Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools a...
Philipp Winter, Roya Ensafi, Karsten Loesing, Nick...
This report provides an (updated) overview of Grafalgo, an opensource library of graph algorithms and the data structures used to implement them. The programs in this library were...
This paper explores the classic single-item newsvendor problem under a novel setting which combines temporal dependence and tractable robust optimization. First, the demand is mod...
Emilio Carrizosa, Alba V. Olivares-Nadal, Pepa Ram...
Constrained sampling and counting are two fundamental problems arising in domains ranging from artificial intelligence and security, to hardware and software testing. Recent appro...
Alexander Ivrii, Sharad Malik, Kuldeep S. Meel, Mo...
A wide range of problems can be modelled as constraint satisfaction problems (CSPs), that is, a set of constraints that must be satisfied simultaneously. Constraints can either b...
Abstract We present an original approach to compute efficient mid-term fleet configurations, at the request of a Queensland-based long-haul trucking carrier. Our approach conside...
Although best known for his work in symbolic logic, George Boole made seminal contributions in the logic of probabilities. He solved the probabilistic inference problem with a proj...
Abstract Petri nets are a simple formalism for modeling concurrent computation. They are also an interesting tool for modeling and analysing biochemical reaction systems, bridging ...