Skip to main content

Showing 1–13 of 13 results for author: Michel, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.03472  [pdf, other

    cs.DS math.CO

    Lower bounds for graph reconstruction with maximal independent set queries

    Authors: Lukas Michel, Alex Scott

    Abstract: We investigate the number of maximal independent set queries required to reconstruct the edges of a hidden graph. We show that randomised adaptive algorithms need at least $Ω(Δ^2 \log(n / Δ) / \log Δ)$ queries to reconstruct $n$-vertex graphs of maximum degree $Δ$ with success probability at least $1/2$, and we further improve this lower bound to $Ω(Δ^2 \log(n / Δ))$ for randomised non-adaptive al… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: 12 pages

  2. arXiv:2402.14821  [pdf, other

    cs.OH math.OC

    Constraint Propagation on GPU: A Case Study for the Bin Packing Constraint

    Authors: Fabio Tardivo, Laurent Michel, Enrico Pontelli

    Abstract: The Bin Packing Problem is one of the most important problems in discrete optimization, as it captures the requirements of many real-world problems. Because of its importance, it has been approached with the main theoretical and practical tools. Resolution approaches based on Linear Programming are the most effective, while Constraint Programming proves valuable when the Bin Packing Problem is a c… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  3. arXiv:2310.19594  [pdf, other

    cs.DS cs.CC

    Superpolynomial smoothed complexity of 3-FLIP in Local Max-Cut

    Authors: Lukas Michel, Alex Scott

    Abstract: Local search algorithms for NP-hard problems such as Max-Cut frequently perform much better in practice than worst-case analysis suggests. Smoothed analysis has proved an effective approach to understanding this: a substantial literature shows that when a small amount of random noise is added to input data, local search algorithms typically run in polynomial or quasi-polynomial time. In this paper… ▽ More

    Submitted 4 April, 2024; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: 19 pages, 3 figures, changes to the abstract, introduction, and conclusion

  4. arXiv:2205.03471  [pdf, other

    cond-mat.soft cs.LG physics.comp-ph

    Dynamically writing coupled memories using a reinforcement learning agent, meeting physical bounds

    Authors: Théo Jules, Laura Michel, Adèle Douin, Frédéric Lechenault

    Abstract: Traditional memory writing operations proceed one bit at a time, where e.g. an individual magnetic domain is force-flipped by a localized external field. One way to increase material storage capacity would be to write several bits at a time in the bulk of the material. However, the manipulation of bits is commonly done through quasi-static operations. While simple to model, this method is known to… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: Main text: 5 pages, 4 figures. Submitted to PNAS

  5. arXiv:2005.14458  [pdf, other

    stat.ML cs.LG stat.ME

    Distributional Random Forests: Heterogeneity Adjustment and Multivariate Distributional Regression

    Authors: Domagoj Ćevid, Loris Michel, Jeffrey Näf, Nicolai Meinshausen, Peter Bühlmann

    Abstract: Random Forest (Breiman, 2001) is a successful and widely used regression and classification algorithm. Part of its appeal and reason for its versatility is its (implicit) construction of a kernel-type weighting function on training data, which can also be used for targets other than the original mean estimation. We propose a novel forest construction for multivariate responses based on their joint… ▽ More

    Submitted 12 October, 2022; v1 submitted 29 May, 2020; originally announced May 2020.

  6. arXiv:2002.12447  [pdf, other

    cs.AI

    Bringing freedom in variable choice when searching counter-examples in floating point programs

    Authors: Heytem Zitoun, Claude Michel, Laurent Michel, Michel Rueher

    Abstract: Program verification techniques typically focus on finding counter-examples that violate properties of a program. Constraint programming offers a convenient way to verify programs by modeling their state transformations and specifying searches that seek counter-examples. Floating-point computations present additional challenges for verification given the semantic subtleties of floating point arith… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  7. arXiv:2002.12441  [pdf, other

    cs.AI

    An efficient constraint based framework forhandling floating point SMT problems

    Authors: Heytem Zitoun, Claude Michel, Laurent Michel, Michel Rueher

    Abstract: This paper introduces the 2019 version of \us{}, a novel Constraint Programming framework for floating point verification problems expressed with the SMT language of SMTLIB. SMT solvers decompose their task by delegating to specific theories (e.g., floating point, bit vectors, arrays, ...) the task to reason about combinatorial or otherwise complex constraints for which the SAT encoding would be c… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  8. arXiv:1910.07921  [pdf, other

    cs.NI cs.CR

    FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks

    Authors: Devon Callahan, Timothy Curry, Hazel Davidson, Heytem Zitoun, Benjamin Fuller, Laurent Michel

    Abstract: Maintaining a resilient computer network is a delicate task with conflicting priorities. Flows should be served while controlling risk due to attackers. Upon publication of a vulnerability, administrators scramble to manually mitigate risk while waiting for a patch. We introduce FASHION: a linear optimizer that balances routing flows with the security risk posed by these flows. FASHION formalize… ▽ More

    Submitted 8 August, 2022; v1 submitted 17 October, 2019; originally announced October 2019.

    Comments: Accepted to IEEE TDSC. This version adds an online evaluation Sections 4.2 and 5.2.4

    ACM Class: C.2.1; C.2.3; G.1.6

  9. arXiv:1902.05988  [pdf, other

    cs.CR cs.NI

    DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks

    Authors: Timothy Curry, Devon Callahan, Benjamin Fuller, Laurent Michel

    Abstract: Networks are designed with functionality, security, performance, and cost in mind. Tools exist to check or optimize individual properties of a network. These properties may conflict, so it is not always possible to run these tools in series to find a configuration that meets all requirements. This leads to network administrators manually searching for a configuration. This need not be the case.… ▽ More

    Submitted 15 February, 2019; originally announced February 2019.

  10. Building an Archive with Saada

    Authors: Laurent Michel, Christian Motch, Hoan Ngoc Nguyen, François-Xavier Pineau

    Abstract: Saada transforms a set of heterogeneous FITS files or VOTables of various categories (images, tables, spectra ...) in a database without writing code. Databases created with Saada come with a rich Web interface and an Application Programming Interface (API). They support the four most common VO services. Such databases can mix various categories of data in multiple collections. They allow a direct… ▽ More

    Submitted 1 September, 2014; originally announced September 2014.

    Comments: 18 pages, 5 figures Special VO issue

    MSC Class: 68U35

  11. arXiv:1401.5341  [pdf, ps, other

    cs.AI cs.PL

    Domain Views for Constraint Programming

    Authors: Pascal Van Hentenryck, Laurent Michel

    Abstract: Views are a standard abstraction in constraint programming: They make it possible to implement a single version of each constraint, while avoiding to create new variables and constraints that would slow down propagation. Traditional constraint-programming systems provide the concept of {\em variable views} which implement a view of the type $y = f(x)$ by delegating all (domain and constraint) oper… ▽ More

    Submitted 21 January, 2014; originally announced January 2014.

    Comments: Workshop: TRICS13: Techniques foR Implementing Constraint programming, September 2013, CP, Uppsala

  12. arXiv:1401.5334  [pdf, other

    cs.AI cs.PL

    A Microkernel Architecture for Constraint Programming

    Authors: Laurent Michel, Pascal Van Hentenryck

    Abstract: This paper presents a microkernel architecture for constraint programming organized around a number of small number of core functionalities and minimal interfaces. The architecture contrasts with the monolithic nature of many implementations. Experimental results indicate that the software engineering benefits are not incompatible with runtime efficiency.

    Submitted 21 January, 2014; originally announced January 2014.

  13. arXiv:1105.6314  [pdf, other

    cs.AI cs.MS

    Activity-Based Search for Black-Box Contraint-Programming Solvers

    Authors: L. Michel, P. Van Hentenryck

    Abstract: Robust search procedures are a central component in the design of black-box constraint-programming solvers. This paper proposes activity-based search, the idea of using the activity of variables during propagation to guide the search. Activity-based search was compared experimentally to impact-based search and the WDEG heuristics. Experimental results on a variety of benchmarks show that activity-… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.