@inproceedings{19743,
  abstract     = {The possibility of errors in human-engineered formal verification software, such as model checkers, poses a serious threat to the purpose of these tools. An established approach to mitigate this problem are certificates—lightweight, easy-to-check proofs of the verification results. In this paper, we develop novel certificates for model checking of Markov decision processes (MDPs) with quantitative reachability and expected reward properties. Our approach is conceptually simple and relies almost exclusively on elementary fixed point theory. Our certificates work for arbitrary finite MDPs and can be readily computed with little overhead using standard algorithms. We formalize the soundness of our certificates in Isabelle/HOL and provide a formally verified certificate checker. Moreover, we augment existing algorithms in the probabilistic model checker Storm with the ability to produce certificates and demonstrate practical applicability by conducting the first formal certification of the reference results in the Quantitative Verification Benchmark Set.},
  author       = {Chatterjee, Krishnendu and Quatmann, Tim and Schäffeler, Maximilian and Weininger, Maximilian and Winkler, Tobias and Zilken, Daniel},
  booktitle    = {31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems},
  isbn         = {9783031906527},
  issn         = {1611-3349},
  location     = {Hamilton, ON, Canada},
  pages        = {130--151},
  publisher    = {Springer Nature},
  title        = {{Fixed point certificates for reachability and expected rewards in MDPs}},
  doi          = {10.1007/978-3-031-90653-4_7},
  volume       = {15697},
  year         = {2025},
}

@inproceedings{19744,
  abstract     = {We consider the problem of refuting equivalence of probabilistic programs, i.e., the problem of proving that two probabilistic programs induce different output distributions. We study this problem in the context of programs with conditioning (i.e., with observe and score statements), where the output distribution is conditioned by the event that all the observe statements along a run evaluate to true, and where the probability densities of different runs may be updated via the score statements. Building on a recent work on programs without conditioning, we present a new equivalence refutation method for programs with conditioning. Our method is based on weighted restarting, a novel transformation of probabilistic programs with conditioning to the output equivalent probabilistic programs without conditioning that we introduce in this work. Our method is the first to be both a) fully automated, and b) providing provably correct answers. We demonstrate the applicability of our method on a set of programs from the probabilistic inference literature.},
  author       = {Chatterjee, Krishnendu and Kafshdar Goharshadi, Ehsan and Novotný, Petr and Zikelic, Dorde},
  booktitle    = {31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems},
  isbn         = {9783031906527},
  issn         = {1611-3349},
  location     = {Hamilton, ON, Canada},
  pages        = {279--300},
  publisher    = {Springer Nature},
  title        = {{Refuting equivalence in probabilistic programs with conditioning}},
  doi          = {10.1007/978-3-031-90653-4_14},
  volume       = {15697},
  year         = {2025},
}

@misc{19769,
  abstract     = {Artifact to reproduce the experimental results presented in the article "Sound Statistical Model Checking for Probabilities and Expected Rewards" by Carlos E. Budde, Arnd Hartmanns, Tobias Meggendorfer, Maximilian Weininger, and Patrick Wienhöft (TACAS 2025).

The contents include all data and software (formal models, software tools, Python & bash scripts) used in the experimental evaluation presented in sections 3, 4, and 6 of the article. Detailed instructions on how to reproduce the results are bundled in the artifact.},
  author       = {Budde, Carlos and Hartmanns, Arnd and Meggendorfer, Tobias and Weininger, Maximilian and Wienhöft, Patrick},
  publisher    = {Zenodo},
  title        = {{Sound statistical model checking for probabilities and expected rewards (experimental reproduction package)}},
  doi          = {10.5281/ZENODO.14602066},
  year         = {2025},
}

@misc{19771,
  abstract     = {This artifact allows to review and reproduce the Isabelle proofs and practical experiments from the paper *Fixed Point Certificates for Reachability and Expected Rewards in MDPs*.
The contents are two-fold:
First, the artifact contains a formally verified certificate checker for the certificates presented in the paper.
The formal Isabelle/HOL proofs of the background theory can be inspected, checked by Isabelle and the code extraction can be retraced.

Second, the artifact contains a modified version of the model checking tool `Storm` with support for certificate generation. Together with the provided scripts and benchmark files, this allows to reproduce the experiments from the paper.
An appropriate subset of the experiments is given to allow a review in a timely manner. In addition, original logfiles from our experiments are provided, allowing a detailed inspection.

The package includes convenient installation scripts for [the TACAS 2023 VM](https://doi.org/10.5281/zenodo.7113223) (based on Ubuntu 22.04).
A native installation on Linux or macOS systems (including the newer ARM-based machines) is also possible.},
  author       = {Chatterjee, Krishnendu and Quatmann, Tim and Schäffeler, Maximilian and Weininger, Maximilian and Winkler, Tobias and Zilken, Daniel},
  publisher    = {Zenodo},
  title        = {{Artifact: Fixed point certificates for reachability and expected rewards in MDPs}},
  doi          = {10.5281/ZENODO.14626585},
  year         = {2025},
}

@article{19776,
  abstract     = {We use the circle method to prove that a density 1 of elements in Fq[t] are representable as a sum of three cubes of essentially minimal degree from Fq[t], assuming the Ratios Conjecture and that char(Fq)>3. Roughly speaking, to do so, we upgrade an order of magnitude result to a full asymptotic formula that was conjectured by Hooley in the number field setting.},
  author       = {Browning, Timothy D and Glas, Jakob and Wang, Victor},
  issn         = {1432-1823},
  journal      = {Mathematische Zeitschrift},
  number       = {4},
  publisher    = {Springer Nature},
  title        = {{Optimal sums of three cubes in Fq[t]}},
  doi          = {10.1007/s00209-025-03765-z},
  volume       = {310},
  year         = {2025},
}

@article{15016,
  abstract     = {Amphibians, by virtue of their phylogenetic position, provide invaluable insights on nervous system evolution, development, and remodeling. The genetic toolkit for amphibians, however, remains limited. Recombinant adeno-associated viral vectors (AAVs) are a powerful alternative to transgenesis for labeling and manipulating neurons. Although successful in mammals, AAVs have never been shown to transduce amphibian cells efficiently. We screened AAVs in three amphibian species—the frogs Xenopus laevis and Pelophylax bedriagae and the salamander Pleurodeles waltl—and identified at least two AAV serotypes per species that transduce neurons. In developing amphibians, AAVs labeled groups of neurons generated at the same time during development. In the mature brain, AAVrg retrogradely traced long-range projections. Our study introduces AAVs as a tool for amphibian research, establishes a generalizable workflow for AAV screening in new species, and expands opportunities for cross-species comparisons of nervous system development, function, and evolution.},
  author       = {Jaeger, Eliza C.B. and Vijatovic, David and Deryckere, Astrid and Zorin, Nikol and Nguyen, Akemi L. and Ivanian, Georgiy and Woych, Jamie and Arnold, Rebecca C and Ortega Gurrola, Alonso and Shvartsman, Arik and Barbieri, Francesca and Toma, Florina-Alexandra and Gorbsky, Gary J. and Horb, Marko E. and Cline, Hollis T. and Shay, Timothy F. and Kelley, Darcy B. and Yamaguchi, Ayako and Shein-Idelson, Mark and Tosches, Maria Antonietta and Sweeney, Lora Beatrice Jaeger},
  issn         = {1878-1551},
  journal      = {Developmental Cell},
  number       = {5},
  pages        = {794--812.e6},
  publisher    = {Elsevier},
  title        = {{Adeno-associated viral tools to trace neural development and connectivity across amphibians}},
  doi          = {10.1016/j.devcel.2024.10.025},
  volume       = {60},
  year         = {2025},
}

@article{15121,
  abstract     = {We present an auction algorithm using multiplicative instead of constant weight updates to compute a (1-E)-approximate maximum weight matching (MWM) in a bipartite graph with n vertices and m edges in time 0(mE-1), beating the running time of the fastest known approximation algorithm of Duan and Pettie [JACM ’14] that runs in 0(mE-1 log E-1). Our algorithm is very simple and it can be extended to give a dynamic data structure that maintains a (1-E)-approximate maximum weight matching under (1) one-sided vertex deletions (with incident edges) and (2) one-sided vertex insertions (with incident edges sorted by weight) to the other side. The total time time used is 0(mE-1), where m is the sum of the number of initially existing and inserted edges.},
  author       = {Zheng, Da Wei and Henzinger, Monika H},
  issn         = {1436-4646},
  journal      = {Mathematical Programming},
  pages        = {881--894},
  publisher    = {Springer Nature},
  title        = {{Multiplicative auction algorithm for approximate maximum weight bipartite matching}},
  doi          = {10.1007/s10107-024-02066-3},
  volume       = {210},
  year         = {2025},
}

@article{15128,
  abstract     = {We prove a universal mesoscopic central limit theorem for linear eigenvalue statistics of a Wigner-type matrix inside the bulk of the spectrum with compactly supported twice continuously differentiable test functions. The main novel ingredient is an optimal local law for the two-point function $T(z,\zeta)$  and a general class of related quantities involving two resolvents at nearby spectral parameters.},
  author       = {Riabov, Volodymyr},
  issn         = {0246-0203},
  journal      = {Annales de l'institut Henri Poincare (B) Probability and Statistics},
  number       = {1},
  pages        = {129--154},
  publisher    = {Institute of Mathematical Statistics},
  title        = {{Mesoscopic eigenvalue statistics for Wigner-type matrices}},
  doi          = {10.1214/23-AIHP1438},
  volume       = {61},
  year         = {2025},
}

@article{10011,
  abstract     = {We propose a new weak solution concept for (two-phase) mean curvature flow which enjoys both (unconditional) existence and (weak-strong) uniqueness properties. These solutions are evolving varifolds, just as in Brakke's formulation, but are coupled to the phase volumes by a simple transport equation. First, we show that, in the exact same setup as in Ilmanen's proof [J. Differential Geom. 38, 417-461, (1993)], any limit point of solutions to the Allen-Cahn equation is a varifold solution in our sense. Second, we prove that any calibrated flow in the sense of Fischer et al. [arXiv:2003.05478] - and hence any classical solution to mean curvature flow-is unique in the class of our new varifold solutions. This is in sharp contrast to the case of Brakke flows, which a priori may disappear at any given time and are therefore fatally non-unique. Finally, we propose an extension of the solution concept to the multi-phase case which is at least guaranteed to satisfy a weak-strong uniqueness principle.},
  author       = {Hensel, Sebastian and Laux, Tim},
  issn         = {1945-743X},
  journal      = {Journal of Differential Geometry},
  keywords     = {Mean curvature flow, gradient flows, varifolds, weak solutions, weak-strong uniqueness, calibrated geometry, gradient-flow calibrations},
  pages        = {209--268},
  publisher    = {International Press},
  title        = {{A new varifold solution concept for mean curvature flow: Convergence of  the Allen-Cahn equation and weak-strong uniqueness}},
  doi          = {10.4310/jdg/1747065796},
  volume       = {130},
  year         = {2025},
}

@article{10045,
  abstract     = {Given a fixed finite metric space (V,μ), the {\em minimum 0-extension problem}, denoted as 0-Ext[μ], is equivalent to the following optimization problem: minimize function of the form minx∈Vn∑ifi(xi)+∑ijcijμ(xi,xj) where cij,cvi are given nonnegative costs and fi:V→R are functions given by fi(xi)=∑v∈Vcviμ(xi,v). The computational complexity of 0-Ext[μ] has been recently established by Karzanov and by Hirai: if metric μ is {\em orientable modular} then 0-Ext[μ] can be solved in polynomial time, otherwise 0-Ext[μ] is NP-hard. To prove the tractability part, Hirai developed a theory of discrete convex functions on orientable modular graphs generalizing several known classes of functions in discrete convex analysis, such as L♮-convex functions. We consider a more general version of the problem in which unary functions fi(xi) can additionally have terms of the form cuv;iμ(xi,{u,v}) for {u,v}∈F, where set F⊆(V2) is fixed. We extend the complexity classification above by providing an explicit condition on (μ,F) for the problem to be tractable. In order to prove the tractability part, we generalize Hirai's theory and define a larger class of discrete convex functions. It covers, in particular, another well-known class of functions, namely submodular functions on an integer lattice. Finally, we improve the complexity of Hirai's algorithm for solving 0-Ext on orientable modular graphs.
},
  author       = {Dvorak, Martin and Kolmogorov, Vladimir},
  issn         = {1436-4646},
  journal      = {Mathematical Programming},
  keywords     = {minimum 0-extension problem, metric labeling problem, discrete metric spaces, metric extensions, computational complexity, valued constraint satisfaction problems, discrete convex analysis, L-convex functions},
  pages        = {279--322},
  publisher    = {Springer Nature},
  title        = {{Generalized minimum 0-extension problem and discrete convexity}},
  doi          = {10.1007/s10107-024-02064-5},
  volume       = {209},
  year         = {2025},
}

@inproceedings{20820,
  abstract     = {The high computational costs of large language models (LLMs) have led to a flurry of research on LLM compression, via methods such as quantization, sparsification, or structured pruning. A new frontier in this area is given by dynamic, non-uniform compression methods, which adjust the compression levels (e.g., sparsity) per-block or even per-layer in order to minimize accuracy loss, while guaranteeing a global compression threshold. Yet, current methods rely on estimating the "importance" of a given layer, implicitly assuming that layers contribute independently to the overall compression error. We begin from the motivating observation that this independence assumption does not generally hold for LLM compression: pruning a model further may even significantly recover performance. To address this, we propose EvoPress, a novel evolutionary framework for dynamic LLM compression. By formulating dynamic compression as a general optimization problem, EvoPress identifies optimal compression profiles in a highly efficient manner, and generalizes across diverse models and compression techniques. Via EvoPress, we achieve state-of-the-art performance for dynamic compression of Llama, Mistral, and Phi models, setting new benchmarks for structural pruning (block/layer dropping), unstructured sparsity, and quantization with dynamic bitwidths.},
  author       = {Sieberling, Oliver and Kuznedelev, Denis and Kurtic, Eldar and Alistarh, Dan-Adrian},
  booktitle    = {42nd International Conference on Machine Learning},
  issn         = {2640-3498},
  location     = {Vancouver, Canada},
  pages        = {55556--55590},
  publisher    = {ML Research Press},
  title        = {{EvoPress: Accurate dynamic model compression via evolutionary search}},
  volume       = {267},
  year         = {2025},
}

@inproceedings{20821,
  abstract     = {Modern deep neural networks exhibit heterogeneity across numerous layers of various types such as residuals, multi-head attention, etc., due to varying structures (dimensions, activation functions, etc.), distinct representation characteristics, which impact predictions. We develop a general layer-wise quantization framework with tight variance and code-length bounds, adapting to the heterogeneities over the course of training. We then apply a new layer-wise quantization technique within distributed variational inequalities (VIs), proposing a novel Quantized Optimistic Dual Averaging (QODA) algorithm with adaptive learning rates, which achieves competitive convergence rates for monotone VIs. We empirically show that QODA achieves up to a 150% speedup over the baselines in end-to-end training time for training Wasserstein GAN on 12+GPUs.},
  author       = {Nguyen, Anh Duc and Markov, Ilia and Wu, Frank Zhengqing and Ramezani-Kebrya, Ali and Antonakopoulos, Kimon and Alistarh, Dan-Adrian and Cevher, Volkan},
  booktitle    = {42nd International Conference on Machine Learning},
  issn         = {2640-3498},
  location     = {Vancouver, Canada},
  pages        = {46026--46072},
  publisher    = {ML Research Press},
  title        = {{Layer-wise quantization for quantized optimistic dual averaging}},
  volume       = {267},
  year         = {2025},
}

@article{20839,
  abstract     = {For every couple of Hausdorff functions ψ and φ verifying some mild assumptions, there exists a compact subset K of the Baire space such that the φ-Hausdorff measure and the ψ-packing measure on K are both finite and positive. Such examples are then embedded in any infinite dimensional Banach space to answer positively a question of Fan on the existence of metric spaces with arbitrary scales.},
  author       = {Helfter, Mathieu},
  issn         = {2308-1317},
  journal      = {Journal of Fractal Geometry},
  publisher    = {EMS Press},
  title        = {{Sets with arbitrary Hausdorff and packing scales in infinite dimensional Banach spaces}},
  doi          = {10.4171/jfg/177},
  year         = {2025},
}

@inproceedings{20844,
  abstract     = {We introduce and construct a new proof system called Non-interactive Arguments of Knowledge or Space (NArKoS), where a space-bounded prover can convince a verifier they know a secret, while having access to sufficient space allows one to forge indistinguishable proofs without the secret.
An application of NArKoS are space-deniable proofs, which are proofs of knowledge (say for authentication in access control) that are sound when executed by a lightweight device like a smart-card or an RFID chip that cannot have much storage, but are deniable (in the strong sense of online deniability) as the verifier, like a card reader, can efficiently forge such proofs.
We construct NArKoS in the random oracle model using an OR-proof combining a sigma protocol (for the proof of knowledge of the secret) with a new proof system called simulatable Proof of Transient Space (simPoTS). We give two different constructions of simPoTS, one based on labelling graphs with high pebbling complexity, a technique used in the construction of memory-hard functions and proofs of space, and a more practical construction based on the verifiable space-hard functions from TCC’24 where a prover must compute a root of a sparse polynomial. In both cases, the main challenge is making the proofs efficiently simulatable.},
  author       = {Dujmovic, Jesko and Günther, Christoph Ullrich and Pietrzak, Krzysztof Z},
  booktitle    = {23rd International Conference on Theory of Cryptography},
  isbn         = {9783032122896},
  issn         = {1611-3349},
  location     = {Aarhus, Denmark},
  pages        = {171--202},
  publisher    = {Springer Nature},
  title        = {{Space-deniable proofs}},
  doi          = {10.1007/978-3-032-12290-2_6},
  volume       = {16271},
  year         = {2025},
}

@inproceedings{20845,
  abstract     = {We develop new attacks against the Evasive LWE family of assumptions, in both the public and private-coin regime. To the best of our knowledge, ours are the first attacks against Evasive LWE in the public-coin regime, for any instantiation from the family. Our attacks are summarized below.

Public-Coin Attacks.
1.The recent work by Hseih, Lin and Luo [17] constructed the first Attribute Based Encryption (ABE) for unbounded depth circuits by relying on the “circular” evasive LWE assumption. This assumption has been popularly considered as a safe, public-coin instance of Evasive LWE in contrast to its “private-coin” cousins (for instance, see [10, 11]).
We provide the first attack against this assumption, challenging the widely held belief that this is a public-coin assumption.
2. We demonstrate a counter-example against vanilla public-coin evasive LWE by Wee [26] in an unnatural parameter regime. Our attack crucially relies on the error in the pre-condition being larger than the error in the post-condition, necessitating a refinement of the assumption.

Private-Coin Attacks.
1. The recent work by Agrawal, Kumari and Yamada [2] constructed the first functional encryption scheme for pseudorandom functionalities (PRFE) and extended this to obfuscation for pseudorandom functionalities (PRIO) [4] by relying on private-coin evasive LWE. We provide a new attack against the assumption stated in the first posting of their work (subsequently refined to avoid these attacks).
2. The recent work by Branco et al. [8] (concurrently to [4]) provides a construction of obfuscation for pseudorandom functionalities by relying on private-coin evasive LWE. We provide a new attack against their stated assumption.
3. Branco et al. [8] showed that there exist contrived, “self-referential” classes of pseudorandom functionalities for which pseudorandom obfuscation cannot exist. We extend their techniques to develop an analogous result for pseudorandom functional encryption.

While Evasive LWE was developed to specifically avoid “zeroizing attacks”, our work shows that in certain settings, such attacks can still apply.},
  author       = {Agrawal, Shweta and Modi, Anuja and Yadav, Anshu and Yamada, Shota},
  booktitle    = {23rd International Conference on Theory of Cryptography},
  isbn         = {9783032122926},
  issn         = {1611-3349},
  location     = {Aarhus, Denmark},
  pages        = {259--290},
  publisher    = {Springer Nature},
  title        = {{Zeroizing attacks against evasive and circular evasive LWE}},
  doi          = {10.1007/978-3-032-12293-3_9},
  volume       = {16269},
  year         = {2025},
}

@inproceedings{20846,
  abstract     = {CVRFs are PRFs that unify the properties of verifiable and constrained PRFs. Since they were introduced concurrently by Fuchsbauer and Chandran-Raghuraman-Vinayagamurthy in 2014, it has been an open problem to construct CVRFs without using heavy machinery such as multilinear maps, obfuscation or functional encryption.
We solve this problem by constructing a prefix-constrained verifiable PRF that does not rely on the aforementioned assumptions. Essentially, our construction is a verifiable version of the Goldreich-Goldwasser-Micali PRF. To achieve verifiability we leverage degree-2 algebraic PRGs and bilinear groups. In short, proofs consist of intermediate values of the Goldreich-Goldwasser-Micali PRF raised to the exponents of group elements. These outputs can be verified using pairings since the underlying PRG is of degree 2.
We prove the selective security of our construction under the Decisional Square Diffie-Hellman (DSDH) assumption and a new assumption, which we dub recursive Decisional Diffie-Hellman (recursive DDH).
We prove the soundness of recursive DDH in the generic group model assuming the hardness of the Multivariate Quadratic (MQ) problem and a new variant thereof, which we call MQ+.
Last, in terms of applications, we observe that our CVRF is also an exponent (C)VRF in the plain model. Exponent VRFs were recently introduced by Boneh et al. (Eurocrypt’25) with various applications to threshold cryptography in mind. In addition to that, we give further applications for prefix-CVRFs in the blockchain setting, namely, stake-pooling and compressible randomness beacons.},
  author       = {Brandt, Nicholas and Cueto Noval, Miguel and Günther, Christoph Ullrich and Ünal, Akin and Wohnig, Stella},
  booktitle    = {23rd International Conference on Theory of Cryptography},
  isbn         = {9783032122896},
  issn         = {1611-3349},
  location     = {Aarhus, Denmark},
  pages        = {478--511},
  publisher    = {Springer Nature},
  title        = {{Constrained verifiable random functions without obfuscation and friends}},
  doi          = {10.1007/978-3-032-12290-2_16},
  volume       = {16271},
  year         = {2025},
}

@article{20847,
  abstract     = {We report on an experimental active matter system with motion restricted to four cardinal directions. Our particles are magnetite-doped colloidal spheres driven by the Quincke electrorotational instability. The absence of a magnetic field (|𝑩|=0) leads to circular trajectories interspersed with short spontaneous runs. Intermediate fields (|𝑩|≲20mT) linearize the motion along the axis perpendicular to 𝑩. At high magnetic fields, we observe the surprising emergence of a second, distinct linearization along the axis parallel to 𝑩. With numerical simulations, we show that this behavior can be explained by anisotropic magnetic susceptibility.},
  author       = {Fitzgerald, Eavan and Clavaud, Cécile and Das, Debasish and Lenton, Isaac C and Waitukaitis, Scott R},
  issn         = {2470-0053},
  journal      = {Physical Review E},
  number       = {6},
  publisher    = {American Physical Society},
  title        = {{Rolling at right angles: Magnetic anisotropy enables dual-anisotropic active matter}},
  doi          = {10.1103/1ss8-31rb},
  volume       = {112},
  year         = {2025},
}

@article{20848,
  abstract     = {Genetic variation that influences complex disease susceptibility is introduced into the population by mutation and removed by natural selection and genetic drift. This mutation–selection–drift balance (MSDB) shapes the prevalence of a disease and its genetic architecture. To date, however, MSDB has been modeled only for monogenic (Mendelian) diseases. Here, we develop an MSDB model for complex disease susceptibility: we assume that genotype relates to disease risk according to the canonical liability threshold model and that the selection on variants affecting risk stems from the fitness cost of the disease. We focus on diseases that are highly polygenic, entail a substantial fitness cost, and are neither extremely common in the population nor exceedingly rare. The comparison of model predictions with genome-wide association studies and other observations in humans indicates that common genetic variation affecting complex disease susceptibility is little affected by directional selection and instead shaped by pleiotropic stabilizing selection on other traits. In turn, directional selection may exert a more substantial effect on rare, large-effect variants. Our results also suggest that current estimates of disease heritability are likely biased. The model thus provides a better understanding of the evolutionary processes that shape the architecture and prevalence of complex diseases.},
  author       = {Berg, Jeremy J. and Li, Xinyi and Riall, Kellen and Hayward, Laura and Sella, Guy},
  issn         = {1943-2631},
  journal      = {Genetics},
  number       = {4},
  publisher    = {Oxford University Press},
  title        = {{Mutation–selection–drift balance models of complex diseases}},
  doi          = {10.1093/genetics/iyaf220},
  volume       = {231},
  year         = {2025},
}

@article{20850,
  abstract     = {We provide an estimate for the number of nontrivial integer points on the Pellian surface t^2 - du^2 = 1 in a bounded region. We give a lower bound on the size of fundamental solutions for almost all d in a certain class, based on a recent conjecture of Browning and Wilsch about integer points on log K3 surfaces. We also obtain an upper bound on the average of class number in this class, assuming the same conjecture.},
  author       = {Diao, Yijie},
  issn         = {2118-8572},
  journal      = {Journal de theorie des nombres de Bordeaux},
  number       = {3},
  pages        = {973--988},
  publisher    = {Université de Bordeaux},
  title        = {{Class numbers and integer points on some Pellian surfaces}},
  doi          = {10.5802/jtnb.1348},
  volume       = {37},
  year         = {2025},
}

@article{20851,
  abstract     = {High-voltage disordered spinel LiNi0.5Mn1.5O4 is a promising cathode material for high power density in lithium-ion batteries. However, it suffers from poor cycle life associated with the rock-salt phase transformation. This study presents a straightforward synthesis approach to enhance the electrochemical performance of LiNi0.5Mn1.5O4 through a synergistic solid-state modification with LiF and AlF3. This dual modification promotes rapid Li⁺ diffusion, enables near-complete delithiation/lithiation, approaching the theoretical capacity of disordered LiNi0.5Mn1.5O4, and, more importantly, effectively mitigates the formation of the rock-salt phase, thereby enhancing structural stability, as confirmed by operando X-ray absorption spectroscopy (XAS) and synchrotron X-ray diffraction (SXRD). As a result, the optimized LiNi0.5Mn1.5O4 (10 mg AlF3 + 30 mg LiF) delivers high reversible capacities of 142.1, 139.1, 129.2, 121.6, 110.3, 93.5, and 76.1 mAh∙g−1 at 0.2C, 0.5C, 1.0C, 2.0C, 3.0C, 4.0C, and 5.0C, respectively. Full cells using graphite as the anode and a high-loading cathode exhibit excellent cycling performance. They retain 80% of their capacity after 200 cycles at 0.5C within a voltage window of 3.5–4.9 V with cathode loading of 11 mg∙cm−2. The findings of this study will significantly advance high-power LiNi0.5Mn1.5O4 materials, offering improved battery life and thereby enhancing their potential for practical applications.},
  author       = {Chang, Xingqi and Escudero, Carlos and Black, Ashley P. and Horta, Sharona and Martínez, Elías and Lu, Xuan and Llorca, Jordi and Ibáñez, Maria and Biendicho, Jordi Jacas and Cabot, Andreu},
  issn         = {2198-3844},
  journal      = {Advanced Science},
  publisher    = {Wiley},
  title        = {{Mitigating the rock-salt phase transformation in disordered LNMO through synergetic solid-state AlF3/LiF modifications}},
  doi          = {10.1002/advs.202515962},
  year         = {2025},
}

