Constraint reasoning techniques, developed in the context of AI research, have successfully solved many real problems. Although it is a mature field, there are many important active lines of research such as open CSPs, distributed CSPs, quantified CSPs and soft constraint problems. Another well-known AI topic is Planning. It has recently gained new strenth in the research community due to its reformulation in terms of graphs, search and constraint satisfaction. In this project we want to make progress in the open lines of research of both fields. We also want to exploit the close relation between constraint processing and planning. Our objectives are:
Constraint reasoning. Our goal is to contribute to the efficient resolution of the new paradigms (open, distributed and quantified CSPs) as well as continue our work on soft constraints, where we have already made relevant contributions, extending the results to closely related models such as clausal formulas or bayesian networks. Since the problem is in general untractable, we also want to identify tractable classes (soluble in polynomial time).
Planning
Our goal is to refine the methods based on heuristic search for planning. We also want to study and develop the combination of search and inference. We want to exploit the existence of symmetries to decrease the solving effort, which is a well-known topic in the constraint community.
We present this project as a continuation of REPLI (TIC2002-04470-C03) motivated by the good results and experience that was achieved. We have now a larger and more experienced team of researchers. The benefits of the project will be the accomplishment of the previous goals as well as the integration of different research groups with complementary expertise.
- 2007, Conference PaperCarlos Hernández; Pedro Meseguer
The project, planned as a continuation of project LOGFAC (TIC2001-1577-C03-01), has three basic objectives. The first one is to continue the logic and algebraic study of t-norm based many-valued logics in the frame of both residuated and substructural logics. The second one is the formalization, within the framework of the above logics, of several deductive soft computing mechanisms, based on fuzzy logic, to deal with fuzziness and imprecision. The last one is to continue theoretical and experimental research on algorithms for the satisfiability problem in many-valued logics and their application to computational problems, in particular to constraint satisfaction problems with hard and soft constraints problems.
- 2008, Journal ArticleTeresa Alsinet; C. Chesñevar; Lluís Godo; G. Simari
- 2008, Journal ArticleCarles Noguera; Francesc Esteva; Joan Gispert
- 2007, Journal ArticleTommaso Flaminio; Lluís Godo
- 2007, Conference PaperFèlix Bou; Francesc Esteva; Lluís Godo
- 2007, Conference PaperCarlos Ansótegui; María Luisa Bonet; Jordi Levy; Felip Manyà
- 2007, Journal ArticleRostislav Horcík; Carles Noguera; Milan Petrík
- 2007, Conference PaperCarlos Ansótegui; María Luisa Bonet; Jordi Levy; Felip Manyà
- 2007, Conference PaperFrancesc Esteva; Lluís Godo; Carles Noguera
- 2007, Book ChapterCarlos Ansótegui; María Luisa Bonet; Jordi Levy; Felip Manyà
- 2007, Book ChapterRoberto Cignoli; Francesc Esteva; Lluís Godo
- 2007, Conference PaperCarlos Ansótegui; María Luisa Bonet; Jordi Levy; Felip Manyà
- 2007, Journal ArticleFrancesc Esteva; Joan Gispert; Lluís Godo; Carles Noguera
- 2007, Conference PaperCarlos Ansótegui; María Luisa Bonet; Jordi Levy; Felip Manyà
- 2007, Book ChapterFrancesc Esteva; Lluís Godo
- 2007, Journal ArticleMaría Luisa Bonet; Jordi Levy; Felip Manyà
- 2006, Conference PaperChu Min Li; Felip Manyà; J. Planes
- 2006, Conference PaperFrancesc Esteva; Lluís Godo
- 2006, Conference PaperRomà Adillon;Angel García-Cerdaña;Ventura Verdú
- 2006, Conference PaperMaría Luisa Bonet; Jordi Levy; Felip Manyà
- 2006, Journal ArticleLluís Godo;Enrico Marchioni
- 2006, Journal ArticleFranco Montagna; Carles Noguera; Rostislav Horcík
- 2006, Journal ArticleLluís Godo; Adriana Zapico
- 2006, Conference PaperAna Casali; Lluís Godo; Carles Sierra
- 2006, Journal ArticlePetr Savicky;Roberto Cignoli;Francesc Esteva;Lluís Godo;Carles Noguera
- 2006, Conference PaperJordi Levy; Manfred Schmidt-Schauss; Mateu Villaret
- 2006, Conference PaperFrancesc Esteva; Lluís Godo; Carles Noguera
- 2006, Journal ArticleFrancesc Esteva; Lluís Godo; Carles Noguera
- 2006, Journal ArticleJ. Argerlich; Felip Manyà
- 2006, Conference PaperFrancesc Esteva; Lluís Godo; Carles Noguera
- 2006, Conference PaperJordi Levy; Manfred Schmidt-Schauss; Mateu Villaret
- 2006, Conference PaperTeresa Alsinet; C. Chesñevar; Lluís Godo; Sandra Sandri; G. Simari
- 2006, Conference PaperCarles Noguera; Francesc Esteva; Joan Gispert
- 2005, Journal ArticleCarles Noguera; Francesc Esteva; Joan Gispert
- 2005, Book ChapterC. Chesñevar; G. Simari; Lluís Godo; Teresa Alsinet
- 2005, Conference PaperC. Chesñevar; G. Simari; Lluís Godo
- 2005, Conference PaperCarles Noguera; Francesc Esteva; Joan Gispert
- 2005, Journal ArticleCarles Noguera; Francesc Esteva; Joan Gispert
- 2005, Conference PaperRoberto Cignoli; Francesc Esteva; Lluís Godo; Carles Noguera
- 2005, Conference PaperPetr Savicky; Roberto Cignoli; Francesc Esteva; Lluís Godo; Carles Noguera
- 2005, Conference PaperJordi Levy; Joachim Niehren; Mateu Villaret
- 2005, Conference PaperFranco Montagna;Carles Noguera;Rostislav Horcík
- 2005, Conference PaperAna Casali; Lluís Godo; Carles Sierra
- 2005, Conference PaperLluís Godo; Adriana Zapico
- 2005, Conference PaperCarles Noguera; Francesc Esteva; Joan Gispert
ONCNOSIS aims to discover novel molecular tools, therapeutic compounds and developing new technological approaches for disease diagnosis, prognosis and treatment in four selected cancers.
- 2007, Book ChapterYasuo Narukawa; Vicenç Torra
- 2007, Book ChapterSandra Sandri; C. Sibertin-Blanc; Vicenç Torra
- 2007, Journal ArticleVicenç Torra; Yasuo Narukawa
- 2007, Journal ArticleVanes Daza; Javier Herranz ; Paz Morillo; Carla Rafols
- 2007, Journal ArticleVicenç Torra; Yasuo Narukawa
- 2006, Journal ArticleVicenç Torra; Yasuo Narukawa; Sadaaki Miyamoto
- 2006, Conference PaperJordi Nin; Vicenç Torra
- 2006, Conference PaperVicenç Torra; Josep Domingo-Ferrer
- 2006, Conference PaperYasuo Narukawa; Vicenç Torra
- 2006, Conference PaperJosep Domingo-Ferrer; Vicenç Torra; Josep M. Mateo i Sanz; F. Sebe
- 2006, Conference PaperVicenç Torra; Sadaaki Miyamoto
- 2006, Conference PaperJordi Nin; Vicenç Torra
- 2006, Conference PaperVicenç Torra; Sadaaki Miyamoto
- 2006, Journal ArticleVicenç Torra; John Abowd; Josep Domingo-Ferrer
- 2005, Conference PaperJordi Nin; Vicenç Torra
The mission of ARES is to advance the state of the art and the practice of information security and privacy through:
- Edge-cutting, world-class research on information security and privacy, making the latter compatible with the former
- The reinforcement of Spanish participation in the European 7th Framework Programme, specifically in the thematic programmes "Security and space" and "Information and communications technologies"
- The contribution of ARES to higher education in their activity domain by co-operating with the UNESCO Chair in Data Privacy held by the ARES co-ordinator and the doctoral programmes and Bologna master degrees in which the six groups of the team are involved
- The constitution of ARES as a national and international reference team in the domain of information security and privacy;
- The fosterage of technology transfer in information security and privacy towards industry and productive sectors, by means of contracts, agreements, patents and training.
A mid-term ambition of ARES is to become an inter-university research center excelling in information security and privacy. This change of legal status will not be operated immediately, but it is hoped that it can be accomplished within the next five years.
The activity areas of ARES include but are not limited to the following: secure electronic commerce, information privacy, critical infrastructures, intellectual property protection and digital rights management, cryptology, smart cards, personal identification and biometrics, access control and authentication, network security, security certification and trust generation, dependability, security and privacy in ubiquitous (pervasive) computing. The leitmotiv of the proposed research programme is ?National and corporate security vs individual privacy in information and communications technologies?.
- 2012, Conference PaperJordi Marés;Vicenç Torra
- 2012, Conference PaperJavier Murillo;Daniel Abril;Vicenç Torra
- 2012, Conference PaperDavid F. Nettleton;Daniel Abril
- 2012, Journal ArticleDaniel Abril;Guillermo Navarro-Arribas;Vicenç Torra
- 2012, Conference PaperDavid F. Nettleton
- 2011, Journal ArticleJavier Jiménez;Jordi Marés;Vicenç Torra
- 2011, Journal ArticleCarles Martinez-Garcia;Guillermo Navarro-Arribas;Joan Borrell
- 2011, Conference ProceedingsVicenç Torra;Daniel Abril;Guillermo Navarro-Arribas
- 2011, Journal ArticleDavid Nettleton;Vicenç Torra
- 2011, Journal ArticleArnau Erola;Jordi Castellà-Roca;Guillermo Navarro-Arribas;Vicenç Torra
- 2011, Conference ProceedingsDaniel Abril;Guillermo Navarro-Arribas;Vicenç Torra
- 2011, ThesisJordi Marés;Vicenç Torra
- 2011, Journal ArticleVicenç Torra;Sadaaki Miyamoto
- 2011, Journal ArticleCarles Martinez-Garcia;Guillermo Navarro-Arribas;Simon N. Foley;Vicenç Torra;Joan Borrell
- 2011, Conference ProceedingsArnau Erola;Jordi Castellà-Roca;Guillermo Navarro-Arribas;Vicenç Torra
- 2011, Conference ProceedingsDaniel Abril;Guillermo Navarro-Arribas;Vicenç Torra
- 2011, Journal ArticleVicenç Torra;Sadaaki Miyamoto
- 2011, Book ChapterDavid Nettleton;Sáez-Trumper, D.;Vicenç Torra
- 2010, Conference PaperIsaac Cano;Susana Ladra;Vicenç Torra
- 2010, Journal ArticleJavier Herranz;Stan Matwin;Jordi Nin;Vicenç Torra
- 2010, Book ChapterVicenç Torra
- 2010, Journal ArticleYasuo Narukawa;Vicenç Torra
- 2010, Book ChapterVicenç Torra
- 2010, Conference PaperGuillermo Navarro-Arribas;Vicenç Torra;Arnau Erola;Jordi Castellà-Roca
- 2010, Journal ArticleGuillermo Navarro-Arribas;Vicenç Torra
- 2010, Journal ArticleVicenç Torra;Yasuo Narukawa
- 2010, ThesisDaniel Abril;Vicenç Torra
- 2010, Conference PaperJordi Nin;Javier Herranz;Vicenç Torra
- 2010, Conference PaperJordi Nin;Vicenç Torra
- 2010, Conference ProceedingsDaniel Abril;Guillermo Navarro-Arribas;Vicenç Torra
- 2010, Conference PaperJavier Herranz;Jordi Nin;Vicenç Torra
- 2010, Conference PaperYasuo Narukawa;Vicenç Torra
- 2010, Journal ArticleSusana Ladra;Vicenç Torra
- 2010, Book ChapterVicenç Torra
- 2010, Conference PaperCarles Martínez-García;Guillermo Navarro-Arribas;Joaquin Garcia-Alfaro
- 2010, Journal ArticleJordi Cucurull;Ramon Martí;Guillermo Navarro-Arribas;Sergi Robles;Joan Borrell;Gerard Suades
- 2010, Journal ArticleVicenç Torra
- 2010, Conference PaperMaria Bras-Amorós;Josep Domingo-Ferrer;Vicenç Torra
- 2010, Conference PaperVicenç Torra
- 2010, Conference ProceedingsDaniel Abril;Guillermo Navarro-Arribas;Vicenç Torra
- 2010, Conference PaperIsaac Cano;Vicenç Torra
- 2010, Conference PaperLuis Gabriel Jaimes;Vicenç Torra
- 2010, Book ChapterJordi Marés;Vicenç Torra
- 2010, Journal ArticleVicenç Torra
- 2010, Book ChapterVicenç Torra
- 2010, Journal ArticleVicenç Torra;Guillermo Navarro-Arribas;Daniel Abril
- 2010, Book ChapterVicenç Torra
- 2010, Conference PaperArnau Erola;Jordi Castellà-Roca;Guillermo Navarro-Arribas;Vicenç Torra
- 2010, Conference ProceedingsVicenç Torra;Guillermo Navarro-Arribas;Daniel Abril
- 2010, Conference PaperVicenç Torra;Ji-Hee Min
- 2009, Journal ArticleJordi Cucurull;Ramon Martí;Guillermo Navarro-Arribas;Sergi Robles;Joan Borrell
- 2009, Conference PaperCarlos Martínez-Garcia;Guillermo Navarro-Arribas;Joan Borrell;Abraham Martín-Campillo
- 2009, Conference PaperGuillermo Navarro;Vicenç Torra
- 2009, Conference PaperAida Valls;Jordi Nin;Vicenç Torra
- 2009, Conference PaperVicenç Torra;Isaac Cano;Guillermo Navarro-Arribas
- 2009, Journal ArticleJordi Nin;Vicenç Torra
- 2009, Journal ArticleJordi Cucurull;Ramon Martí;Guillermo Navarro-Arribas;Sergi Robles;Benno J Overeinder;Joan Borrell
- 2009, Conference PaperGuillermo Navarro-Arribas;Vicenç Torra
- 2009, Conference PaperJordi Nin;Barbara Carminati;Elena Ferrari;Vicenç Torra
- 2009, Book ChapterJordi Pont-Tuset;Jordi Nin;Pau Medrano-Gracia;Victor Muntés-Mulero;Josep Ll. Larriba-Pey
- 2009, Conference PaperIsaac Cano;Vicenç Torra
- 2009, Conference PaperGuillermo Navarro-Arribas;Joaquin Garcia-Alfaro
- 2009, Book ChapterJavier Herranz;Stan Matwin;Pedro Meseguer;Jordi Nin
- 2009, Journal ArticleJordi Nin;Vicenç Torra
- 2008, Journal ArticleVicenç Torra;Yasuo Narukawa
- 2008, Conference PaperJoan Guisado-Gámez;Arnau Prat-Pérez
- 2008, Journal ArticleJordi Nin;Javier Herranz;Vicenç Torra
- 2008, Journal ArticleVanes Daza;Javier Herranz;Paz Morillo;Carla Rafols
- 2008, Conference PaperYasuo Narukawa;Vicenç Torra
- 2008, Conference PaperJordi Pont-Tuset;Jordi Nin;Pau Medrano-Gracia;Victor Muntés-Mulero;Josep Ll. Larriba-Pey
- 2008, Conference PaperJordi Nin;Javier Herranz;Vicenç Torra
- 2008, Conference PaperJosep Domingo-Ferrer;Vicenç Torra
- 2008, Conference PaperJoan Guisado-Gámez;Arnau Prat-Pérez;Jordi Nin;Victor Muntés-Mulero;Josep Ll. Larriba-Pey
- 2008, Journal ArticleDavid Galindo;Javier Herranz
- 2008, Journal ArticleVanes Daza;Javier Herranz;Germán Sáez
- 2007, Journal ArticleJavier Herranz
- 2007, Conference PaperVicenç Torra
- 2007, BookVicenç Torra; Yasuo Narukawa
- 2007, Conference PaperJavier Herranz ; Vanes Daza; Paz Morillo; Carla Rafols
- 2007, Conference PaperYasuo Narukawa; Vicenç Torra
- 2007, Journal ArticleVicenç Torra; Yasuo Narukawa
- 2007, Journal ArticleVanes Daza; Javier Herranz ; Paz Morillo; Carla Rafols
- 2007, Conference PaperVicenç Torra; Yasuo Narukawa
The main objective of E-AEGIS is to demonstrate that transaction security in the information society is compatible with consumer privacy. Specifically, this will be demonstrated for the following three scenarios: mobile services (subproject E-AEGIS/M-PRIVACY), digital content management (subproject E-AEGIS/STEGOPRIVACY), and privacy-preserving data mining (subproject EAEGIS/DBPRIVACY).
Subproject E-AEGIS/DBPRIVACY will focus on the creation of synthetic (i.e. simulated) datasets which preserve a certain model present in an original dataset for a number of subdomains (subsets of variables and records). This will enable companies to co-operate in joint market analyses without exchanging their customers' real data, but only synthetic data. To ensure that the synthetic data really do preserve privacy, re-identification methods will be used to measure disclosure risk. New reidentification methods will be designed to take non-independent data into account. The ultimate goal is to use synthetic data also *within a company*: the corporate data warehouse will be fed with synthetic data simulating the real data collected by the operational subsystems; the operational data will be deleted at short time intervals, with the ensuing privacy gain.
- 2011, Journal ArticleCarles Martinez-Garcia;Guillermo Navarro-Arribas;Simon N. Foley;Vicenç Torra;Joan Borrell
- 2011, Conference ProceedingsArnau Erola;Jordi Castellà-Roca;Guillermo Navarro-Arribas;Vicenç Torra
- 2011, Journal ArticleCarles Martinez-Garcia;Guillermo Navarro-Arribas;Joan Borrell
- 2010, Conference PaperCarles Martínez-García;Guillermo Navarro-Arribas;Joaquin Garcia-Alfaro
- 2010, Journal ArticleJordi Cucurull;Ramon Martí;Guillermo Navarro-Arribas;Sergi Robles;Joan Borrell;Gerard Suades
- 2010, Conference PaperGuillermo Navarro-Arribas;Vicenç Torra;Arnau Erola;Jordi Castellà-Roca
- 2010, Journal ArticleGuillermo Navarro-Arribas;Vicenç Torra
- 2009, Book ChapterJavier Herranz;Stan Matwin;Pedro Meseguer;Jordi Nin
- 2009, Journal ArticleJordi Nin;Vicenç Torra
- 2009, Journal ArticleJordi Nin;Vicenç Torra
- 2009, Journal ArticleJordi Cucurull;Ramon Martí;Guillermo Navarro-Arribas;Sergi Robles;Joan Borrell
- 2009, Conference PaperCarlos Martínez-Garcia;Guillermo Navarro-Arribas;Joan Borrell;Abraham Martín-Campillo
- 2009, Conference PaperGuillermo Navarro;Vicenç Torra
- 2009, Conference PaperAida Valls;Jordi Nin;Vicenç Torra
- 2009, Book ChapterJordi Pont-Tuset;Jordi Nin;Pau Medrano-Gracia;Victor Muntés-Mulero;Josep Ll. Larriba-Pey
- 2009, Conference PaperVicenç Torra;Isaac Cano;Guillermo Navarro-Arribas
- 2009, Journal ArticleJordi Cucurull;Ramon Martí;Guillermo Navarro-Arribas;Sergi Robles;Benno J Overeinder;Joan Borrell
- 2009, Conference PaperGuillermo Navarro-Arribas;Vicenç Torra
- 2009, Conference PaperJordi Nin;Barbara Carminati;Elena Ferrari;Vicenç Torra
- 2009, Book ChapterIsaac Cano;Guillermo Navarro-Arribas;Vicenç Torra
- 2009, Conference PaperIsaac Cano;Vicenç Torra
- 2009, Conference PaperGuillermo Navarro-Arribas;Joaquin Garcia-Alfaro
- 2008, Conference PaperJordi Pont-Tuset;Jordi Nin;Pau Medrano-Gracia;Victor Muntés-Mulero;Josep Ll. Larriba-Pey
- 2008, Conference PaperJordi Nin;Javier Herranz;Vicenç Torra
- 2008, Conference PaperJoan Guisado-Gámez;Arnau Prat-Pérez;Jordi Nin;Victor Muntés-Mulero;Josep Ll. Larriba-Pey
- 2008, Journal ArticleDavid Galindo;Javier Herranz
- 2008, Journal ArticleVanes Daza;Javier Herranz;Germán Sáez
- 2008, Conference PaperJoan Guisado-Gámez;Arnau Prat-Pérez
- 2008, Journal ArticleJordi Nin;Javier Herranz;Vicenç Torra
- 2008, Journal ArticleVanes Daza;Javier Herranz;Paz Morillo;Carla Rafols
- 2007, Journal ArticleJavier Herranz
- 2007, Journal ArticleVicenç Torra; Yasuo Narukawa
- 2007, Conference PaperJavier Herranz ; Vanes Daza; Paz Morillo; Carla Rafols
- 2007, Journal ArticleVanes Daza; Javier Herranz ; Paz Morillo; Carla Rafols
The inclusion of soft constraints in the constraint-based reasoning model has connected this model with combinatorial optimization. This allows one to have a common view of both areas, exchanging methods between them. This project tries to use, integrate and extend ideas that have been shown successful for constraint reasoning in a double dimension:
- Soft constraints. Contribution to the issues caused by the inclusion of soft constraints in the constraint model, extending existing results for hard constraints. In particular, we will focus on soft constraint propagation and local consistency, resolution algorithms and their complexity, and the efficient formulation of real problems.
- Applications. To apply constraint techniques to two different fields: planning and uncertainty management. On planning, the idea of planning as heuristic search wll be extended to produce a temporal planner of high performance, combining a branch-and-bound scheme with prunning techniques based con constraint propagation. On uncertainty management, constraint-solving algorithms based on decomposition will be applied to bayesian networks and to the possibilistic model. Finally, other problems will be studied, in particular the optimization of circuit design. Project benefits include not only the above mentioned contributions and the resolution of the applications, but also the integration of research groups with complementary backgrounds.
- 2005, Conference PaperCarlos Hernández; Pedro Meseguer
- 2005, Book ChapterIsmel Brito; Pedro Meseguer
- 2005, Conference PaperPedro Meseguer; Martí Sánchez; Javier Larrosa
- 2005, Journal ArticleChristian Bessière; Ismel Brito; Arnold Maestre; Pedro Meseguer
- 2005, Conference PaperCarlos Hernández; Pedro Meseguer
- 2005, Conference PaperIsmel Brito; Pedro Meseguer
- 2004, Conference PaperIsmel Brito; Fernando Herrero; Pedro Meseguer
- 2004, Conference PaperMartí Sánchez; Pedro Meseguer; Javier Larrosa
- 2003, Journal ArticleSimon de Givry; Javier Larrosa; Pedro Meseguer; Thomas Schiex
- 2003, Journal ArticleIsmel Brito; Pedro Meseguer
- 2002, Conference PaperChristian Bessière; Arnold Maestre; Pedro Meseguer
