Latest Research

The Malaysian Election Corpus (MECo): Federal and State-Level Election Results from 1955 to 2025

Thevesh/paper-malaysian-election-corpus 10 May 2025

Empirical research and public knowledge on Malaysia's elections have long been constrained by a lack of high-quality open data, particularly in the absence of a Freedom of Information framework.

Computers and Society Applications

0
10 May 2025

Scheduled Jacobian Chaining

STCE-at-RWTH/Jacobian-Chaining 9 May 2025

This paper addresses the efficient computation of Jacobian matrices for programs composed of sequential differentiable subprograms.

Discrete Mathematics Distributed, Parallel, and Cluster Computing Data Structures and Algorithms Combinatorics

0
09 May 2025

CPP-DIP: Multi-objective Coverage Path Planning for MAVs in Dispersed and Irregular Plantations

iaerialrobo/cpp-dip 8 May 2025

A density-aware waypoint strategy is applied: Kernel Density Estimation (KDE) is used to reduce redundant waypoints in dense regions, while a greedy algorithm ensures complete coverage in sparse areas.

Robotics

0
08 May 2025

HEXGEN-TEXT2SQL: Optimizing LLM Inference Request Scheduling for Agentic Text-to-SQL Workflow

relaxed-system-lab/hexgen-flow 8 May 2025

In this paper, we introduce HEXGEN-TEXT2SQL, a novel framework designed explicitly to schedule and execute agentic multi-stage LLM-based Text-to-SQL workflows on heterogeneous GPU clusters that handle multi-tenant end-to-end queries.

Databases

0
08 May 2025

Empowering Scientific Workflows with Federated Agents

proxystore/academy 8 May 2025

To demonstrate the breadth of applications that can be supported by agentic workflow designs, we also present case studies in materials discovery, decentralized learning, and information extraction in which agents are deployed across diverse HPC systems.

Multiagent Systems Distributed, Parallel, and Cluster Computing

4
08 May 2025

QUIC-Exfil: Exploiting QUIC's Server Preferred Address Feature to Perform Data Exfiltration Attacks

thomasgruebl/quic-exfil 8 May 2025

Whereas existing data exfiltration techniques, such as TLS and DNS-based exfiltration, can be detected on a firewall level, QUIC-based data exfiltration is more difficult to detect, since changes in IP addresses and ports are inherent to the protocol's normal behavior.

Cryptography and Security

0
08 May 2025

Cross-Problem Solving for Network Optimization: Is Problem-Aware Learning the Key?

qiyu3816/pad 8 May 2025

This limitation reveals a key gap between current methods and human solving - the inability to recognize and understand problem characteristics.

Networking and Internet Architecture

0
08 May 2025

Towards Mitigating API Hallucination in Code Generated by LLMs with Hierarchical Dependency Aware

yujiachen99/apimitigation 8 May 2025

MARIN consists of two phases: Hierarchical Dependency Mining, which analyzes local and global dependencies of the current function, aiming to supplement comprehensive project context in LLMs input, and Dependency Constrained Decoding, which utilizes mined dependencies to adaptively constrain the generation process, aiming to ensure the generated APIs align with the projects specifications.

Software Engineering

1
08 May 2025

AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities

ai-llm-research/autopatch 7 May 2025

Large Language Models (LLMs) have emerged as promising tools in software development, enabling automated code generation and analysis.

Cryptography and Security

0
07 May 2025

QStore: Quantization-Aware Compressed Model Storage

illinoisdata/qstore 7 May 2025

A straightforward approach is to maintain a separate file for each model precision (e. g., INT8, BF16), which is indeed the approach taken by many model providers such as HuggingFace and Ollama.

Databases

0
07 May 2025