Semantic Scholar uses AI to extract papers important to this topic.
Predicate encryption is a new paradigm for public-key encryption that generalizes identity-based encryption and more. In… Expand Energy expenses are becoming an increasingly important fraction of data center operating costs. At the same time, the energy… Expand We describe a new algorithm for compiling conjunctive normal form (CNF) into Deterministic Decomposable Negation Normal (d-DNNF… Expand The problem of k-SAT is to determine if the given k-CNF has a satisfying solution. It is a celebrated open question as to whether… Expand We present a technique that transforms any binary programming problem with integral coefficients to a satisfiability problem of… Expand Abstract In the paper we present Rough Set approach to reasoning in incomplete information systems. We propose reduction of… Expand For several NP-complete problems, there have been a progression of better but still exponential algorithms. In this paper we… Expand It has recently been shown that local search is surprisingly good at finding satisfying assignments for certain computationally… Expand It has recently been shown that local search is surprisingly good at nding satisfying assignments for certain classes of CNF… Expand Typographical Conventions 1 Introduction 1.1 Bibliographical and Historical Remarks Exercises 2 Declarative Knowledge 2.1… Expand