
2025-10-01 16:58:00
Salesforce öffnet Slack für externe KI
Salesforce öffnet Slack für KI: Über API und Model Context Protocol erhalten Entwickler Zugriff auf Chatdaten, um kontextsensitive Agenten zu erstellen.
https://www.
Salesforce öffnet Slack für externe KI
Salesforce öffnet Slack für KI: Über API und Model Context Protocol erhalten Entwickler Zugriff auf Chatdaten, um kontextsensitive Agenten zu erstellen.
https://www.
A Measurement Study of Model Context Protocol
Hechuan Guo, Yongle Hao, Yue Zhang, Minghui Xu, Peizhuo Lyu, Jiezhi Chen, Xiuzhen Cheng
https://arxiv.org/abs/2509.25292 https://…
LLUAD: Low-Latency User-Anonymized DNS
Philip Sj\"osv\"ard, Hongyu Jin, Panos Papadimitratos
https://arxiv.org/abs/2509.24174 https://arxiv.org/p…
Quantum Sequential Universal Hypothesis Testing
Matteo Zecchin, Osvaldo Simeone, Aaditya Ramdas
https://arxiv.org/abs/2508.21594 https://arxiv.org/pdf/2508…
Replaced article(s) found for cs.CL. https://arxiv.org/list/cs.CL/new
[3/5]:
- Medical Red Teaming Protocol of Language Models: On the Importance of User Perspectives in Health...
Jean-Philippe Corbeil, Minseon Kim, Alessandro Sordoni, Francois Beaulieu, Paul Vozila
Permuting Transactions in Ethereum Blocks: An Empirical Study
Jan Droll
https://arxiv.org/abs/2509.25415 https://arxiv.org/pdf/2509.25415
Automated Test Data Generation for Enterprise Protobuf Systems: A Metaclass-Enhanced Statistical Approach
Y. Du
https://arxiv.org/abs/2507.22070 https://ar…
Xavier Worthy injury update: Chiefs WR cleared from concussion protocol after hard fall in practice
https://www.cbssports.com/nfl/news/xavier-
Cycles Protocol: A Peer-to-Peer Electronic Clearing System
Ethan Buchman, Paolo Dini, Shoaib Ahmed, Andrew Miller, Toma\v{z} Fleischman
https://arxiv.org/abs/2507.22309 https://…
From Cloud-Native to Trust-Native: A Protocol for Verifiable Multi-Agent Systems
Muyang Li
https://arxiv.org/abs/2507.22077 https://arxiv.org/pdf/2507.2207…
Diffusion with doubly stochastic resetting
Maxence Arutkin, Shlomi Reuveni
https://arxiv.org/abs/2509.25365 https://arxiv.org/pdf/2509.25365
Dynamic Exponent Market Maker: Personalized Portfolio Manager and One Pool to Trade Them All
Wittawat Kositwattanarerk
https://arxiv.org/abs/2507.22732 https://
Measurement and preparation protocols for quantum field theory on curved spacetimes
Christopher J. Fewster
https://arxiv.org/abs/2508.21426 https://arxiv.o…
Experimental Construction of NOON State Dynamics in Photonic Flat Band Lattices
Rishav Hui, Trideb Shit, Marco Di Liberto, Diptiman Sen, Sebabrata Mukherjee
https://arxiv.org/abs/2508.21700
ChatGPT Instant Checkout: OpenAI führt Shopping-Funktion ein
OpenAI hat ein Instant-Checkout-Feature sowie ein Agentic Commerce Protocol Open-Source veröffentlicht. Händler müssen zahlen.
https://www.
Remote spin control in Haldane spin chains
Y. del Castillo, A. Ferr\'on, J. Fern\'andez-Rossier
https://arxiv.org/abs/2508.21544 https://arxiv.org/…
Anybody have access to an oscilloscope with a 100baseTX Ethernet decoder on it? Curious how fast commercial protocol decodes are compared to mine.
I'd love benchmarks:
* 2 channels, 10M points, 500 Msps, on P/N
* Simple edge trigger, saturated or nearly saturated link
* Decode to Ethernet frames
How many waveforms per second / seconds per waveform do you get?
Multiple Concurrent Proposers: Why and How
Pranav Garimidi, Joachim Neu, Max Resnick
https://arxiv.org/abs/2509.23984 https://arxiv.org/pdf/2509.23984
Tensor Network Representations for Intrinsically Mixed-State Topological Orders
Bader Aldossari, Sergey Blinov, Zhu-Xi Luo
https://arxiv.org/abs/2507.22989 https://
#GoogleCloud #Observability Adopts #OpenTelemetry Protocol for Native Trace Ingestion
as_skitter: Skitter IP graph (2005)
An aggregate snapshot of the Internet Protocol (IP) graph, as measured by the traceroute tool on CAIDA's skitter infrastructure, in 2005.
This network has 1696415 nodes and 11095298 edges.
Tags: Technological, Communication, Unweighted
https://networks.skewed.de/net/as_s…
Quantitative quantum soundness for all multipartite compiled nonlocal games
Matilde Baroni, Igor Klep, Dominik Leichtle, Marc-Olivier Renou, Ivan \v{S}upi\'c, Lucas Tendick, Xiangling Xu
https://arxiv.org/abs/2509.25145
AgentMaster: A Multi-Agent Conversational Framework Using A2A and MCP Protocols for Multimodal Information Retrieval and Analysis
Callie C. Liao, Duoduo Liao, Sai Surya Gadiraju
https://arxiv.org/abs/2507.21105
A Target-Agnostic Protocol-Independent Interface for the Transport Layer
Pedro Mizuno, Kimiya Mohammadtaheri, Linfan Qian, Joshua Johnson, Danny Akbarzadeh, Chris Neely, Mario Baldi, Nacihket Kapre, Mina Tahmasbi Arashloo
https://arxiv.org/abs/2509.21550
Crosslisted article(s) found for cs.OS. https://arxiv.org/list/cs.OS/new
[1/1]:
- A Target-Agnostic Protocol-Independent Interface for the Transport Layer
Mizuno, Mohammadtaheri, Qian, Johnson, Akbarzadeh, Neely, Baldi, Kapre, Arashloo
OpenAI is open sourcing the Agentic Commerce Protocol, a standard for AI commerce that powers its Instant Checkout feature and was co-developed with Stripe (Sabrina Ortiz/ZDNET)
https://www.zdnet.com/article/chatgpt-just
A Formalization of the Correctness of the Floodsub Protocol
Ankit Kumar (Northeastern University), Panagiotis Manolios (Northeastern University)
https://arxiv.org/abs/2507.19013
MCP4EDA: LLM-Powered Model Context Protocol RTL-to-GDSII Automation with Backend Aware Synthesis Optimization
Yiting Wang, Wanghao Ye, Yexiao He, Yiran Chen, Gang Qu, Ang Li
https://arxiv.org/abs/2507.19570
When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation
Weibo Zhao, Jiahao Liu, Bonan Ruan, Shaofei Li, Zhenkai Liang
https://arxiv.org/abs/2509.24272 https://
Chiefs place WR Worthy in concussion protocol https://www.espn.com/nfl/story/_/id/45860860/chiefs-xavier-worthy-bangs-head-enters-concussion-protocol
Everyone, if you can than do a donation to https://ntp.org
https://www.ntp.org/donate/
Cowboys now down 3 OL starters as former first-round pick suffered concussion vs Packers https://cowboyswire.usatoday.com/story/sports/nfl/cowboys/2025/09/29/cowboys-lt-tyler-guyton-concussion-protocol/86414934007/
Emulating microbial run-and-tumble and tactic motion by stochastically reorienting synthetic active Brownian particles
Sandip Kundu, Dibyendu Mondal, Arup Biswas, Arnab Pal, Manas Khan
https://arxiv.org/abs/2509.21903
Replaced article(s) found for cs.ET. https://arxiv.org/list/cs.ET/new
[1/1]:
- TRMAC: A Time-Reversal-based MAC Protocol for Wireless Networks within Computing Packages
Ama Bandara, Abhijit Das, Fatima Rodriguez-Galan, Eduard Alarcon, Sergi Abadal
Our company sells products to test internet protocol implementations under unusual, but possible, situations. (Many fail.)
We sell worldwide, so we have to attach various code numbers to identify the type of product to the import/export (tariff/duty) government agents who make sure that things coming into their countries pay the proper fees.
Well, that list of code numbers appears to have been created in the 1970s and not updated since. So if you are selling a VHS VCR or a Fax m…
Still chasing a tricky bug in ngscopeclient that will have to wait until tomorrow.
Scenario:
* Open a pre-existing scopesession containing a protocol analyzer online
* Start acquiring new data
The very first waveform acquired seems to not end up in history, but all other processing works normally including protocol decodes (so we basically end up with a phantom waveform in the protocol analyzer that doesn't match up with one in history).
On the Implementation Security of Twin-Field Quantum Key Distribution using Optical Injection Locking
Sergio Ju\'arez, Alessandro Marcomini, Mikhail Petrov, Robert I. Woodward, Toby J. Dowling, R. Mark Stevenson, Marcos Curty, Davide Rusca
https://arxiv.org/abs/2508.21763
Scan-do Attitude: Towards Autonomous CT Protocol Management using a Large Language Model Agent
Xingjian Kang, Linda Vorberg, Andreas Maier, Alexander Katzmann, Oliver Taubmann
https://arxiv.org/abs/2509.20270
DNS in the Time of Curiosity: A Tale of Collaborative User Privacy Protection
Philip Sj\"osv\"ard, Hongyu Jin, Panos Papadimitratos
https://arxiv.org/abs/2509.24153 ht…
Toward 48 dB Spin Squeezing and 96 dB Signal Magnification for Cosmic Relic Searches with Nuclear Spins
Marios Galanis, Onur Hosten, Asimina Arvanitaki, Savas Dimopoulos
https://arxiv.org/abs/2508.20520
Style4D-Bench: A Benchmark Suite for 4D Stylization
Beiqi Chen, Shuai Shao, Haitang Feng, Jianhuang Lai, Jianlou Si, Guangcong Wang
https://arxiv.org/abs/2508.19243 https://
A comparison of variable selection methods and predictive models for postoperative bowel surgery complications
\"Ozge \c{S}ahin, Annemiek Kwast, Annemieke Witteveen, Tina Nane
https://arxiv.org/abs/2507.22771
Brook-2PL: Tolerating High Contention Workloads with A Deadlock-Free Two-Phase Locking Protocol
Farzad Habibi, Juncheng Fang, Tania Lorido-Botran, Faisal Nawab
https://arxiv.org/abs/2508.18576
VeriLLM: A Lightweight Framework for Publicly Verifiable Decentralized Inference
Ke Wang, Felix Qu, Libin Xia, Zishuo Zhao, Chris Tong, Lynn Ai, Eric Yang
https://arxiv.org/abs/2509.24257
Rethinking Testing for LLM Applications: Characteristics, Challenges, and a Lightweight Interaction Protocol
Wei Ma, Yixiao Yang, Qiang Hu, Shi Ying, Zhi Jin, Bo Du, Zhenchang Xing, Tianlin Li, Junjie Shi, Yang Liu, Linxiao Jiang
https://arxiv.org/abs/2508.20737
This Company Wants to Bring End-to-End Encrypted Messages to Bluesky’s AT Protocol https://www.404media.co/this-company-wants-to-bring-end-to-end-encrypted-messages-to-blueskys-at-protocol/
MCP-Bench: Benchmarking Tool-Using LLM Agents with Complex Real-World Tasks via MCP Servers
Zhenting Wang, Qi Chang, Hemani Patel, Shashank Biju, Cheng-En Wu, Quan Liu, Aolin Ding, Alireza Rezazadeh, Ankit Shah, Yujia Bao, Eugene Siow
https://arxiv.org/abs/2508.20453
Fascinating stuff, an open protocol by Google to let agents make payments.
https://cloud.google.com/blog/pro…
An early termination strategy for the distributed biased min-consensus protocol under disturbances
Zicheng Huang, Wangzhi Zhou, Yuanqiu Mo
https://arxiv.org/abs/2509.19832 https…
Xavier Worthy injury: Emerging Chiefs WR enters concussion protocol after leaving practice
https://www.cbssports.com/nfl/news/xavier-worthy-…
Zero Trust-based Decentralized Identity Management System for Autonomous Vehicles
Amal Yousseef, Shalaka Satam, Banafsheh Saber Latibari, Mai Abdel-Malek, Soheil Salehi, Pratik Satam
https://arxiv.org/abs/2509.25566
Sparse Regression Codes for Secret Key Agreement: Achieving Strong Secrecy and Near-Optimal Rates for Gaussian Sources
Emmanouil M. Athanasakos, Hariprasad Manjunath
https://arxiv.org/abs/2507.20157
Formal Modeling and Verification of the Algorand Consensus Protocol in CADP
Andrea Esposito, Francesco P. Rossi, Marco Bernardo, Francesco Fabris, Hubert Garavel
https://arxiv.org/abs/2508.19452
A Protocol to Address Ecological Redirection for Digital Practices in Organizations
Valentin Girard, Antoine Martin, Maud Rio, Romain Couillet
https://arxiv.org/abs/2507.19078 h…
Towards Multi-Agent Economies: Enhancing the A2A Protocol with Ledger-Anchored Identities and x402 Micropayments for AI Agents
Awid Vaziry, Sandro Rodriguez Garzon, Axel K\"upper
https://arxiv.org/abs/2507.19550
Model Context Protocols in Adaptive Transport Systems: A Survey
Gaurab Chhetri, Shriyank Somvanshi, Md Monzurul Islam, Shamyo Brotee, Mahmuda Sultana Mimi, Dipti Koirala, Biplov Pandey, Subasish Das
https://arxiv.org/abs/2508.19239
RoCE BALBOA: Service-enhanced Data Center RDMA for SmartNICs
Maximilian Jakob Heer, Benjamin Ramhorst, Yu Zhu, Luhao Liu, Zhiyi Hu, Jonas Dann, Gustavo Alonso
https://arxiv.org/abs/2507.20412
Democracy for DAOs: An Empirical Study of Decentralized Governance and Dynamic (Case Study Internet Computer SNS Ecosystem)
Burak Arda Okutan, Stefan Schmid, Yvonne-Anne Pignolet
https://arxiv.org/abs/2507.20234
Time-energy tradeoff in stochastic resetting using optimal control
R\'emi Goerlich, Kristian St{\o}levik Olsen, Hartmut L\"owen, Yael Roichman
https://arxiv.org/abs/2507.19387
BiTAA: A Bi-Task Adversarial Attack for Object Detection and Depth Estimation via 3D Gaussian Splatting
Yixun Zhang, Feng Zhou, Jianqin Yin
https://arxiv.org/abs/2509.19793 http…
Teleportation-based filtering for gravitational-wave detectors
Yohei Nishino
https://arxiv.org/abs/2509.20812 https://arxiv.org/pdf/2509.20812
Equally entangled multiqubit states
Francisco Albarr\'an-Arriagada, Guillermo Romero, Juan Carlos Retamal
https://arxiv.org/abs/2508.20770 https://arxi…
Protocol Testing with I/O Grammars
Alexander Liggesmeyer, Jos\'e Antonio Zamudio Amaya, Andreas Zeller
https://arxiv.org/abs/2509.20308 https://arxiv.o…
Scan-do Attitude: Towards Autonomous CT Protocol Management using a Large Language Model Agent
Xingjian Kang, Linda Vorberg, Andreas Maier, Alexander Katzmann, Oliver Taubmann
https://arxiv.org/abs/2509.20270
Asking for no reason whatsoever: Lots of oscilloscopes have protocol decodes for various flavors of Ethernet.
Have you ever encountered one, from any manufacturer, that is able to decode 100mbit ethernet in real time without dropping packets?
Experiences with Model Context Protocol Servers for Science and High Performance Computing
Haochen Pan, Ryan Chard, Reid Mello, Christopher Grams, Tanjin He, Alexander Brace, Owen Price Skelly, Will Engler, Hayden Holbrook, Song Young Oh, Maxime Gonthier, Michael Papka, Ben Blaiszik, Kyle Chard, Ian Foster
https://arxiv.org/abs/2508.18489
Quantum optical shallow networks
Simone Roncallo, Angela Rosy Morgillo, Seth Lloyd, Chiara Macchiavello, Lorenzo Maccone
https://arxiv.org/abs/2507.21036 https://
AniME: Adaptive Multi-Agent Planning for Long Animation Generation
Lisai Zhang, Baohan Xu, Siqian Yang, Mingyu Yin, Jing Liu, Chao Xu, Siqi Wang, Yidi Wu, Yuxin Hong, Zihao Zhang, Yanzhang Liang, Yudong Jiang
https://arxiv.org/abs/2508.18781
An Open-source Implementation and Security Analysis of Triad's TEE Trusted Time Protocol
Matthieu Bettinger, Sonia Ben Mokhtar, Anthony Simonet-Boulogne
https://arxiv.org/abs/2507.20851
A Theory of Goal-Oriented Medium Access: Protocol Design and Distributed Bandit Learning
Federico Chiariotti, Andrea Zanella
https://arxiv.org/abs/2508.19141 https://
Crosslisted article(s) found for cs.MA. https://arxiv.org/list/cs.MA/new
[1/1]:
- The Aegis Protocol: A Foundational Security Framework for Autonomous AI Agents
Sai Teja Reddy Adapala, Yashwanth Reddy Alugubelly
Cryptographic Data Exchange for Nuclear Warheads
Neil Perry, Daniil Zhukov
https://arxiv.org/abs/2507.20074 https://arxiv.org/pdf/2507.20074
Development and analysis of a secured VoIP system for surveillance activities
M. Matsive Ali
https://arxiv.org/abs/2507.21038 https://arxiv.org/pdf/2507.21…
Cardinals' Zay Jones (concussion) to miss game https://www.espn.com/nfl/story/_/id/46366942/cards-wr-zay-jones-concussion-protocol-vs-seahawks
Shallow-depth GHZ state generation on NISQ devices
S. Siddardha Chelluri, Stephan Schuster, Sumeet, Riccardo Roma
https://arxiv.org/abs/2507.19145 https://
The STAR-XAI Protocol: An Interactive Framework for Inducing Second-Order Agency in AI Agents
Antoni Guasch, Maria Isabel Valdez
https://arxiv.org/abs/2509.17978 https://…
The Aegis Protocol: A Foundational Security Framework for Autonomous AI Agents
Sai Teja Reddy Adapala, Yashwanth Reddy Alugubelly
https://arxiv.org/abs/2508.19267 https://
Distillation of supersinglet states
Saeed Ahmad, Shuang Li, Jonathan Raghoonanan, Kaixuan Zhou, Valentin Ivannikov, Tim Byrnes
https://arxiv.org/abs/2509.20962 https://
Trivial Trojans: How Minimal MCP Servers Enable Cross-Tool Exfiltration of Sensitive Data
Nicola Croce, Tobin South
https://arxiv.org/abs/2507.19880 https://
Observation of Inelastic Meson Scattering in a Floquet System using a Digital Quantum Simulator
Ziting Wang, Zi-Yong Ge, Yun-Hao Shi, Zheng-An Wang, Si-Yun Zhou, Hao Li, Kui Zhao, Yue-Shan Xu, Wei-Guo Ma, Hao-Tian Liu, Cai-Ping Fang, Jia-Cheng Song, Tian-Ming Li, Jia-Chi Zhang, Yu Liu, Cheng-Lin Deng, Guangming Xue, Haifeng Yu, Kai Xu, Kaixuan Huang, Franco Nori, Heng Fan
Is Crunching Public Data the Right Approach to Detect BGP Hijacks?
Alessandro Giaconia, Muoi Tran, Laurent Vanbever, Stefano Vissicchio
https://arxiv.org/abs/2507.20434 https://…
MindGuard: Tracking, Detecting, and Attributing MCP Tool Poisoning Attack via Decision Dependence Graph
Zhiqiang Wang, Junyang Zhang, Guanquan Shi, HaoRan Cheng, Yunhao Yao, Kaiwen Guo, Haohua Du, Xiang-Yang Li
https://arxiv.org/abs/2508.20412
Excited-CAFQA: A classical simulation bootstrap for the variational estimation of molecular excited states
Bikrant Bhattacharyya, Gokul Ravi
https://arxiv.org/abs/2509.20588 htt…
Bridging Cloud Convenience and Protocol Transparency: A Hybrid Architecture for Ethereum Node Operations on Amazon Managed Blockchain
S M Mostaq Hossain, Amani Altarawneh, Maanak Gupta
https://arxiv.org/abs/2507.18774
PALQO: Physics-informed Model for Accelerating Large-scale Quantum Optimization
Yiming Huang, Yajie Hao, Jing Zhou, Xiao Yuan, Xiaoting Wang, Yuxuan Du
https://arxiv.org/abs/2509.20733
Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools
Ping He, Changjiang Li, Binbin Zhao, Tianyu Du, Shouling Ji
https://arxiv.org/abs/2509.21011 https://
Protocol for Purifying Noisy Preparation and Measurements of Qubits
Jaemin Kim, Seungchan Seo, Jiyoung Yun, Benjamin Lienhard, Joonwoo Bae
https://arxiv.org/abs/2508.16136 https…
Servant, Stalker, Predator: How An Honest, Helpful, And Harmless (3H) Agent Unlocks Adversarial Skills
David Noever
https://arxiv.org/abs/2508.19500 https://
SCAMPER -- Synchrophasor Covert chAnnel for Malicious and Protective ERrands
Prashanth Krishnamurthy, Ramesh Karri, Farshad Khorrami
https://arxiv.org/abs/2508.20051 https://
Parrondo paradox in quantum image encryption
{\L}ukasz Pawela
https://arxiv.org/abs/2508.16382 https://arxiv.org/pdf/2508.16382
Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks
Kangfeng Ye, Roberto Metere, Jim Woodcock, Poonam Yadav
https://arxiv.org/abs/2508.19430
The Art of Hide and Seek: Making Pickle-Based Model Supply Chain Poisoning Stealthy Again
Tong Liu, Guozhu Meng, Peng Zhou, Zizhuang Deng, Shuaiyin Yao, Kai Chen
https://arxiv.org/abs/2508.19774
Separate and efficient characterization of state-preparation and measurement errors using single-qubit operations
Muhammad Qasim Khan, Leigh M. Norris, Lorenza Viola
https://arxiv.org/abs/2509.19448
Observation of hysteresis in an isolated quantum system of disordered Heisenberg spins
Moritz Hornung, Eduard J. Braun, Sebastian Geier, Titus Franz, Gerhard Z\"urn, Matthias Weidem\"uller
https://arxiv.org/abs/2508.18197
Cryptographic Backdoor for Neural Networks: Boon and Bane
Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra
https://arxiv.org/abs/2509.20714 https://arxiv.…
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
Shayesta Naziri, Xu Wang, Guangsheng Yu, Christy Jie Liang, Wei Ni
https://arxiv.org/abs/2508.17043
Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation
Tharcisse Ndayipfukamiye, Jianguo Ding, Doreen Sebastian Sarwatt, Adamu Gaston Philipo, Huansheng Ning
https://arxiv.org/abs/2509.20411
PRZK-Bind: A Physically Rooted Zero-Knowledge Authentication Protocol for Secure Digital Twin Binding in Smart Cities
Yagmur Yigit, Mehmet Ali Erturk, Kerem Gursu, Berk Canberk
https://arxiv.org/abs/2508.17913
MultiFuzz: A Dense Retrieval-based Multi-Agent System for Network Protocol Fuzzing
Youssef Maklad, Fares Wael, Ali Hamdi, Wael Elsersy, Khaled Shaban
https://arxiv.org/abs/2508.14300