{"id":"https://openalex.org/W7125931217","doi":"https://doi.org/10.48550/arxiv.2601.19410","title":"Do LLMs Truly Benefit from Longer Context in Automatic Post-Editing?","display_name":"Do LLMs Truly Benefit from Longer Context in Automatic Post-Editing?","publication_year":2026,"publication_date":"2026-01-27","ids":{"openalex":"https://openalex.org/W7125931217","doi":"https://doi.org/10.48550/arxiv.2601.19410"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.19410","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.19410","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.19410","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025476926","display_name":"Ahrii Kim","orcid":"https://orcid.org/0000-0003-2989-3220"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kim, Ahrii","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5039790391","display_name":"Seong\u2010heum Kim","orcid":"https://orcid.org/0000-0003-2551-0157"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kim, Seong-heum","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025476926"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10181","display_name":"Natural Language Processing Techniques","score":0.6632999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10181","display_name":"Natural Language Processing Techniques","score":0.6632999777793884,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.057999998331069946,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.02879999950528145,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7976999878883362},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6761999726295471},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.476500004529953},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.3379000127315521}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7976999878883362},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6761999726295471},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5527999997138977},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5012000203132629},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.476500004529953},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36559998989105225},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35269999504089355},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25850000977516174}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.19410","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.19410","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.19410","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.19410","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Automatic":[0],"post-editing":[1],"(APE)":[2],"aims":[3],"to":[4,84,100],"refine":[5],"machine":[6],"translations":[7],"by":[8],"correcting":[9],"residual":[10],"errors.":[11],"Although":[12],"recent":[13],"large":[14],"language":[15],"models":[16,80],"(LLMs)":[17],"demonstrate":[18],"strong":[19,128],"translation":[20,172],"capabilities,":[21],"their":[22,127],"effectiveness":[23],"for":[24,104,142,165,171],"APE--especially":[25],"under":[26,41],"document-level":[27,44,102],"context--remains":[28],"insufficiently":[29],"understood.":[30],"We":[31],"present":[32],"a":[33,42,95],"systematic":[34],"comparison":[35],"of":[36,72,123,136,156],"proprietary":[37,59,137],"and":[38,53,133,153,160],"open-weight":[39,89],"LLMs":[40,60,138],"naive":[43],"prompting":[45],"setup,":[46],"analyzing":[47],"APE":[48,64,144],"quality,":[49],"contextual":[50,105],"behavior,":[51],"robustness,":[52],"efficiency.":[54],"Our":[55],"results":[56],"show":[57],"that":[58],"achieve":[61],"near":[62],"human-level":[63],"quality":[65],"even":[66],"with":[67],"simple":[68],"one-shot":[69],"prompting,":[70],"regardless":[71],"whether":[73],"document":[74],"context":[75,103],"is":[76],"provided.":[77],"While":[78],"these":[79,116],"exhibit":[81],"higher":[82],"robustness":[83,92],"data":[85],"poisoning":[86],"attacks":[87],"than":[88],"counterparts,":[90],"this":[91],"also":[93],"reveals":[94],"limitation:":[96],"they":[97],"largely":[98],"fail":[99],"exploit":[101],"error":[106],"correction.":[107],"Furthermore,":[108],"standard":[109],"automatic":[110],"metrics":[111],"do":[112],"not":[113],"reliably":[114],"reflect":[115],"qualitative":[117],"improvements,":[118],"highlighting":[119],"the":[120,130,151,163],"continued":[121],"necessity":[122],"human":[124],"evaluation.":[125],"Despite":[126],"performance,":[129],"substantial":[131],"cost":[132],"latency":[134],"overheads":[135],"render":[139],"them":[140],"impractical":[141],"real-world":[143],"deployment.":[145],"Overall,":[146],"our":[147],"findings":[148],"elucidate":[149],"both":[150],"promise":[152],"current":[154],"limitations":[155],"LLM-based":[157],"document-aware":[158],"APE,":[159],"point":[161],"toward":[162],"need":[164],"more":[166],"efficient":[167],"long-context":[168],"modeling":[169],"approaches":[170],"refinement.":[173]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
