We present a way to create small yet difficult model counting instances....
Feature extraction is a fundamental task in the application of machine
l...
Interactive constraint systems often suffer from infeasibility (no solut...
This paper proposes the notion of 'Privacy-Anomaly Detection' and consid...
One of the data security and privacy concerns is of insider threats, whe...
Artificial Intelligence has the potential to exacerbate societal bias an...
We present in this paper our solver for logic grid puzzles. The approach...
When creating benchmarks for SAT solvers, we need SAT instances that are...
Robust Stable Marriage (RSM) is a variant of the classical Stable Marria...
We study the notion of robustness in stable matching problems. We first
...
Constraint programming is used for a variety of real-world optimisation
...
In many combinatorial problems one may need to model the diversity or
si...
Call control features (e.g., call-divert, voice-mail) are primitive opti...
Instance-specific algorithm configuration and algorithm portfolios have ...
In recent years, portfolio approaches to solving SAT problems and CSPs h...
We present an application focused on the design of resilient long-reach
...