{"id":"https://openalex.org/W7152025511","doi":"https://doi.org/10.48550/arxiv.2604.05013","title":"Scaling Coding Agents via Atomic Skills","display_name":"Scaling Coding Agents via Atomic Skills","publication_year":2026,"publication_date":"2026-04-06","ids":{"openalex":"https://openalex.org/W7152025511","doi":"https://doi.org/10.48550/arxiv.2604.05013"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.05013","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.05013","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.05013","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133191380","display_name":"Yingwei Ma","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ma, Yingwei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133165883","display_name":"Yue Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Yue","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133155718","display_name":"Xinlong Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Xinlong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133148585","display_name":"Yanhao Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Yanhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133162061","display_name":"Kelin Fu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fu, Kelin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101373549","display_name":"Yibo Miao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Miao, Yibo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133185408","display_name":"Yuchong Xie","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xie, Yuchong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113252996","display_name":"Zhexu Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Zhexu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133226333","display_name":"Shing-Chi Cheung","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cheung, Shing-Chi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5133191380"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9316999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9316999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.019600000232458115,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.007499999832361937,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.641700029373169},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.631600022315979},{"id":"https://openalex.org/keywords/scaling","display_name":"Scaling","score":0.423799991607666},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41499999165534973},{"id":"https://openalex.org/keywords/atomic-units","display_name":"Atomic units","score":0.40799999237060547},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3806000053882599},{"id":"https://openalex.org/keywords/neural-coding","display_name":"Neural coding","score":0.37400001287460327}],"concepts":[{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.641700029373169},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.631600022315979},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5906999707221985},{"id":"https://openalex.org/C99844830","wikidata":"https://www.wikidata.org/wiki/Q102441924","display_name":"Scaling","level":2,"score":0.423799991607666},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41499999165534973},{"id":"https://openalex.org/C66823137","wikidata":"https://www.wikidata.org/wiki/Q757568","display_name":"Atomic units","level":2,"score":0.40799999237060547},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3806000053882599},{"id":"https://openalex.org/C77637269","wikidata":"https://www.wikidata.org/wiki/Q7002051","display_name":"Neural coding","level":2,"score":0.37400001287460327},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33889999985694885},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3278999924659729},{"id":"https://openalex.org/C104779481","wikidata":"https://www.wikidata.org/wiki/Q50707","display_name":"Composite number","level":2,"score":0.32690000534057617},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3190000057220459},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.3093999922275543},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C102951782","wikidata":"https://www.wikidata.org/wiki/Q49295","display_name":"Atomic force microscopy","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C194778546","wikidata":"https://www.wikidata.org/wiki/Q15308119","display_name":"Atomic model","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26460000872612}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.05013","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.05013","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.05013","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.05013","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.7781134247779846,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Current":[0],"LLM":[1],"coding":[2,74,87,126,147],"agents":[3,88,148],"are":[4,79,101],"predominantly":[5],"trained":[6],"on":[7,172],"composite":[8,73,125,178],"benchmarks":[9],"(e.g.,":[10],"bug":[11],"fixing),":[12],"which":[13],"often":[14],"leads":[15],"to":[16,38,122],"task-specific":[17],"overfitting":[18],"and":[19,57,82,136,176],"limited":[20],"generalization.":[21],"To":[22],"address":[23],"this,":[24],"we":[25,85,112],"propose":[26],"a":[27,142],"novel":[28],"scaling":[29,144],"paradigm":[30,145],"that":[31,60,114],"shifts":[32],"the":[33,63,157],"focus":[34],"from":[35],"task-level":[36],"optimization":[37],"atomic":[39,47,77,94,99,118,152,174],"skill":[40],"mastery.":[41],"We":[42],"first":[43],"formalize":[44],"five":[45],"fundamental":[46],"skills,":[48],"code":[49,51,58,131,137],"localization,":[50],"editing,":[52],"unit-test":[53],"generation,":[54],"issue":[55],"reproduction,":[56],"review,":[59],"serve":[61],"as":[62,129],"basis":[64],"vectors":[65],"for":[66,146],"complex":[67],"software":[68],"engineering":[69],"tasks.":[70,179],"Compared":[71],"with":[72,151],"tasks,":[75,127],"these":[76,117],"skills":[78,100,119,175],"more":[80],"generalizable":[81],"composable.":[83],"Then,":[84],"scale":[86],"by":[89,149,170],"performing":[90],"joint":[91,165],"RL":[92,166],"over":[93],"skills.":[95,153],"In":[96],"this":[97],"manner,":[98],"consistently":[102],"improved":[103],"without":[104],"negative":[105],"interference":[106],"or":[107],"trade-offs":[108],"between":[109],"them.":[110],"Notably,":[111,163],"observe":[113],"improvements":[115],"in":[116],"generalize":[120],"well":[121],"other":[123],"unseen":[124],"such":[128],"bug-fixing,":[130],"refactoring,":[132],"machine":[133],"learning":[134],"engineering,":[135],"security.":[138],"The":[139],"observation":[140],"motivates":[141],"new":[143],"training":[150],"Extensive":[154],"experiments":[155],"demonstrate":[156],"effectiveness":[158],"of":[159],"our":[160,164],"proposed":[161],"paradigm.":[162],"improves":[167],"average":[168],"performance":[169],"18.7%":[171],"5":[173,177]},"counts_by_year":[],"updated_date":"2026-04-09T06:13:59.934233","created_date":"2026-04-09T00:00:00"}
