Smarter QEMU Coverage: A Plugin That Doesn’t Slow You Down
Researchers have developed a new QEMU plugin, NQC2, that significantly accelerates code coverage analysis for embedded systems without compromising performance.
Researchers have developed a new QEMU plugin, NQC2, that significantly accelerates code coverage analysis for embedded systems without compromising performance.

A new wave of research explores how quantum machine learning can bolster the security of distributed energy systems against increasingly sophisticated coordinated stealth attacks.
![Classical syndrome codes-specifically [latex]CSXC_{\mathrm{S}}^{X}[/latex]-demonstrate performance characteristics that implicitly forecast eventual failure modes within the system they attempt to stabilize.](https://arxiv.org/html/2601.01137v1/x1.png)
Researchers have uncovered a fundamental link between the mathematical structure of Bivariate Bicycle codes and their ability to correct errors in quantum data, even with limited measurements.

A new system architecture tackles the challenges of running multiple quantum programs concurrently, paving the way for more efficient use of scarce quantum resources.
A new framework combines federated learning with advanced cryptography to safeguard critical infrastructure from evolving cyber threats.
As the threat of quantum computing looms, this review explores the vital steps needed to safeguard Intelligent Transportation Systems from emerging cryptographic vulnerabilities.
A new framework, Rogue Variable Theory, explores how quantum-inspired mathematics can represent ambiguous pre-event cognitive states, offering a path towards more interpretable and aligned artificial intelligence.
![The system optimizes semantic communication by assigning repetition counts to quantized embeddings-guided by a policy [latex]\pi_{\theta}[/latex]-to minimize semantic distortion [latex]D_{S}[/latex] while adhering to a predetermined channel-use budget [latex]B[/latex].](https://arxiv.org/html/2601.00186v1/x1.png)
A new reinforcement learning approach intelligently prioritizes the most vital parts of data embeddings, ensuring reliable communication even with limited bandwidth.
New latch-free techniques dramatically reduce thread contention and improve performance in key-value stores by enabling highly concurrent access to B-tree indexes.
A novel authenticated encryption framework, Diamond, offers enhanced security and efficiency for resource-constrained Internet of Things devices.