2025-09-30 14:44:31
Chance-constrained Flow Matching for High-Fidelity Constraint-aware Generation
Jinhao Liang, Yixuan Sun, Anirban Samaddar, Sandeep Madireddy, Ferdinando Fioretto
https://arxiv.org/abs/2509.25157
Chance-constrained Flow Matching for High-Fidelity Constraint-aware Generation
Jinhao Liang, Yixuan Sun, Anirban Samaddar, Sandeep Madireddy, Ferdinando Fioretto
https://arxiv.org/abs/2509.25157
System design 101 (or even before): never use the email as the PK for a user account. What if the user needs to change their email?
Better make it a regular column with a UNIQUE constraint.
Simultaneous Quantization and Reduction of Constrained Systems
Jianhao M. Yang
https://arxiv.org/abs/2509.22747 https://arxiv.org/pdf/2509.22747
Influence-Guided Concolic Testing of Transformer Robustness
Chih-Duo Hong, Yu Wang, Yao-Chen Chang, Fang Yu
https://arxiv.org/abs/2509.23806 https://arxiv.…
Exponentially slow Mixing arising from Entropic Repulsion in $p$-SOS model
Seokun Choi
https://arxiv.org/abs/2509.23120 https://arxiv.org/pdf/2509.23120
Taming Variability: Randomized and Bootstrapped Conformal Risk Control for LLMs
Lingyou Pang, Lei Huang, Jianyu Lin, Tianyu Wang, Alexander Aue, Carey E. Priebe
https://arxiv.org/abs/2509.23007
I think we can actually prove that this constraint is the *only* constraint that can preserve freedom:
1. There will exist actors in a system who will wish to take advantage of others. Evolution drives survival and one strategy for increasing survival in an altruistic society is to become a parasite.
2. Expecting exploitative dynamics, a system needs to have a set of rules to manage exploitation.
3. If the set of rules is static it will lack the requisite variety necessary to manage the infinite possible behavior of humans so the system will fail.
4. If the system is dynamic then it must have a rule set about how it's own rules are updated. This would make the system recursive, which makes the system at least as complex as mathematics. Any system at least as complex as mathematics is necessarily either incomplete or inconsistent (Gödel's incompleteness theorem). If the system is incomplete, then constraints can be evaded which then allow a malicious agent to seize control of the system and update the rules for their own benefit. If constraints are incomplete, then a malicious agent can take advantage of others within the system.
5. Therefore, no social system can possibly protect freedom unless there exists a single metasystemic constraint (that the system must be optional) allowing for the system to be abandoned when compromised.
Oh, you might say, but this just means you have to infinitely abandon systems. Sure, but there's an evolutionary advantage to cooperation so there's evolutionary pressure to *not* be a malicious actor. So a malicious actor being able to compromise the whole system is likely to be a much more rare event. Compromising a system is a lot of work, so the first thing a malicious actor would want to do is preserve that work. They would want to lock you in. The most important objective to a malicious actor compromising a system would be to violate that metasystemic constraint, or all of their work goes out the window when everyone leaves.
And now you understand why borders exist, why fascists are obsessed with maintaining categories like gender, race, ethnicity, etc. This is why even Democrats like Newsom are on board with putting houseless people in concentration camps. And this is why the most important thing anarchists promote is the ability to choose not to be part of any of that.
Constraint Satisfaction Approaches to Wordle: Novel Heuristics and Cross-Lexicon Validation
Jahidul Arafat, Fariha Tasmin, Sanjaya Poudel, Kamrujjaman, Eftakhar Ahmed Arnob, Ahsan Habib Tareq
https://arxiv.org/abs/2510.02855
Sequence Variables: A Constraint Programming Computational Domain for Routing and Sequencing
Augustin Delecluse, Pierre Schaus, Pascal Van Hentenryck
https://arxiv.org/abs/2510.09373
Constraint Qualification for Generic Parameter Families of Constraints in Optimization
Naoki Hamada, Kenta Hayano, Hiroshi Teramoto
https://arxiv.org/abs/2510.02381 https://
Phase Transitions of the Additive Uniform Noise Channel with Peak Amplitude and Cost Constraint
Jonas Stapmanns, Catarina Dias, Luke Eilers, Tobias K\"uhn, Jean-Pascal Pfister
https://arxiv.org/abs/2510.12427
Constraint-Level Design of zkEVMs: Architectures, Trade-offs, and Evolution
Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri-Boshrooyeh
https://arxiv.org/abs/2510.05376 https://
GRPO-GCC: Enhancing Cooperation in Spatial Public Goods Games via Group Relative Policy Optimization with Global Cooperation Constraint
Zhaoqilin Yang, Chanchan Li, Tianqi Liu, Hongxin Zhao, Youliang Tian
https://arxiv.org/abs/2510.08607
How Well do Diffusion Policies Learn Kinematic Constraint Manifolds?
Lexi Foland, Thomas Cohn, Adam Wei, Nicholas Pfaff, Boyuan Chen, Russ Tedrake
https://arxiv.org/abs/2510.01404
ConstraintLLM: A Neuro-Symbolic Framework for Industrial-Level Constraint Programming
Weichun Shi, Minghao Liu, Wanting Zhang, Langchen Shi, Fuqi Jia, Feifei Ma, Jian Zhang
https://arxiv.org/abs/2510.05774
Efficient Approximation Algorithms for Fair Influence Maximization under Maximin Constraint
Xiaobin Rui, Zhixiao Wang, Chen Peng, Qiangpeng Fang, Wei Chen
https://arxiv.org/abs/2509.26579
from my link log —
Should CSS be a constraint system instead?
https://pavpanchekha.com/blog/why-css-bad.html
saved 2025-12-06 https://
From singular to regular: revisiting thermodynamics of Bardeen-AdS black holes
Meng-Sen Ma, Yun He, Xiao-Ming Wang, Huai-Fan Li
https://arxiv.org/abs/2510.06576 https://
Optimal placement of wind farms via quantile constraint learning
Wenxiu Feng, Antonio Alc\'antara, Carlos Ruiz
https://arxiv.org/abs/2510.01093 https://
Modular Counting over 3-Element and Conservative Domains
Andrei A. Bulatov, Amirhossein Kazeminia
https://arxiv.org/abs/2510.09950 https://arxiv.org/pdf/25…
“My expectation is that within 10 years,
almost all new data centers will be built in space
purely because of the constraint that we’re facing on energy terrestrially”
https://spectrum.ieee.org/nvidia-h100-space?share_id=9034975
Constraint-Guided Unit Test Generation for Machine Learning Libraries
Lukas Krodinger, Altin Hajdari, Stephan Lukasczyk, Gordon Fraser
https://arxiv.org/abs/2510.09108 https://
I feel as though I should illustrate the difference that this one single constraint can make by two examples.
The rules of Simon Says are maximally authoritarian. You must perform any action ordered, with the only restriction that the authority must say "Simon says" first. Were you forced to stay in this system, it would be the most despotic autocracy possible. But it's not. It's a silly game because you can leave at any time.
Let's flip this and imagine a room. During a specific period of time you will have absolute control over everything in this room. In this room you have total freedom. This is not even the limited freedom, the coordinated freedom, the compromising freedom of civil society. You could, without consequence, perform any action you wish in this room. You could say anything, destroy or steal any object, order any individual to perform any action, kill any person in the room with you and take anything they own. This is the sovereign freedom, the absolute freedom, of dictators and kings. The only restriction is that you are not allowed to leave the room while you have this freedom. In fact, you really only have this level of freedom because the room is actually empty other than for you. I am, of course, talking about a form of torture still common in the US: solitary confinement.
Pinching Antenna Systems (PASS) for Cell-Free Communications
Haochen Li
https://arxiv.org/abs/2510.03628 https://arxiv.org/pdf/2510.03628
This is the best critique of SF's Family Zoning Plan I've seen, from Fernando Martí, who knows his stuff.
“Zoning is not the primary constraint to construction today — not in SF where it costs $800,000 or more to build a unit of housing. Nor is environmental review or planning approvals. If these were the constraints to production, then we wouldn’t have tens of thousands of already approved market-rate units unable to get construction financing”
Constraint-Aware Route Recommendation from Natural Language via Hierarchical LLM Agents
Tao Zhe, Rui Liu, Fateme Memar, Xiao Luo, Wei Fan, Xinyue Ye, Zhongren Peng, Dongjie Wang
https://arxiv.org/abs/2510.06078
Two-cardinal Kurepa Hypotheses
Fanxin Wu
https://arxiv.org/abs/2510.08860 https://arxiv.org/pdf/2510.08860
Dynamic Regret Bounds for Online Omniprediction with Long Term Constraints
Yahav Bechavod, Jiuyao Lu, Aaron Roth
https://arxiv.org/abs/2510.07266 https://a…
Nine lower bound conjectures on streaming approximation algorithms for CSPs
Noah G. Singer
https://arxiv.org/abs/2510.10714 https://arxiv.org/pdf/2510.1071…
Improved Dark Photon Sensitivity from the Dark SRF Experiment
Saarik Kalia, Zhen Liu, Bianca Giaccone, Oleksandr Melnychuk, Roman Pilipenko, Asher Berlin, Anson Hook, Sergey Belomestnykh, Crispin Contreras-Martinez, Daniil Frolov, Timergali Khabiboulline, Yuriy Pischalnikov, Sam Posen, Oleg Pronitchev, Vyacheslav Yakovlev, Anna Grassellino, Roni Harnik, Alexander Romanenko
Quenching, Fast and Slow: Breaking Kibble-Zurek Universal Scaling by Jumping along Geodesics
Thi Ha Kyaw, Guillermo Romero, Gaurav Saxena
https://arxiv.org/abs/2510.08528 https:…
Single-Deviation Stability in Additively Separable Hedonic Games with Constrained Coalition Sizes
Martin Bullinger, Adam Dunajski, Edith Elkind, Matan Gilboa
https://arxiv.org/abs/2510.12641
Generalized Multi-Constraint Extremum Seeking
Alan Williams, Jorge Cort\'es, Alexander Scheinker
https://arxiv.org/abs/2510.06403 https://arxiv.org/pdf…
Spinning into Quantum Geometry: Dirac and Wheeler-DeWitt Dynamics from Stochastic Helicity
Partha Nandi, Partha Ghose, Francesco Petruccione
https://arxiv.org/abs/2510.10836 htt…
Towards Automated and Predictive Network-Level Energy Profiling in Reconfigurable IoT Systems
Mohammud J. Bocus, Senhui Qiu, Robert J. Piechocki, Kerstin Eder
https://arxiv.org/abs/2510.09842
I feel as though I should illustrate the difference that this one single constraint can make by two examples.
The rules of Simon Says are maximally authoritarian. You must perform any action ordered, with the only restriction that the authority must say "Simon says" first. Were you forced to stay in this system, it would be the most despotic autocracy possible. But it's not. It's a silly game because you can leave at any time.
Let's flip this and imagine a room. During a specific period of time you will have absolute control over everything in this room. In this room you have total freedom. This is not even the limited freedom, the coordinated freedom, the compromising freedom of civil society. You could, without consequence, perform any action you wish in this room. You could say anything, destroy or steal any object, order any individual to perform any action, kill any person in the room with you and take anything they own. This is the sovereign freedom, the absolute freedom, of dictators and kings. The only restriction is that you are not allowed to leave the room while you have this freedom. In fact, you really only have this level of freedom because the room is actually empty other than for you. I am, of course, talking about a form of torture still common in the US: solitary confinement.
Risk-Budgeted Control Framework for Balanced Performance and Safety in Autonomous Vehicles
Pei Yu Chang, Vishnu Renganathan, Qadeer Ahmed
https://arxiv.org/abs/2510.10442 https:…
Encoding Numeric Computations and Infusing Heuristic Knowledge Using Integrity Constraints in stableKanren
Xiangyu Guo, Ajay Bansal
https://arxiv.org/abs/2510.04049 https://
A CSP approach to Graph Sandwich Problems
Manuel Bodirsky, Santiago Guzm\'an-Pro
https://arxiv.org/abs/2510.09128 https://arxiv.org/pdf/2510.09128
Constraining the new contributions to electron $g-2$ in a radiative neutrino mass model
Bayu Dirgantara, J. Julio
https://arxiv.org/abs/2510.08504 https://…
Physically Valid Biomolecular Interaction Modeling with Gauss-Seidel Projection
Siyuan Chen, Minghao Guo, Caoliwen Wang, Anka He Chen, Yikun Zhang, Jingjing Chai, Yin Yang, Wojciech Matusik, Peter Yichen Chen
https://arxiv.org/abs/2510.08946
Non-unitary Time Evolution via the Chebyshev Expansion Method
\'Aron Holl\'o, D\'aniel Varjas, Cosma Fulga, L\'aszl\'o Oroszl\'any, Viktor K\"onye
https://arxiv.org/abs/2510.10643
Replaced article(s) found for cs.CR. https://arxiv.org/list/cs.CR/new
[2/3]:
- VulSolver: Vulnerability Detection via LLM-Driven Constraint Solving
Xiang Li, Yueci Su, Jiahao Liu, Zhiwei Lin, Yuebing Hou, Peiming Gao, Yuanchao Zhang
Replaced article(s) found for physics.app-ph. https://arxiv.org/list/physics.app-ph/new
[1/1]:
- Generalized causality constraint based on duality symmetry reveals untapped potential of sound ab...
Qu, Yang, Huang, Liu, Dong, Li, Sheng, Abrahams, Fang
Consistent gauge theories for the slave particle representation of the strongly correlated $t$-$J$ model
Xi Luo, Tao Shi, Yue Yu, Long Liang
https://arxiv.org/abs/2510.09264 htt…
There are 3 fundamental freedoms outlined in Dawn of Everything:
(1) the freedom to move away or relocate from one’s surroundings;
(2) the freedom to ignore or disobey commands issued by others; and
(3) the freedom to shape entirely new social realities, or shift back and forth between different ones.
I think these can all be captured in one statement when reframed as a system constraint: for a system to be free, participation must be optional for all members.
People must be part of *some* system. Even individualistic survivalism is itself a system (if not a very good one). Then there is a corollary as well: any system that is not free, that is not optional, can turn optional systems into mandatory ones, and thus (adopted from the MLK quote) un-freedom anywhere is a threat to freedom everywhere.
Edit:
I'm gonna drop the #Philosophy tag on here because apparently that's where I went with it. Challenges and push-back welcome.
Edit:
Aaaaand Its a blog post
https://anarchoccultism.org/building-zion/an-algorithm-for-liberation
As usual, comments, typos, and questions are always welcome.
The tetrahedral Horn problem and asymptotics of U(n) 6j symbols
Anton Alekseev, Matthias Christandl, Thomas C. Fraser
https://arxiv.org/abs/2510.04877 https://
Existence of global weak solutions to a parabolic $p$-Laplacian problem with convective term
Angelica Pia Di Feola, Michael Ruzicka
https://arxiv.org/abs/2510.05847 https://
Automated Constraint Specification for Job Scheduling by Regulating Generative Model with Domain-Specific Representation
Yu-Zhe Shi, Qiao Xu, Yanjia Li, Mingchen Liu, Huamin Qu, Lecheng Ruan, Qining Wang
https://arxiv.org/abs/2510.02679
Homomorphism Problems in Graph Databases and Automatic Structures
R\'emi Morvan
https://arxiv.org/abs/2510.07422 https://arxiv.org/pdf/2510.07422
Replaced article(s) found for cs.ET. https://arxiv.org/list/cs.ET/new
[1/1]:
- Lagrange Oscillatory Neural Networks for Constraint Satisfaction and Optimization
Corentin Delacour, Bram Haverkort, Filip Sabo, Nadine Azemard, Aida Todri-Sanial
Geometric Queries on Closed Implicit Surfaces for Walk on Stars
Tianyu Huang
https://arxiv.org/abs/2510.07275 https://arxiv.org/pdf/2510.07275
The $\alpha$--regression for compositional data: a unified framework for standard, spatially-lagged, and geographically-weighted regression models
Michail Tsagris
https://arxiv.org/abs/2510.12663
Global Solutions to Non-Convex Functional Constrained Problems with Hidden Convexity
Ilyas Fatkhullin, Niao He, Guanghui Lan, Florian Wolf
https://arxiv.org/abs/2511.10626 https://arxiv.org/pdf/2511.10626 https://arxiv.org/html/2511.10626
arXiv:2511.10626v1 Announce Type: new
Abstract: Constrained non-convex optimization is fundamentally challenging, as global solutions are generally intractable and constraint qualifications may not hold. However, in many applications, including safe policy optimization in control and reinforcement learning, such problems possess hidden convexity, meaning they can be reformulated as convex programs via a nonlinear invertible transformation. Typically such transformations are implicit or unknown, making the direct link with the convex program impossible. On the other hand, (sub-)gradients with respect to the original variables are often accessible or can be easily estimated, which motivates algorithms that operate directly in the original (non-convex) problem space using standard (sub-)gradient oracles. In this work, we develop the first algorithms to provably solve such non-convex problems to global minima. First, using a modified inexact proximal point method, we establish global last-iterate convergence guarantees with $\widetilde{\mathcal{O}}(\varepsilon^{-3})$ oracle complexity in non-smooth setting. For smooth problems, we propose a new bundle-level type method based on linearly constrained quadratic subproblems, improving the oracle complexity to $\widetilde{\mathcal{O}}(\varepsilon^{-1})$. Surprisingly, despite non-convexity, our methodology does not require any constraint qualifications, can handle hidden convex equality constraints, and achieves complexities matching those for solving unconstrained hidden convex optimization.
toXiv_bot_toot
Spatially-informed transformers: Injecting geostatistical covariance biases into self-attention for spatio-temporal forecasting
Yuri Calleo
https://arxiv.org/abs/2512.17696 https://arxiv.org/pdf/2512.17696 https://arxiv.org/html/2512.17696
arXiv:2512.17696v1 Announce Type: new
Abstract: The modeling of high-dimensional spatio-temporal processes presents a fundamental dichotomy between the probabilistic rigor of classical geostatistics and the flexible, high-capacity representations of deep learning. While Gaussian processes offer theoretical consistency and exact uncertainty quantification, their prohibitive computational scaling renders them impractical for massive sensor networks. Conversely, modern transformer architectures excel at sequence modeling but inherently lack a geometric inductive bias, treating spatial sensors as permutation-invariant tokens without a native understanding of distance. In this work, we propose a spatially-informed transformer, a hybrid architecture that injects a geostatistical inductive bias directly into the self-attention mechanism via a learnable covariance kernel. By formally decomposing the attention structure into a stationary physical prior and a non-stationary data-driven residual, we impose a soft topological constraint that favors spatially proximal interactions while retaining the capacity to model complex dynamics. We demonstrate the phenomenon of ``Deep Variography'', where the network successfully recovers the true spatial decay parameters of the underlying process end-to-end via backpropagation. Extensive experiments on synthetic Gaussian random fields and real-world traffic benchmarks confirm that our method outperforms state-of-the-art graph neural networks. Furthermore, rigorous statistical validation confirms that the proposed method delivers not only superior predictive accuracy but also well-calibrated probabilistic forecasts, effectively bridging the gap between physics-aware modeling and data-driven learning.
toXiv_bot_toot
Planar Length-Constrained Minimum Spanning Trees
D Ellis Hershkowitz, Richard Z Huang
https://arxiv.org/abs/2510.09002 https://arxiv.org/pdf/2510.09002
Robust Closed-Form Control for MIMO Nonlinear Systems under Conflicting Time-Varying Hard and Soft Constraints
Farhad Mehdifar, Charalampos P. Bechlioulis, Dimos V. Dimarogonas
https://arxiv.org/abs/2510.11393
Spectrum of pure $R^2$ gravity: full Hamiltonian analysis
Will Barker, Dra\v{z}en Glavan
https://arxiv.org/abs/2510.08201 https://arxiv.org/pdf/2510.08201
Style Over Story: A Process-Oriented Study of Authorial Creativity in Large Language Models
Donghoon Jung, Jiwoo Choi, Songeun Chae, Seohyon Jung
https://arxiv.org/abs/2510.02025
Existence of ghost-eliminating constraints in multivielbein theory
J. Flinckman, S. F. Hassan
https://arxiv.org/abs/2510.03014 https://arxiv.org/pdf/2510.0…
Crosslisted article(s) found for math.LO. https://arxiv.org/list/math.LO/new
[1/1]:
- Janus-faces of temporal constraint languages: a dichotomy of expressivity
Johanna Brunar, Michael Pinsker, Moritz Sch\"obi
Private Learning of Littlestone Classes, Revisited
Xin Lyu
https://arxiv.org/abs/2510.00076 https://arxiv.org/pdf/2510.00076…
Robustness of Covariance Estimators with Application in Activity Detection
Hendrik Bernd Zarucha, Peter Jung, Giuseppe Caire
https://arxiv.org/abs/2510.07044 https://
A Decoy-like Protocol for Quantum Key Distribution: Enhancing the Performance with Imperfect Single Photon Sources
Chanaprom Cholsuk, Furkan A\u{g}larc{\i}, Daniel K. L. Oi, Serkan Ate\c{s}, Tobias Vogl
https://arxiv.org/abs/2510.09454
EC3R-SLAM: Efficient and Consistent Monocular Dense SLAM with Feed-Forward 3D Reconstruction
Lingxiang Hu, Naima Ait Oufroukh, Fabien Bonardi, Raymond Ghandour
https://arxiv.org/abs/2510.02080
Replaced article(s) found for cs.PL. https://arxiv.org/list/cs.PL/new
[1/1]:
- Ranking Functions for Linear-Constraint Loops
Amir M. Ben-Amram, Samir Genaim
https:…
A Computer-Assisted Proof of the Optimal Density Bound for Pinwheel Covering
Akitoshi Kawamura, Yusuke Kobayashi
https://arxiv.org/abs/2510.06533 https://a…
A semi-Lagrangian method for solving state constraint Mean Field Games in Macroeconomics
Fabio Camilli, Qing Tang, Yong-shen Zhou
https://arxiv.org/abs/2510.00768 https://
Replaced article(s) found for cs.AI. https://arxiv.org/list/cs.AI/new
[2/14]:
- TCP: a Benchmark for Temporal Constraint-Based Planning
Zifeng Ding, Sikuan Yan, Zhangdie Yuan, Xianglong Hu, Fangru Lin, Andreas Vlachos
Replaced article(s) found for cs.LO. https://arxiv.org/list/cs.LO/new
[1/1]:
- Janus-faces of temporal constraint languages: a dichotomy of expressivity
Johanna Brunar, Michael Pinsker, Moritz Sch\"obi
On Boolean PCSPs with Polynomial Threshold Polymorphisms
Katzper Michno
https://arxiv.org/abs/2509.26248 https://arxiv.org/pdf/2509.26248
Crosslisted article(s) found for cs.LG. https://arxiv.org/list/cs.LG/new
[2/5]:
- Linguistic Patterns in Pandemic-Related Content: A Comparative Analysis of COVID-19, Constraint, ...
Mkululi Sikosana, Sean Maudsley-Barton, Oluwaseun Ajao
On Stable Cutsets in General and Minimum Degree Constrained Graphs
Mats Vroon, Hans L. Bodlaender
https://arxiv.org/abs/2510.09432 https://arxiv.org/pdf/25…
Improved Search-to-Decision Reduction for Random Local Functions
Kel Zin Tan, Prashant Nalini Vasudevan
https://arxiv.org/abs/2510.02944 https://arxiv.org/…
CPU- and GPU-Based Parallelization of the Robust Reference Governor
Hamid R. Ossareh, William Shayne, Samuel Chevalier
https://arxiv.org/abs/2510.08288 https://
Particle momentum spectra, correlations, and maximum entropy principle in high-multiplicity collision events
S. V. Akkelin
https://arxiv.org/abs/2510.01822 https://
Burgers equation with a twist: A study on rotational-form equations
Adam Larios
https://arxiv.org/abs/2510.02761 https://arxiv.org/pdf/2510.02761
Localized structures in two-field systems: exact solutions in the presence of Lorentz symmetry breaking and explicit connection with geometric constraints
G. H. Bandeira, D. Bazeia, G. S. Santiago, Ya. Shnir
https://arxiv.org/abs/2510.07012
A Martingale approach to continuous Portfolio Optimization under CVaR like constraints
J\'er\^ome Lelong (LJK), V\'eronique Maume-Deschamps, William Thevenot
https://arxiv.org/abs/2509.26009
Replaced article(s) found for cs.LG. https://arxiv.org/list/cs.LG/new
[3/5]:
- Look-Ahead Reasoning on Learning Platforms
Haiqing Zhu, Tijana Zrnic, Celestine Mendler-D\"unner
https://arxiv.org/abs/2511.14745 https://mastoxiv.page/@arXiv_csLG_bot/115575981129228810
- Deep Gaussian Process Proximal Policy Optimization
Matthijs van der Lende, Juan Cardenas-Cartagena
https://arxiv.org/abs/2511.18214 https://mastoxiv.page/@arXiv_csLG_bot/115610315210502140
- Spectral Concentration at the Edge of Stability: Information Geometry of Kernel Associative Memory
Akira Tamamori
https://arxiv.org/abs/2511.23083 https://mastoxiv.page/@arXiv_csLG_bot/115644325602130493
- xGR: Efficient Generative Recommendation Serving at Scale
Sun, Liu, Zhang, Wu, Yang, Liang, Li, Ma, Liang, Ren, Zhang, Liu, Zhang, Qian, Yang
https://arxiv.org/abs/2512.11529 https://mastoxiv.page/@arXiv_csLG_bot/115723008170311172
- Credit Risk Estimation with Non-Financial Features: Evidence from a Synthetic Istanbul Dataset
Atalay Denknalbant, Emre Sezdi, Zeki Furkan Kutlu, Polat Goktas
https://arxiv.org/abs/2512.12783 https://mastoxiv.page/@arXiv_csLG_bot/115729287232895097
- The Semantic Illusion: Certified Limits of Embedding-Based Hallucination Detection in RAG Systems
Debu Sinha
https://arxiv.org/abs/2512.15068 https://mastoxiv.page/@arXiv_csLG_bot/115740048142898391
- Towards Reproducibility in Predictive Process Mining: SPICE -- A Deep Learning Library
Stritzel, H\"uhnerbein, Rauch, Zarate, Fleischmann, Buck, Lischka, Frey
https://arxiv.org/abs/2512.16715 https://mastoxiv.page/@arXiv_csLG_bot/115745910810427061
- Differentially private Bayesian tests
Abhisek Chakraborty, Saptati Datta
https://arxiv.org/abs/2401.15502 https://mastoxiv.page/@arXiv_statML_bot/111843467510507382
- SCAFFLSA: Taming Heterogeneity in Federated Linear Stochastic Approximation and TD Learning
Paul Mangold, Sergey Samsonov, Safwan Labbi, Ilya Levin, Reda Alami, Alexey Naumov, Eric Moulines
https://arxiv.org/abs/2402.04114
- Adjusting Model Size in Continual Gaussian Processes: How Big is Big Enough?
Guiomar Pescador-Barrios, Sarah Filippi, Mark van der Wilk
https://arxiv.org/abs/2408.07588 https://mastoxiv.page/@arXiv_statML_bot/112965266196097314
- Non-Perturbative Trivializing Flows for Lattice Gauge Theories
Mathis Gerdes, Pim de Haan, Roberto Bondesan, Miranda C. N. Cheng
https://arxiv.org/abs/2410.13161 https://mastoxiv.page/@arXiv_heplat_bot/113327593338897860
- Dynamic PET Image Prediction Using a Network Combining Reversible and Irreversible Modules
Sun, Zhang, Xia, Sun, Chen, Yang, Liu, Zhu, Liu
https://arxiv.org/abs/2410.22674 https://mastoxiv.page/@arXiv_eessIV_bot/113401026110345647
- Targeted Learning for Variable Importance
Xiaohan Wang, Yunzhe Zhou, Giles Hooker
https://arxiv.org/abs/2411.02221 https://mastoxiv.page/@arXiv_statML_bot/113429912435819479
- Refined Analysis of Federated Averaging and Federated Richardson-Romberg
Paul Mangold, Alain Durmus, Aymeric Dieuleveut, Sergey Samsonov, Eric Moulines
https://arxiv.org/abs/2412.01389 https://mastoxiv.page/@arXiv_statML_bot/113588027268311334
- Embedding-Driven Data Distillation for 360-Degree IQA With Residual-Aware Refinement
Abderrezzaq Sendjasni, Seif-Eddine Benkabou, Mohamed-Chaker Larabi
https://arxiv.org/abs/2412.12667 https://mastoxiv.page/@arXiv_csCV_bot/113672538318570349
- 3D Cell Oversegmentation Correction via Geo-Wasserstein Divergence
Peter Chen, Bryan Chang, Olivia A Creasey, Julie Beth Sneddon, Zev J Gartner, Yining Liu
https://arxiv.org/abs/2502.01890 https://mastoxiv.page/@arXiv_csCV_bot/113949981686723660
- DHP: Discrete Hierarchical Planning for Hierarchical Reinforcement Learning Agents
Shashank Sharma, Janina Hoffmann, Vinay Namboodiri
https://arxiv.org/abs/2502.01956 https://mastoxiv.page/@arXiv_csRO_bot/113949997485625086
- Foundation for unbiased cross-validation of spatio-temporal models for species distribution modeling
Diana Koldasbayeva, Alexey Zaytsev
https://arxiv.org/abs/2502.03480
- GraphCompNet: A Position-Aware Model for Predicting and Compensating Shape Deviations in 3D Printing
Juheon Lee (Rachel), Lei (Rachel), Chen, Juan Carlos Catana, Hui Wang, Jun Zeng
https://arxiv.org/abs/2502.09652 https://mastoxiv.page/@arXiv_csCV_bot/114017924551186136
- LookAhead Tuning: Safer Language Models via Partial Answer Previews
Liu, Wang, Luo, Yuan, Sun, Liang, Zhang, Zhou, Hooi, Deng
https://arxiv.org/abs/2503.19041 https://mastoxiv.page/@arXiv_csCL_bot/114227502448008352
- Constraint-based causal discovery with tiered background knowledge and latent variables in single...
Christine W. Bang, Vanessa Didelez
https://arxiv.org/abs/2503.21526 https://mastoxiv.page/@arXiv_statML_bot/114238919468512990
toXiv_bot_toot
The NPA hierarchy does not always attain the commuting operator value
Marco Fanizza, Larissa Kroell, Arthur Mehta, Connor Paddock, Denis Rochette, William Slofstra, Yuming Zhao
https://arxiv.org/abs/2510.04943
Prepared mind, fast response: A temporal decoupling framework for adaptive knowledge orchestration in open-domain dialogue
Jinling Gan, Churong Liang, Runnan Li
https://arxiv.org/abs/2510.08175
Neural Post-Einsteinian Test of General Relativity with the Third Gravitational-Wave Transient Catalog
Yiqi Xie, Gautham Narayan, Nicol\'as Yunes
https://arxiv.org/abs/2510.02515
Progressively Sampled Equality-Constrained Optimization
Frank E. Curtis, Lingjun Guo, Daniel P. Robinson
https://arxiv.org/abs/2510.00417 https://arxiv.org…
Reinforcement Learning from Probabilistic Forecasts for Safe Decision-Making via Conditional Value-at-Risk Planning
Michal Koren, Or Peretz, Tai Dinh, Philip S. Yu
https://arxiv.org/abs/2510.08226
Safe Landing on Small Celestial Bodies with Gravitational Uncertainty Using Disturbance Estimation and Control Barrier Functions
Felipe Arenas-Uribe, T. Michael Seigler, Jesse B. Hoagg
https://arxiv.org/abs/2510.05895
Optimal transport paths with capacity induced cost function
Qinglan Xia, Haotian Sun
https://arxiv.org/abs/2510.10557 https://arxiv.org/pdf/2510.10557
Truth-Aware Decoding: A Program-Logic Approach to Factual Language Generation
Faruk Alpay, Hamdi Alakkad
https://arxiv.org/abs/2510.07331 https://arxiv.org…
Quantifying the Accuracy-Interpretability Trade-Off in Concept-Based Sidechannel Models
David Debot, Giuseppe Marra
https://arxiv.org/abs/2510.05670 https://
Reinforce-Ada: An Adaptive Sampling Framework for Reinforce-Style LLM Training
Wei Xiong, Chenlu Ye, Baohao Liao, Hanze Dong, Xinxing Xu, Christof Monz, Jiang Bian, Nan Jiang, Tong Zhang
https://arxiv.org/abs/2510.04996
Off-Policy Reinforcement Learning with Anytime Safety Guarantees via Robust Safe Gradient Flow
Pol Mestres, Arnau Marzabal, Jorge Cort\'es
https://arxiv.org/abs/2510.01492 h…
Optimizing Fairness in Production Planning: A Human-Centric Approach to Machine and Workforce Allocation
Alexander Nasuta, Alessandro Cisi, Sylwia Olbrych, Gustavo Vieira, Rui Fernandes, Lucas Paletta, Marlene Mayr, Rishyank Chevuri, Robert Woitsch, Hans Aoyang Zhou, Anas Abdelrazeq, Robert H. Schmitt
https://arxiv.org/abs/2510.01094
Reinforcement Learning with Action-Triggered Observations
Alexander Ryabchenko, Wenlong Mou
https://arxiv.org/abs/2510.02149 https://arxiv.org/pdf/2510.021…
Convergence analysis of inexact MBA method for constrained upper-$\mathcal{C}^2$ optimization problems
Ruyu Liu, Shaohua Pan
https://arxiv.org/abs/2511.09940 https://arxiv.org/pdf/2511.09940 https://arxiv.org/html/2511.09940
arXiv:2511.09940v1 Announce Type: new
Abstract: This paper concerns a class of constrained optimization problems in which, the objective and constraint functions are both upper-$\mathcal{C}^2$. For such nonconvex and nonsmooth optimization problems, we develop an inexact moving balls approximation (MBA) method by a workable inexactness criterion for the solving of subproblems. By leveraging a global error bound for the strongly convex program associated with parametric optimization problems, we establish the full convergence of the iterate sequence under the partial bounded multiplier property (BMP) and the Kurdyka-{\L}ojasiewicz (KL) property of the constructed potential function, and achieve the local convergence rate of the iterate and objective value sequences if the potential function satisfies the KL property of exponent $q\in[1/2,1)$. A verifiable condition is also provided to check whether the potential function satisfies the KL property of exponent $q\in[1/2,1)$ at the given critical point. To the best of our knowledge, this is the first implementable inexact MBA method with a full convergence certificate for the constrained nonconvex and nonsmooth optimization problem.
toXiv_bot_toot
Optimizing Fairness in Production Planning: A Human-Centric Approach to Machine and Workforce Allocation
Alexander Nasuta, Alessandro Cisi, Sylwia Olbrych, Gustavo Vieira, Rui Fernandes, Lucas Paletta, Marlene Mayr, Rishyank Chevuri, Robert Woitsch, Hans Aoyang Zhou, Anas Abdelrazeq, Robert H. Schmitt
https://arxiv.org/abs/2510.01094
MM-LMPC: Multi-Modal Learning Model Predictive Control via Bandit-Based Mode Selection
Wataru Hashimoto, Kazumune Hashimoto
https://arxiv.org/abs/2510.00410 https://
Riccati-ZORO: An efficient algorithm for heuristic online optimization of internal feedback laws in robust and stochastic model predictive control
Florian Messerer, Yunfan Gao, Jonathan Frey, Moritz Diehl
https://arxiv.org/abs/2511.10473 https://arxiv.org/pdf/2511.10473 https://arxiv.org/html/2511.10473
arXiv:2511.10473v1 Announce Type: new
Abstract: We present Riccati-ZORO, an algorithm for tube-based optimal control problems (OCP). Tube OCPs predict a tube of trajectories in order to capture predictive uncertainty. The tube induces a constraint tightening via additional backoff terms. This backoff can significantly affect the performance, and thus implicitly defines a cost of uncertainty. Optimizing the feedback law used to predict the tube can significantly reduce the backoffs, but its online computation is challenging.
Riccati-ZORO jointly optimizes the nominal trajectory and uncertainty tube based on a heuristic uncertainty cost design. The algorithm alternates between two subproblems: (i) a nominal OCP with fixed backoffs, (ii) an unconstrained tube OCP, which optimizes the feedback gains for a fixed nominal trajectory. For the tube optimization, we propose a cost function informed by the proximity of the nominal trajectory to constraints, prioritizing reduction of the corresponding backoffs. These ideas are developed in detail for ellipsoidal tubes under linear state feedback. In this case, the decomposition into the two subproblems yields a substantial reduction of the computational complexity with respect to the state dimension from $\mathcal{O}(n_x^6)$ to $\mathcal{O}(n_x^3)$, i.e., the complexity of a nominal OCP.
We investigate the algorithm in numerical experiments, and provide two open-source implementations: a prototyping version in CasADi and a high-performance implementation integrated into the acados OCP solver.
toXiv_bot_toot
Riemannian Consistency Model
Chaoran Cheng, Yusong Wang, Yuxin Chen, Xiangxin Zhou, Nanning Zheng, Ge Liu
https://arxiv.org/abs/2510.00983 https://arxiv.or…
The Trajectory Bundle Method: Unifying Sequential-Convex Programming and Sampling-Based Trajectory Optimization
Kevin Tracy, John Z. Zhang, Jon Arrizabalaga, Stefan Schaal, Yuval Tassa, Tom Erez, Zachary Manchester
https://arxiv.org/abs/2509.26575
A Block-Activated Decomposition Algorithm for Multi-Stage Stochastic Variational Inequalities
Minh N. B\`ui
https://arxiv.org/abs/2509.26198 https://arxiv.…