocalizationZexin Fang, Bin Han, Anjie Qiu, Zhuojun Tian, Hans D. Schotten2026-04-09下载Reliable positioning is essential for Uncrewed Aerial Vehicles (UAVs) in safety-critical urban operations, yet achieving sub-meter accuracy under stringent latency constraints remains challenging.
Arqon: A suite of control applications enabling a reliable quantum networkScarlett Gauthier, Thomas R. Beauchamp, Stephanie Wehner2026-04-09下载A quantum network's purpose is to enable users to execute applications on end nodes. This requires the network to provide the service of creating entangled links between those nodes.
Post-Quantum Cryptographic Analysis of Message Transformations Across the Network StackAshish Kundu, Vishal Chakraborty, Ramana Kompella2026-04-09下载When a user sends a message over a wireless network, the message does not travel as-is. It is encrypted, authenticated, encapsulated, and transformed as it descends the protocol stack from the applica...
Why Network Segmentation Projects FailRohit Dube2026-04-09下载Network segmentation is a foundational enterprise security control. Despite its recognized benefits, segmentation initiatives frequently fail in practice, and the field lacks a systematic empirical ex...
LITE: Lightweight Channel Gain Estimation with Reduced X-Haul CSI Signaling in O-RANDavid Goez, Marco Piazzola, Giulia Costa, Achiel Colpaert, Rodney Martinez Alonso, Esra Aycan Beyazit, Nina Slamnik-Krijestorac, Johann M. Marquez-Barja, Miguel Camelo Botero2026-04-09下载Cell-Free Massive Multiple-Input Multiple-Output (CF-MaMIMO) in Open Radio Access Network (O-RAN) promises high spectral efficiency but is limited by frequent Channel State Information (CSI) exchanges...
Real-Time Cross-Layer Semantic Error Correction Using Language Models and Software-Defined RadioYuchen Pan, Yuyang Du, Yirun Wang, Shiqi Xu, Lihao Zhang, Soung Chang Liew2026-04-09下载As Language Models (LMs) advance, Semantic Error Correction (SEC) has emerged as a promising approach for reliable network designs. Yet existing methods prioritize intent over accuracy, falling short ...
FORSLICE: An Automated Formal Framework for Efficient PRB-Allocation towards Slicing Multiple Network ServicesDebarpita Banerjee, Sumana Ghosh, Snigdha Das, Shilpa Budhkar, Rana Pratap Sircar2026-04-09下载Network slicing is a modern 5G technology that provides efficient network experience for diverse use cases. It is a technique for partitioning a single physical network infrastructure into multiple vi...
Beyond Static Forecasting: Unleashing the Power of World Models for Mobile Traffic ExtrapolationXiaoqian Qi, Haoye Chai, Yue Wang, Yong Li2026-04-09下载Mobile traffic prediction is a fundamental yet challenging problem for wireless network planning and optimization. Existing models focus on learning static long-term temporal patterns in mobile traffi...
Multimodal Reasoning with LLM for Encrypted Traffic Interpretation: A BenchmarkLonggang Zhang, Xiaowei Fu, Fuxiang Huang, Lei Zhang2026-04-09下载Network traffic, as a key media format, is crucial for ensuring security and communications in modern internet infrastructure. While existing methods offer excellent performance, they face two key bot...
IoT-Brain: Grounding LLMs for Semantic-Spatial Sensor SchedulingZhaomeng Zhou, Lan Zhang, Junyang Wang, Mu Yuan, Junda Lin, Jinke Song2026-04-09下载Intelligent systems powered by large-scale sensor networks are shifting from predefined monitoring to intent-driven operation, revealing a critical Semantic-to-Physical Mapping Gap.
Incentivising green video streaming through a 2-tier subscription model with carbon-aware rewardsVasilios A. Siris, Adamantia Stamou, George D. Stamoulis, Konstantinos Varsos2026-04-09下载We investigate incentives for reducing the carbon emissions of video streaming that depend on the energy consumption of segments in the end-to-end video delivery path, the carbon intensity, and the us...
Design and empirical validation of a stock-Android software architecture for Wi-Fi Direct multi-group communicationKwasi Edward, Wayne Goodridge, Koffka Khan, Amit Ramkissoon2026-04-09下载Context: Stock Android exposes Wi-Fi Direct peer-to-peer APIs, but it does not provide application-transparent communication across multiple Wi-Fi Direct groups.
LCMP: Distributed Long-Haul Cost-Aware Multi-Path Routing for Inter-Datacenter RDMA NetworksDong-Yang Yu, Yuchao Zhang, Xiaodi Wang, Jun Wang, Wenfei Wu, Haipeng Yao, Wendong Wang, Ke Xu2026-04-09下载RDMA-empowered cloud services are gradually deployed across datacenters (DCs) with multiple paths, which exhibit new properties of path asymmetry, delayed congestion signals, and simultaneous flow rou...
Post-Quantum Cryptography-Based Bidirectional Authentication Key Exchange Protocol and Industry Applications: A Case Study of Instant MessagingAbel C. H. Chen, James W. H. Tung, Austin B. Y. Lin, Chin-Ling Chen, Ching-Chun Chang, Chin-Chen Chang2026-04-09下载This study aims to enhance the bidirectional authentication capability of ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) by proposing the post-quantum cryptography-based (PQC-based) bidirec...

cs.OS - Operating Systems

标题作者发布日期PDF摘要
VCAO: Verifier-Centered Agentic Orchestration for Strategic OS Vulnerability DiscoverySuyash Mishra2026-04-09下载We formulate operating-system vulnerability discovery as a \emph{repeated Bayesian Stackelberg search game} in which a Large Reasoning Model (LRM) orchestrator allocates analysis budget across kernel ...
Valve: Production Online-Offline Inference Colocation with Jointly-Bounded Preemption Latency and RateFangyue Liu, Hua Liu, Xinyuan Lyu, Shuo Ai, Hao Liang, Lingpeng Chen, Ziqian Hu, Chong Zha, Xin Jin, Hanmei Luo, Peng Chen2026-04-09下载LLM inference powers latency-critical production services nowadays. The bursty nature of inference traffic results in over-provisioning, which in turn leads to resource underutilization.
A Hardware-Anchored Privacy Middleware for PII Sharing Across Heterogeneous Embedded Consumer DevicesAditya Sabbineni, Pravin Nagare, Devendra Dahiphale, Preetam Dedu, Willison Lopes2026-04-09下载The rapid expansion of the Internet of Things (IoT) and smart home ecosystems has led to a fragmented landscape of user data management across consumer electronics (CE) such as Smart TVs, gaming conso...

cs.PF - Performance

标题作者发布日期PDF摘要
Wattlytics: A Web Platform for Co-Optimizing Performance, Energy, and TCO in HPC ClustersAyesha Afzal, Georg Hager, Gerhard Wellein2026-04-09下载The escalating computational demands and energy footprint of GPU-accelerated computing systems complicate informed design and operational decisions.

基于 VitePress 构建