Backdoor sets for DLL subsolvers

S Szeider - Journal of Automated Reasoning, 2005 - Springer
We study the parameterized complexity of detecting small backdoor sets for instances of the
propositional satisfiability problem (SAT). The notion of backdoor sets has been recently …

An experimental study of adaptive control for evolutionary algorithms

G Di Tollo, F Lardeux, J Maturana, F Saubion - Applied Soft Computing, 2015 - Elsevier
In this paper, we investigate how adaptive operator selection techniques are able to
efficiently manage the balance between exploration and exploitation in an evolutionary …

Random 3-SAT: The plot thickens

C Coarfa, DD Demopoulos, ASM Aguirre… - … on Principles and …, 2000 - Springer
This paper presents an experimental investigation of the following questions: how does the
average-case complexity of random 3-SAT, understood as a function of the order (number of …

On super strong ETH

N Vyas, R Williams - Journal of Artificial Intelligence Research, 2021 - jair.org
Multiple known algorithmic paradigms (backtracking, local search and the polynomial
method) only yield a 2 n (1-1/O (k)) time algorithm for k-SAT in the worst case. For this …

Combining cellular genetic algorithms and local search for solving satisfiability problems

G Folino, C Pizzuti, G Spezzano - Proceedings Tenth IEEE …, 1998 - ieeexplore.ieee.org
A new parallel hybrid method for solving the satisfiability problem that combines cellular
genetic algorithms and the random walk (WSAT) strategy of GSAT is presented. The method …

Combining linear programming and satisfiability solving for resource planning

SA Wolfman, DS Weld - The Knowledge Engineering Review, 2001 - cambridge.org
Compilation to Boolean satisfiability has become a powerful paradigm for solving artificial
intelligence problems. However, domains that require metric reasoning cannot be compiled …

Quantum circuit design and analysis for database search applications

YL Ju, IM Tsai, SY Kuo - … Transactions on Circuits and Systems I …, 2007 - ieeexplore.ieee.org
In this paper, we show how quantum Boolean circuits can be used to implement the oracle
and the inversion-about-average function in Grover's search algorithm. Before illustrating …

[图书][B] Applying the particle swarm optimizer to non-stationary environments

AJ Carlisle - 2002 - search.proquest.com
Abstract The Particle Swarm Optimizer is modified to create the Adaptive Particle Swarm
Optimizer. This variation is better able to locate and track optima in dynamic environments …

An efficient two-factor authentication scheme based on negative databases: Experiments and extensions

R Liu, X Wang, C Wang - Applied Soft Computing, 2022 - Elsevier
With the rapid development of network communication technology, identity authentication
based on smart cards is one of the most common two-factor authentication schemes. In …

Survey on applications of formal methods in reverse engineering and intellectual property protection

S Keshavarz, C Yu, S Ghandali, X Xu… - Journal of Hardware and …, 2018 - Springer
Recent years have seen a growth in the use of algorithmic techniques, and especially formal
methods, in reverse engineering. Depending on the motivation and requirements of the …