<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Task Assignment Problem for Safety-Critical Networks Considering Communication and Criticality</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Franz Wotawa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Julian Proenza</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manuel A. Barranco</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alberto Ballesteros</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Graz University of Technology (TU Graz), Institute of Software Technology</institution>
          ,
          <addr-line>Infeldgasse 16b/2, A-8010 Graz</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universitat de les Illes Balears</institution>
          ,
          <addr-line>Cra. de Valldemossa, km 7.5. 07122 Palma, Illes Balears</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>The task assignment problem is well-known and of great practical importance. In a previous work, we presented a corresponding answer set programming model and provided an initial experimental evaluation, demonstrating its practical applicability. However, this model falls short in several aspects, making it less than entirely suitable for safety-critical networks. In this paper, we extend the model providing means for representing critical tasks and communication. In particular, we introduce predicates for capturing communication among tasks and their limitations caused by networks, i.e., the available bandwidth. We also provide a preliminary experimental evaluation of the new model, demonstrating its feasibility for minor problem instances.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Configuring computing nodes</kwd>
        <kwd>ASP models for configuration</kwd>
        <kwd>Experimental analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Knowledge-based configuration, i.e., the composition of elements and parts to fulfill customers’ needs,
has garnered considerable attention. There has been a lot of research and applications reported in
scientific literature, ranging from service configuration [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], governance systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], product
configuration [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], considering hardware and software in the automotive domain [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], to green configuration in
scheduling [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], only to give the most recent examples. Modelling for configuration is often based on
logic, see, e.g., [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and most recently, answer set programming (ASP) for representing models used for
configuration and reasoning to obtain valid configuration has gained more attention, e.g., see [
        <xref ref-type="bibr" rid="ref3 ref7 ref8 ref9">7, 3, 8, 9</xref>
        ].
      </p>
      <p>
        In this short paper, we continue work on system configuration, focusing on configuring networks
comprising nodes for executing pre-defined tasks. As already mentioned in our previous paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ],
the underlying problem is related to scheduling and shift designs [11] and has also been considered
in previous work, e.g., [12]. Furthermore, the underlying problem can be seen as a variant of the
well-known knapsack problem [13, 14]. In contrast to our previous paper, we extend the underlying
model to bring it closer to the intended application area, which are highly reliable networks for hard
real-time systems, where faults occurring during operation need to be mitigated within a pre-defined
time see e.g., [15]. Mitigation depends on the type of fault, e.g., a fault in a network node, where tasks
need to be reallocated. Such a (re-) configuration needs to be fast, such that no computational real-time
requirements are violated. It is worth noting that machine learning has already been suggested [16] to
solve re-configuration during operation.
      </p>
      <p>In particular, we introduce concepts for handling communication among nodes and their limitations.
We simplify communication by considering only one bus where all nodes are connected to enable
allocated tasks to communicate with each other. The formal representation allows us to state which task
is communicating with another and also the costs of communication in terms of required bandwidth. In
addition, we also capture the challenge of critical tasks. A task is considered critical if its non-execution
would cause a safety-relevant efect. Such a task is replicated in a safety-critical network, and voting
mechanisms are applied to ensure that it is always executed. Examples of safety-critical tasks include a
brake controller that must always enable braking when requested by a driver of a vehicle.</p>
      <p>In addition to the extended model, we conduct a first limited experimental evaluation based on several
instances of task assignment problems. The evaluation utilizes the answer set programming solver
clingo [17] and answers the question whether the extended model is appropriate for being used in
the context of safety-critical networks, i.e., whether it is fast enough to assign tasks whenever required.</p>
      <p>We structure this paper as follows. First, we introduce the underlying configuration problem.
Afterward, we discuss the extensions of the model and present an answer set programming solution,
followed by the experimental evaluation. Finally, we conclude this short paper.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem description</title>
      <p>
        In this section, we define the task-to-node assignment problem, or short task assignment problem. We
start summarizing the problem and its related constraints from our previous paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. We assume 
computing nodes 1, . . . ,  and  tasks 1, . . . , . For each node , we know the maximum number
of tasks () it can hold and the available memory (). For each task  , we know its memory
consumption ( ). In the following, we use this knowledge to formulate several constraints that need
to be considered when assigning tasks to nodes. For the constraints, we assume a function ()
that returns a set of tasks that is assigned to a node .
      </p>
      <p>1. Memory limitations: The required memory by the task shall never exceed the available memory
of the node.</p>
      <p>⎛
∀ ∈ {1, . . . , } : ⎝</p>
      <p>⎞
∑︁
∈()
( ) ≤ ()⎠
2. Task limitations: The number of tasks assigned to a node shall never exceed its capabilities.</p>
      <p>∀ ∈ {1, . . . , } : (|()| ≤ ())
3. Global memory limitations: The required memory of all tasks shall never exceed the memory
provided by all nodes.</p>
      <p>∑︁ ( ) ≤
=1</p>
      <p>∑︁ ()
=1
 ≤</p>
      <p>∑︁ ()
=1
(1)
(2)
(3)
(4)
4. Global task limitations: The number of available tasks shall never exceed the sum of the number
of tasks of all nodes.</p>
      <p>A solution to the tasks assignment problem is an assignment of all tasks to nodes such that ∀ ∈
{1, . . . , } : ∃ ∈ {1, . . . , } :  ∈ (), there is no tasks assigned to two diferent nodes, i.e.,
∀,  ∈ {1, . . . , },  ̸=  : () ∩ ( ) = ∅, and all constraints are fulfilled. Such an
assignment is a valid one and may not exist due to limitations regarding available memory or the total
node capacity. We may also consider optimality criteria such as minimizing the number of nodes where
we assign tasks.</p>
      <p>
        In addition to this original task assignment problem, we now add further information and
constraints to represent the safety-critical network more appropriately. In particular, networks are for
communication. Communication channels impose further constraints due to resource limitations. For
example, there is only a maximum bandwidth available. If too many tasks are communicating at the
same time, the bandwidth might not be suficient. To simplify communication, we now only consider
Predicates used to specify nodes, tasks, and their corresponding knowledge from [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Predicate
node()
task()
memory(,)
tcapacity(,)</p>
      <p>maximum number of tasks  that
mcapacity(,)
maximum memory  provided
specifies that  represents a
node
a node  can hold
by node 
specifies that  is a task
memory  required by task 
a bus, where all messages have to pass through. Hence, there is a limitation of the bus in terms of
bandwidth  . We now need to specify the communication needs of each task. We assume that not
necessarily each tasks need to communicate with each other. Hence, we introduce a function  that
maps a potentially empty set of tasks to a given task, and a function  that maps a task  and any tasks
from () to a necessary bandwidth. However, this bandwidth is only required if the two tasks are
not assigned to the same node. If two tasks are in the same node, there is no need to use the bus for
communication. Obviously, the required total bandwidth needed for communication shall never exceed
the bandwidth of the bus  .</p>
      <p>∑︁</p>
      <p>∑︁
∈{1,...,}  ∈ ( )∧
̸ ∃ ∈ {1, . . . , } :
︂(
 ∈ ()∧ ︂)
 ∈ ()
( , ) ≤</p>
      <p>In addition to communication, we may also want to state that several tasks should never be allocated
to the same node. Critical tasks are examples. Such tasks may replicate each other in behavior and are
used to add fault tolerance. For simplification purposes, we only introduce a predicate  for any
two tasks stating that both are not allowed to be assigned to the same node:
∀ ∈ {1, . . . , } : ∀′ ∈ {1, . . . , },  ̸= ′ : ( , ′ ) →</p>
      <p≯ ∃ ∈ {1, . . . , } : (︀  ∈ () ∧ ′ ∈ ()︀)
The task assignment problem comprising the additional constraints 5 and 6 is the extended task
(5)
(6)
assignment problem.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Implementation</title>
      <p>
        After outlining the task assignment problem in the last section, we present a solution using answer set
programming where we rely on the syntax of the clingo solver [17], which is similar to the Prolog
language. For more information regarding answer set programming (ASP), we refer to introductory
literature, e.g., [18]. Note also that we do not discuss the ASP model in detail, except for the new
addition. The details are described in our previous paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In Table 1, we summarize the predicates
necessary to specify the original task assignment problem.
      </p>
      <p>To find solutions for this problem, we further introduced a predicate
select that takes a task T
as the first parameter and a node</p>
      <p>N as the second. The ASP solver selects tasks for nodes such that
no constraint is violated. To be self-contained, we summarize the clingo source code comprising
additional predicates for handling memory and task requirements:
% Generate a selection of a node for each task
{ select(T,N) : node(N) } = 1 :- task(T).
% Constraints
% No 1: Do not exceed the max. number of tasks
noTasksAssigned(M,N)
:</p>
      <p>M = #count { T : select(T,N)}, node(N).
:- noTasksAssigned(M,N), tcapacity(N,C), M&gt;C.
% No 2: Do not exceed the max. memory of a node
memRequired(M,N)
:</p>
      <p>M = #sum { NM,T :select(T,N), memory(T,NM)},
node(N).
:- memRequired(M,N), mcapacity(N,C), M &gt; C.
% Global constraints
totalCapacity(C) :- C=#sum {T,N :tcapacity(N,T)}.
totalNrTasks(C) :- C=#count {T :task(T) }.
totalMemReq(C) :- C=#sum {M,T :memory(T,M)}.
totalMem(C) :- C=#sum {N,CN :mcapacity(CN,N)}.
:- totalCapacity(C), totalNrTasks(TC), C &lt; TC.
:- totalMemReq(Ctask), totalMem(Cnode),</p>
      <p>Ctask &gt; Cnode.</p>
      <p>It is worth noting that this implementation corrects two shortcomings of the original one, which
may have led to some results that should not have been consistent solutions to the task assignment
problem. In the following, we now discuss the extension to this model to allow computing solutions for
the extended task assignment problem.</p>
      <p>Let us handle the communication between nodes first. For stating communication needs between
tasks, we introduce a predicate comReq∖3 that states communication needs between two tasks and the
required bandwidth. Hence, this predicate more or less captures the functions  and . For example,
comReq(t1,t2,10) states that there is a message transfer from task t1 to t2 requiring a bandwidth
of 10. What we need to formalize is the communication need and a constraint stating bandwidth
violation. For the former, we introduce a predicate comNeed∖3 that summarizes communication needs
between two tasks depending on their assignment to nodes. If they are at the same node, there is no
communication bandwidth required. Otherwise, it is stated as defined in comReq. The following rules
capture this behavior:
comNeed(T1,T2,0) :- select(T1,N), select(T2,N).
comNeed(T1,T2,B)
:select(T1,N1), select(T2,N2),</p>
      <p>N1!=N2, comReq(T1,T2,B).</p>
      <p>Based on comNeed, we can now specify the sum of the communication bandwidth required, which
we define as follows, utilizing the predicate comRequired for the whole bus:
comRequired(M)
:</p>
      <p>M=#sum {B,T1,T2 :comNeed(T1,T2,B),</p>
      <p>task(T1), task(T2)}.</p>
      <p>Finally, we state the communication constraint that the communication required is not allowed to
exceed the total bandwidth provided by the bus (which is 50 in this particular case):
comChannel(50).
:- comChannel(B), comRequired(M), M&gt;B.</p>
      <p>Runtime in seconds vs. number of nodes
101
100
s
d
n
o
c
e
s
n10− 1
i
e
m
i
t
10− 2
10− 3
5
10
15
20
25 30
nodes 
35
40
45
50</p>
      <p>For handling information about critical nodes, we introduce the distinct∖2 predicate to state that
two tasks should never be assigned to the same node, e.g., distinct(t1,t2) states that tasks t1 and
t2 has to be assigned at diferent node. Stating this constraint is straightforward:
:- select(T1,N), select(T2,N), distinct(T1,T2).</p>
      <p>It is worth noting that this model is still a simplified representation of the task assignment for
safety-critical networks. But it covers certain important aspects, which have not been considered before.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental evaluation</title>
      <p>
        Similar to the experimental evaluation in our previous paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], we want to investigate the runtime
behavior of the ASP solver clingo when using systems comprising a diferent number of tasks and
nodes. In particular, it is interesting to know how many nodes can be handled within a fixed time span
of, e.g., 0.01 or 0.1 seconds. In addition, we are interested in the efects of the additional constraints on
the runtime.
      </p>
      <p>
        Experimental setup: We used a Java program for generating model instances automatically, where
we ranged the number of nodes from 5, 10, 20 to 100 and the number of tasks randomly between the
number of nodes and its double. The capacity of each node was randomly set from 1 to 10. The memory
provided by each node was randomly chosen from 20, 40, 60,. . . , 200. The memory required by every
task was randomly set to 10, 20, or 30. Moreover, we randomly selected whether a task communicates
with another and also whether two tasks are distinct. We obtained two diferent test sets, each of size
110, considering two diferent probability settings. We conducted the experiments using an Apple
MacBook Pro, with an Apple M1 CPU comprising 8 cores and 16 GB of main memory, running under
macOS Sequoia Version 15.5. For computing solutions, we relied on clingo version 5.7.1 and applied
the standard setup. Note that this setup (with the exception of the underlying operating system) is the
same as used in our previous paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] to allow for a comparison.
      </p>
      <p>Experimental results: After generating the problem instances, we ran clingo to compute one
solution, i.e., we ran clingo using the prompt clingo –time-limit=10 –outf=2 where we set
a time limit of 10 seconds and obtained all results in JSON format. What we observed is that the
underlying new constraints impact the runtime. For the first test set, we exceeded the time limit 76
times. From the remaining instances, 29 were satisfiable and 5 were unsatisafible. For the second test,
the number of instances where we could not establish a solution drops to 67. The number of satisfiable
instances increases to 43, and no unsatisfiable instance was obtained.</p>
      <p>
        Figure 1 depicts the minimum, maximum, and average runtime for all satisfiable and unsatisfiable
runs for each category where data was available. In comparison with the results from our previous
paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], we see a big diference. Only smaller instances comprising less than 10 nodes can now
be configured in less than 0.1 seconds, which was 20 in our other publication. Hence, the additional
constraints have a substantial impact, which is also visible by the high number of instances that cannot
be analyzed within the 10-second boundary.
      </p>
      <p>We further compared the average runtime of all satisfiable and unsatisfiable instances with the one
obained considering only satisfiable instances. Table 2 summarizes the results where we only consider
nodes where enough instances for a comparison remain. We see that when considering unsatisfiable
instances the runtime increases on average, which is in line with results obtained in our previous paper.
Threats to validity: The presented results are from an initial experimental evaluation. The
experimental setup is limited, not considering the entire range of potential parameters. Due to the time
boundary set, there are many instances where satisfiability or unsatisfiability cannot be assigned. The
setup also does not allow for answering several interesting questions, like the responsibility of certain
constraints for the increased runtime.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>In this paper, we extend an existing model for the task assignment problem, considering constraints for
communication and also for tasks that should not run on the same computing node. We further present
the results of an initial experimental evaluation, which show that there is an impact on the overall
runtime, potentially limiting its practical use to minor instances. However, the current evaluation is
limited, and further experimental evaluations and a more in-depth analysis are necessary. In future
work, we aim to address the questions regarding the influence of specific constraints on the overall
runtime and develop a more sophisticated test set that considers a wider variety of parameters.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>The work was supported by the Austrian Science Fund (FWF) Cluster of Excellence Bilateral AI under
contract number 10.55776/COE12.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly in order to: Grammar and spelling
check, Paraphrase, and Reword. After using this tool, the authors reviewed and edited the content as
needed and take full responsibility for the publication’s content.
[11] M. Abseher, M. Gebser, N. Musliu, T. Schaub, S. Woltran, Shift design with answer set programming,
in: Logic Programming and Nonmonotonic Reasoning - 13th International Conference, LPNMR
2015, Lexington, KY, USA, September 27-30, 2015. Proceedings, volume 9345 of Lecture Notes in
Computer Science, Springer, 2015, pp. 32–39. URL: https://doi.org/10.1007/978-3-319-23264-5_4.
doi:10.1007/978-3-319-23264-5\_4.
[12] M. Nica, B. Peischl, F. Wotawa, A constraint model for automated deployment of automotive control
software, in: Proceedings of the Twentieth International Conference on Software Engineering &amp;
Knowledge Engineering (SEKE’2008), San Francisco, CA, USA, July 1-3, 2008, Knowledge Systems
Institute Graduate School, 2008, pp. 899–904.
[13] V. Cacchiani, M. Iori, A. Locatelli, S. Martello, Knapsack problems – an overview of recent advances.
part i: Single knapsack problems, Computers &amp; Operations Research 143 (2022) 105692. URL:
https://www.sciencedirect.com/science/article/pii/S0305054821003877. doi:https://doi.org/
10.1016/j.cor.2021.105692.
[14] V. Cacchiani, M. Iori, A. Locatelli, S. Martello, Knapsack problems – an overview of recent
advances. part ii: Multiple, multidimensional, and quadratic knapsack problems, Computers &amp;
Operations Research 143 (2022) 105693. URL: https://www.sciencedirect.com/science/article/pii/
S0305054821003889. doi:https://doi.org/10.1016/j.cor.2021.105693.
[15] A. Ballesteros, M. Barranco, J. Proenza, L. Almeida, F. Pozo, P. Palmer-Rodríguez, An infrastructure
for enabling dynamic fault tolerance in highly-reliable adaptive distributed embedded systems
based on switched ethernet, Sensors 22 (2022) 7099. URL: https://doi.org/10.3390/s22187099.
doi:10.3390/S22187099.
[16] R. Rotaeche, A. Ballesteros, J. Proenza, Speeding task allocation search for reconfigurations in
adaptive distributed embedded systems using deep reinforcement learning, Sensors 23 (2023) 548.</p>
      <p>URL: https://doi.org/10.3390/s23010548. doi:10.3390/S23010548.
[17] M. Gebser, R. Kaminski, B. Kaufmann, T. Schaub, Multi-shot asp solving with clingo, Theory and</p>
      <p>Practice of Logic Programming 19 (2019) 27–82. doi:10.1017/S1471068418000054.
[18] T. Eiter, G. Ianni, T. Krennwallner, Answer set programming: A primer, in: Reasoning Web.</p>
      <p>Semantic Technologies for Information Systems: 5th International Summer School 2009,
BrixenBressanone, Italy, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009, pp. 40–110. URL: https:
//doi.org/10.1007/978-3-642-03754-2_2. doi:10.1007/978-3-642-03754-2\_2.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Strøm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Münsberg</surname>
          </string-name>
          , L. Hvam,
          <article-title>Identifying potential applications of service configuration systems in a logistics company</article-title>
          ,
          <source>in: Proc. of the 25th Intern. Workshop on Configuration (Conf WS</source>
          <year>2023</year>
          ), Málaga, Spain, September 6-
          <issue>7</issue>
          ,
          <year>2023</year>
          , volume
          <volume>3509</volume>
          <source>of CEUR Workshop Proceedings</source>
          , CEURWS.org,
          <year>2023</year>
          , pp.
          <fpage>60</fpage>
          -
          <lpage>66</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3509</volume>
          /paper9.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Muñoz-Hermoso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Benavides</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. J. D.</given-names>
            <surname>Mayo</surname>
          </string-name>
          <article-title>, Multi-level configuration in smart governance systems</article-title>
          ,
          <source>in: Proc. of the 25th Intern. Workshop on Configuration (Conf WS</source>
          <year>2023</year>
          ), Málaga, Spain, September 6-
          <issue>7</issue>
          ,
          <year>2023</year>
          , volume
          <volume>3509</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>74</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3509</volume>
          /paper10.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Comploi-Taupe</surname>
          </string-name>
          , G. Friedrich, T. Niestroj,
          <article-title>Dynamic aggregates in expressive ASP heuristics for configuration problems</article-title>
          ,
          <source>in: Proc. of the 25th Intern. Workshop on Configuration (Conf WS</source>
          <year>2023</year>
          ), Málaga, Spain, September 6-
          <issue>7</issue>
          ,
          <year>2023</year>
          , volume
          <volume>3509</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>84</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3509</volume>
          /paper11.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Jost</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sinz</surname>
          </string-name>
          ,
          <article-title>Challenges in automotive hardware-software co-configuration</article-title>
          ,
          <source>in: Proc. of the 26th Intern. Workshop on Configuration (Conf WS</source>
          <year>2024</year>
          ), Girona, Spain, September 2-
          <issue>3</issue>
          ,
          <year>2024</year>
          , volume
          <volume>3812</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>20</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3812</volume>
          /paper2.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Moya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pérez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Salido</surname>
          </string-name>
          ,
          <article-title>Developing an algorithm selector for green configuration in scheduling problems</article-title>
          ,
          <source>in: Proc. of the 26th Intern. Workshop on Configuration (Conf WS</source>
          <year>2024</year>
          ), Girona, Spain, September 2-
          <issue>3</issue>
          ,
          <year>2024</year>
          , volume
          <volume>3812</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>49</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3812</volume>
          /paper6.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Friedrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jannach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stumptner</surname>
          </string-name>
          ,
          <article-title>Consistency based diagnosis of configuration knowledge-bases</article-title>
          ,
          <source>in: Proceedings of the Tenth International Workshop on Principles of Diagnosis</source>
          , Loch Awe,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Mishra</surname>
          </string-name>
          ,
          <article-title>Product configuration in answer set programming</article-title>
          ,
          <source>Electronic Proceedings in Theoretical Computer Science</source>
          <volume>345</volume>
          (
          <year>2021</year>
          )
          <fpage>296</fpage>
          -
          <lpage>304</lpage>
          . URL: http://dx.doi.org/10.4204/EPTCS.345.46. doi:
          <volume>10</volume>
          .4204/ eptcs.345.46.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.</given-names>
            <surname>Rühling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Schaub</surname>
          </string-name>
          , T. Stolzmann,
          <article-title>Towards a formalization of configuration problems for asp-based reasoning: Preliminary report</article-title>
          ,
          <source>in: Proc. of the 25th Intern. Workshop on Configuration (Conf WS</source>
          <year>2023</year>
          ), Málaga, Spain, September 6-
          <issue>7</issue>
          ,
          <year>2023</year>
          , volume
          <volume>3509</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>94</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3509</volume>
          /paper12.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Comploi-Taupe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Falkner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hahn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Schaub</surname>
          </string-name>
          , G. Schenner,
          <article-title>Interactive configuration with ASP multi-shot solving</article-title>
          ,
          <source>in: Proc. of the 25th Intern. Workshop on Configuration (Conf WS</source>
          <year>2023</year>
          ), Málaga, Spain, September 6-
          <issue>7</issue>
          ,
          <year>2023</year>
          , volume
          <volume>3509</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>95</fpage>
          -
          <lpage>103</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3509</volume>
          /paper13.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Wotawa</surname>
          </string-name>
          ,
          <article-title>Using answer set programming for assigning tasks to computing nodes</article-title>
          ,
          <source>in: Proc. of the 26th Intern. Workshop on Configuration (Conf WS</source>
          <year>2024</year>
          ), Girona, Spain, September 2-
          <issue>3</issue>
          ,
          <year>2024</year>
          , volume
          <volume>3812</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>64</fpage>
          -
          <lpage>67</lpage>
          . URL: https: //ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3812</volume>
          /paper9.pdf.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>