{"id":"https://openalex.org/W7106256773","doi":"https://doi.org/10.48550/arxiv.2511.15244","title":"Context Cascade Compression: Exploring the Upper Limits of Text Compression","display_name":"Context Cascade Compression: Exploring the Upper Limits of Text Compression","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W7106256773","doi":"https://doi.org/10.48550/arxiv.2511.15244"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2511.15244","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.15244","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2511.15244","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Liu, Fanfan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Liu, Fanfan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Qiu, Haibo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiu, Haibo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.17159999907016754,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.17159999907016754,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.1062999963760376,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.08330000191926956,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.7639999985694885},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.6543999910354614},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6377000212669373},{"id":"https://openalex.org/keywords/compression-ratio","display_name":"Compression ratio","score":0.6365000009536743},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.6014000177383423},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.5454999804496765},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5439000129699707},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5177000164985657},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5092999935150146}],"concepts":[{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.7639999985694885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7271000146865845},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.6543999910354614},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6377000212669373},{"id":"https://openalex.org/C25797200","wikidata":"https://www.wikidata.org/wiki/Q828137","display_name":"Compression ratio","level":3,"score":0.6365000009536743},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.6014000177383423},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.5454999804496765},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5439000129699707},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5177000164985657},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5092999935150146},{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.48730000853538513},{"id":"https://openalex.org/C32717103","wikidata":"https://www.wikidata.org/wiki/Q184759","display_name":"Character encoding","level":3,"score":0.4643999934196472},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.4449000060558319},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4104999899864197},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.40950000286102295},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39809998869895935},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.39649999141693115},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.3587000072002411},{"id":"https://openalex.org/C34146451","wikidata":"https://www.wikidata.org/wiki/Q5048094","display_name":"Cascade","level":2,"score":0.3571999967098236},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.34860000014305115},{"id":"https://openalex.org/C94835093","wikidata":"https://www.wikidata.org/wiki/Q3113333","display_name":"Data compression ratio","level":5,"score":0.3440999984741211},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3440000116825104},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28700000047683716},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2511.15244","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.15244","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2511.15244","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.15244","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Million-level":[0],"token":[1],"inputs":[2],"in":[3,91,172,218],"long-context":[4],"tasks":[5],"pose":[6],"significant":[7],"computational":[8],"and":[9,28,61,183,201,226,230],"memory":[10],"challenges":[11],"for":[12,151,215],"Large":[13],"Language":[14],"Models":[15],"(LLMs).":[16],"Recently,":[17],"DeepSeek-OCR":[18],"conducted":[19],"research":[20],"into":[21,81],"the":[22,43,59,70,107,112,128,136,157,162,173],"feasibility":[23,184],"of":[24,46,54,84,97,130,138,175],"Contexts":[25],"Optical":[26],"Compression":[27,39,179],"achieved":[29],"preliminary":[30],"results.":[31],"Inspired":[32],"by":[33,76],"this,":[34],"we":[35,154],"introduce":[36],"Context":[37],"Cascade":[38],"C3":[40,178,189],"to":[41,57,100,148,160],"explore":[42],"upper":[44,213],"limits":[45],"text":[47,74,98,131],"compression.":[48,188],"Our":[49],"method":[50],"cascades":[51],"two":[52],"LLMs":[53],"different":[55],"sizes":[56],"handle":[58],"compression":[60,75,125,158,216],"decoding":[62,113,145],"tasks.":[63],"Specifically,":[64],"a":[65,78,82,94,123,191,205,211],"small":[66],"LLM,":[67,105],"acting":[68],"as":[69,106],"first":[71],"stage,":[72,109],"performs":[73],"condensing":[77],"long":[79],"context":[80,176],"set":[83],"latent":[85,101,139],"tokens":[86,99,132],"(e.g.,":[87],"32":[88],"or":[89],"64":[90],"length),":[92],"achieving":[93],"high":[95],"ratio":[96,126,159],"tokens.":[102],"A":[103],"large":[104],"second":[108],"then":[110],"executes":[111],"task":[114],"on":[115,221],"this":[116],"compressed":[117],"context.":[118],"Experiments":[119],"show":[120],"that":[121,171,195],"at":[122,166,236],"20x":[124],"(where":[127],"number":[129,137],"is":[133,164],"20":[134],"times":[135],"tokens),":[140],"our":[141],"model":[142,231],"achieves":[143],"98%":[144],"accuracy,":[146],"compared":[147],"approximately":[149],"60%":[150],"DeepSeek-OCR.":[152],"When":[153],"further":[155],"increase":[156],"40x,":[161],"accuracy":[163],"maintained":[165],"around":[167],"93%.":[168],"This":[169,208],"indicates":[170],"domain":[174],"compression,":[177,224],"demonstrates":[180],"superior":[181],"performance":[182],"over":[185],"optical":[186,222],"character":[187,223],"uses":[190],"simpler,":[192],"pure-text":[193],"pipeline":[194],"ignores":[196],"factors":[197],"like":[198],"layout,":[199],"color,":[200],"information":[202],"loss":[203],"from":[204],"visual":[206],"encoder.":[207],"also":[209],"suggests":[210],"potential":[212],"bound":[214],"ratios":[217],"future":[219],"work":[220],"OCR,":[225],"related":[227],"fields.":[228],"Codes":[229],"weights":[232],"are":[233],"publicly":[234],"accessible":[235],"https://github.com/liufanfanlff/C3-Context-Cascade-Compression":[237]},"counts_by_year":[],"updated_date":"2025-11-23T05:13:22.807545","created_date":"2025-11-23T00:00:00"}
