Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.
@arXiv_csSE_bot@mastoxiv.page
2025-09-29 09:20:47

AgentPack: A Dataset of Code Changes, Co-Authored by Agents and Humans
Yangtian Zi, Zixuan Wu, Aleksander Boruch-Gruszecki, Jonathan Bell, Arjun Guha
arxiv.org/abs/2509.21891

@arXiv_condmatmtrlsci_bot@mastoxiv.page
2025-08-29 09:26:21

Lattice-induced spin dynamics in Dirac magnet CoTiO3
Andrey Baydin, Jiaming Luo, Zhiren He, Jacques Doumani, Tong Lin, Fuyang Tay, Jiaming He, Jianshi Zhou, Guru Khalsa, Junichiro Kono, Hanyu Zhu
arxiv.org/abs/2508.20354

A provision in the recently passed Wisconsin state budget that diverts $2.2 million annually from schools to fund 12 Milwaukee County prosecutors may violate the Wisconsin Constitution.
The positions had previously been paid for with federal funding that is set to expire.
The budget act redirects all traffic fines and forfeiture revenues in Milwaukee County to the Milwaukee County District Attorney’s Office to fund 12 positions.

@raiders@darktundra.xyz
2025-08-28 21:27:21

The Las Vegas Raiders Should Bring Back A Fan Favorite The Carolina Panthers Recently Cut heavy.com/sports/nfl/las-vegas]

@arXiv_csCV_bot@mastoxiv.page
2025-09-29 11:27:17

Hierarchical Representation Matching for CLIP-based Class-Incremental Learning
Zhen-Hao Wen, Yan Wang, Ji Feng, Han-Jia Ye, De-Chuan Zhan, Da-Wei Zhou
arxiv.org/abs/2509.22645

@arXiv_csAI_bot@mastoxiv.page
2025-08-28 09:09:31

Analysing Chain of Thought Dynamics: Active Guidance or Unfaithful Post-hoc Rationalisation?
Samuel Lewis-Lim, Xingwei Tan, Zhixue Zhao, Nikolaos Aletras
arxiv.org/abs/2508.19827

@arXiv_csCR_bot@mastoxiv.page
2025-07-30 10:22:01

Can We End the Cat-and-Mouse Game? Simulating Self-Evolving Phishing Attacks with LLMs and Genetic Algorithms
Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki
arxiv.org/abs/2507.21538

@arXiv_csSE_bot@mastoxiv.page
2025-07-30 08:32:31

HLSDebugger: Identification and Correction of Logic Bugs in HLS Code with LLM Solutions
Jing Wang, Shang Liu, Yao Lu, Zhiyao Xie
arxiv.org/abs/2507.21485

@arXiv_csCR_bot@mastoxiv.page
2025-09-30 11:21:51

Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence
Yuqiao Meng, Luoxi Tang, Feiyang Yu, Jinyuan Jia, Guanhua Yan, Ping Yang, Zhaohan Xi
arxiv.org/abs/2509.23573