2025-06-26 |
Efficient and Reuseable Cloud Configuration Search Using Discovery Spaces |
Michael Johnston et.al. |
2506.21467v1 |
null |
2025-06-26 |
Carbon-Aware Microservice Deployment for Optimal User Experience on a Budget |
Kevin Kreutz et.al. |
2506.21422v1 |
null |
2025-06-26 |
Counterfactual Voting Adjustment for Quality Assessment and Fairer Voting in Online Platforms with Helpfulness Evaluation |
Chang Liu et.al. |
2506.21362v1 |
null |
2025-06-26 |
Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks |
Deepak Kumar Panda et.al. |
2506.21142v1 |
null |
2025-06-26 |
Post-Quantum and Blockchain-Based Attestation for Trusted FPGAs in B5G Networks |
Ilias Papalamprou et.al. |
2506.21073v1 |
null |
2025-06-26 |
Bridding OT and PaaS in Edge-to-Cloud Continuum |
Carlos J Barrios et.al. |
2506.21072v1 |
null |
2025-06-26 |
BLOCKS: Blockchain-supported Cross-Silo Knowledge Sharing for Efficient LLM Services |
Zhaojiacheng Zhou et.al. |
2506.21033v1 |
null |
2025-06-26 |
Co-Design of Sensing, Communications, and Control for Low-Altitude Wireless Networks |
Haijia Jin et.al. |
2506.20970v1 |
null |
2025-06-25 |
Robust and Flexible Microtransit Design: Chance-Constrained Dial-a-Ride Problem with Soft Time Windows |
Hongli Li et.al. |
2506.20788v1 |
null |
2025-06-25 |
Perry: A High-level Framework for Accelerating Cyber Deception Experimentation |
Brian Singer et.al. |
2506.20770v1 |
null |
2025-06-25 |
Drift-Adaptive Slicing-Based Resource Management for Cooperative ISAC Networks |
Shisheng Hu et.al. |
2506.20762v1 |
null |
2025-06-25 |
SuperSONIC: Cloud-Native Infrastructure for ML Inferencing |
Dmitry Kondratyev et.al. |
2506.20657v1 |
null |
2025-06-25 |
Efficient Federated Learning with Encrypted Data Sharing for Data-Heterogeneous Edge Devices |
Hangyu Li et.al. |
2506.20644v1 |
null |
2025-06-25 |
Cost-benefit analysis of an AI-driven operational digital platform for integrated electric mobility, renewable energy, and grid management |
Arega Getaneh Abate et.al. |
2506.20631v1 |
null |
2025-06-25 |
Benchmarking Unsupervised Strategies for Anomaly Detection in Multivariate Time Series |
Laura Boggia et.al. |
2506.20574v1 |
null |
2025-06-25 |
Demonstration of effective UCB-based routing in skill-based queues on real-world data |
Sanne van Kempen et.al. |
2506.20543v1 |
null |
2025-06-25 |
Analyzing Security and Privacy Challenges in Generative AI Usage Guidelines for Higher Education |
Bei Yi Ng et.al. |
2506.20463v1 |
null |
2025-06-25 |
Smart Ride and Delivery Services with Electric Vehicles: Leveraging Bidirectional Charging for Profit Optimisation |
Jinchun Du et.al. |
2506.20401v2 |
null |
2025-06-25 |
SPARK: Graph-Based Online Semantic Integration System for Robot Task Planning |
Mimo Shirasaka et.al. |
2506.20394v1 |
null |
2025-06-25 |
Lightweight Target-Speaker-Based Overlap Transcription for Practical Streaming ASR |
Aleš Pražák et.al. |
2506.20288v1 |
null |
2025-06-25 |
Daily Fluctuations in Weather and Economic Growth at the Subnational Level: Evidence from Thailand |
Sarun Kamolthip et.al. |
2506.20105v1 |
null |
2025-06-25 |
MEL: Multi-level Ensemble Learning for Resource-Constrained Environments |
Krishna Praneet Gudipaty et.al. |
2506.20094v1 |
null |
2025-06-24 |
Near-Field SWIPT Using XL-MIMO: Power Allocation and Subarray Activation |
Muhammad Zeeshan Mumtaz et.al. |
2506.20050v1 |
null |
2025-06-24 |
An experiment in price perception error |
Shawn Berry et.al. |
2506.19953v1 |
null |
2025-06-24 |
Quantum-Resistant Domain Name System: A Comprehensive System-Level Study |
Juyoul Lee et.al. |
2506.19943v1 |
null |
2025-06-24 |
A Hybrid Intrusion Detection System with a New Approach to Protect the Cybersecurity of Cloud Computing |
Maryam Mahdi Al-Husseini et.al. |
2506.19934v1 |
null |
2025-06-24 |
CORMO-RAN: Lossless Migration of xApps in O-RAN |
Antonio Calagna et.al. |
2506.19760v1 |
null |
2025-06-24 |
Decision-Focused Learning for Neural Network-Constrained Optimization: Application to HVAC Management System |
Pietro Favaro et.al. |
2506.19717v1 |
null |
2025-06-24 |
LLM-Driven Medical Document Analysis: Enhancing Trustworthy Pathology and Differential Diagnosis |
Lei Kang et.al. |
2506.19702v1 |
null |
2025-06-24 |
Adaptive Request Scheduling for CodeLLM Serving with SLA Guarantees |
Shi Chang et.al. |
2506.19677v2 |
null |