422

V. Ashley Villar et al 2025 ApJS 276 3 Researchers show that the properties of a supernova’s host galaxy can be a valuable tool for classifying the explosion, especially when combined with a redshift value.
The post The Impact of Host-Galaxy Properties on Supernova Classification with Hierarchical L…
329

arXiv:2512.17325v1 Announce Type: new
Abstract: We provide causal mechanistic validation that in-context learning (ICL) decomposes into two separable mechanisms: Task Schema (abstract task type recognition) and Binding (specific input-output associations). Through activation patching experiments ac…
332

Excitons are pairs of bound negatively charged electrons and positively charged holes that form in semiconductors, enabling the transport of energy in electronic devices. These pairs of charge carriers also emerge in transition metal dichalcogenides, thin semiconducting materials comprised of a tran…
240

arXiv:2512.17198v1 Announce Type: new
Abstract: We introduce BumpNet, a sparse neural network framework for PDE numerical solution and operator learning. BumpNet is based on meshless basis function expansion, in a similar fashion to radial-basis function (RBF) networks. Unlike RBF networks, the bas…
318

Spanish researchers have created a powerful new open-source tool that helps uncover the hidden genetic networks driving cancer. Called RNACOREX, the software can analyze thousands of molecular interactions at once, revealing how genes communicate inside tumors and how those signals relate to patient…
223

arXiv:2512.17394v1 Announce Type: new
Abstract: Theory of Mind (ToM) -- the ability to attribute beliefs, desires, and emotions to others -- is fundamental for human social intelligence, yet remains a major challenge for artificial agents. Existing Vision-Language Models (VLMs) are increasingly app…
219

arXiv:2512.17262v1 Announce Type: new
Abstract: Dependable service-oriented computing relies on multiple Quality of Service (QoS) parameters that are essential to assess service optimality. However, real-world QoS data are extremely sparse, noisy, and shaped by hierarchical dependencies arising fro…
221

arXiv:2512.17893v1 Announce Type: cross
Abstract: Neural Quantum States (NQS) use neural networks to represent wavefunctions of quantum many-body systems, but their performance depends on the choice of basis, yet the underlying mechanism remains poorly understood. We use a fully solvable one-dimens…
265

A way to electrically modify the chirality of organic–inorganic hybrid materials, in which chiral molecules adsorb onto inorganic surfaces, has been demonstrated by researchers at Science Tokyo. By using an electric double-layer transistor with a chiral electrolyte, specific chirality was imposed on…
232

Science is entering a massive publishing boom, in large part due to artificial intelligence. New research published in the journal Science has revealed that scientists who use large language models (LLMs) like ChatGPT are producing significantly more papers across many fields. The technology is also…
222

Scientists have identified a previously unknown natural compound produced by heat-loving cyanobacteria that helps protect against ultraviolet radiation. Natural sunscreen ingredients can protect the skin from damaging radiation while reducing the risk of allergic reactions. In a recent study, scient…
222

This giant bubble on the island of Sardinia holds 2,000 tonnes of carbon dioxide. But the gas wasn’t captured from factory emissions, nor was it pulled from the air. It came from a gas supplier, and it lives permanently inside the dome’s system to serve an eco-friendly purpose: to store large amount…
210

As claims about conscious AI grow louder, a Cambridge philosopher argues that we lack the evidence to know whether machines can truly be conscious, let alone morally significant. A philosopher at the University of Cambridge says we currently have too little reliable evidence about what consciousness…
118

arXiv:2512.17748v1 Announce Type: new
Abstract: The rise of quantum computing/technology potentially introduces significant security challenges to cloud computing, necessitating quantum-resistant encryption strategies as well as protection schemes and methods for cloud infrastructures offering quan…