Expertini Research Research

Browse Research Papers

305,115+ open-access research outputs.

โœ• Clear
๐Ÿ“‚ Computer Science
Showing 305115 results in Computer Science
Computer Science Preprint PDF DOI

Computing Equilibrium beyond Unilateral Deviation

Mingyang Liu, Gabriele Farina, Asuman Ozdaglar ยท 2026

Most familiar equilibrium concepts, such as Nash and correlated equilibrium, guarantee only that no single player can improve their utility by deviating unilaterally. They offer no guarantees against โ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Superpolynomial Length Lower Bounds for Tree-Like Semantic Proof Systems with Bounded Line Size

Susanna F. de Rezende, David Engstrom, Yassine Ghannane, Kilian Risse ยท 2026

We prove superpolynomial length lower bounds for the semantic tree-like Frege refutation system with bounded line size. Concretely, for any function $n^{2-\varepsilon} \leq s(n) \leq 2^{n^{1-\varepsilโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Non-negative Rational Semantic Numeration Systems

Alexander Chunikhin ยท 2026

A new class of Semantic Numeration Systems, namely, positive rational Semantic Numeration Systems is introduced. For cardinal semantic operators, differences in the formation of carry (common carry) aโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Essential, Yet Overlooked: Identity Verification Barriers for Blind and Low Vision People in Government Services

Ryan John Oommen, Tanusree Sharma ยท 2026

Identity verification is a critical gateway to accessing government services and public benefits, yet contemporary systems are typically designed around visual interaction, leaving blind and low visioโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

FlashRT: Towards Computationally and Memory Efficient Red-Teaming for Prompt Injection and Knowledge Corruption

Yanting Wang, Chenlong Yin, Ying Chen, Jinyuan Jia ยท 2026

Long-context large language models (LLMs)-for example, Gemini-3.1-Pro and Qwen-3.5-are widely used to empower many real-world applications, such as retrieval-augmented generation, autonomous agents, aโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Optimal Transmitter Placement in Realistic Urban Environments

Lukas Taus, Richard Tsai, Jeffrey G. Andrews ยท 2026

In a wireless network, the spatial location of the transmitters has a large impact on the achievable rate at each user location. The optimal placement of -- for example -- cellular base stations is a โ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Unsafe and Unused? A History of Utility Code in Mature Open Source Projects

Brandon Keller, Kaitlin Yandik, Angela Ngo, Andy Meneely ยท 2026

Filenames are a concise means of conveying information about source code to fellow developers. One such convention is util. Commonly understood to stand for "utility", filenames with the letters util โ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Efficient Multivector Retrieval with Token-Aware Clustering and Hierarchical Indexing

Silvio Martinico, Franco Maria Nardini, Cosimo Rulli, Rossano Venturini ยท 2026

Multivector retrieval models achieve state-of-the-art effectiveness through fine-grained token-level representations, but their deployment incurs substantial computational and memory costs. Current soโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Index-Assisted Stratified Sampling for Online Aggregation

Yunnan Yu, Zhuoyue Zhao ยท 2026

Ad-hoc queries over frequently updated data in a flat schema are common in real-time data analysis applications and often require very low latency. Online aggregation can achieve so by providing approโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Claw-Eval-Live: A Live Agent Benchmark for Evolving Real-World Workflows

Chenxin Li, Zhengyang Tang, Huangxin Lin, Yunlong Lin, Shijue Huang, Shengyuan Liu, Bowen Ye, Rang Li, Lei Li, Benyou Wang, Yixuan Yuan ยท 2026

LLM agents are expected to complete end-to-end units of work across software tools, business services, and local workspaces. Yet many agent benchmarks freeze a curated task set at release time and graโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Crab: A Semantics-Aware Checkpoint/Restore Runtime for Agent Sandboxes

Tianyuan Wu, Chaokun Chang, Lunxi Cao, Wei Gao, Wei Wang ยท 2026

Autonomous agents act through sandboxed containers and microVMs whose state spans filesystems, processes, and runtime artifacts. Checkpoint and restore (C/R) of this state is needed for fault tolerancโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Latent Adversarial Detection: Adaptive Probing of LLM Activations for Multi-Turn Attack Detection

Prashant Kulkarni ยท 2026

Multi-turn prompt injection follows a known attack path -- trust-building, pivoting, escalation but text-level defenses miss covert attacks where individual turns appear benign. We show this attack paโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

DEFault++: Automated Fault Detection, Categorization, and Diagnosis for Transformer Architectures

Sigma Jahan, Saurabh Singh Rajput, Tushar Sharma, Mohammad Masudur Rahman ยท 2026

Transformer models are widely deployed in critical AI applications, yet faults in their attention mechanisms, projections, and other internal components often degrade behavior silently without raisingโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

I hope we don't do to trust what advertising has done to love

Jade Alglave ยท 2026

Advertising uses love to sell stuff, like nylons. It also uses the word "love" in trivialising ways -- do you "love" your oven? When I hear about trust in the context of AI, especially agentic, I hopeโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Beyond Code, We Are People: A Systematic Mapping of 25 Years of Literature on Soft Skills in Agile Development Teams

Israely Lima, Lucas Moura Lourenco, Marcio Ribeiro, Ivan Machado, Carla Ilane Bezerra ยท 2026

Software development is a sociotechnical and human-centered endeavor in which human factors directly influence quality, productivity, and innovation capacity. In this context, career development in coโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Succinct Graph Representations and Algorithmic Applications

Ahammed Ullah, Alex Pothen ยท 2026

We propose new graph representations that exploit dense local structure to improve time and space simultaneously. Given an undirected graph $G$, we define a dual clique cover (DCC) representation of $โ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Towards Neuro-symbolic Causal Rule Synthesis, Verification, and Evaluation Grounded in Legal and Safety Principles

Zainab Rehan, Christian Medeiros Adriano, Sona Ghahremani, Holger Giese ยท 2026

Rule-based systems remain central in safety-critical domains but often struggle with scalability, brittleness, and goal misspecification. These limitations can lead to reward hacking and failures in fโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Perfectly Private Over-the-Air Computation

Shudi Weng, Ming Xiao, Mikael Skoglund ยท 2026

This paper studies a key research question: how to achieve perfect privacy in over-the-air computation (AirComp)? The problem is particularly intriguing due to a dilemma. Real-field operations can ensโ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Tailwind: A Practical Framework for Query Accelerators

Geoffrey X. Yu, Ryan Marcus, Tim Kraska ยท 2026

Relational database management systems (RDBMSes) can process general-purpose queries, but often have lower performance compared to custom-built solutions for specific queries. For example, consider a โ€ฆ

Read Paper โ†’
Computer Science Preprint PDF DOI

Akita: A High Usability Simulation Framework for Computer Architecture

Sabila Al Jannat, Ying Li, Mengyang He, Xuzhong Wang, Huizhi Zhao, Jingxiang Sun, Daoxuan Xu, Enze Xu, Yifan Sun ยท 2026

Computer architecture simulation is essential for evaluating new designs without the need for costly tapeout. The community has developed dozens of valuable simulators that have enabled significant arโ€ฆ

Read Paper โ†’
Page 1 of 15256 Next โ†’