Computer Science

54884 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Learning to Stay Safe: Adaptive Regularization Against Safety Degradation during Fine-Tuning
By Jyotin Goel, Souvik Maji, Pratik Mazumder · ArXiv: 2602.17546
2026-02-19
0
Evaluating Chain-of-Thought Reasoning through Reusability and Verifiability
By Shashank Aggarwal, Ram Vikas Mishra, Amit Awekar · ArXiv: 2602.17544
2026-02-19
0
Informative Trains: A Memory-Efficient Journey to a Self-Stabilizing Leader Election Algorithm in Anonymous Graphs
By Lelia Blin, Sylvain Gay, Isabella Ziccardi · ArXiv: 2602.17541
2026-02-19
0
IRIS: Learning-Driven Task-Specific Cinema Robot Arm for Visuomotor Motion Control
By Qilong Cheng, Matthew Mackay, Ali Bereyhi · ArXiv: 2602.17537
2026-02-19
0
HAP Networks for the Future: Applications in Sensing, Computing, and Communication
By Sultan Çoğay, T. Tolga Sari, Muhammad Nadeem Ali · ArXiv: 2602.17534
2026-02-19
0
Position: Evaluation of ECG Representations Must Be Fixed
By Zachary Berger, Daniel Prakah-Asante, John Guttag · ArXiv: 2602.17531
2026-02-19
0
Provably Explaining Neural Additive Models
By Shahaf Bassan, Yizhak Yisrael Elboher, Tobias Ladner · ArXiv: 2602.17530
2026-02-19
0
Enhancing Large Language Models (LLMs) for Telecom using Dynamic Knowledge Graphs and Explainable Retrieval-Augmented Generation
By Dun Yuan, Hao Zhou, Xue Liu · ArXiv: 2602.17529
2026-02-19
0
The Anxiety of Influence: Bloom Filters in Transformer Attention Heads
By Peter Balogh · ArXiv: 2602.17526
2026-02-19
0
Variational inference via radial transport
By Luca Ghafourpour, Sinho Chewi, Alessio Figalli · ArXiv: 2602.17525
2026-02-19
0
LORA-CRAFT: Cross-layer Rank Adaptation via Frozen Tucker Decomposition of Pre-trained Attention Weights
By Kasun Dewage, Marianna Pensky, Suranadi De Silva · ArXiv: 2602.17510
2026-02-19
0
Pareto Optimal Benchmarking of AI Models on ARM Cortex Processors for Sustainable Embedded Systems
By Pranay Jain, Maximilian Kasper, Göran Köber · ArXiv: 2602.17508
2026-02-20
0
Towards a Software Reference Architecture for Natural Language Processing Tools in Requirements Engineering
By Julian Frattini, Quim Motger · ArXiv: 2602.17498
2026-02-19
0
Retrospective In-Context Learning for Temporal Credit Assignment with Large Language Models
By Wen-Tse Chen, Jiayu Chen, Fahim Tajwar · ArXiv: 2602.17497
2026-02-19
0
Learning with Boolean threshold functions
By Veit Elser, Manish Krishan Lal · ArXiv: 2602.17493
2026-02-19
0
Coin selection by Random Draw according to the Boltzmann distribution
By Jan Lennart Bönsel, Michael Maurer, Silvio Petriconi · ArXiv: 2602.17490
2026-02-19
0
Computational Hardness of Private Coreset
By Badih Ghazi, Cristóbal Guzmán, Pritish Kamath · ArXiv: 2602.17488
2026-02-19
0
Linear Convergence in Games with Delayed Feedback via Extra Prediction
By ** *저자 정보가 논문 본문에 명시되어 있지 않아 확인할 수 없습니다.* ** · ArXiv: 2602.17486
2026-02-19
1
What Do LLMs Associate with Your Name? A Human-Centered Black-Box Audit of Personal Data
By Dimitri Staufer, Kirsten Morehouse · ArXiv: 2602.17483
2026-02-19
0
Compiling Quantum Lambda-Terms into Circuits via the Geometry of Interaction
By Kostia Chardonnet, Ugo Dal Lago, Naohiko Hoshino · ArXiv: 2602.17482
2026-02-19
0
Directed type theory, with a twist
By Fern, o Rafael Chu Rivera, Paige R · ArXiv: 2602.17480
2026-02-19
0
Variational Grey-Box Dynamics Matching
By Gurjeet Sangra Singh, Frantzeska Lavda, Giangiacomo Mercatali · ArXiv: 2602.17477
2026-02-19
0
Support Recovery and $\ell_2$-Error Bound for Sparse Regression with Quadratic Measurements via Weakly-Convex-Concave Regularization
By Jun Fan, Jingyu Yang, Xinyu Zhang · ArXiv: 2602.17466
2026-02-19
0
The CTI Echo Chamber: Fragmentation, Overlap, and Vendor Specificity in Twenty Years of Cyber Threat Reporting
By Manuel Suarez-Roman, Francesco Marciori, Mauro Conti · ArXiv: 2602.17458
2026-02-19
0
Privacy in Theory, Bugs in Practice: Grey-Box Auditing of Differential Privacy Libraries
By Tudor Cebere, David Erb, Damien Desfontaines · ArXiv: 2602.17454
2026-02-19
0
Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge
By Wyatt Benno, Alberto Centelles, Antoine Douchet · ArXiv: 2602.17452
2026-02-19
0
Beyond Pipelines: A Fundamental Study on the Rise of Generative-Retrieval Architectures in Web Research
By Amirereza Abbasi, Mohsen Hooshm · ArXiv: 2602.17450
2026-02-19
0
ACOS: Arrays of Cheap Optical Switches
By Daniel Amir, Ori Cohen, Jakob Krebs · ArXiv: 2602.17449
2026-02-19
0
ABCD: All Biases Come Disguised
By Mateusz Nowak, Xavier Cadet, Peter Chin · ArXiv: 2602.17445
2026-02-19
0
WarpRec: Unifying Academic Rigor and Industrial Scale for Responsible, Reproducible, and Efficient Recommendation
By Marco Avolio, Potito Aghilar, Sabino Roccotelli · ArXiv: 2602.17442
2026-02-19
0
«« « 77 78 79 80 81 82 83 84 85 86 » »»