
2025-07-18 20:10:23
Zelensky doesn't see corruption as a problem, prosecuted activist says: https://benborges.xyz/2025/07/18/zelensky-doesnt-see-corruption-as.html
Zelensky doesn't see corruption as a problem, prosecuted activist says: https://benborges.xyz/2025/07/18/zelensky-doesnt-see-corruption-as.html
Beyond Solving Math Quiz: Evaluating the Ability of Large Reasoning Models to Ask for Information
Youcheng Huang, Bowen Qin, Chen Huang, Duanyu Feng, Xi Yang, Wenqiang Lei
https://arxiv.org/abs/2508.11252
Efficient Online Learning and Adaptive Planning for Robotic Information Gathering Based on Streaming Data
Sanjeev Ramkumar Sudha, Joel Jose, Erlend M. Coates
https://arxiv.org/abs/2507.13053
Really good clear explanation from @…, laying out various problems and risks with trying to implement "age verification" online.
"Firstly, in order to prove your age you’re being asked to hand over some fairly important personal details. ... Usually the company you’re handing these details to is a third party, often one you will never have heard of before. ...
"The data that is being collected for age verification purposes is extremely tempting to hackers ... and at the moment there is no specific regulation outlining the security standards that these companies should meet ...
"Let’s say all the current age verification providers are incredibly robust, though. ... The question still remains... should you be sharing this information with random websites anyway?
"... once you’ve trained the population of an entire country to routinely hand over their credit card details in order to access content, you have given them an incredibly bad habit that it’s going to be tough to break. ... You don’t just prove your age once, after all, you potentially have to do it dozens of times, to access a bunch of different websites. Everything from BlueSky to PornHub to Spotify and even maybe Wikipedia. It becomes a weekly or perhaps monthly occurrence. Just as individual users don’t tend to read every website’s terms and conditions, it’s unlikely they’re all going to do due diligence checks on every provider who asks for ID, especially once they’ve become used to just handing that data over.
"And although that may not be a problem for _you_, you tech-savvy cleverclogs, if you’ve ever found yourself in the position of unpaid IT support for one of your less knowledgeable friends or relatives, hopefully you can see why it’s a huge problem for the UK population more broadly."
And more!
#AgeVerification #OnlineSafetyAct #OSA
Information-Theoretic Fairness with A Bounded Statistical Parity Constraint
Amirreza Zamani, Abolfazl Changizi, Ragnar Thobaben, Mikael Skoglund
https://arxiv.org/abs/2508.12847
SpecDiff: Accelerating Diffusion Model Inference with Self-Speculation
Jiayi Pan, Jiaming Xu, Yongkang Zhou, Guohao Dai
https://arxiv.org/abs/2509.13848 https://
Atom-Searcher: Enhancing Agentic Deep Research via Fine-Grained Atomic Thought Reward
Yong Deng, Guoqing Wang, Zhenzhe Ying, Xiaofeng Wu, Jinzhen Lin, Wenwen Xiong, Yuqin Dai, Shuo Yang, Zhanwei Zhang, Qiwen Wang, Yang Qin, Changhua Meng
https://arxiv.org/abs/2508.12800
Transient-Stability-Aware Frequency Provision in IBR-Rich Grids via Information Gap Decision Theory and Deep Learning
Amin Masoumi, Mert Korkali
https://arxiv.org/abs/2507.13265
It's funny how people asking for someone's gender when the information they need is pronouns. Whoever came up with the term XY problem clearly chose a suitable name.
Projective Plane Subdivision Method For Initial Orbit Determination
Ruiqi Huang, Anton Leykin, Michela Mancini
https://arxiv.org/abs/2509.14397 https://arx…
Limit theory for mean-field control problems with common noise adapted controls
Bruno Bouchard, Xiaolu Tan
https://arxiv.org/abs/2509.14734 https://arxiv.o…
Who to Trust? Aggregating Client Knowledge in Logit-Based Federated Learning
Viktor Kovalchuk, Nikita Kotelevskii, Maxim Panov, Samuel Horv\'ath, Martin Tak\'a\v{c}
https://arxiv.org/abs/2509.15147
Spatial-CLAP: Learning Spatially-Aware audio--text Embeddings for Multi-Source Conditions
Kentaro Seki, Yuki Okamoto, Kouei Yamaoka, Yuki Saito, Shinnosuke Takamichi, Hiroshi Saruwatari
https://arxiv.org/abs/2509.14785
Reducing AoI and Improving Throughput for NOMA-assisted SGF Systems: A Hierarchical Learning Approach
Yuqin Liu, Mona Jaber, Yan Liu, Arumugam Nallanathan
https://arxiv.org/abs/2508.11473
Positive maps and extendibility hierarchies from copositive matrices
Aabhas Gulati, Ion Nechita, Sang-Jun Park
https://arxiv.org/abs/2509.15201 https://arx…
Fluid Dynamics and Domain Reconstruction from Noisy Flow Images Using Physics-Informed Neural Networks and Quasi-Conformal Mapping
Han Zhang, Xue-Cheng Tai, Jean-Michel Morel, Raymond H. Chan
https://arxiv.org/abs/2508.11216
LKFMixer: Exploring Large Kernel Feature For Efficient Image Super-Resolution
Yinggan Tang, Quanwei Hu
https://arxiv.org/abs/2508.11391 https://arxiv.org/p…
Is This News Still Interesting to You?: Lifetime-aware Interest Matching for News Recommendation
Seongeun Ryu, Yunyong Ko, Sang-Wook Kim
https://arxiv.org/abs/2508.13064 https:/…
Dynamic Non-Bayesian Persuasion
Masanori Kobayashi
https://arxiv.org/abs/2508.12328 https://arxiv.org/pdf/2508.12328
An Efficient Network-aware Direct Search Method for Influence Maximization
Matteo Bergamaschi, Sara Venturini, Francesco Tudisco, Francesco Rinaldi
https://arxiv.org/abs/2508.12164
AROMA: Mixed-Initiative AI Assistance for Non-Visual Cooking by Grounding Multi-modal Information Between Reality and Videos
Zheng Ning, Leyang Li, Daniel Killough, JooYoung Seo, Patrick Carrington, Yapeng Tian, Yuhang Zhao, Franklin Mingzhe Li, Toby Jia-Jun Li
https://arxiv.org/abs/2507.10963
The “Neural Data” Goldilocks Problem: Defining “Neural Data” in U.S. State Privacy Laws
https://fpf.org/blog/the-neural-data-goldilocks-problem-defining-neural-data-in-u-s-state-privacy-laws/
@…
In 2030, OpenAI projects $200B in revenue, with R&D spending hitting ~45% of that, or ~$90B; R&D costs of Alphabet and others are currently 10%-20% of revenue (The Information)
https://www.theinformation.com/articles/openais-350-billion-computing-co…
An optimal experimental design approach to sensor placement in continuous stochastic filtering
Sahani Pathiraja, Claudia Schillings, Philipp Wacker
https://arxiv.org/abs/2508.12288
Detecting $k$-nonstretchability via a class of informationally complete symmetric measurements
Yan Hong, Mengjia Zhang, Limin Gao, Huaqi Zhou, Limei Zhang
https://arxiv.org/abs/2508.12817
Towards a category-theoretic foundation of Classical and Quantum Information Geometry
Florio M. Ciaglia, Fabio Di Cosmo, Laura Gonz\'alez-Bravo
https://arxiv.org/abs/2509.10262
Developing Visual Augmented Q&A System using Scalable Vision Embedding Retrieval & Late Interaction Re-ranker
Rachna Saxena, Abhijeet Kumar, Suresh Shanmugam
https://arxiv.org/abs/2507.12378
Quickest Change Detection with Cost-Constrained Experiment Design
Patrick Vincent N. Lubenia, Taposh Banerjee
https://arxiv.org/abs/2509.14186 https://arxi…
A Nonparallel Support Tensor Machine for Binary Classification based Large Margin Distribution and Iterative Optimization
Zhuolin Du, Yisheng Song
https://arxiv.org/abs/2507.13012
Information Field Theory based Event Reconstruction for Cosmic Ray Radio Detectors
Simon Str\"ahnz, Tim Huege, Torsten En{\ss}lin, Karen Terveer, Anna Nelles
https://arxiv.org/abs/2507.10738
High-dimensional maximum-entropy phase space tomography
Austin Hoover
https://arxiv.org/abs/2508.11227 https://arxiv.org/pdf/2508.11227
Sampled-Based Guided Quantum Walk: Non-variational quantum algorithm for combinatorial optimization
Ugo Nzongani, Dylan Laplace Mermoud, Giuseppe Di Molfetta, Andrea Simonetto
https://arxiv.org/abs/2509.15138
Happens a lot. There was a bug in the MedAdvisor Android app. It wouldn't accept photos of scripts for several weeks. I sent them an email explaining the problem we had encountered. I included the information that it didn't work on either my phone model or the husband's different model both running android version etc. Their first response was to ask what phone I was using. 🤦♀️
#TechHelp
SmokeSVD: Smoke Reconstruction from A Single View via Progressive Novel View Synthesis and Refinement with Diffusion Models
Chen Li, Shanshan Dong, Sheng Qiu, Jianmin Han, Zan Gao, Kemeng Huang, Taku Komura
https://arxiv.org/abs/2507.12156
Data Synchronization at High Frequencies
Xinbing Kong, Cheng Liu, Bin Wu
https://arxiv.org/abs/2507.12220 https://arxiv.org/pdf/2507.…
Friend or Foe: Delegating to an AI Whose Alignment is Unknown
Drew Fudenberg, Annie Liang
https://arxiv.org/abs/2509.14396 https://arxiv.org/pdf/2509.14396…
The Pandora's Box Problem with Sequential Inspections
Ali Aouad, Jingwei Ji, Yaron Shaposhnik
https://arxiv.org/abs/2507.07508 https://
GMail:
"Be careful with this message.
This message appears to be sent from your account but Gmail couldn't verify this. Someone might be impersonating your account. If you're not sure the message is from you, use caution when clicking links, downloading attachments, or replying with personal information."
I sent it while logged in to GMail using multiple authentication steps from my home network using a secure laptop. What are they talking about? Serious question: how could they not verify it? It's either an idiotic engineering problem on their end or I'm terrified that security is meaningless. Probably both.
TL;DR: what if instead of denying the harms of fascism, we denied its suppressive threats of punishment
Many of us have really sharpened our denial skills since the advent of the ongoing pandemic (perhaps you even hesitated at the word "ongoing" there and thought "maybe I won't read this one, it seems like it'll be tiresome"). I don't say this as a preface to a fiery condemnation or a plea to "sanity" or a bunch of evidence of how bad things are, because I too have honed my denial skills in these recent years, and I feel like talking about that development.
Denial comes in many forms, including strategic information avoidance ("I don't have time to look that up right now", "I keep forgetting to look into that", "well this author made a tiny mistake, so I'll click away and read something else", "I'm so tired of hearing about this, let me scroll farther", etc.) strategic dismissal ("look, there's a bit of uncertainty here, I should ignore this", "this doesn't line up perfectly with my anecdotal experience, it must be completely wrong", etc.) and strategic forgetting ("I don't remember what that one study said exactly; it was painful to think about", "I forgot exactly what my friend was saying when we got into that argument", etc.). It's in fact a kind of skill that you can get better at, along with the complementary skill of compartmentalization. It can of course be incredibly harmful, and a huge genre of fables exists precisely to highlight its harms, but it also has some short-term psychological benefits, chiefly in the form of muting anxiety. This is not an endorsement of denial (the harms can be catastrophic), but I want to acknowledge that there *are* short-term benefits. Via compartmentalization, it's even possible to be honest with ourselves about some of our own denials without giving them up immediately.
But as I said earlier, I'm not here to talk you out of your denials. Instead, given that we are so good at denial now, I'm here to ask you to be strategic about it. In particular, we live in a world awash with propaganda/advertising that serves both political and commercial ends. Why not use some of our denial skills to counteract that?
For example, I know quite a few people in complete denial of our current political situation, but those who aren't (including myself) often express consternation about just how many people in the country are supporting literal fascism. Of course, logically that appearance of widespread support is going to be partly a lie, given how much our public media is beholden to the fascists or outright in their side. Finding better facts on the true level of support is hard, but in the meantime, why not be in denial about the "fact" that Trump has widespread popular support?
To give another example: advertisers constantly barrage us with messages about our bodies and weight, trying to keep us insecure (and thus in the mood to spend money to "fix" the problem). For sure cutting through that bullshit by reading about body positivity etc. is a better solution, but in the meantime, why not be in denial about there being anything wrong with your body?
This kind of intentional denial certainly has its own risks (our bodies do actually need regular maintenance, for example, so complete denial on that front is risky) but there's definitely a whole lot of misinformation out there that it would be better to ignore. To the extent such denial expands to a more general denial of underlying problems, this idea of intentional denial is probably just bad. But I sure wish that in a world where people (including myself) routinely deny significant widespread dangers like COVID-19's long-term risks or the ongoing harms of escalating fascism, they'd at least also deny some of the propaganda keeping them unhappy and passive. Instead of being in denial about US-run concentration camps, why not be in denial that the state will be able to punish you for resisting them?
Searching for Privacy Risks in LLM Agents via Simulation
Yanzhe Zhang, Diyi Yang
https://arxiv.org/abs/2508.10880 https://arxiv.org/pdf/2508.10880
Multi-Satellite Cooperative MIMO Transmission: Statistical CSI-Aware RSMA Precoding Design
Sangwon Jo, Seok-Hwan Park
https://arxiv.org/abs/2508.11132 https://
From Distrust to Retribution: America’s Escalating Spiral: https://blog.rmendes.net/2025/09/11/from-distrust-to-retribution-americas.html
Aligned Query Expansion: Efficient Query Expansion for Information Retrieval through LLM Alignment
Adam Yang, Gustavo Penha, Enrico Palumbo, Hugues Bouchard
https://arxiv.org/abs/2507.11042
Towards a Global Scale Quantum Information Network: A Study Applied to Satellite-Enabled Distributed Quantum Computing
Laurent de Forges de Parny, Luca Paccard, Mathieu Bertrand, Luca Lazzarini, Valentin Leloup, Raphael Aymeric, Agathe Blaise, St\'ephanie Molin, Pierre Besancenot, Cyrille Laborde, Mathias van den Bossche
https://arxiv.…
Automatic reproducing kernel and regularization for learning convolution kernels
Haibo Li, Fei Lu
https://arxiv.org/abs/2507.11944 https://
Optimal Simultaneous Byzantine Agreement, Common Knowledge and Limited Information Exchange
Ron van der Meyden
https://arxiv.org/abs/2508.03418 https://arx…
Evaluation of a deliberate-practice informed supplemental intervention in graduate Quantum Mechanics
Michael E. Robbins, Guillaume M. Laurent, Eric W. Burkholder
https://arxiv.org/abs/2508.09917
Efficient Reward Identification In Max Entropy Reinforcement Learning with Sparsity and Rank Priors
Mohamad Louai Shehab, Alperen Tercan, Necmiye Ozay
https://arxiv.org/abs/2508.07400
A malicious Jira ticket can cause Cursor to exfiltrate secrets from the repository or local file system. But this is not just a problem with Cursor: GitHub MCP connections can also be exploited to expose private repository data, and a vulnerability in GitLab Duo allowed private information to be exposed through automatically rendered HTML code.
Beer Path Problems in Temporal Graphs
Andrea D'Ascenzo, Giuseppe F. Italiano, Sotiris Kanellopoulos, Anna Mpanti, Aris Pagourtzis, Christos Pergaminelis
https://arxiv.org/abs/2507.08685
Incorporating Fixed Pole Information in the Data-Driven Least Squares Realization Problem
Christof Vermeersch, Sibren Lagauw, Bart De Moor
https://arxiv.org/abs/2509.09394 https…
ESSENTIAL: Episodic and Semantic Memory Integration for Video Class-Incremental Learning
Jongseo Lee, Kyungho Bae, Kyle Min, Gyeong-Moon Park, Jinwoo Choi
https://arxiv.org/abs/2508.10896
Anthropic adds a memory feature for Claude to reference information from past chats, available now for Max, Team, and Enterprise plans, and soon for other plans (Zac Hall/9to5Mac)
https://9to5mac.com/2025/08/11/claude-memory-feature/
Scaling Up without Fading Out: Goal-Aware Sparse GNN for RL-based Generalized Planning
Sangwoo Jeon, Juchul Shin, Gyeong-Tae Kim, YeonJe Cho, Seongwoo Kim
https://arxiv.org/abs/2508.10747
Debiased machine learning for combining probability and non-probability survey data
Shaun Seaman
https://arxiv.org/abs/2508.08948 https://arxiv.org/pdf/250…
Energy Efficiency Maximization for Movable Antenna-Enhanced MIMO Downlink System Based on S-CSI
Xintai Chen, Biqian Feng, Yongpeng Wu, Xiang-Gen Xia, Chengshan Xiao
https://arxiv.org/abs/2509.12036
An iterated $I$-projection procedure for solving the generalized minimum information checkerboard copula problem
Ivan Kojadinovic, Tommaso Martini
https://arxiv.org/abs/2509.02829
Retrodicting Chaotic Systems: An Algorithmic Information Theory Approach
Kamal Dingle, Boumediene Hamzi, Marcus Hutter, Houman Owhadi
https://arxiv.org/abs/2507.04780
Distributed Finite-Horizon Optimal Control for Consensus with Differential Privacy Guarantees
Yuwen Ma, Yongqiang Wang, Sarah K. Spurgeon, Boli Chen
https://arxiv.org/abs/2509.11917
City Sampling for Citizens' Assemblies
Paul G\"olz, Jan Maly, Ulrike Schmidt-Kraepelin, Markus Utke, Philipp C. Verpoort
https://arxiv.org/abs/2509.07557 https://
Wigner's friend's black hole adventure: an argument for complementarity?
Laurens Walleghem
https://arxiv.org/abs/2507.05369 https://
Monotonicity in half-spaces for singular quasilinear elliptic problems involving the gradient
Phuong Le
https://arxiv.org/abs/2508.08859 https://arxiv.org/…
Cascaded Information Disclosure for Generalized Evaluation of Problem Solving Capabilities
Yunxiang Yan, Tomohiro Sawada, Kartik Goyal
https://arxiv.org/abs/2507.23776 https://
The Cosine Schedule is Fisher-Rao-Optimal for Masked Discrete Diffusion Models
Leo Zhang
https://arxiv.org/abs/2508.04884 https://arxiv.org/pdf/2508.04884
Approaching Maximal Information Extraction in Low-Signal Regimes via Multiple Instance Learning
Atakan Azakli, Bernd Stelzer
https://arxiv.org/abs/2508.07114 https://
Joint Power Allocation and Reflecting-Element Activation for Energy Efficiency Maximization in IRS-Aided Communications Under CSI Uncertainty
Christos N. Efrem, Ioannis Krikidis
https://arxiv.org/abs/2507.11413
Koopman-von Neumann Field Theory
James Stokes
https://arxiv.org/abs/2507.11541 https://arxiv.org/pdf/2507.11541
Recursive Bound-Constrained AdaGrad with Applications to Multilevel and Domain Decomposition Minimization
Serge Gratton, Alena Kopani\v{c}\'akov\'a, Philippe Toint
https://arxiv.org/abs/2507.11513
Accelerated and Optimized Search of Imperceptible Color Vibration for Embedding Information into LCD images
Shingo Hattori, Takefumi Hiraki
https://arxiv.org/abs/2507.22901 http…
Connected k-Median with Disjoint and Non-disjoint Clusters
Jan Eube, Kelin Luo, Dorian Reineccius, Heiko R\"oglin, Melanie Schmidt
https://arxiv.org/abs/2507.02774
MambaITD: An Efficient Cross-Modal Mamba Network for Insider Threat Detection
Kaichuan Kong, Dongjie Liu, Xiaobo Jin, Zhiying Li, Guanggang Geng, Jian Weng
https://arxiv.org/abs/2508.05695
Rollout-Based Approximate Dynamic Programming for MDPs with Information-Theoretic Constraints
Zixuan He, Charalambos D. Charalambous, Photios A. Stavrou
https://arxiv.org/abs/2509.02812
FlowDrag: 3D-aware Drag-based Image Editing with Mesh-guided Deformation Vector Flow Fields
Gwanhyeong Koo, Sunjae Yoon, Younghwan Lee, Ji Woo Hong, Chang D. Yoo
https://arxiv.org/abs/2507.08285
$d 1$ Measurement Bases are Sufficient for Determining $d$-Dimensional Quantum States: Theory and Experiment
Tianqi Xiao, Yaxin Wang, Ying Xia, Zhihao Li, Xiaoqi Zhou
https://arxiv.org/abs/2507.11204
Want to invest in Ukrainian startups from the US? This platform promises to be the bridge: https://benborges.xyz/2025/07/01/want-to-invest-in-ukrainian.html
Is External Information Useful for Data Fusion? An Evaluation before Acquisition
Guorong Dai, Lingxuan Shao, Jinbo Chen
https://arxiv.org/abs/2507.22351 https://
Addressing the Cold-Start Problem for Personalized Combination Drug Screening
Antoine de Mathelin, Christopher Tosh, Wesley Tansey
https://arxiv.org/abs/2509.07850 https://
Mutual Information Optimal Control of Discrete-Time Linear Systems
Shoju Enami, Kenji Kashima
https://arxiv.org/abs/2507.04712 https://
DMF2Mel: A Dynamic Multiscale Fusion Network for EEG-Driven Mel Spectrogram Reconstruction
Cunhang Fan, Sheng Zhang, Jingjing Zhang, Enrui Liu, Xinhui Li, Minggang Zhao, Zhao Lv
https://arxiv.org/abs/2507.07526
Neural Estimation of the Information Bottleneck Based on a Mapping Approach
Lingyi Chen, Shitong Wu, Sicheng Xu, Huihui Wu, Wenyi Zhang
https://arxiv.org/abs/2507.19832 https://…
Getting In Contract with Large Language Models -- An Agency Theory Perspective On Large Language Model Alignment
Sascha Kaltenpoth, Oliver M\"uller
https://arxiv.org/abs/2509.07642
Fair Domain Generalization: An Information-Theoretic View
Tangzheng Lian, Guanyu Hu, Dimitrios Kollias, Xinyu Yang, Oya Celiktutan
https://arxiv.org/abs/2507.05823
Integrated Learning and Optimization to Control Load Demand and Wind Generation for Minimizing Ramping Cost in Real-Time Electricity Market
Imran Pervez, Omar Knio
https://arxiv.org/abs/2508.09774
Asymmetric Modulation Design for Fluid-Antenna SWIPT Systems
Ahsan Mehmood, Ioannis Krikidis, Ghassan M. Kraidy
https://arxiv.org/abs/2509.07610 https://ar…
Commitment Gap via Correlation Gap
Shuchi Chawla, Dimitris Christou, Trung Dang
https://arxiv.org/abs/2508.20246 https://arxiv.org/pdf/2508.20246
Unambiguous discrimination of the change point for quantum channels
Kenji Nakahira
https://arxiv.org/abs/2508.06785 https://arxiv.org/pdf/2508.06785…
Blackbox Dataset Inference for LLM
Ruikai Zhou, Kang Yang, Xun Chen, Wendy Hui Wang, Guanhong Tao, Jun Xu
https://arxiv.org/abs/2507.03619 https://
NLGCL: Naturally Existing Neighbor Layers Graph Contrastive Learning for Recommendation
Jinfeng Xu, Zheyu Chen, Shuo Yang, Jinze Li, Hewei Wang, Wei Wang, Xiping Hu, Edith Ngai
https://arxiv.org/abs/2507.07522
Learning from the past in an irreversible investment problem
Topias Tolonen-Weckstr\"om
https://arxiv.org/abs/2508.21731 https://arxiv.org/pdf/2508.21…
Bayesian Radio Map Estimation: Fundamentals and Implementation via Diffusion Models
Tien Ngoc Ha, Daniel Romero
https://arxiv.org/abs/2508.06037 https://ar…
I2I-STRADA -- Information to Insights via Structured Reasoning Agent for Data Analysis
SaiBarath Sundar, Pranav Satheesan, Udayaadithya Avadhanam
https://arxiv.org/abs/2507.17874
Tackling Federated Unlearning as a Parameter Estimation Problem
Antonio Balordi, Lorenzo Manini, Fabio Stella, Alessio Merlo
https://arxiv.org/abs/2508.19065 https://
Average Consensus with Dynamic Compression in Bandwidth-Limited Directed Networks
Evagoras Makridis, Gabriele Oliva, Apostolos I. Rikos, Themistoklis Charalambous
https://arxiv.org/abs/2508.06893
On Optimality of Private Information in Bayesian Routing Games
Alexia Ambrogio, Leonardo Cianfanelli, Giacomo Como
https://arxiv.org/abs/2509.03357 https://
Using causal abstractions to accelerate decision-making in complex bandit problems
Joel Dyer, Nicholas Bishop, Anisoara Calinescu, Michael Wooldridge, Fabio Massimo Zennaro
https://arxiv.org/abs/2509.04296
Tailored First-order and Interior-point methods and a new semidefinite programming hierarchy for entanglement detection
Javier Pena, Vikesh Siddhu, Sridhar Tayur
https://arxiv.org/abs/2508.05854
Decentralized Optimization via RC-ALADIN with Efficient Quantized Communication
Xu Du, Karl H. Johansson, Apostolos I. Rikos
https://arxiv.org/abs/2508.06197 https://
Quantum Shadows: The Dining Information Brokers
Theodore Andronikos, Constantinos Bitsakos, Konstantinos Nikas, Georgios I. Goumas, Nectarios Koziris
https://arxiv.org/abs/2507.13810
Secrecy Energy Efficiency Maximization in RIS-Aided Networks: Active or Nearly-Passive RIS?
Robert Kuku Fotock, Agbotiname Lucky Imoize, Alessio Zappone, Marco Di Renzo, Roberto Garello
https://arxiv.org/abs/2507.07241
Treasure Hunt in Anonymous Graphs with Quantum Pebbles by Oblivious Agents
Gaurav Gaur, Barun Gorain, Rishi Ranjan Singh, Daya Gaur
https://arxiv.org/abs/2509.02909 https://