<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Chemotherapy Treatment Scheduling via Answer Set Programming?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Carmine Dodaro</string-name>
          <email>dodaro@mat.unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Galata</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Maratea</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Mochi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Porro</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DEMACS, University of Calabria</institution>
          ,
          <addr-line>Rende</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>DIBRIS, University of Genova</institution>
          ,
          <addr-line>Genova</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>SurgiQ srl</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The problem of planning and scheduling chemotherapy treatments in oncology clinics is a complex problem, given that the solution has to satisfy (as much as possible) several requirements such as the cyclic nature of chemotherapy treatment plans, and the availability of resources, e.g. treatment time, nurses, and pharmacy quantities. At the same time, realizing a satisfying schedule is of upmost importance for obtaining the best health outcomes. In this paper we present a solution to the problem based on Answer Set Programming (ASP), that recently proved to be a consistent methodology for solving complex scheduling problems involving optimization. Results of an experimental analysis, conducted on benchmarks with realistic sizes and parameters, show that ASP is a suitable solving methodology also for this important scheduling problem.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The Chemotherapy Treatment Scheduling (CTS) [29{31, 35] problem consists
of computing a schedule for patients requiring chemotherapy treatments. The
CTS problem is a complex problem for oncology clinics since it involves
multiple resources and aspects, including the availability of nurses, chairs, and drugs.
Chemotherapy treatments have a cyclic nature, where the number and the
duration of each cycle depend on the di erent types of cancer and the stage of the
disease. Moreover, treatments may have di erent priorities that must be taken
into account for preparing a solution. A proper solution to the CTS problem
is thus crucial for improving the degree of satisfaction of patients and nurses,
and for a better management of resources. Various studies, also in the context
of the COVID19 emergency [
        <xref ref-type="bibr" rid="ref32 ref36">32, 36</xref>
        ], have shown how delays in cancer surgery
and treatment have a signi cant adverse impact on patient survival. This
impact varies depending on the aggressiveness of the cancer, thus stressing the
importance of developing a model capable of e ciently prioritize patients.
      </p>
      <p>
        Complex combinatorial problems, possibly involving optimizations, such as
the CTS problem, are usually the target applications of AI languages and tools
such as Answer Set Programming (ASP). As a matter of fact, ASP has been
successfully employed for solving hard combinatorial problems in several research
areas, including Arti cial Intelligence [
        <xref ref-type="bibr" rid="ref18 ref8 ref9">8, 9, 18</xref>
        ], Bioinformatics [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ],
Hydroinformatics [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], and it has been also employed to solve many scheduling problems [
        <xref ref-type="bibr" rid="ref1 ref14 ref15 ref16 ref19 ref26 ref34 ref5 ref6 ref8">14,
26, 34, 1, 15, 16, 5, 6, 19, 8</xref>
        ], and in industrial applications (see, e.g., [
        <xref ref-type="bibr" rid="ref17 ref2">2, 17</xref>
        ]). The
success of ASP is due to di erent factors, including a simple but rich syntax [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
which includes optimization statements as well as powerful database-inspired
constructs like aggregates, an intuitive semantics [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and the availability of
e cient solvers (see, e.g., [
        <xref ref-type="bibr" rid="ref23 ref25 ref3 ref33 ref4">4, 23, 33, 25, 3</xref>
        ]).
      </p>
      <p>
        In this paper, we propose the rst ASP encoding for solving the CTS
problem, and then we tested our solution by experimenting with several instances
simulating real-world scenarios. Results obtained using the state-of-the-art ASP
solver clingo [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] show that ASP is a suitable solving methodology for the CTS
problem.
      </p>
      <p>To summarize, the main contributions of this paper are the following:
We provide an ASP encoding for solving the complete CTS problem
(Section 4).</p>
      <p>We generated several instances simulating real-world scenario and conducted
an experimental analysis assessing the good performance of our solution
(Section 5).</p>
      <p>We analyze related literature (Section 6).</p>
      <p>The paper is completed by Section 2, which contains needed preliminaries
about ASP, by an informal description of the CTS problem in Section 3, and by
conclusions and possible topics for future research in Section 7.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background on ASP</title>
      <p>
        Answer Set Programming (ASP) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] is a programming paradigm developed in
the eld of nonmonotonic reasoning and logic programming. In this section we
overview the language of ASP. More detailed descriptions and a more formal
account of ASP, including the features of the language employed in this paper,
can be found in [
        <xref ref-type="bibr" rid="ref10 ref13">10, 13</xref>
        ]. Hereafter, we assume the reader is familiar with logic
programming conventions.
      </p>
      <p>Syntax. The syntax of ASP is similar to the one of Prolog. Variables are strings
starting with uppercase letter and constants are non-negative integers or strings
starting with lowercase letters. A term is either a variable or a constant. A
standard atom is an expression p(t1; : : : ; tn), where p is a predicate of arity n and
t1; : : : ; tn are terms. An atom p(t1; : : : ; tn) is ground if t1; : : : ; tn are constants.
A ground set is a set of pairs of the form hconsts : conji, where consts is a list of
constants and conj is a conjunction of ground standard atoms. A symbolic set
is a set speci ed syntactically as fT erms1 : Conj1; ; T ermst : Conjtg, where
t &gt; 0, and for all i 2 [1; t], each T ermsi is a list of terms such that jT ermsij =
k &gt; 0, and each Conji is a conjunction of standard atoms. A set term is either a
symbolic set or a ground set. Intuitively, a set term fX : a(X; c); p(X); Y : b(Y; m)g
stands for the union of two sets: the rst one contains the X-values making the
conjunction a(X; c); p(X) true, and the second one contains the Y -values making
the conjunction b(Y; m) true. An aggregate function is of the form f (S), where
S is a set term, and f is an aggregate function symbol. Basically, aggregate
functions map multisets of constants to a constant. The most common functions
implemented in ASP systems are the following:
#count , number of terms;
#sum, sum of integers.</p>
      <p>An aggregate atom is of the form f (S) T , where f (S) is an aggregate function,
2 f&lt;; ; &gt;; ; 6=; =g is a comparison operator, and T is a term called guard.
An aggregate atom f (S) T is ground if T is a constant and S is a ground
set. An atom is either a standard atom or an aggregate atom. A rule r has the
following form:</p>
      <p>a1 _ : : : _ an :{ b1; : : : ; bk; not bk+1; : : : ; not bm:
where a1; : : : ; an are standard atoms, b1; : : : ; bk are atoms, bk+1; : : : ; bm are
standard atoms, and n; k; m 0. A literal is either a standard atom a or its negation
not a. The disjunction a1 _ : : : _ an is the head of r, while the conjunction
b1; : : : ; bk; not bk+1; : : : ; not bm is its body. Rules with empty body are called
facts. Rules with empty head are called constraints. A variable that appears
uniquely in set terms of a rule r is said to be local in r, otherwise it is a global
variable of r. An ASP program is a set of safe rules, where a rule r is safe if the
following conditions hold: (i) for each global variable X of r there is a positive
standard atom ` in the body of r such that X appears in `; and (ii) each
local variable of r appearing in a symbolic set fTerms : Conj g also appears in a
positive atom in Conj .</p>
      <p>
        A weak constraint [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] ! is of the form:
where w and l are the weight and level of !, respectively. (Intuitively, [w@l] is
read as "weight w at level l", where weight is the \cost" of violating the condition
in the body of w, whereas levels can be speci ed for de ning a priority among
preference criteria). An ASP program with weak constraints is = hP; W i,
where P is a program and W is a set of weak constraints.
      </p>
      <p>A standard atom, a literal, a rule, a program or a weak constraint is ground
if no variables appear in it.</p>
      <p>Semantics. Let P be an ASP program. The Herbrand universe UP and the
Herbrand base BP of P are de ned as usual. The ground instantiation GP of
P is the set of all the ground instances of rules of P that can be obtained by
substituting variables with constants from UP .</p>
      <p>An interpretation I for P is a subset I of BP . A ground literal ` (resp.,
not `) is true w.r.t. I if ` 2 I (resp., ` 62 I), and false (resp., true) otherwise. An
aggregate atom is true w.r.t. I if the evaluation of its aggregate function (i.e.,
the result of the application of f on the multiset S) with respect to I satis es
the guard; otherwise, it is false.</p>
      <p>A ground rule r is satis ed by I if at least one atom in the head is true w.r.t.
I whenever all conjuncts of the body of r are true w.r.t. I.</p>
      <p>
        A model is an interpretation that satis es all rules of a program. Given a
ground program GP and an interpretation I, the reduct [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] of GP w.r.t. I is the
subset GIP of GP obtained by deleting from GP the rules in which a body literal
is false w.r.t. I. An interpretation I for P is an answer set (or stable model) for
P if I is a minimal model (under subset inclusion) of GIP (i.e., I is a minimal
model for GIP ) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>Given a program with weak constraints = hP; W i, the semantics of
extends from the basic case de ned above. Thus, let G = hGP ; GW i be the
instantiation of ; a constraint ! 2 GW is violated by an interpretation I if all
the literals in ! are true w.r.t. I. An optimum answer set for is an answer set
of GP that minimizes the sum of the weights of the violated weak constraints in
GW in a prioritized way.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Problem</title>
    </sec>
    <sec id="sec-4">
      <title>Description</title>
      <p>In this section, we provide an informal description of the CTS problem and its
requirements.</p>
      <p>The CTS problem consists of computing a schedule for chemotherapy
patients. Chemotherapy treatment plans have a cyclic nature, following a schema
that depends on the required treatment and each di erent treatment session
requires di erent drugs to be dispensed. The input of the problem is a list of
registrations, corresponding to treatment sessions for the patients, where each
registration includes:
the drugs to be dispensed, with a maximum of 3 drugs per session;
the priority level of the registration, where 1, 2, and 3 correspond to
registrations with high, medium, and low priority, respectively; and
the day before which the treatment must start, if the registration corresponds
to the rst session of the patient, or the number of waiting days before the
subsequent session, otherwise.</p>
      <p>Registrations range over a period of time of 14 days, where each day is
composed by 8 time slots. Then, each hospital has c available chairs, each chair
can be assigned to at most ntreat treatments, n nurses working in the hospital,
k patients that a nurse can visit per time slot, and a maximum quantity of
available drugs for each day. In our setting, c, ntreat, n, and k are xed and set
to 15, 10, 5, and 4, respectively.</p>
      <p>The output of the problem is a schedule of registrations to time slots
according to the following requirements:
the rst session treatment must be scheduled before the date reported in the
registration;
the subsequent sessions must be scheduled exactly after the number of
waiting days speci ed in the registration;
each chair can be used by only one patient for each time slot;
if the treatment requires more than one time slots, then the patients must
always use the same chair;
each nurse can assist from 1 to k patients for each time slot;
each chair can be assigned to at most ntreat treatments;
treatments cannot exceed the maximum quantity of drugs available for each
day;
treatments must be scheduled as soon as possible, therefore it is not possible
that a day has no scheduled registration and subsequent days have scheduled
registrations;
since some drugs might require a long time to be prepared, treatments cannot
be scheduled at the latest available time slot.</p>
      <p>Moreover, as a further requirement, registrations with the highest priorities
should be scheduled before other registrations.
4</p>
    </sec>
    <sec id="sec-5">
      <title>ASP Encoding for the CTS problem</title>
      <p>
        Starting from the speci cations in the previous section, here we present the
ASP encoding, based on the input language of clingo [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], for the scheduling
problem.
      </p>
      <p>Data Model. The input data is speci ed by means of the following atoms:
Instances of reg(REGID,PRIOR,M,DUEDATE,TID1,TID2,TID3) represent the
registrations, characterized by an id (REGID), a priority score (PRIOR, we
recall that 1 is the highest priority and 3 is the lowest priority), a value
indicating an internal order of treatments (M, where 0 indicates the rst
treatment, 1 the second treatment, etc.), the date by which the treatments
must be carried out (DUEDATE), the ids of treatments (TID1, TID2, TID3)
that must be carried out.</p>
      <p>Instances of mss(DAY,TS) represent the available time slots for each day,
e.g., mss(1,1), ..., mss(1,8) denote that 8 slots are available for the day 1,
where each slot has a xed duration (30 minutes or 1 hour) depending on
the scenario.
Instances of type(TID, QUANT, NCHAIRS, NNURSES, D) represent for each
treatment, denoted by its identi er TID, the amount of drugs (QUANT), the
number of chairs (NCHAIRS), the number of nurses (NNURSES), and the
duration expressed (D) required by the treatment.</p>
      <p>Instances of drug(TID,MAX) represent for each treatment, denoted by its
identi er TID, the maximum availability of the required drug for each day
(MAX).</p>
      <p>Instances of chair(ID) represent the available chairs, with its identi er ID.
Instances of nurse(ID,D) represent the nurses available in a speci c day,
where ID is the identi er of the nurse and D is the day.</p>
      <p>Moreover, we also take advantage of three constants, namely c, k, and ntreat,
corresponding to the ones described in the previous section.</p>
      <p>The output is an assignment represented by atoms of the form</p>
      <p>x(RID,DAY,TS,TID1,TID2,TID3,PRIOR,M)
where the intuitive meaning is that the registration with id RID is assigned to
the day DAY and its starting time slot is TS, whereas the terms TID1, TID2, TID3,
PRIOR, and M are the ones of reg(REGID,PRIOR,M,DUEDATE,TID1,TID2,TID3),
described above.
Encoding. The related encoding is shown in Figure 1, and is described in the
following. To simplify the description, we denote as ri the rule appearing at the
line i of Figure 1.</p>
      <p>Rules r1 and r2 guess an assignment for the registrations to a day DAY and
a time slot TS, where r1 is used to guess the rst day of the treatment and r2
the subsequent days. Rules r3, r4, and r5 are auxiliary rules which are used for
deriving atoms of the form res(RID,DAY,H,NCHAIR,NNURSE) starting from the
assignment derived in rules r1 and r2. Basically, those atoms include, for each
registration of a given day, all the time slots where the registration is assigned,
and the number of chairs and nurses required by the registration. Then, rules r6
and r7 guess the chairs and the nurses that must be assigned to each selected
registration. Subsequent rules, from r8 to r16, are used to check that the schedule
ful lls all the requirements. In particular, rules r8 and r9 ensure that each chair
is assigned to at most one patient and each nurse can visit at most k patients for
each time slot, respectively. Rule r10 enforces that a patient has always the same
chair until the treatment is not nished. Rule r11 is used to guarantee that the
number of assigned chairs does not exceed the number of available chairs, denoted
with the constant c. Rules r12 and r13 ensure that each treatment does not exceed
the allotted time expressed by instances of mss and the number of treatments
assigned to a chair does not exceed the maximum number of treatments (denoted
with the constant ntreat ), respectively. Rule r14 guarantees that treatments start
before the last available slot of mss. Rule r15 ensures that if a day has at least
one scheduled registration, then all previous days must also have at least one
scheduled registration, whereas rule r16 is used to enforce that the maximum
availability of the drugs is not exceeded for each day. Then, weak constraints
from r17 to r19 are used to optimize the schedule of the registrations according
to their priority. In particular, registrations with the highest priority must be
scheduled before other registrations. Note that this optimization is considered
for the rst day of treatment only. Finally, weak constraint r20 is used to schedule
the treatments as soon as possible. Note that r20 is somehow subsumed by weak
constraints from r17 to r19, however we nd out that adding this weak constraints
slightly improves the overall performance in our experiments.
5</p>
    </sec>
    <sec id="sec-6">
      <title>Experimental Results</title>
      <p>
        In this section we report the results of an empirical analysis of the CTS problem.
Data have been randomly generated using parameters inspired by real-world
data. In this way we can simulate di erent scenarios and use them to test our
encoding. The experiments were run on a AMD Ryzen 5 2600 CPU @ 3.40GHz
with 7.6 GB of physical RAM. The ASP system used was clingo [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], using
arguments {restart-on-model for a faster optimization and {parallel-mode 12 for
parallel execution. The time limit was set to 300 seconds.
5.1
      </p>
      <sec id="sec-6-1">
        <title>CTS benchmarks</title>
        <p>The generated benchmarks vary for the number of patients and drug availability
but they all consider a 14-days calendar. Two di erent scenarios were considered.
The rst one (scenario ) is characterized by an amount of drugs that allow the
system to use the available chairs in a high percentage. For the second one
(scenario ), we severely reduced the number of available drugs, to test the
encoding in a situation in which the drugs become a limitation for the system
and then the usage of the chairs is reduced. Each scenario was tested with 10
di erent randomly generated inputs for each of the di erent groups of patients:
60, 80, and 100. The characteristics of the tests are the following:
2 di erent benchmarks, comprising a planning period of 14 working days, and
di erent numbers of available drugs, as reported in Table 1 and in Table 2,
for each group of patients;
3 di erent types of drugs that are assigned to the patients following the
schema reported in Table 3;
For each patient, there are 6 di erent registrations, each corresponding to
a day of treatment, following the schema reported in Table 3, with the rst
one having a randomly generated priority and a due date of the treatment
with a value inside a range of days based on the priority. In this way, we
simulate the common situation where a manager takes a list of patients with
di erent priorities and tries to schedule every patient as soon as possible,
taking into account the priority.</p>
        <p>The priorities of the rst registration have been generated from uneven
distribution of three possible values (with weights respectively of 0.20, 0.40, and 0.40 for
registrations having priority 1, 2, and 3, respectively). Depending on the priority
the due date of the treatment is randomly assigned from three di erent ranges:
[1,6) for priority 1, [6,11) for priority 2, and [11,15) for priority 3, respectively.</p>
        <p>The parameters of the test have been summed up in Table 4. In particular, for
each group of patients (60, 80 and, 100), we reported the mean and the standard
deviation of the number of patients with priority 1, 2 and 3, respectively.
5.2</p>
      </sec>
      <sec id="sec-6-2">
        <title>Results</title>
        <p>The encoding was tested on each scenario ( , i.e. drugs abundance, and , i.e.
drugs scarcity) and with each number of patients (60, 80 or 100). We summarized
our results in Tables 5 and 7 for scenario and Tables 6 and 8 for scenario ,
respectively. In each of these tables we report the average for each day, calculated
over 10 tests with randomly generated input, of the infusion chairs occupation
and the usage of each treatment drug as a percentage over the maximum quantity
that could be produced in that day. As a general observation, these results show
that our solution is capable to reach a good level of chairs occupation and drugs
usage, especially in the rst half of the planning period. In the second half,
the e ciency decreases for the simple reason that many patients have either
nished their treatments or are in their later stages, which are less time and
drug consuming (see Table 3). In a real-world application, a new schedule with
new patients would actually be planned such that the second half of the rst
schedule would overlap with rst half of the second schedule, thus having some
slots pre-occupied and lling all spaces left empty.</p>
        <p>Finally, we present some more detailed results achieved on one instance of
scenario . In particular, we present in Fig. 2 the occupation of a chair during
the planning period, while in Fig. 3 we show the drug usage. Fig. 4 reports
the day the rst session of each treatment, subdivided by patient priority, was
scheduled: as we can see priority 1 patients begin their treatment at the rst
day available, then priority 2 are obviously favoured over priority 3 patients. In
Fig. 5 we show the aggregated number of patients treated per day: note that
this number can signi cantly vary because the duration of the sessions can be
very di erent depending on the phase of the treatment.
6</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Related Work</title>
      <p>In this section we review related literature devoted to acknowledging some of the
most interesting works published in the latest years which dealt with the CTS
problem.</p>
      <p>
        Sevinc et al. [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ] addressed the CTS problem through a two-phase approach.
In the rst one an adaptive negative-feedback scheduling algorithm is adopted
to control the load on the system, while in the second phase two heuristics
based on the `Multiple Knapsack Problem' have been evaluated to assign
patients to speci c infusion seats. The overall design has been put to test at a local
chemotherapy center and has yielded good results for patient waiting times,
orderly execution of chemotherapy regimen and utilization of infusion chairs.
Huang et al. [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] developed and implemented a model to optimize safety and
e ciency in terms of sta ng resource violations measured by nurse-to-patient
ratios throughout the workday and at key points during treatment to decide
when to schedule patients according to their visit durations. The optimization
model was built using Excel Solver. Hahn-Goldberg et al. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] addressed in
particular dynamic uncertainty that arises from requests for appointments that arrive
in real time and uncertainty due to last minute scheduling changes through a
proactive template of an expected day in the chemotherapy centre using a
deterministic optimization model updated, to accommodate last minute additions
and cancellations to the schedule, by a shu ing algorithm. Huggins et al. [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]
presented a mixed-integer programming optimization model developed with the
objective of maximizing resource utilization, while balancing human workload,
in particular taking into account variability in length of treatment, increased
patient demand, and resource limitations.
      </p>
      <p>schedules with 60 (top left), 80 (top right) and 100
Fig. 5. Total number of patients treated in each day of the planning period for scenario
with 60 (top left), 80 (top right) and 100 (bottom left) patients (bottom left).
7</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusions and Current Work</title>
      <p>In this paper we have employed ASP for solving the CTS problem, and we
then presented the results of an experimental analysis on instances generated
in order to simulate real-world scenarios. The proposed solution and the good
results con rm that ASP is a viable AI tool for solving hard scheduling problems,
mainly due to the available modeling rules and constructs, and availability of
e cient solvers.</p>
      <p>
        Concerning future work, we are currently improving the analysis by
investigating with other parameters, e.g. with k = 7, given that a range between 4 and
7 for k is often employed in papers, or with 20 and 40 patients. We also plan
to to include the design, encoding and analysis of a re-scheduling solution, in
case the o -line solution, as proposed in this paper, cannot be fully implemented
for circumstances such as canceled registrations, and the evaluation of
heuristics and optimization techniques (see, e.g., [
        <xref ref-type="bibr" rid="ref27 ref28 ref7">7, 27, 28</xref>
        ]) for further improving the
e ectiveness of our solution. Finally, we plan to experimentally confront to the
alternative solutions mentioned in the related work section, assuming such
solutions are publicly available and the comparison is signi cant, and to analyse
with real data when they become available.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abels</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jordi</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostrowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toletti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wanko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Train scheduling with hybrid ASP</article-title>
          .
          <source>In: LPNMR. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11481</volume>
          , pp.
          <volume>3</volume>
          {
          <fpage>17</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Abseher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musliu</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Shift design with answer set programming</article-title>
          .
          <source>Fundamenta Informaticae</source>
          <volume>147</volume>
          (
          <issue>1</issue>
          ),
          <volume>1</volume>
          {
          <fpage>25</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amendola</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Evaluation of disjunctive programs in WASP</article-title>
          . In: Balduccini,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Lierler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Woltran</surname>
          </string-name>
          , S. (eds.)
          <source>LPNMR. LNCS</source>
          , vol.
          <volume>11481</volume>
          , pp.
          <volume>241</volume>
          {
          <fpage>255</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Anytime answer set optimization via unsatis able core shrinking</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          <volume>16</volume>
          (
          <issue>5-6</issue>
          ),
          <volume>533</volume>
          {
          <fpage>551</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An advanced answer set programming encoding for nurse scheduling</article-title>
          .
          <source>In: AI*IA. LNCS</source>
          , vol.
          <volume>10640</volume>
          , pp.
          <volume>468</volume>
          {
          <fpage>482</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Nurse (re)scheduling via answer set programming</article-title>
          .
          <source>Intelligenza Arti ciale 12(2)</source>
          ,
          <volume>109</volume>
          {
          <fpage>124</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marques-Silva</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Optimum stable model search: Algorithms and implementation</article-title>
          .
          <source>J. Log. Comput</source>
          . (
          <year>2020</year>
          ). https://doi.org/10.1093/logcom/exv061, http://dx.doi.org/10.1093/logcom/ exv061
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Amendola</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the application of answer set programming to the conference paper assignment problem</article-title>
          .
          <source>In: AI*IA. Lecture Notes in Computer Science</source>
          , vol.
          <volume>10037</volume>
          , pp.
          <volume>164</volume>
          {
          <fpage>178</fpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Balduccini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gelfond</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Watson</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nogueira</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The USA-Advisor: A case study in answer set planning</article-title>
          .
          <source>In: LPNMR. LNCS</source>
          , vol.
          <volume>2173</volume>
          , pp.
          <volume>439</volume>
          {
          <fpage>442</fpage>
          . Springer (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Brewka</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Truszczynski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Answer set programming at a glance</article-title>
          .
          <source>Communications of the ACM</source>
          <volume>54</volume>
          (
          <issue>12</issue>
          ),
          <volume>92</volume>
          {
          <fpage>103</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Buccafurri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rullo</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Enhancing Disjunctive Datalog by Constraints</article-title>
          .
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>12</volume>
          (
          <issue>5</issue>
          ),
          <volume>845</volume>
          {
          <fpage>860</fpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Calimeri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faber</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ianni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminski</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krennwallner</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Asp-core-2 input language format</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          <volume>20</volume>
          (
          <issue>2</issue>
          ),
          <volume>294</volume>
          {
          <fpage>309</fpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Calimeri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faber</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ianni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminski</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krennwallner</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>ASP-Core-2 Input Language Format (</article-title>
          <year>2013</year>
          ), https://www.mat.unical.it/aspcomp2013/files/ASP-CORE-
          <volume>2</volume>
          .01c.pdf
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Calimeri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Design and results of the Fifth Answer Set Programming Competition</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>231</volume>
          ,
          <fpage>151</fpage>
          {
          <fpage>181</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galata</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>M.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Porro</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>An ASP-based solution for operating room scheduling with beds management</article-title>
          .
          <source>In: RuleML+RR. Lecture Notes in Computer Science</source>
          , vol.
          <volume>11784</volume>
          , pp.
          <volume>67</volume>
          {
          <fpage>81</fpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galata</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Porro</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Operating room scheduling via answer set programming</article-title>
          .
          <source>In: AI*IA. LNCS</source>
          , vol.
          <volume>11298</volume>
          , pp.
          <volume>445</volume>
          {
          <fpage>459</fpage>
          . Springer (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gasteiger</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musitsch</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schekotihin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Combining answer set programming and domain heuristics for solving hard industrial problems (application paper)</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          <volume>16</volume>
          (
          <issue>5-6</issue>
          ),
          <volume>653</volume>
          {
          <fpage>669</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Allotment problem in travel industry: A solution based on ASP</article-title>
          .
          <source>In: RR. LNCS</source>
          , vol.
          <volume>9209</volume>
          , pp.
          <volume>77</volume>
          {
          <fpage>92</fpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Nurse scheduling via answer set programming</article-title>
          .
          <source>In: LPNMR. LNCS</source>
          , vol.
          <volume>10377</volume>
          , pp.
          <volume>301</volume>
          {
          <fpage>307</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Erdem</surname>
          </string-name>
          , E., Oztok, U.:
          <article-title>Generating explanations for biomedical queries</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          <volume>15</volume>
          (
          <issue>1</issue>
          ),
          <volume>35</volume>
          {
          <fpage>78</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Faber</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pfeifer</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
          </string-name>
          , N.:
          <article-title>Semantics and complexity of recursive aggregates in answer set programming</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>175</volume>
          (
          <issue>1</issue>
          ),
          <volume>278</volume>
          {
          <fpage>298</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Gavanelli</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nonato</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peano</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>An ASP approach for the valves positioning optimization in a water distribution system</article-title>
          .
          <source>Journal of Logic and Computation</source>
          <volume>25</volume>
          (
          <issue>6</issue>
          ),
          <volume>1351</volume>
          {
          <fpage>1369</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminski</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Kaufmann,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Ostrowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Schaub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Wanko</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Theory solving made easy with clingo 5. In: ICLP (Technical Communications)</article-title>
          .
          <source>OASICS</source>
          , vol.
          <volume>52</volume>
          , pp.
          <volume>2</volume>
          :
          <issue>1</issue>
          {2:
          <fpage>15</fpage>
          .
          <string-name>
            <surname>Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaufmann</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Con ict-driven answer set solving: From theory to practice</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>187</volume>
          ,
          <issue>52</issue>
          {
          <fpage>89</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Evaluation techniques and systems for answer set programming: a survey</article-title>
          . In: Lang,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (ed.)
          <source>IJCAI</source>
          . pp.
          <volume>5450</volume>
          {
          <fpage>5456</fpage>
          . ijcai.
          <source>org</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The sixth answer set programming competition</article-title>
          .
          <source>Journal of Arti cial Intelligence Research</source>
          <volume>60</volume>
          ,
          <volume>41</volume>
          {
          <fpage>95</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Giunchiglia</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tacchella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Dependent and independent variables in propositional satis ability</article-title>
          . In: Flesca,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Leone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Ianni</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <source>JELIA. Lecture Notes in Computer Science</source>
          , vol.
          <volume>2424</volume>
          , pp.
          <volume>296</volume>
          {
          <fpage>307</fpage>
          . Springer (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Giunchiglia</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tacchella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>(In)E ectiveness of look-ahead techniques in a modern SAT solver</article-title>
          . In: Rossi,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (ed.)
          <source>CP. Lecture Notes in Computer Science</source>
          , vol.
          <volume>2833</volume>
          , pp.
          <volume>842</volume>
          {
          <fpage>846</fpage>
          . Springer (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Hahn-Goldberg</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carter</surname>
            ,
            <given-names>M.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beck</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trudeau</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sousa</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beattie</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Dynamic optimization of chemotherapy outpatient scheduling with uncertainty</article-title>
          .
          <source>Health Care Manag Sci</source>
          <volume>17</volume>
          (
          <issue>4</issue>
          ),
          <volume>379</volume>
          {392 (Dec
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>Y.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryce</surname>
            ,
            <given-names>A.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Culbertson</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Connor</surname>
            ,
            <given-names>S.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Looker</surname>
            ,
            <given-names>S.A.e.a.</given-names>
          </string-name>
          :
          <article-title>Alternative Outpatient Chemotherapy Scheduling Method to Improve Patient Service Quality and Nurse Satisfaction</article-title>
          .
          <source>Journal of Oncology Practice (Dec</source>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Huggins</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Claudio</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perez</surname>
          </string-name>
          , E.:
          <article-title>Improving resource utilization in a cancer clinic: An optimization model</article-title>
          .
          <source>In: IIE Annual Conference and Expo</source>
          <year>2014</year>
          (01
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Treatment delays in oncology patients during COVID-19 pandemic: A perspective</article-title>
          .
          <source>J Glob Health</source>
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <volume>010367</volume>
          {010367 (Jun
          <year>2020</year>
          ), publisher: International Society of Global Health
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pulina</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A multi-engine approach to answer-set programming</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          <volume>14</volume>
          (
          <issue>6</issue>
          ),
          <volume>841</volume>
          {
          <fpage>868</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grasso</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manna</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lio</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iiritano</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
          </string-name>
          , N.:
          <article-title>Team-building with answer set programming in the Gioia-Tauro seaport</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          <volume>12</volume>
          (
          <issue>3</issue>
          ),
          <volume>361</volume>
          {
          <fpage>381</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Sevinc</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sanli</surname>
            ,
            <given-names>U.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goker</surname>
          </string-name>
          , E.:
          <article-title>Algorithms for scheduling of chemotherapy plans</article-title>
          .
          <source>Computers in Biology and Medicine</source>
          <volume>43</volume>
          (
          <issue>12</issue>
          ),
          <volume>2103</volume>
          {2109 (Dec
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Sud</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Broggio</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loveday</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torr</surname>
            ,
            <given-names>B.e.a.</given-names>
          </string-name>
          :
          <article-title>Collateral damage: the impact on outcomes from cancer surgery of the COVID-19 pandemic</article-title>
          .
          <source>Annals of Oncology</source>
          <volume>31</volume>
          (
          <issue>8</issue>
          ),
          <volume>1065</volume>
          {1074 (Aug
          <year>2020</year>
          ), publisher: Elsevier
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Turkcan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeng</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lawley</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Chemotherapy operations planning and scheduling</article-title>
          .
          <source>IIE Thansactions on Healthcare Systems Engineering</source>
          <volume>2</volume>
          (
          <issue>03</issue>
          <year>2010</year>
          ). https://doi.org/10.1080/19488300.
          <year>2012</year>
          .665155
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>