Recent Submissions

  • On the stability of generalized second price auctions with budgets 

    Díaz Cort, Josep; Giotis, Ioannis; Kirousis, Lefteris; Markakis, Evangelos; Serna Iglesias, María José (Springer, 2014)
    Conference report
    Open Access
    The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints, which is present in practice. Motivated by this, we introduce the different ...
  • The ordering principle in a fragment of approximate counting 

    Atserias Peri, Albert; Thapen, Neil (2014)
    Article
    Open Access
    The ordering principle states that every finite linear order has a least element. We show that, in the relativized setting, the surjective weak pigeonhole principle for polynomial time functions does not prove a Herbrandized ...
  • Process discovery algorithms using numerical abstract domains 

    Carmona Vargas, Josep; Cortadella Fortuny, Jordi (2014-12-01)
    Article
    Open Access
    The discovery of process models from event logs has emerged as one of the crucial problems for enabling the continuous support in the life-cycle of an information system. However, in a decade of process discovery research, ...
  • Better feedback for educational online judges 

    Mani, Anaga; Venkataramani, Divya; Petit Silvestre, Jordi; Roura Ferret, Salvador (SciTePress, 2014)
    Conference report
    Open Access
    The verdicts of most online programming judges are, essentially, binary: the submitted codes are either “good enough” or not. Whilst this policy is appropriate for competitive or recruitment platforms, it can hinder the ...
  • Firefighting as a game 

    Álvarez Faura, M. del Carme; Blesa Aguilera, Maria Josep; Molter, Hendrik (2014-12-10)
    Article
    Restricted access - publisher's policy
    The Firefighter Problem was proposed in 1995 [16] as a deterministic discrete-time model for the spread (and containment) of a fire. Its applications reach from real fires to the spreading of diseases and the containment ...
  • Lower bounds for DNF-refutations of a relativized weak pigeonhole principle 

    Atserias Peri, Albert; Müller, Moritz; Oliva Valls, Sergi (2015-06-01)
    Article
    Open Access
    The relativized weak pigeonhole principle states that if at least 2n out of n(2) pigeons fly into n holes, then some hole must be doubly occupied. We prove that every DNF-refutation of the CNF encoding of this principle ...
  • Tableau-based reasoning for graph properties 

    Lambers, Leen; Orejas Valdés, Fernando (Springer, 2014)
    Conference report
    Restricted access - publisher's policy
    Graphs are ubiquitous in Computer Science. For this reason, in many areas, it is very important to have the means to express and reason about graph properties. A simple way is based on defining an appropriate encoding of ...
  • Adaptive clock with useful jitter 

    Cortadella Fortuny, Jordi; Lavagno, Luciano; López Muñoz, Pedro; Lupon Navazo, Marc; Moreno Vega, Alberto; Roca Pérez, Antoni; Sapatnekar, Sachin S. (2015-05-19)
    External research report
    Open Access
    The growing variability in nanoelectronic devices due to uncertainties from the manufacturing process and environmental conditions (power supply, temperature, aging) requires increasing design guardbands, forcing circuits ...
  • On the complexity of exchanging 

    Molinero Albareda, Xavier; Olsen, Martin; Serna Iglesias, María José (2015-03-24)
    External research report
    Open Access
    We analyze the computational complexity of the problem of deciding whether, for a given simple game, there exists the possibility of rearranging the participants in a set of j given losing coalitions into a set of j winning ...
  • Bounded-width QBF is PSPACE-complete 

    Atserias Peri, Albert; Oliva Valls, Sergi (2014-11-01)
    Article
    Restricted access - publisher's policy
    Tree-width and path-width are two well-studied parameters of structures that measure their similarity to a tree and a path, respectively. We show that QBF on instances with constant path-width, and hence constant tree-width, ...

View more