scispace - formally typeset
B

Barry O'Sullivan

Researcher at University College Cork

Publications -  324
Citations -  3966

Barry O'Sullivan is an academic researcher from University College Cork. The author has contributed to research in topics: Constraint programming & Constraint satisfaction problem. The author has an hindex of 29, co-authored 312 publications receiving 3610 citations. Previous affiliations of Barry O'Sullivan include Brown University & National University of Ireland.

Papers
More filters
Proceedings ArticleDOI

Finding Robust Solutions to Stable Marriage

TL;DR: The notion of robustness in stable matching problems is studied and it is shown that checking whether a given stable matching is a $(1,b)$-supermatch can be done in polynomial time and the empirical evaluation on large instances show that local search outperforms the other approaches.
Proceedings ArticleDOI

What-If Analysis Through Simulation-Optimization Hybrids.

TL;DR: This paper proposes and experiment with one approach for combining simulation with a combinatorial optimization and decision making component and two alternative approaches that can reasonably combine decision making with simulation in a coherent way and avoid the generate and test behaviour.
BookDOI

Data Mining and Constraint Programming - Foundations of a Cross-Disciplinary Approach

TL;DR: This chapter presents an introduction to combinatorial optimisation in the context of the high-level modelling platform, Numberjack, along with details on how such problems can be solved using three of the most prominent solution paradigms.
Posted Content

Data, Power and Bias in Artificial Intelligence

TL;DR: This paper reviews ongoing work to ensure data justice, fairness and bias mitigation in AI systems from different domains exploring the interrelated dynamics of each and examining whether the inevitability of bias in AI training data may in fact be used for social good.
Proceedings ArticleDOI

Modeling and detecting the cascade vulnerability problem using soft constraints

TL;DR: This paper considers how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security.