
2025-07-17 08:42:03
from my link log —
Dynamic witnesses for static type errors in OCaml, or, ill-typed programs usually go wrong.
https://arxiv.org/abs/1606.07557
saved 2025-05-31
from my link log —
Dynamic witnesses for static type errors in OCaml, or, ill-typed programs usually go wrong.
https://arxiv.org/abs/1606.07557
saved 2025-05-31
Taming Uncertainty via Automation: Observing, Analyzing, and Optimizing Agentic AI Systems
Dany Moshkovich, Sergey Zeltyn
https://arxiv.org/abs/2507.11277 …
NemeSys: An Online Underwater Explorer with Goal-Driven Adaptive Autonomy
Adnan Abdullah, Alankrit Gupta, Vaishnav Ramesh, Shivali Patel, Md Jahidul Islam
https://arxiv.org/abs/2507.11889
Pete Carroll talks Preseason Week 2: 'I want to see us execute' https://www.raiders.com/video/pete-carroll-raiders-training-camp-preseason-week-2-presser-08142025
Envisage: Towards Expressive Visual Graph Querying
Xiaolin Wen, Qishuang Fu, Shuangyue Han, Yichen Guo, Joseph K. Liu, Yong Wang
https://arxiv.org/abs/2507.11999
Consumer Law for AI Agents
Christoph Busch
https://arxiv.org/abs/2507.11567 https://arxiv.org/pdf/2507.11567
PuDHammer: Experimental Analysis of Read Disturbance Effects of Processing-using-DRAM in Real DRAM Chips
Ismail Emir Yuksel, Akash Sood, Ataberk Olgun, O\u{g}uzhan Canpolat, Haocong Luo, F. Nisa Bostanc{\i}, Mohammad Sadrosadati, A. Giray Ya\u{g}l{\i}k\c{c}{\i}, Onur Mutlu
https://arxiv.org/abs/2506.12947
Surfing the SWAVES: Lifecycle-aware Service Placement in MEC
Federico Giarr\`e, Holger Karl
https://arxiv.org/abs/2506.12265 https://…
Learn from previous runs to improve future automation and save plans in a gallery for reuse.
🔀 Parallel execution
Run multiple tasks simultaneously with status indicators for efficient workflow management.
🌐 Web automation
Browse websites, fill forms, navigate deep sites not indexed by search engines, with real-time browser view.
💻 Code execution
Generate and execute code alongside web browsing for comprehensive task automation capabilities.
🔗
Supreme Court to hear Alabama appeal in push to execute intellectually disabled man | The Independent
https://www.independent.co.uk/news/world/americas/supreme-court-execute-intellectually-disabled-joseph-clifton-smith-b2765542.html
@… The public hosted Renovate runs with some extra security measures so you can't execute any code on their systems. Which is fair. So one of the features that I want to use needs https://…
From Leadnow
urgent petition from Leadnow supporter Leslie, who is calling on the federal government to immediately end its contracts with GardaWorld — the Canadian company staffing a new ICE immigration detention facility in the U.S. called Alligator Alcatraz.
GardaWorld — a Canadian-based “private security company” — has million-dollar contracts to execute Trump's racist and inhumane immigration regime, which kidnaps people, tears families apart, and denies people due proc…
A Canonical Bijection Between Finite-Decimal Real Numbers and Natural Numbers with Constant-Time Enumeration Formulas
S. K. Rithvik
https://arxiv.org/abs/2508.10750 https://
Series C, Episode 03 - Volcano
TARRANT: Well, let's go, while we can.
AVON: Execute preprogrammed course.
ZEN: Confirmed.
DAYNA: I didn't believe they'd do it.
TARRANT: Neither did Servalan.
https://blake.torpidity.net/m/303/650 B7B5
Goldman Sachs CTO Marco Argenti says the bank is "going to start augmenting our workforce with Devin", Cognition's AI coding assistant, as Wall Street adopts AI (Hugh Son/CNBC)
https://www.cnbc.com/2025/07/11/goldman-sachs-auto…
Cybercriminals are using AI to execute highly targeted attacks at scale, causing people to unwittingly send money and sensitive information or simply open themselves up to theft.
Hackers are now able to rent generative AI large language models created in the underground cybercrime community to help formulate text-based scams.
But just as generative AI is enhancing and scaling social engineering attacks, so too is it giving defenders a leg up.
Finally a useful magic quadrant
Thanks to @… for the discovery.
#cybersecurity #vulnerability
Today I finally remembered the syntax to delete a remote git branch: `git push origin --delete 42_not_needed_branch` (and was brave enought to just execute it without checking, yolo)
How Quantum Agents Can Change Which Strategies Are More Complex
Spiros Kechrimparis, Nix Barnett, Mile Gu, Hyukjoon Kwon
https://arxiv.org/abs/2508.08092 https://
from my link log —
Distance-based ISA for efficient register renaming.
https://www.sigarch.org/distance-based-isa-for-efficient-register-management/
saved 2025-06-04
SHIELDA: Structured Handling of Exceptions in LLM-Driven Agentic Workflows
Jingwen Zhou, Jieshan Chen, Qinghua Lu, Dehai Zhao, Liming Zhu
https://arxiv.org/abs/2508.07935 https:…
TooBadRL: Trigger Optimization to Boost Effectiveness of Backdoor Attacks on Deep Reinforcement Learning
Songze Li, Mingxuan Zhang, Oubo Ma, Kang Wei, Shouling Ji
https://arxiv.org/abs/2506.09562
PyVision: Agentic Vision with Dynamic Tooling
Shitian Zhao, Haoquan Zhang, Shaoheng Lin, Ming Li, Qilong Wu, Kaipeng Zhang, Chen Wei
https://arxiv.org/abs/2507.07998
Convergence Sans Synchronization
Arya Tanmay Gupta
https://arxiv.org/abs/2508.06949 https://arxiv.org/pdf/2508.06949
Reading Command output line by line
Sometimes, you want to execute a system command from within a Go app and process it's output line-by-line in a streaming fashion.
https://www.yellowduck.be/posts/reading-command-output-line-by-line/
A Survey of LLM-based Deep Search Agents: Paradigm, Optimization, Evaluation, and Challenges
Yunjia Xi, Jianghao Lin, Yongzhao Xiao, Zheli Zhou, Rong Shan, Te Gao, Jiachen Zhu, Weiwen Liu, Yong Yu, Weinan Zhang
https://arxiv.org/abs/2508.05668
🎯 Why Developers Are Going Crazy For It
1. True Agentic Intelligence 🤝
Unlike traditional chatbots, Kimi K2 can: • Plan and execute multi-step tasks autonomously • Use tools and APIs intelligently • Handle complex workflows without human intervention • Adapt strategies based on real-time feedback
OK so, let's see how far I can get figuring out the VSC8512 SERDES stuff without any nonpublic information.
It looks like everything fun is accessed via register 18G "global command and serdes configuration".
This is a 16-bit register which is basically a mailbox to the internal MCU.
Bit 15 (0x8000) is documented as "execute command". This always has to be set when writing to the PHY, then you wait for it to be cleared before doing anything else. Tha…
The new Mastodon version seems to shit itself on Safari? The Home/Trending/etc links don't work when clicked. And then after a few minutes they start working again, randomly. I only have this in the console.
Anybody using Safari here? v18.5
#mastodon
Trump calls up nonimmigration officers to help execute ICE deportation operation (Anna Giaritelli/Washington Examiner)
https://www.washingtonexaminer.com/news/3460118/doj-dhs-diverted-assist-ice-deportations-illegal-immigrants-trump/
http://www.memeorandum.com/250702/p61#a250702p61
Data Center Appliance: »A data center appliance is a ready-to-use device that integrates key software and hardware components to execute a specific IT function. It is a functional unit comprised of hardware and software designed for a specific, often narrowly defined, purpose.« 🤡🤯 #buzzworddetective
Grounded Vision-Language Navigation for UAVs with Open-Vocabulary Goal Understanding
Yuhang Zhang, Haosheng Yu, Jiaping Xiao, Mir Feroskhan
https://arxiv.org/abs/2506.10756
AI Agents and the Law
Mark O. Riedl, Deven R. Desai
https://arxiv.org/abs/2508.08544 https://arxiv.org/pdf/2508.08544…
I've just found out that the nano text editor can sort lines by pressing Ctrl-T (execute any command on marked lines) and then entering "| sort" (like in a shell pipe).
https://unix.stackexchange.com/a/717925
Open Source Planning & Control System with Language Agents for Autonomous Scientific Discovery
Licong Xu, Milind Sarkar, Anto I. Lonappan, \'I\~nigo Zubeldia, Pablo Villanueva-Domingo, Santiago Casas, Christian Fidler, Chetana Amancharla, Ujjwal Tiwari, Adrian Bayer, Chadi Ait Ekiou, Miles Cranmer, Adrian Dimitrov, James Fergusson, Kahaan Gandhi, Sven Krippendorf, Andrew Laverick, Julien Lesgourgues, Antony Lewis, Thomas Meier, Blake Sherwin, Kristen Surrao, Francisco Villaescu…
Reasoning to Edit: Hypothetical Instruction-Based Image Editing with Visual Reasoning
Qingdong He, Xueqin Chen, Chaoyi Wang, Yanjie Pan, Xiaobin Hu, Zhenye Gan, Yabiao Wang, Chengjie Wang, Xiangtai Li, Jiangning Zhang
https://arxiv.org/abs/2507.01908
Your Agent Can Defend Itself against Backdoor Attacks
Li Changjiang, Liang Jiacheng, Cao Bochuan, Chen Jinghui, Wang Ting
https://arxiv.org/abs/2506.08336 …
from my link log —
Tracking source locations for profiling GPU programs in Futhark.
https://futhark-lang.org/blog/2025-07-29-tracking-source-locations.html
saved 2025-08-01
Execution-Feedback Driven Test Generation from SWE Issues
Toufique Ahmed, Jatin Ganhotra, Avraham Shinnar, Martin Hirzel
https://arxiv.org/abs/2508.06365 https://
This https://arxiv.org/abs/2505.16764 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csPL_…
Wait-Only Broadcast Protocols are Easier to Verify
Lucie Guillou, Arnaud Sangnier, Nathalie Sznajder
https://arxiv.org/abs/2506.22144 https://
@… Under hospitals in Israel are refuges to protect the patients and staffs from bombing. Under hospitals in Gaza are military facilities used to plan & execute bombings of civilian targets in Israel.
This https://arxiv.org/abs/2502.10090 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csRO_…
De-AntiFake: Rethinking the Protective Perturbations Against Voice Cloning Attacks
Wei Fan, Kejiang Chen, Chang Liu, Weiming Zhang, Nenghai Yu
https://arxiv.org/abs/2507.02606
W przypadku #PyPy, przyczyną jest zawsze jakiś wyciek zasobów…
https://github.com/vutran1710/PyrateLimiter/pull/205
Petri Net Modeling and Deadlock-Free Scheduling of Attachable Heterogeneous AGV Systems
Boyu Li, Zhengchen Li, Weimin Wu, Mengchu Zhou
https://arxiv.org/abs/2508.00724 https://
20-GHz bandwidth optical activation function based on a semiconductor laser
Hai-Fei Guo, Zheng-Can Sun, Yi-Wei Shen, Rui-Qian Li, Xing Li, Cheng Wang
https://arxiv.org/abs/2507.00468
Hijacking JARVIS: Benchmarking Mobile GUI Agents against Unprivileged Third Parties
Guohong Liu, Jialei Ye, Jiacheng Liu, Yuanchun Li, Wei Liu, Pengzhi Gao, Jian Luan, Yunxin Liu
https://arxiv.org/abs/2507.04227
Knowledge-Guided Attention-Inspired Learning for Task Offloading in Vehicle Edge Computing
Ke Ma, Junfei Xie
https://arxiv.org/abs/2506.04456 https://
Intercepting 3I/ATLAS at Closest Approach to Jupiter with the Juno spacecraft
Abraham Loeb, Adam Hibberd, Adam Crowl
https://arxiv.org/abs/2507.21402 https://
Phi-Ground Tech Report: Advancing Perception in GUI Grounding
Miaosen Zhang, Ziqiang Xu, Jialiang Zhu, Qi Dai, Kai Qiu, Yifan Yang, Chong Luo, Tianyi Chen, Justin Wagle, Tim Franklin, Baining Guo
https://arxiv.org/abs/2507.23779
from my link log —
Implement your programming language twice.
https://futhark-lang.org/blog/2025-05-07-implement-your-language-twice.html
saved 2025-05-08
This https://arxiv.org/abs/2505.23073 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csAR_…
Real-Time Iteration Scheme for Diffusion Policy
Yufei Duan, Hang Yin, Danica Kragic
https://arxiv.org/abs/2508.05396 https://arxiv.org/pdf/2508.05396
Agent-based Liquidity Risk Modelling for Financial Markets
Perukrishnen Vytelingum, Rory Baggott, Namid Stillman, Jianfei Zhang, Dingqiu Zhu, Tao Chen, Justin Lyon
https://arxiv.org/abs/2505.15296
Simpler, Better, Faster, Stronger: Revisiting a Successful Reduction Rule for Dominating Set
Lukas Geis, Alexander Leonhardt, Johannes Meintrup, Ulrich Meyer, Manuel Penschuck
https://arxiv.org/abs/2506.14564
Quantum Circuit Caches and Compressors for Low Latency, High Throughput Computing
Ioana Moflic, Alan Robertson, Simon J. Devitt, Alexandru Paler
https://arxiv.org/abs/2507.20677
Budget Allocation Policies for Real-Time Multi-Agent Path Finding
Raz Beck, Roni Stern
https://arxiv.org/abs/2507.16874 https://arxiv.org/pdf/2507.16874
A System Level Compiler for Massively-Parallel, Spatial, Dataflow Architectures
Dirk Van Essendelft, Patrick Wingo, Terry Jordan, Ryan Smith, Wissam Saidi
https://arxiv.org/abs/2506.15875
from my link log —
Decomposing transactional systems.
https://transactional.blog/blog/2025-decomposing-transactional-systems
saved 2025-04-18
Improving LLM Agents with Reinforcement Learning on Cryptographic CTF Challenges
Lajos Muzsai, David Imolai, Andr\'as Luk\'acs
https://arxiv.org/abs/2506.02048
DeepGo: Predictive Directed Greybox Fuzzing
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Kai Lu
https://arxiv.org/abs/2507.21952 https://arxiv.o…
Optimization and Synthesis of Quantum Circuits with Global Gates
Alejandro Villoria, Henning Basold, Alfons Laarman
https://arxiv.org/abs/2507.20694 https://
This https://arxiv.org/abs/2505.14314 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csAR_…
Enhancing Speech Instruction Understanding and Disambiguation in Robotics via Speech Prosody
David Sasu, Kweku Andoh Yamoah, Benedict Quartey, Natalie Schluter
https://arxiv.org/abs/2506.02057
Graphs Meet AI Agents: Taxonomy, Progress, and Future Opportunities
Yuanchen Bei, Weizhi Zhang, Siwen Wang, Weizhi Chen, Sheng Zhou, Hao Chen, Yong Li, Jiajun Bu, Shirui Pan, Yizhou Yu, Irwin King, Fakhri Karray, Philip S. Yu
https://arxiv.org/abs/2506.18019
Replaced article(s) found for cs.CV. https://arxiv.org/list/cs.CV/new
[5/5]:
Imagine, Verify, Execute: Memory-Guided Agentic Exploration with Vision-Language Models
AI is the Strategy: From Agentic AI to Autonomous Business Models onto Strategy in the Age of AI
Ren\'e Bohnsack, Mickie de Wet
https://arxiv.org/abs/2506.17339
Prompt Optimization and Evaluation for LLM Automated Red Teaming
Michael Freenor, Lauren Alvarez, Milton Leal, Lily Smith, Joel Garrett, Yelyzaveta Husieva, Madeline Woodruff, Ryan Miller, Erich Kummerfeld, Rafael Medeiros, Sander Schulhoff
https://arxiv.org/abs/2507.22133
TypeTele: Releasing Dexterity in Teleoperation by Dexterous Manipulation Types
Yuhao Lin, Yi-Lin Wei, Haoran Liao, Mu Lin, Chengyi Xing, Hao Li, Dandan Zhang, Mark Cutkosky, Wei-Shi Zheng
https://arxiv.org/abs/2507.01857
DX100: A Programmable Data Access Accelerator for Indirection
Alireza Khadem, Kamalavasan Kamalakkannan, Zhenyan Zhu, Akash Poptani, Yufeng Gu, Jered Benjamin Dominguez-Trujillo, Nishil Talati, Daichi Fujiki, Scott Mahlke, Galen Shipman, Reetuparna Das
https://arxiv.org/abs/2505.23073
Scheduzz: Constraint-based Fuzz Driver Generation with Dual Scheduling
Yan Li, Wenzhang Yang, Yuekun Wang, Jian Gao, Shaohua Wang, Yinxing Xue, Lijun Zhang
https://arxiv.org/abs/2507.18289
Reconfigurable qubit states and quantum trajectories in a synthetic artificial neuron network with a process to direct information generation from co-integrated burst-mode spiking under non-Markovianity
Osama M. Nayfeh, Chris S. Horne
https://arxiv.org/abs/2507.16669
Invisible Injections: Exploiting Vision-Language Models Through Steganographic Prompt Embedding
Chetan Pathade
https://arxiv.org/abs/2507.22304 https://arx…
MCP4EDA: LLM-Powered Model Context Protocol RTL-to-GDSII Automation with Backend Aware Synthesis Optimization
Yiting Wang, Wanghao Ye, Yexiao He, Yiran Chen, Gang Qu, Ang Li
https://arxiv.org/abs/2507.19570
AgentAlign: Navigating Safety Alignment in the Shift from Informative to Agentic Large Language Models
Jinchuan Zhang, Lu Yin, Yan Zhou, Songlin Hu
https://arxiv.org/abs/2505.23020
GraspMAS: Zero-Shot Language-driven Grasp Detection with Multi-Agent System
Quang Nguyen, Tri Le, Huy Nguyen, Thieu Vo, Tung D. Ta, Baoru Huang, Minh N. Vu, Anh Nguyen
https://arxiv.org/abs/2506.18448
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes
Pasquale De Rosa, Simon Queyrut, Y\'erom-David Bromberg, Pascal Felber, Valerio Schiavoni
https://arxiv.org/abs/2506.19480
HetGPU: The pursuit of making binary compatibility towards GPUs
Yiwei Yang, Yusheng Zheng, Tong Yu, Andi Quinn
https://arxiv.org/abs/2506.15993 https://
Enhancing Object Search in Indoor Spaces via Personalized Object-factored Ontologies
Akash Chikhalikar, Ankit A. Ravankar, Jose Victorio Salazar Luces, Yasuhisa Hirata
https://arxiv.org/abs/2506.14422
Detecting Hardware Trojans in Microprocessors via Hardware Error Correction Code-based Modules
Alessandro Palumbo, Ruben Salvador
https://arxiv.org/abs/2506.15417
Tensor Manipulation Unit (TMU): Reconfigurable, Near-Memory Tensor Manipulation for High-Throughput AI SoC
Weiyu Zhou, Zheng Wang, Chao Chen, Yike Li, Yongkui Yang, Zhuoyu Wu, Anupam Chattopadhyay
https://arxiv.org/abs/2506.14364
TopicAttack: An Indirect Prompt Injection Attack via Topic Transition
Yulin Chen, Haoran Li, Yuexin Li, Yue Liu, Yangqiu Song, Bryan Hooi
https://arxiv.org/abs/2507.13686