EUNO.NEWS EUNO.NEWS
  • All (21181) +146
  • AI (3169) +10
  • DevOps (940) +5
  • Software (11185) +102
  • IT (5838) +28
  • Education (48)
  • Notice
  • All (21181) +146
    • AI (3169) +10
    • DevOps (940) +5
    • Software (11185) +102
    • IT (5838) +28
    • Education (48)
  • Notice
  • All (21181) +146
  • AI (3169) +10
  • DevOps (940) +5
  • Software (11185) +102
  • IT (5838) +28
  • Education (48)
  • Notice
Sources Tags Search
한국어 English 中文
  • 1 week ago · ai

    [Paper] MicLog: Towards Accurate and Efficient LLM-based Log Parsing via Progressive Meta In-Context Learning

    Log parsing converts semi-structured logs into structured templates, forming a critical foundation for downstream analysis. Traditional syntax and semantic-base...

    #research #paper #ai #machine-learning
  • 1 week ago · ai

    [Paper] Calibrating Agent-Based Financial Markets Simulators with Pretrainable Automatic Posterior Transformation-Based Surrogates

    Calibrating Agent-Based Models (ABMs) is an important optimization problem for simulating the complex social systems, where the goal is to identify the optimal ...

    #research #paper #ai
  • 1 week ago · software

    [Paper] PenForge: On-the-Fly Expert Agent Construction for Automated Penetration Testing

    Penetration testing is essential for identifying vulnerabilities in web applications before real adversaries can exploit them. Recent work has explored automati...

    #research #paper #software
  • 1 week ago · devops

    [Paper] Divergence-Based Adaptive Aggregation for Byzantine Robust Federated Learning

    Inherent client drifts caused by data heterogeneity, as well as vulnerability to Byzantine attacks within the system, hinder effective model training and conver...

    #research #paper #devops
  • 1 week ago · devops

    [Paper] Learning-Augmented Performance Model for Tensor Product Factorization in High-Order FEM

    Accurate performance prediction is essential for optimizing scientific applications on modern high-performance computing (HPC) architectures. Widely used perfor...

    #research #paper #devops
  • 1 week ago · software

    [Paper] CHASE: LLM Agents for Dissecting Malicious PyPI Packages

    Modern software package registries like PyPI have become critical infrastructure for software development, but are increasingly exploited by threat actors distr...

    #research #paper #software
  • 1 week ago · ai

    [Paper] MemGovern: Enhancing Code Agents through Learning from Governed Human Experiences

    While autonomous software engineering (SWE) agents are reshaping programming paradigms, they currently suffer from a 'closed-world' limitation: they attempt to ...

    #research #paper #ai #machine-learning
  • 1 week ago · ai

    [Paper] Comparative Separation: Evaluating Separation on Comparative Judgment Test Data

    This research seeks to benefit the software engineering society by proposing comparative separation, a novel group fairness notion to evaluate the fairness of m...

    #research #paper #ai #machine-learning
  • 1 week ago · ai

    [Paper] A Backpropagation-Free Feedback-Hebbian Network for Continual Learning Dynamics

    Feedback-rich neural architectures can regenerate earlier representations and inject temporal context, making them a natural setting for strictly local synaptic...

    #research #paper #ai #machine-learning
  • 1 week ago · software

    [Paper] Vextra: A Unified Middleware Abstraction for Heterogeneous Vector Database Systems

    The rapid integration of vector search into AI applications, particularly for Retrieval Augmented Generation (RAG), has catalyzed the emergence of a diverse eco...

    #research #paper #software
  • 1 week ago · devops

    [Paper] Privacy-Preserving Data Processing in Cloud : From Homomorphic Encryption to Federated Analytics

    Privacy-preserving data processing refers to the methods and models that allow computing and analyzing sensitive data with a guarantee of confidentiality. As cl...

    #research #paper #devops
  • 1 week ago · devops

    [Paper] Behavioral Analytics for Continuous Insider Threat Detection in Zero-Trust Architectures

    Insider threats are a particularly tricky cybersecurity issue, especially in zero-trust architectures (ZTA) where implicit trust is removed. Although the rule o...

    #research #paper #devops

Newer posts

Older posts
EUNO.NEWS
RSS GitHub © 2026