[Paper] Controlled Self-Evolution for Algorithmic Code Optimization
Self-evolution methods enhance code generation through iterative 'generate-verify-refine' cycles, yet existing approaches suffer from low exploration efficiency...
Self-evolution methods enhance code generation through iterative 'generate-verify-refine' cycles, yet existing approaches suffer from low exploration efficiency...
Self-evolution methods enhance code generation through iterative 'generate-verify-refine' cycles, yet existing approaches suffer from low exploration efficiency...
Self-evolution methods enhance code generation through iterative 'generate-verify-refine' cycles, yet existing approaches suffer from low exploration efficiency...
Serverless computing is a paradigm in which the underlying infrastructure is fully managed by the provider, enabling applications and services to be executed wi...
Decision-making is a core engineering design activity that conveys the engineer's knowledge and translates it into courses of action. Capturing this form of kno...
The rapid emergence of multi-agent AI systems (MAS), including LangChain, CrewAI, and AutoGen, has shaped how large language model (LLM) applications are develo...
Radio astronomy relies on bespoke, experimental and innovative computing solutions. This will continue as next-generation telescopes such as the Square Kilometr...
3D object detection using LiDAR-based point cloud data and deep neural networks is essential in autonomous driving technology. However, deploying state-of-the-a...
Recent secure code generation methods, using vulnerability-aware fine-tuning, prefix-tuning, and prompt optimization, claim to prevent LLMs from producing insec...
In this paper, the foundations of neuromorphic computing, spiking neural networks (SNNs) and memristors, are analyzed and discussed. Neuromorphic computing is t...
Context: The rapid emergence of generative AI (GenAI) tools has begun to reshape various software engineering activities. Yet, their adoption within agile envir...
As vulnerability research increasingly adopts generative AI, a critical reliance on opaque model outputs has emerged, creating a 'trust gap' in security automat...