Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
cs.SE updates on arXiv.org
rss.arxiv.org
Hidden Dependencies and Component
Variants
in
SBOM-Based
Software Composition Analysis
arxiv.org
·
1w
Probabilistic
Verification of Neural Networks via Efficient
Probabilistic
Hull
Generation
arxiv.org
·
1w
Quantum-HPC
Software Stacks and the
openQSE
Reference Architecture: A Survey
arxiv.org
·
1w
Beyond the Binary:
Motivations
, Challenges, and Strategies of
Transgender
and Non-binary Software Engineering Students
arxiv.org
·
1w
Generalizing
Test Cases for Comprehensive Test
Scenario
Coverage
arxiv.org
·
1w
Automated
LTL
Specification
Generation from Industrial Aerospace Requirements
arxiv.org
·
1w
Value-Conflict
Diagnostics
Reveal Widespread Alignment
Faking
in Language Models
arxiv.org
·
1w
The Path Not
Taken
:
Duality
in Reasoning about Program Execution
arxiv.org
·
1w
mcdok
at
SemEval-2026
Task 13: Finetuning LLMs for Detection of Machine-Generated Code
arxiv.org
·
1w
MathDuels
: Evaluating LLMs as Problem
Posers
and Solvers
arxiv.org
·
1w
·
Hacker News
Strategic
Heterogeneous
Multi-Agent Architecture for Cost-Effective Code
Vulnerability
Detection
arxiv.org
·
1w
Agentic AI-assisted coding offers a unique opportunity to
instill
epistemic
grounding during software development
arxiv.org
·
1w
Can Large Language Models Assist the
Comprehension
of
ROS2
Software Architectures?
arxiv.org
·
1w
Absorber
LLM: Harnessing Causal
Synchronization
for Test-Time Training
arxiv.org
·
1w
Measuring and
Exploiting
Confirmation
Bias in LLM-Assisted Security Code Review
arxiv.org
·
6w
Mining Type
Constructs
Using
Patterns
in AI-Generated Code
arxiv.org
·
9w
Automating
Computational
Reproducibility
in Social Science: Comparing Prompt-Based and Agent-Based Approaches
arxiv.org
·
11w
Focus on What Matters:
Fisher-Guided
Adaptive Multimodal Fusion for
Vulnerability
Detection
arxiv.org
·
16w
From Rookie to Expert:
Manipulating
LLMs for Automated Vulnerability
Exploitation
in Enterprise Software
arxiv.org
·
17w
AI for software engineering: from
probable
to
provable
arxiv.org
·
21w
« Page 13
·
Page 15 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help