342

arXiv:2512.14070v1 Announce Type: new
Abstract: JavaScript's widespread adoption has made it an attractive target for malicious attackers who employ sophisticated obfuscation techniques to conceal harmful code. Current deobfuscation tools suffer from critical limitations that severely restrict thei…
234

arXiv:2512.13921v1 Announce Type: new
Abstract: Multi-hybrid architectures are poised to take over language modeling due to better quality and performance. We introduce a hierarchical decomposition framework for linear recurrences that allows us to develop algorithms aligned with GPU memory hierarc…
332

arXiv:2512.12067v1 Announce Type: new
Abstract: The Internet community has taken major efforts to decrease latency in the World Wide Web. Significant improvements have been achieved in accelerating content transport and in compressing static content. Less attention, however, has been dedicated to d…
201

arXiv:2511.03909v2 Announce Type: replace
Abstract: The weighted Euler characteristic transform (WECT) and Euler characteristic function (ECF) have proven to be useful tools in a variety of applications. However, current methods for computing these functions are either not optimized for speed or do…
223

Despite changing its name and using decidedly bird-free branding, X is trying to hold on to its original Twitter trademarks, TechCrunch reports. The xAI-owned social media platform has updated its terms of service to include references to Twitter after previously only mentioning X, and seemingly att…