-
#1Untangling Blockchain: A Data Processing View of Blockchain SystemsComprehensive analysis of blockchain systems from a data processing perspective, covering distributed ledger technologies, consensus protocols, smart contracts, and performance benchmarking using BLOCKBENCH framework.
-
#2Improbable Bigrams: Vulnerabilities in Byte-Level BPE TokenizersResearch analysis of incomplete tokens in byte-level BPE tokenizers and their vulnerability to improbable bigrams causing hallucinatory behaviors in LLMs.
-
#3Computational Lexical Analysis of Flamenco Genres: NLP and Machine Learning ApproachQuantitative analysis of Flamenco lyrics using NLP and machine learning to classify genres, identify semantic fields, and explore historical connections through lexical patterns.
-
#4Beyond Attentive Tokens: Efficient Vision Transformers with Token Importance and DiversityA novel token pruning method for Vision Transformers that jointly considers token importance and diversity to reduce computational complexity while maintaining accuracy.
-
#5DafnyBench: A Benchmark for Formal Software VerificationDafnyBench is the largest benchmark for training and evaluating machine learning systems for formal software verification, featuring 750+ programs with 53,000+ lines of code.
-
#6Formal Verification of Permission Voucher Protocol: Security Analysis and ImplementationComprehensive formal analysis of the Permission Voucher Protocol for privacy-preserving authentication in smart cities using Tamarin Prover and other verification tools.
-
#7Lamb: Lexical Analysis with Ambiguity Support for Context-Sensitive Language ProcessingLamb is a lexical analyzer that generates lexical analysis graphs to handle lexical ambiguities in language specifications, enabling context-sensitive analysis through parser collaboration.
-
#8Verification of MPI Programs: A Mathematical Model for Parallel ComputingA comprehensive analysis of MPI program verification using mathematical models, with application to matrix multiplication algorithms and comparison with existing verification approaches.
Last updated: 2025-12-01 05:35:38