Book of Abstracts: 2nd International Workshop on Mathematics and Physical Sciences
Logic programs, more specifically, answer-set programs, can be annotated with probabilities on facts to express uncertainty. We address the problem of propagating weight annotations on facts (e.g. probabilities) of an answer-set program to its stable models, and from there to events (defined as sets of atoms) in a dataset over the program’s domain. We propose a novel approach which is algebraic in the sense tha...
This paper describes an implementation of a Constraint Programming approach to the problem of multi-criteria forest management optimization. The goal is to decide when to harvest each forest unit while striving to optimize several criteria under spatial restrictions. With a large number of management units, the optimization problem becomes computationally intractable. We propose an approach for deriving a set o...
Forestmanagement is an activity of prime economic and ecological impor2 tance. Managed forest areas can span very large regions and their proper manage3 ment is paramount to an effective development, in terms both of economic and natural 4 resources planning. Amanaged activity consists of individual andmutually indepen5 dent policy choices which apply to distinct patches of land—named stands—which, 6 as a whole...
This book-proceeding comprises the results of various comprehensive Mathematical and Physical Sciences-based studies accepted for presentation and discussion during the 1st Mathematical and Physical Sciences International Workshop in Évora, in 2023 (Mat- Phys23). The MatPhys23, organized under the auspices of University of Évora throughout the CIMA - Research Center in Mathematics and Applications, the ICT - In...
Critical infrastructures must be able to mitigate, at runtime, suspected ongoing cyberattacks that have eluded preventive security measures. To tackle this issue, we first propose an autonomic computing architecture for a Cyber-Security Incident Response Team Intelligent Decision Support System (CSIRT-IDSS) with a precise set of technologies for each of its components. We then zoom in on the component responsib...
Both logic programming in general and Prolog in particular have a long and fascinating history, intermingled with that of many disciplines they inherited from or catalyzed. A large body of research has been gathered over the last 50 years, supported by many Prolog implementations. Many implementations are still actively developed, while new ones keep appearing. Often, the features added by different systems wer...
The Quadratic Assignment Problem is a a classical constrained optimization problem used to model many real-life applications. We present experiments in solving the Quadratic Assignment Problem by means of Quantum Annealing and Quantum-inspired Annealing. We describe how to model this classical combinatorial problem in terms of QUBO (Quadratic Unconstrained Binary optimization) for implementing it on hardware so...
As with Amazon’s Echo and its conversational agent Alexa, smart voice-controlled devices become ever more present in daily life, and many different applications can be integrated into this platform. In this paper, we present a framework that eases the development of skills in Prolog. As Prolog has a long history in natural language processing, we may integrate well-established techniques, such as reasoning abou...
In this work we present NeMODe a declarative system for Computer Network Intrusion detection providing a declarative Domain Specific Language for describing computer network intrusion signatures that can spread across several network packets, which allows to state constraints over network packets, describing relations between several packets. NeMODe provides several back-end detection mechanisms relying on Cons...