1

Adaptive Directions for Bernstein-Based Polynomial Set Evolution

An ASP Approach for the Synthesis of CNOT Minimal Quantum Circuits

In the last year, physical working Quantum Computers have been built and made available for the end users. Such devices, working under the rules of Quantum Mechanics, can only apply a finite set of one/two qubit operations that form a universal set …

An xAI Approach for Data-to-Text Processing with ASP

The generation of natural language text from data series gained renewed interest among AI research goals. Not surprisingly, the few proposals in the state of the art are based on training some system, in order to produce a text that describes and …

Constraint Propagation on GPU: A Case Study for the Cumulative Constraint

Continued Hereditarily Finite Set-Approximations

We study an encoding RA that assigns a real number to each hereditarily finite set, in a broad sense. In particular, we investigate whether the map RA can be used to produce codes that approximate any positive real number to arbitrary precision, in a …

DBCChecker: A Bigraph-Based Tool for Checking Security Properties of Container Compositions

Despite their widespread application in modern systems, container composition is often complex and error-prone. In this work, we present DBCChecker, a tool aiming to verify security properties of systems obtained by composition of containers. From …

Graph-Theoretical Arguments in Support of a Quantum Declarative Manifesto

The encoding of graphs and the development of efficient algorithms over graphs in the Quantum framework is still a challenging problem. More in general, the understanding of whether a problem can benefit of the Quantum speed-up or not is far from …

Modeling Carne PRI supply chain with the *-Chain Platform

Certification of the origin of products and control over the production chain are fundamental activities that can make goods competitive. Therefore, it is of great interest to develop platforms that enable domain experts to build supply chain …

Neural Networks Reduction via Lumping

The increasing size of recently proposed Neural Networks makes it hard to implement them on embedded devices, where memory, battery and computational power are a non-trivial bottleneck. For this reason during the last years network compression …

Pairing an Autoencoder and a SF-SOINN for Implementing an Intrusion Detection System

Intrusion Detection System are systems aiming to detect intrusions within individual computers or networks. These systems are of fundamental importance nowadays, as the number of attacks on networks is ever increasing. In this paper, a prototype of a …