Showing 1221–1240 of 31,192 results
/ Date/ Name
Apr 20, 2026AgenTEE: Confidential LLM Agent Execution on Edge DevicesApr 20, 2026Algebraic Graph TheoryApr 20, 2026Generalized Turán problems for Berge hypergraphsApr 20, 2026Collision Energy Dependence of Hypertriton Production in Au+Au Collisions at RHICApr 20, 2026Inductive Dual-Polarity Modeling via Static-Dynamic Disentanglement for Dynamic Signed NetworksApr 20, 2026Comment on "Specific heat of an ideal Bose gas above the Bose condensation temperature," [Am. J. Phys. 72(9), 1193--1194 (2004)]Apr 20, 2026Committed SAE-Feature Traces for Audited-Session Substitution Detection in Hosted LLMsApr 20, 2026Beyond Explicit Refusals: Soft-Failure Attacks on Retrieval-Augmented GenerationApr 20, 2026The complex of discrete Morse matchings of the $n$-simplex: homotopy types and structural resultsApr 20, 2026Dynamics of one-dimensional Bose-Josephson Junction in a Box Trap: From Coherent Oscillations to Many-Body Dephasing and Dynamical FreezingApr 20, 2026Audit-or-Cast: Enforcing Honest Elections with Privacy-Preserving Public VerificationApr 20, 2026mlr3torch: A Deep Learning Framework in R based on mlr3 and torchApr 20, 2026Distributional Off-Policy Evaluation with Deep Quantile Process RegressionApr 20, 2026AQPIM: Breaking the PIM Capacity Wall for LLMs with In-Memory Activation QuantizationApr 20, 2026An `Inverse' Experimental Framework to Estimate Market EfficiencyApr 20, 2026Evaluating Answer Leakage Robustness of LLM Tutors against Adversarial Student AttacksApr 20, 2026Towards E-Value Based Stopping Rules for Bayesian Deep EnsemblesApr 20, 2026Dynamic Risk Assessment by Bayesian Attack Graphs and Process MiningApr 20, 2026Lagrange Index based Scheduling for Minimizing Age of Updates from Heterogeneous SourcesApr 20, 2026Enhancing Anomaly-Based Intrusion Detection Systems with Process Mining