Memory-augmented Large Language Models (LLMs) have demonstrated remarkable capability for complex and long-horizon embodied planning. By keeping track of past experiences and environmental states, memory enables LLMs to maintain a global view, thereby avoiding repetitive exploration. However, existing approaches often store the memory as raw text, leading to excessively long prompts and high prefill latency. While it is possible to store and reuse the KV caches, the efficiency benefits are greatly undermined due to frequent KV cache updates. In this paper, we propose KEEP, a KV-cache-centric memory management system for efficient embodied planning. KEEP features 3 key innovations: (1) a Static-Dynamic Memory Construction algorithm that reduces KV cache recomputation by mixed-granularity memory group; (2) a Multi-hop Memory Re-computation algorithm that dynamically identifies important cross-attention among different memory groups and reconstructs memory interactions iteratively; (3) a Layer-balanced Memory Loading that eliminates unbalanced KV cache loading and cross-attention computation across different layers. Extensive experimental results have demonstrated that KEEP achieves 2
Machine learning in healthcare requires effective representation of structured medical codes, but current methods face a trade off: knowledge graph based approaches capture formal relationships but miss real world patterns, while data driven methods learn empirical associations but often overlook structured knowledge in medical terminologies. We present KEEP (Knowledge preserving and Empirically refined Embedding Process), an efficient framework that bridges this gap by combining knowledge graph embeddings with adaptive learning from clinical data. KEEP first generates embeddings from knowledge graphs, then employs regularized training on patient records to adaptively integrate empirical patterns while preserving ontological relationships. Importantly, KEEP produces final embeddings without task specific auxiliary or end to end training enabling KEEP to support multiple downstream applications and model architectures. Evaluations on structured EHR from UK Biobank and MIMIC IV demonstrate that KEEP outperforms both traditional and Language Model based approaches in capturing semantic relationships and predicting clinical outcomes. Moreover, KEEP's minimal computational requirements
This article develops an optical navigation (OPNAV) and station-keeping pipeline for the near-rectilinear halo orbit (NRHO) in high-fidelity ephemeris model dynamics, using synthetic images in a non-iterative horizon-based OPNAV algorithm, applying the result in a navigation filter, and using the obtained estimates in a station-keeping control scheme that keeps the spacecraft in the vicinity of a reference orbit. We study differential correction-based and minimization-based implementations of the so-called x-axis crossing control scheme, and propose an improved targeting prediction scheme by incorporating the filter's state covariance with an unscented transform. We also introduce a hysteresis mechanism, which improves station-keeping cost and provides insight into the difference in performance between the differential correction-based and minimization-based approaches. We perform Monte-Carlo experiments to assess the pipeline's tracking and ΔV performances. We report several key findings, including the variability of the filter performance with the sensor field of view and measurement locations, station-keeping cost reduction achieved by the unscented transform-based prediction an
Areostationary Mars orbit (AMO) satellites will play an important role in future expeditions to the Martian surface due to their strength as navigation and communication satellites. Perturbative forces experienced by an AMOR satellite will cause it to drift from its nominal orbit, necessitating station keeping. This note presents a novel approach to AMO station keeping that bridges the gap seen in prior predictive control methods between fuel-efficiency and computational-efficiency. The method proposed in this notes involves the discovery and use of a fuel-free natural motion trajectory that maintains the satellite within one degree of longitude from a areostationary orbit. Two of these natural motion trajectories exist as limit cycles about Mars' stable equilibrium longitudes. They are the resulting motion in the presence of Mars' non-homogeneous gravitational field, accounting for Keplerian and higher-order gravitational perturbations. The proposed MPC policy uses a linear time-varying (LTV) dynamic model that is derived by linearizing the satellite's dynamics relative to the appropriate natural motion trajectory. The result is a station keeping policy that minimizes the fuel con
Accountability regimes typically encourage record-keeping to enable the transparency that supports oversight, investigation, contestation, and redress. However, implementing such record-keeping can introduce considerations, risks, and consequences, which so far remain under-explored. This paper examines how record-keeping practices bring algorithmic systems within accountability regimes, providing a basis to observe and understand their effects. For this, we introduce, describe, and elaborate 'accountability capture' -- the re-configuration of socio-technical processes and the associated downstream effects relating to record-keeping for algorithmic accountability. Surveying 100 practitioners, we evidence and characterise record-keeping issues in practice, identifying their alignment with accountability capture. We further document widespread record-keeping practices, tensions between internal and external accountability requirements, and evidence of employee resistance to practices imposed through accountability capture. We discuss these and other effects for surveillance, privacy, and data protection, highlighting considerations for algorithmic accountability communities. In all,
Drawing on ideas from continuous integration, we present concepts of an automated benchmarking pipeline for high performance applications. Customization and collaboration have been key design goals owing to the requirements of research-software development as a continuous community effort. We have extended our previous conceptual work on systematic benchmarking workflows with the functionality of user-agnostic operations as well as continuous benchmarking. This fosters reproducibility and re-use of benchmarking results to ensure sustainable technological progress. We provide software-engineering solutions to keep pace with the rapid evolution of both large-scale models and high-performance computing systems with a view towards the scientific domains of neuroscience and artificial intelligence.
Protocols for causal message delivery are widely used in distributed systems. Traditionally, causal delivery can be enforced either on the message sender's side or on the receiver's side. The traditional sender-side approach avoids the message metadata overhead of the receiver-side approach, but is more conservative than necessary. We present Cykas ("Can you keep a secret?"), a new protocol for sender-side enforcement of causal delivery that sidesteps the conservativeness of the traditional sender-side approach by allowing eager sending of messages and constraining the behavior of their recipients. We implemented the Cykas protocol in Rust and checked the safety and liveness of our implementation using the Stateright implementation-level model checker. Our experiments show that for applications involving long-running jobs, Cykas has a performance advantage: Cykas lets long-running jobs start (and end) earlier, leading to shorter overall execution time compared to the traditional sender-side approach.
We study the market design of keep-alive caching policies applicable in serverless computing. Prior work has assumed that the cost of a cache miss (cold start) is uniform across all customer applications. However, the cost of a cache miss depends on the customer's application. We investigate the market design where the customers submit a bid for their cost of a cache miss. We design a cache allocation policy based on online learning from a mixture of fixed allocation experts. We show that our custom cache allocation policy is asymptotically efficient and monotonically non-increasing with respect to the submitted bid. We examine two ways of charging customers to achieve good incentives. In the first payment scheme the customers are charged based on Myerson's theory, whereas in the second payment scheme the customers are charged their externality. We show via a mix of simulations and theory that both schemes have desirable revenue and incentive properties.
Logical investigations of the notion of secrecy are typically concentrated on tools for deducing whether private information is well hidden from unauthorized, direct, or indirect access attempts. This paper proposes a multi-agent, normal multi-modal logic to capture salient features of secrecy's intentions. Specifically, we focus on the intentions, beliefs, and knowledge of secret keepers and, more generally, of all the actors involved in secret-keeping scenarios. In particular, we investigate intentions underlying the keeping of a true secret, namely a secret concerning information known (and so true) by the secret keeper. The resulting characterization of intending to keep a true secret provides valuable insights into conditions ensuring or undermining secrecy depending on agents' attitudes and links between secrets and their surrounding context. We present the proposed logical system's soundness, completeness, and decidability results. Furthermore, we outline some theorems with potential applications to several fields, e.g., computer science and the social sciences.
The continued exploration of Mars will require a greater number of in-space assets to aid interplanetary communications. Future missions to the surface of Mars may be augmented with stationary satellites that remain overhead at all times as a means of sending data back to Earth from fixed antennae on the surface. These areostationary satellites will experience several important disturbances that push and pull the spacecraft off of its desired orbit. Thus, a station-keeping control strategy must be put into place to ensure the satellite remains overhead while minimizing the fuel required to elongate mission lifetime. This paper develops a model predictive control policy for areostationary station keeping that exploits knowledge of non-Keplerian perturbations in order to minimize the required annual station-keeping $Δv$. The station-keeping policy is applied to a satellite placed at various longitudes, and simulations are performed for an example mission at a longitude of a potential future crewed landing site. Through careful tuning of the controller constraints, and proper placement of the satellite at stable longitudes, the annual station-keeping $Δv$ can be reduced relative to a
Language models are deployed in settings that require compartmentalization: system prompts should not be disclosed, chain-of-thought reasoning is hidden from users, and sensitive data passes through shared contexts. We test whether models can keep prompted information out of their writing. We give each model a secret word with instructions not to reveal it, then ask it to write a story. A second model tries to identify the secret from the story in a binary discrimination test. The secret word never appears literally in any output, but all five frontier models we test leak it thematically -- through topic choice, imagery, and setting--6hy-at rates significantly different from chance, up to 79\%. When told to actively hide the secret, models write \emph{away from} it, and this avoidance is itself detectable. The leakage is cross-model readable, scales sharply with model size within two model families, and disappears entirely for short-form writing like jokes. Giving the model a decoy concept to ``focus on instead'' partially redirects the leakage from the real secret to the decoy. Attending to a secret appears to open up an information channel that frontier LLMs cannot close, even wh
The importance of cybersecurity for Small and Medium Enterprises (SMEs) has never been greater, especially given the rise of AI-driven threats. Supporting SMEs requires a sustained effort to ensure they have access to resources and expertise covering awareness, protection, auditing, and incident response. Since 2019, our work with the Keep It Secure initiative has focused on helping Belgian (Walloon) SMEs strengthen their cybersecurity posture through access to a network of labelled cybersecurity experts. In this process, we interviewed over 120 professionals from around 90 companies and gathered rich insights about the nature, strengths and weaknesses of our regional ecosystem. While our initiative primarily targets the labelling of cybersecurity experts, we demonstrate increasing alignment with the broader Cyber Fundamentals framework deployed at the federal level in Belgium, which supports official certification. This paper reports on the progress and lessons learned from this long-term effort, highlighting how expert validation, based on a structured evaluation approach, can help improve SME cybersecurity.
The increasing number of older adults who experience cognitive decline places a burden on informal caregivers, whose support with tasks of daily living determines whether older adults can remain in their homes. To explore how agents might help lower-SES older adults to age-in-place, we interviewed ten pairs of older adults experiencing cognitive decline and their informal caregivers. We explored how they coordinate care, manage burdens, and sustain autonomy and privacy. Older adults exercised control by delegating tasks to specific caregivers, keeping information about all the care they received from their adult children. Many abandoned some tasks of daily living, lowering their quality of life to ease caregiver burden. One effective strategy, piggybacking, uses spontaneous overlaps in errands to get more work done with less caregiver effort. This raises the questions: (i) Can agents help with piggyback coordination? (ii) Would it keep older adults in their homes longer, while not increasing caregiver burden?
Lane keeping in autonomous driving systems requires scenario-specific weight tuning for different objectives. We formulate lane-keeping as a constrained reinforcement learning problem, where weight coefficients are automatically learned along with the policy, eliminating the need for scenario-specific tuning. Empirically, our approach outperforms traditional RL in efficiency and reliability. Additionally, real-world demonstrations validate its practical value for real-world autonomous driving.
Medical image segmentation is constrained by sparse pathological annotations. Existing augmentation strategies, from conventional transforms to random masking for self-supervision, are feature-agnostic: they often corrupt critical diagnostic semantics or fail to prioritize essential features. We introduce "Keep the Core," a novel data-centric paradigm that uses adversarial priors to guide both augmentation and masking in a significance-preserving manner. Our approach uses SAGE (Sparse Adversarial Gated Estimator), an offline module identifying minimal tokens whose micro-perturbation flips segmentation boundaries. SAGE forges the Token Importance Map $W$ by solving an adversarial optimization problem to maximally degrade performance, while an $\ell_1$ sparsity penalty encourages a compact set of sensitive tokens. The online KEEP (Key-region Enhancement \& Preservation) module uses $W$ for a two-pronged augmentation strategy: (1) Semantic-Preserving Augmentation: High-importance tokens are augmented, but their original pixel values are strictly restored. (2) Guided-Masking Augmentation: Low-importance tokens are selectively masked for an $\text{MAE}$-style reconstruction, forcing
Proto-planetary disks display the so-called size-luminosity relation, where their mm-wavelength fluxes scale linearly with their emitting areas. This suggests that these disks are optically thick in mm-band, an interpretation further supported by their near-black-body spectral indexes. Such characteristics are seen not only among disks in very young star-forming regions like Lupus (1-3 Myrs), but, as we demonstrate here, also among disks in the much older Upper Scorpius region (5-11 Myrs). How can disks shine brightly for so long, when grain growth and subsequent radial drift should have quickly depleted their solid reservoir? Here, we suggest that the "bouncing barrier" provides the answer. Even colliding at very low speeds (below 1cm/s), grains already fail to stick to each other but instead bounce off in-elastically. This barrier stalls grain growth at a near-universal size of 100 micron. These small grains experience much reduced radial drift, and so are able to keep the disks bright for millions of years. They are also tightly coupled to gas, offering poor prospects for processes like streaming instability or pebble accretion. We speculate briefly on how planetesimals can aris
The normal forms provide useful approximations for many trajectories of interest within the circular restricted three-body problem. This paper aims to thoroughly compare two of these forms: the Birkhoff normal form and the resonant normal form, highlighting the strengths of each for the representation of center manifold trajectories. A method of station-keeping is introduced, analogous to Floquet modes, in which the unstable component is minimized at specific points along a trajectory through impulsive maneuvers. Three different formulations of the same station-keeping approach are posed, collectively spanning Lyapunov, vertical, and halo orbits, as well as Lissajous and quasihalo trajectories.
Keeping the batteries on the shelf: this is the holy grail for low-cost Internet of Things (IoT) nodes. In this paper we study the potential of radio frequency (RF)-based wireless power transfer implementing coherent beamforming with many antennas to realize this ambitious target. We optimize the deployment of the antennas to charge electronic shelf labels (ESLs), considering actual regulatory constraints. The results confirm the feasibility to create power spots that are sufficient to keep the high density of battery-less devices operational.
This paper proposes a Recurrent Neural Network (RNN) controller for lane-keeping systems, effectively handling model uncertainties and disturbances. First, quadratic constraints cover the nonlinearities brought by the RNN controller, and the linear fractional transformation method models the dynamics of system uncertainties. Second, we prove the robust stability of the lane-keeping system in the presence of uncertain vehicle speed using a linear matrix inequality. Then, we define a reachable set for the lane-keeping system. Finally, to confirm the safety of the lane-keeping system with tracking error bound, we formulate semidefinite programming to approximate the outer set of the reachable set. Numerical experiments demonstrate that this approach confirms the stabilizing RNN controller and validates the safety with an untrained dataset with untrained varying road curvatures.
Extractive summaries are usually presented as lists of sentences with no expected cohesion between them. In this paper, we aim to enforce cohesion whilst controlling for informativeness and redundancy in summaries, in cases where the input exhibits high redundancy. The pipeline controls for redundancy in long inputs as it is consumed, and balances informativeness and cohesion during sentence selection. Our sentence selector simulates human memory to keep track of topics --modeled as lexical chains--, enforcing cohesive ties between noun phrases. Across a variety of domains, our experiments revealed that it is possible to extract highly cohesive summaries that nevertheless read as informative to humans as summaries extracted by only accounting for informativeness or redundancy. The extracted summaries exhibit smooth topic transitions between sentences as signaled by lexical chains, with chains spanning adjacent or near-adjacent sentences.