Computing Horn Strong Backdoor Sets Thanks to Local Search | IEEE Conference Publication | IEEE Xplore