Setchain Algorithms for Blockchain Scalability
Arivarasan Karmegam, Gabina Luz Bianchi, Margarita Capretto, Mart\'in Ceresa, Antonio Fern\'andez Anta, C\'esar S\'anchez
https://arxiv.org/abs/2509.09795
Long Context Automated Essay Scoring with Language Models
Christopher Ormerod, Gitit Kehat
https://arxiv.org/abs/2509.10417 https://arxiv.org/pdf/2509.1041…
Emergence of Hierarchies in Multi-Agent Self-Organizing Systems Pursuing a Joint Objective
Gang Chen, Guoxin Wang, Anton van Beek, Zhenjun Ming, Yan Yan
https://arxiv.org/abs/2508.09541
A Divide-and-Conquer Tiling Method for the Design of Large Aperiodic Phased Arrays
Nicola Anselmi, Paolo Rocca, Giovanni Toso, Andrea Massa
https://arxiv.org/abs/2508.09682 http…
AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders
Hiroya Kato, Kentaro Kita, Kento Hasegawa, Seira Hidano
https://arxiv.org/abs/2508.08583
Formation of organic hazes in CO$_2$-rich sub-Neptune atmospheres within the graphite-stability regime
Sai Wang, Zhengbo Yang, Chao He, Haixin Li, Yu Liu, Yingjian Wang, Xiao'ou Luo, Sarah E. Moran, Cara Pesciotta, Sarah M. H\"orst, Julianne I. Moses, V\'eronique Vuitton, Laur\`ene Flandinet
https://arxiv.org/abs/2508.05974
How some news organizations are using AI models powered by retrieval-augmented generation to surface the most newsworthy elements from very large datasets (Josh Axelrod/Nieman Lab)
https://www.niemanlab.org/2025/08/the-good
At its core, #CCSignals is an attempt by Creative Commons, a Silicon Valley-based organisation, to legitimise the AI grifts of its donors – Google, Microsoft, and Meta (Zuckerberg).
Creative Commons was always a thinly-veiled attempt at enabling Big Tech data farmers to get more data (that’s why the whole “open data” realm is so well funded/popular – open as in “open for business” not fre…
Vanilla-Converter: A Tool for Converting Camunda 7 BPMN Models into Camunda 8 Models
Dragana Sunaric, Charlotte Verbruggen, Dominik Bork
https://arxiv.org/abs/2508.04352 https:/…
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection
Haywood Gelman, John D. Hastings, David Kenley
https://arxiv.org/abs/2509.06920 https://