Details

Trends in Constraint Programming


Trends in Constraint Programming


, Band 123 1. Aufl.

von: Frédéric Benhamou, Narendra Jussien, Barry A. O'Sullivan

215,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 05.01.2010
ISBN/EAN: 9780470394946
Sprache: englisch
Anzahl Seiten: 408

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

This title brings together the best papers on a range of topics raised at the annual International Conference on Principles and Practice of Constraint Programming. This conference provides papers and workshops which produce new insights, concepts and results which can then be used by those involved in this area to develop their own work.
<p><b>Introduction 17</b><br /> <i>Frédéric Benhamou, Narendra Jussien, Barry O’Sullivan</i></p> <p><b>Part I. The Past, Present and Future of Constraint Programming 23</b><br /> <i>Frédéric Benhamou, Narendra Jussien , Barry O’Sullivan</i></p> <p><b>Chapter 1. Constraint Programming as Declarative Algorithmics 25</b><br /> <i>Pascal Van Hentenryck</i></p> <p>1.1. The CHIP project 26</p> <p>1.2. The Numerica project 32</p> <p>1.3. The OPL project 34</p> <p>1.4. The Comet project 35</p> <p>1.5. The future of constraint programming 38</p> <p><b>Chapter 2. Constraint Programming Tools 41</b><br /> <i>Laurent Michel, Christian Schulte, Pascal Van Hentenryck</i></p> <p>2.1. Introduction 41</p> <p>2.2. Invited talks 43</p> <p>2.2.1. The development of an industrial CP tool (Jean-François Puget) 43</p> <p>2.2.2. System design: taking informed decisions (Christian Schulte) 45</p> <p>2.3. System presentations 48</p> <p>2.3.1. ECLiPSe 48</p> <p>2.3.2. SICStus FD 48</p> <p>2.3.3. G12 49</p> <p>2.3.4. DiSolver 49</p> <p>2.3.5. MINION 50</p> <p>2.3.6. Choco 50</p> <p>2.3.7. Gecode 51</p> <p>2.3.8. Comet 52</p> <p>2.3.9. JaCoP 53</p> <p>2.3.10. Borderwijk 54</p> <p>2.4. Panels 54</p> <p>2.5. Conclusion 56</p> <p>2.6. References 57</p> <p><b>Chapter 3. The Next 10 Years of Constraint Programming 59</b><br /> <i>Lucas Bordeaux, Barry O’Sullivan, Pascal Van Hentenryck</i></p> <p>3.1. Pedro Barahona 61</p> <p>3.2. Christian Bessiere 63</p> <p>3.3. Peter Jeavons 64</p> <p>3.4. Pedro Meseguer 66</p> <p>3.5. Gilles Pesant 68</p> <p>3.6. Francesca Rossi 70</p> <p>3.7. Thomas Schiex 72</p> <p>3.8. Christian Schulte 74</p> <p>3.9. Meinolf Sellmann 75</p> <p>3.10. Mark Wallace 77</p> <p>3.11. Toby Walsh 79</p> <p>3.12. Roland Yap 80</p> <p>3.13. References 81</p> <p><b>Chapter 4. Constraint Propagation and Implementation 83</b><br /> <i>Marc van Dongen, Christophe Lecoutre</i></p> <p>4.1. Filtering algorithms for precedence and dependency constraints (by Roman Barták and Ondøej Èepek) 84</p> <p>4.1.1. Problem description and related works 84</p> <p>4.1.2. Filtering rules for precedence and dependency constraints 85</p> <p>4.1.3. Summary 87</p> <p>4.2. A study of residual supports in arc consistency (by Christophe Lecoutre and Fred Hemery) 87</p> <p>4.3. Maintaining singleton arc consistency (by Christophe Lecoutre and Patrick Prosser) 89</p> <p>4.3.1. Mixed consistency 90</p> <p>4.3.2. Checking existential-SAC 91</p> <p>4.3.3. Conclusion 92</p> <p>4.4. Probabilistic singleton arc consistency (by Deepak Mehta and Marc van Dongen) 93</p> <p>4.5. Simplification and extension of the SPREAD constraint (by Pierre Schaus, Yves Deville, Pierre Dupont and Jean-Charles Régin) 95</p> <p>4.5.1. Filtering of π 96</p> <p>4.5.2. Filtering of X 97</p> <p>4.5.3. Conclusion 99</p> <p>4.6. A new filtering algorithm for the graph isomorphism problem (by Sébastien Sorlin and Christine Solnon) 99</p> <p>4.6.1. A global constraint for the graph isomorphism problem 99</p> <p>4.6.2. ILL-consistency and ILL-filtering 100</p> <p>4.6.3. Experimental results 102</p> <p>4.7. References 103</p> <p><b>Chapter 5. On the First SAT/CP Integration Workshop 105</b><br /> <i>Youssef Hamadi, Lucas Bordeaux</i></p> <p>5.1. The technical program 106</p> <p>5.1.1. The invited talk 106</p> <p>5.1.2. Contributions related to SMT and solver integration 106</p> <p>5.1.3. Contributions related to the use of SAT techniques to improve CSP/CP solvers 107</p> <p>5.1.4. Other contributions 108</p> <p>5.2. The panel session 109</p> <p>5.2.1. Are SAT and CP different or similar? 109</p> <p>5.2.2. Why has SAT succeeded in reducing the tuning issue? 111</p> <p>5.2.3. How long can the current generation of SAT solvers evolve? 113</p> <p>5.2.4. Were performance issues correctly addressed by CP? 115</p> <p>5.2.5. Was CP too ambitious? 118</p> <p>5.2.6. Do we still need CP? 119</p> <p>5.3. Summary, future directions and conclusion 121</p> <p>5.4. References 122</p> <p><b>Chapter 6. Constraint-Based Methods for Bioinformatics 125</b><br /> <i>Alessandro Dal Palù, Agostino Dovier, Franæois Fages, Sebastian Will</i></p> <p>6.1. On using temporal logic with constraints to express biological properties of cell processes (by François Fages) 126</p> <p>6.2. Modeling biological systems in stochastic concurrent constraint programming (by Luca Bortolussi and Alberto Policriti) 129</p> <p>6.3. Chemera: constraints in protein structural problems (by Pedro Barahona and Ludwig Krippahl) 132</p> <p>6.4. Exploiting model checking in constraint-based approaches to the protein folding problem (by Elisabetta De Maria, Agostino Dovier, Angelo Montanari and Carla Piazza) 134</p> <p>6.5. Global constraints for discrete lattices (by Alessandro Dal Palù, Agostino Dovier and Enrico Pontelli) 136</p> <p>6.6. Counting protein structures by DFS with dynamic decomposition (by Sebastian Will and Martin Mann) 138</p> <p>6.7. Suffix array and weighted CSPs (by Matthias Zytnicki, Christine Gaspin and Thomas Schiex) 141</p> <p>6.8. Supertree construction with constraint programming: recent progress and new challenges (by Patrick Prosser) 143</p> <p>6.9. References 145</p> <p><b>Part II. Constraint Modeling and Reformulation 147</b><br /> <i>Ian Miguel, Steven Prestwich</i></p> <p><b>Chapter 7. Improved Models for Graceful Graphs 151</b><br /> <i>Jean-François Puget, Barbara Smith</i></p> <p>7.1. Introduction 151</p> <p>7.2. A direct model 152</p> <p>7.3. The edge-label model 154</p> <p>7.4. A combined model 156</p> <p>7.5. Experimental results 157</p> <p>7.6. Discussion 160</p> <p>7.7. References 161</p> <p><b>Chapter 8. The Automatic Generation of Redundant Representations and Channeling Constraints 163</b><br /> <i>Bernadette Martínez-Hernández, Alan M. Frisch</i></p> <p>8.1. Introduction 163</p> <p>8.2. Representations 167</p> <p>8.3. Alternative representations and channels 168</p> <p>8.3.1. Alternative representations 168</p> <p>8.3.2. Constraint-wise quasi-representations and channeling constraints 169</p> <p>8.4. Refinement 174</p> <p>8.5. Systematic generation of channeling constraints 177</p> <p>8.6. Producing the best alternative for channeling 179</p> <p>8.7. Conclusions and future work 180</p> <p>8.8. References 180</p> <p><b>Part III. Symmetry in Constraint Satisfaction Problems 183</b><br /> <i>Alastair Donaldson, Peter Gregory, Karen Petrie</i></p> <p><b>Chapter 9. GAPLex: Generalized Static Symmetry Breaking 187</b><br /> <i>Chris Jefferson, Tom Kelsey, Steve Linton, Karen Petrie</i></p> <p>9.1. Background and introduction 188</p> <p>9.1.1. Group theory for CSPs 190</p> <p>9.1.2. Using GAP to break CSP symmetries 191</p> <p>9.2. GAPLex 192</p> <p>9.2.1. Motivation and rationale 192</p> <p>9.2.2. Motivating example 193</p> <p>9.2.3. The GAPLex algorithms 193</p> <p>9.3. Empirical evaluation 196</p> <p>9.3.1. Combining GAPLex with incomplete static SB methods 197</p> <p>9.3.2. Combining GAPLex with Puget’s all-different constraints 198</p> <p>9.4. Conclusions and future work 199</p> <p>9.5. References 199</p> <p><b>Chapter 10. Symmetry Breaking in Subgraph Pattern Matching 203</b><br /> <i>Stéphane Zampelli, Yves Deville, Pierre Dupont</i></p> <p>10.1. Background and definitions 205</p> <p>10.2. Variable symmetries 207</p> <p>10.2.1. Detection 207</p> <p>10.2.2. Breaking 207</p> <p>10.3. Value symmetries 208</p> <p>10.3.1. Detection 208</p> <p>10.3.2. Breaking 208</p> <p>10.4. Experimental results 209</p> <p>10.5. Local value symmetries 211</p> <p>10.5.1. Dynamic target graph 212</p> <p>10.5.2. Partial dynamic graphs 214</p> <p>10.6. Conclusion 215</p> <p>10.7. References 216</p> <p><b>Part IV. Interval Analysis, Constraint Propagation and Applications 219</b><br /> <i>Christophe Jermann, Yahia Lebbah, Djamila Sam-Haroud</i></p> <p><b>Chapter 11. Modeling and Solving of a Radio Antenna Deployment Sup-port Application 223</b><br /> <i>Michael Heusch</i></p> <p>11.1. Two simple models for the application 224</p> <p>11.1.1. A first finite domain model 224</p> <p>11.1.2. Shifting the model to mixed domains 225</p> <p>11.1.3. Description of the search algorithm 225</p> <p>11.1.4. Analysis of the performance on progressive deployment problems 226</p> <p>11.2. Introducing the distn constraint 227</p> <p>11.3. Modeling the application with the distn constraint 228</p> <p>11.3.1. Revised model of the application 228</p> <p>11.3.2. Numerical results when solving the LocRLFAP with distn 230</p> <p>11.3.3. Qualitative analysis of the results 231</p> <p>11.4. Conclusion 231</p> <p>11.5. References 232</p> <p><b>Chapter 12. Guaranteed Numerical Injectivity Test via Interval Analysis 233</b><br /> <i>Sébastien Lagrange, Nicolas Delanoue, Luc Jaulin</i></p> <p>12.1. Interval analysis 235</p> <p>12.2. Injectivity 236</p> <p>12.2.1. Partial injectivity 236</p> <p>12.2.2. Partial injectivity condition 238</p> <p>12.3. ITVIA algorithm 241</p> <p>12.4. Examples 242</p> <p>12.4.1. Spiral function 243</p> <p>12.4.2. Ribbon function 243</p> <p>12.5. Conclusion 244</p> <p>12.6. References 244</p> <p><b>Chapter 13. An Interval-based Approximation Method for Discrete Changes in Hybrid cc 245</b><br /> <i>Daisuke Ishii, Kazunori Ueda, Hiroshi Hosobe</i></p> <p>13.1. An overview of Hybrid cc 246</p> <p>13.1.1. The Hybrid cc language 246</p> <p>13.1.2. Implementation of Hybrid cc 247</p> <p>13.2. The objective of the chapter 248</p> <p>13.3. Background of interval arithmetic 248</p> <p>13.3.1. Basic notions of interval arithmetic 249</p> <p>13.3.2. ODE solving based on interval arithmetic 249</p> <p>13.4. The proposed method 249</p> <p>13.4.1. Assumptions on the proposed method 249</p> <p>13.4.2. Trace algorithm 250</p> <p>13.4.3. PruneAndMerge algorithm 251</p> <p>13.5. Experimental results 252</p> <p>13.6. Related work 253</p> <p>13.7. Conclusion 254</p> <p>13.8. References 254</p> <p><b>Part V. Local Search Techniques in Constraint Satisfaction 257</b><br /> <i>Andrea Roli, Yehuda Naveh</i></p> <p><b>Chapter 14. Combining Adaptive Noise and Look-Ahead in Local Search for SAT 261</b><br /> <i>Chu Min Li, Wanxia Wei, Harry Zhang</i></p> <p>14.1. Implementation of the adaptive noise mechanism in G2WSAT 262</p> <p>14.2. Look-Ahead for promising decreasing variables 262</p> <p>14.2.1. Promising score of a variable 262</p> <p>14.2.2. Integrating limited look-ahead in adaptG2WSAT 263</p> <p>14.3. Evaluation 264</p> <p>14.4. Conclusion 266</p> <p>14.5. References 266</p> <p><b>Chapter 15. Finding Large Cliques using SAT Local Search 269</b><br /> <i>Steven Prestwich</i></p> <p>15.1. SAT-encoding the clique problem 270</p> <p>15.2. Notes on the bitwise at-most-one encoding 271</p> <p>15.3. Experiments 272</p> <p>15.4. Conclusion 273</p> <p>15.5. References 274</p> <p><b>Chapter 16. Multi-Point Constructive Search for Constraint Satisfac-tion: An Overview 275</b><br /> <i>Ivan Heckman, J. Christopher Beck</i></p> <p>16.1. Background 276</p> <p>16.2. Empirical study 277</p> <p>16.3. Conclusion 279</p> <p>16.4. References 280</p> <p><b>Chapter 17. Boosting SLS Using Resolution 283</b><br /> <i>Anbulagan, Duc Nghia Pham, John Slaney, Abdul Sattar</i></p> <p>17.1. SLS solvers 284</p> <p>17.2. Preprocessors 285</p> <p>17.3. Empirical evaluation 286</p> <p>17.3.1. Clause weighting versus random walk 286</p> <p>17.3.2. Matching preprocessors to solver-problem pairs 287</p> <p>17.3.3. Multiple preprocessing and preprocessor ordering 287</p> <p>17.4. Conclusion 288</p> <p>17.5. References 288</p> <p><b>Chapter 18. Growing COMET 291</b><br /> <i>Pascal Van Hentenryck, Laurent Michel</i></p> <p>18.1. Constraint-based local search 291</p> <p>18.2. COMET 292</p> <p>18.3. Modeling 293</p> <p>18.4. Search 295</p> <p>18.5. References 296</p> <p><b>Part VI. Preferences and Soft Constraints 299</b><br /> <i>Thomas Schiex</i></p> <p><b>Chapter 19. The Logic Behind Weighted CSP 303</b><br /> <i>Carlos Ansótegui, María L. Bonet, Jordi Levy, Felip Manyà</i></p> <p>19.1. Preliminaries 304</p> <p>19.2. The inference rule – soundness and completeness 307</p> <p>19.3. Global consistency in WCSP 310</p> <p>19.4. Local consistency in WCSP 311</p> <p>19.5. Conclusions 314</p> <p>19.6. References 316</p> <p><b>Chapter 20. Dynamic Heuristics for Branch and Bound on Tree-Decomposition of Weighted CSPs 317</b><br /> <i>Philippe Jégou, Samba Ndojh Ndiaye, Cyril Terrioux</i></p> <p>20.1. Introduction 317</p> <p>20.2. Preliminaries 319</p> <p>20.3. Dynamic orders in O(exp(w + 1)) 322</p> <p>20.4. Bounded extensions of dynamic orders 324</p> <p>20.5. Heuristics 325</p> <p>20.5.1. Cluster orders 325</p> <p>20.5.2. Variable orders 327</p> <p>20.5.3. Heuristics for grouping variables in Classes 4 and 5 327</p> <p>20.6. Experimental study 328</p> <p>20.7. Discussion and conclusion 330</p> <p>20.8. References 331</p> <p><b>Part VII. Constraints in Software Testing, Verification and Analysis 333</b><br /> <i>Benjamin Blanc, Arnaud Gotlieb, Claude Michel</i></p> <p><b>Chapter 21. Extending a CP Solver with Congruences as Domains for Program Verification 337</b><br /> <i>Michel Leconte, Bruno Berstel</i></p> <p>21.1. Related work 339</p> <p>21.2. Congruences as domains 339</p> <p>21.3. Propagation of congruences as domains 340</p> <p>21.4. Cooperation of congruences and intervals 342</p> <p>21.5. Conclusion 342</p> <p>21.6. References 343</p> <p><b>Chapter 22. Generating Random Values Using Binary Decision Dia-grams and Convex Polyhedra 345</b><br /> <i>Erwan Jahier, Pascal Raymond</i></p> <p>22.1. BDD and convex polyhedra 346</p> <p>22.2. The resolution algorithm 346</p> <p>22.3. Choosing solutions 348</p> <p>22.4. Available tools 349</p> <p>22.5. Related work 350</p> <p>22.6. Conclusion 351</p> <p>22.7. References 351</p> <p><b>Chapter 23. A Symbolic Model for Hash-Collision Attacks 353</b><br /> <i>Yannick Chevalier, Mounira Kourjieh</i></p> <p>23.1. Terms and subterms 354</p> <p>23.2. Analysis of reachability properties of cryptographic protocols 356</p> <p>23.3. Model of a collision-aware intruder 357</p> <p>23.3.1. Intruder on words 357</p> <p>23.3.2. Intruder on words with free function symbols 358</p> <p>23.3.3. Hash-colliding intruder 358</p> <p>23.4. Conclusion 359</p> <p>23.5. References 359</p> <p><b>Chapter 24. Strategy for Flaw Detection Based on a Service-driven Model for Group Protocols 361</b><br /> <i>Najah Chridi, Laurent Vigneron</i></p> <p>24.1. Protocol modeling and attack search 362</p> <p>24.1.1. Input of the method 362</p> <p>24.1.2. Searching for attacks in group protocols 363</p> <p>24.1.3. Intruder knowledge management 365</p> <p>24.1.4. Constraint management 366</p> <p>24.2. Verification results 366</p> <p>24.3. Summary and future work 367</p> <p>24.4. References 368</p> <p><b>Part VIII. Constraint Programming for Graphical Applications 369</b><br /> <i>Marc Christie, Hiroshi Hosobe and Kim Marriott</i></p> <p><b>Chapter 25. Trends and Issues in using Constraint Programming for Graphical Applications 371</b><br /> <i>Marc Christie, Hiroshi Hosobe and Kim Marriott</i></p> <p>25.1. More powerful constraint-solving techniques 373</p> <p>25.1.1. Mixture of discrete and continuous constraints 373</p> <p>25.1.2. Mixture of linear, polynomial, geometric and non-linear constraints 373</p> <p>25.1.3. Managing user interaction 374</p> <p>25.1.4. Managing preferences 374</p> <p>25.1.5. Generic techniques 375</p> <p>25.2. Better modeling and understanding of constraint systems by the end-user 376</p> <p>25.2.1. Model specification 376</p> <p>25.2.2. Extensibility 377</p> <p>25.2.3. Constraint representation 377</p> <p>25.2.4. Understanding constraint interaction during solving 377</p> <p>25.3. Bridging the gap between the solver and the application semantics 378</p> <p>25.3.1. High-level modeling 379</p> <p>25.3.2. Support for interaction 379</p> <p>25.4. Conclusion 379</p> <p>25.5. References 380</p> <p><b>Chapter 26. A Constraint Satisfaction Framework for Visual Problem Solving 383</b><br /> <i>Bonny Banerjee, Balakrishnan Chandrasekaran</i></p> <p>26.1. The framework 384</p> <p>26.1.1. A language for expressing visual problems 384</p> <p>26.1.2. A visual problem solver 388</p> <p>26.2. Applications 390</p> <p>26.3. Conclusion 393</p> <p>26.4. References 393</p> <p><b>Chapter 27. Computer Graphics and Constraint Solving: An Applica-tion to Virtual Camera Control 395</b><br /> <i>Jean-Marie Normand</i></p> <p>27.1. Overview 397</p> <p>27.2. A semantic space partitioning approach 398</p> <p>27.2.1. Projection property 398</p> <p>27.2.2. Orientation property 399</p> <p>27.2.3. Occlusion property 399</p> <p>27.3. Numerical solving stage 400</p> <p>27.4. Exploitation of semantic volumes 401</p> <p>27.4.1. Making requests on the volumes 401</p> <p>27.4.2. Making requests on the scene 401</p> <p>27.5. Results 401</p> <p>27.6. Discussion 403</p> <p>27.7. References 404</p> <p><i>Index 405</i></p>
<b>Frédéric Benhamou</b> is a Full Professor in the Department of Computer Science and is Head of the Computer Science Research Laboratory at Nantes Atlantic University, France.<br />  <br /> <b>Narendra Jussien</b> is the President of the French Association for Constraint Programming (AFPC) and is an Assistant Professor in the Department of Computer Science at the Ecole des Mines de Nantes, France. <p><b>Barry O’Sullivan</b> is the Associate Director of the Cork Constraint Computation Centre and is a Senior Lecturer in the Department of Computer Science at University College Cork, Ireland.<br /> </p>
This title brings together the best papers on a range of topics raised at the annual International Conference on Principles and Practice of Constraint Programming. This conference provides papers and workshops which produce new insights, concepts and results which can then be used by those involved in this area to develop their own work.

Diese Produkte könnten Sie auch interessieren:

The CISO Evolution
The CISO Evolution
von: Matthew K. Sharp, Kyriakos Lambros
PDF ebook
33,99 €
Data Mining and Machine Learning Applications
Data Mining and Machine Learning Applications
von: Rohit Raja, Kapil Kumar Nagwanshi, Sandeep Kumar, K. Ramya Laxmi
EPUB ebook
190,99 €