Modern applications, such as data center workloads, have become increasingly complex. These applications primarily operate on massive datasets, which involve large memory footprints, irregular access patterns, and complex control and data flows. The processor-memory speed gap, combined with these complexities, can lead to unexpected performance inefficiencies in these applications, preventing them from achieving optimal performance. […]
Reinforcement Learning (RL) is a machine learning paradigm that trains a decision maker, or policy, by learning from interaction with an environment. The power of RL lies in its ability to learn complex strategies without explicit human instruction, which can lead to better solutions that human designers overlook in domains ranging from robotics to scientific […]
Transient execution attacks are serious security threats in modern-day processors. Out-of-order execution compels the processor to access data that should not be otherwise perceived. Leakage of that secret information creates a covert channel for the attacker for various types of transient and speculative attacks. Transient based execution attacks emanate when the secret information is leaked […]
The growing integration of Large Language Models (LLMs) into real-world applications has heightened concerns about their trustworthiness, as models may reveal private information, reproduce copyrighted content, propagate biases, or generate harmful instructions. These risks, alongside emerging privacy regulations, motivate the need for LLM unlearning, methods that remove the influence of specific data while preserving overall […]
While Large Language Models exhibit remarkable capabilities, their reliance on the standard Transformer architecture imposes prohibitive computational costs and quadratic memory complexity. To bridge the gap between biological efficiency and high-performance AI, we have established foundational work in linearizing attention and maximizing hardware utilization through architectures such as RWKV and MatMul-Free networks. Addressing the remaining […]
Quantum Key Distribution (QKD) provides information-theoretic security for cryptographic key establishment, but existing protocols exhibit limited noise tolerance, restricting their applicability in practical quantum channels with finite resources. This work introduces a QKD protocol based on entanglement swapping that significantly enhances error tolerance and key generation rates. The protocol encodes six-bit classical symbols into six-qubit […]
Translation is a central and highly regulated step of gene expression, yet there are few quantitative, high-throughput tools to study translation. Existing methods such as sucrose gradients provide only bulk ribosome counts, while Ribo-Seq offers positional information in the genome but destroys long-range structure and transcript expression information. Because of these limitations, many fundamental questions […]
Transcriptomic profiling has been transformative in pediatric oncology. Pediatric cancers arise from disrupted developmental programs. Their impaired transcriptional states reflect cell lineage infidelity, aberrant differentiation, and immune-microenvironment interactions distinct from those of adult tumors(Gröbner et al., 2018; X. Ma et al., 2018). Within the osteosarcoma (OS) landscape, despite being the most common bone tumor of […]
Today, both individual and collective memories are increasingly mediated by digital platforms. Both are fundamentally enmeshed in platform ecosystems that orient around commercial imperatives very much at odds with community cohesion. The digital archive where our mediated memories are stored does not merely store information but actively inscribes it, often privileging narratives aligned with commercial […]