咨询与建议

限定检索结果

文献类型

  • 956 篇 会议
  • 51 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 1,025 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 853 篇 工学
    • 833 篇 计算机科学与技术...
    • 495 篇 软件工程
    • 41 篇 信息与通信工程
    • 27 篇 电气工程
    • 17 篇 控制科学与工程
    • 8 篇 机械工程
    • 7 篇 土木工程
    • 6 篇 建筑学
    • 6 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 农业工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 交通运输工程
    • 4 篇 生物工程
    • 3 篇 冶金工程
    • 3 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 航空宇航科学与技...
  • 530 篇 理学
    • 422 篇 数学
    • 274 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 7 篇 生物学
    • 6 篇 化学
  • 62 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 34 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 7 篇 法学
    • 7 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 农学
    • 5 篇 作物学
  • 1 篇 教育学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 198 篇 constraint theor...
  • 163 篇 constraint satis...
  • 62 篇 constraint progr...
  • 26 篇 constrained opti...
  • 25 篇 computer program...
  • 23 篇 integer programm...
  • 21 篇 answer set progr...
  • 15 篇 logic programmin...
  • 15 篇 artificial intel...
  • 15 篇 scheduling
  • 14 篇 mathematical log...
  • 14 篇 dynamic programm...
  • 13 篇 problem solving
  • 12 篇 linear programmi...
  • 11 篇 global constrain...
  • 11 篇 programming lang...
  • 11 篇 logics and meani...
  • 10 篇 modeling languag...
  • 9 篇 constraint satis...
  • 9 篇 combinatorial op...

机构

  • 18 篇 natl univ irelan...
  • 18 篇 brown univ provi...
  • 14 篇 univ connecticut...
  • 14 篇 cork constraint ...
  • 10 篇 cork constraint ...
  • 8 篇 univ oxford comp...
  • 7 篇 natl univ irelan...
  • 7 篇 natl univ irelan...
  • 7 篇 department of me...
  • 6 篇 nicta nsw
  • 6 篇 natl univ singap...
  • 6 篇 cork constraint ...
  • 6 篇 chinese univ hon...
  • 5 篇 161 rue ada mont...
  • 5 篇 cornell univ dep...
  • 5 篇 univ coll cork d...
  • 5 篇 univ st andrews ...
  • 5 篇 ben gurion univ ...
  • 5 篇 department of co...
  • 5 篇 univ coll cork c...

作者

  • 31 篇 stuckey peter j.
  • 28 篇 o'sullivan barry
  • 22 篇 van hentenryck p...
  • 20 篇 freuder eugene c...
  • 17 篇 walsh toby
  • 17 篇 quimper claude-g...
  • 15 篇 miguel ian
  • 15 篇 michel laurent
  • 15 篇 bessiere christi...
  • 14 篇 beldiceanu nicol...
  • 14 篇 schaus pierre
  • 14 篇 schulte christia...
  • 12 篇 smith barbara m.
  • 12 篇 hebrard emmanuel
  • 12 篇 pesant gilles
  • 11 篇 régin jean-charl...
  • 11 篇 beck j. christop...
  • 10 篇 hnich brahim
  • 10 篇 gent ian p.
  • 10 篇 rueher michel

语言

  • 1,023 篇 英文
  • 3 篇 中文
检索条件"任意字段=10th International Conference on the Principles and Practice of Constraint Programming"
1026 条 记 录,以下是341-350 订阅
排序:
principles and practice of constraint programming  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: thomas Schiex Simon de Givry
this book constitutes the proceedings of the 25th international conference on principles and practice of constraint programming, CP 2019, held in Stamford, CT, USA, France, in September/October 2019.
来源: 评论
principles of Declarative programming  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
this book constitutes the refereed proceedings of the 10th international Symposium on programming Languages, Implementations, Logics, and Programs, PLILP'98, held jointly with the 6th international conference on A... 详细信息
来源: 评论
On Backdoors to Tractable constraint Languages
On Backdoors to Tractable Constraint Languages
收藏 引用
20th international conference on the principles and practice of constraint programming (CP)
作者: Carbonnel, Clement Cooper, Martin C. Hebrard, Emmanuel CNRS LAAS 7 Ave Colonel Roche F-31400 Toulouse France Univ Toulouse 3 Inst Rech Informat Toulouse F-31062 Toulouse France Univ Toulouse 1 INP Toulouse F-31400 Toulouse France
In the context of CSPs, a strong backdoor is a subset of variables such that every complete assignment yields a residual instance guaranteed to have a specified property. If the property allows efficient solving, then... 详细信息
来源: 评论
Integrating ILP and SMT for Shortwave Radio Broadcast Resource Allocation and Frequency Assignment  23rd
Integrating ILP and SMT for Shortwave Radio Broadcast Resour...
收藏 引用
33rd international conference on Logic programming / 23rd international conference on principles and practice of constraint programming (CP) / 20th international conference on theory and Applications of Satisfiability Testing (SAT)
作者: Pan, Linjie Jin, Jiwei Gao, Xin Sun, Wei Ma, Feifei Yin, Minghao Zhang, Jian Chinese Acad Sci Inst Software State Key Lab Comp Sci Beijing Peoples R China Northeast Normal Univ Coll Comp Sci Changchun Peoples R China Chinese Acad Sci Lab Parallel Software & Computat Sci Inst Software Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China State Adm Press Publicat Radio Film & Televis Peo Adm Bur Radio Stn Beijing Peoples R China Shan Dong Jiaotong Univ Jinan Peoples R China
Shortwave radio broadcasting is the principal way for broadcasting of voice in many countries. the broadcasting quality of a radio program is determined not only by the parameters of the transmission device, but also ... 详细信息
来源: 评论
Revisiting the sequence constraint
Revisiting the sequence constraint
收藏 引用
12th international conference on principles and practice of constraint programming (CP 2006)
作者: van Hoeve, Willem-Jan Pesant, Gilles Rousseau, Louis-Martin Sabharwal, Ashish Cornell Univ Dept Comp Sci Ithaca NY 14853 USA Ecole Polytech Montreal PQ H3C 3A7 Canada Univ Montreal Ctr Res Transportat Montreal PQ H3C 3J7 Canada
Many combinatorial problems, such as car sequencing and rostering, feature sequence constraints, restricting the number of occurrences of certain values in every subsequence of a given width. To date, none of the filt... 详细信息
来源: 评论
On the Containment of Forbidden Patterns Problems
On the Containment of Forbidden Patterns Problems
收藏 引用
16th Annual international conference on the principles and practice of constraint programming
作者: Madelaine, Florent IUT Informat LIMOS CNRS UMR 6158 F-63172 Aubiere France
Forbidden patterns problems are a generalisation of (finite) constraint satisfaction problems which are definable in Feder and Vardi's logic MMSNP [1]. in fact, they are examples of infinite constraint satisfactio... 详细信息
来源: 评论
Applying constraint programming to rigid body protein docking
收藏 引用
11th international conference on principles and practice of constraint programming (CP 2005)
作者: Krippahl, L Barahona, P Nova Univ Dept Informat P-2825 Monte De Caparica Portugal
In this paper we show how constraint programming (CP) techniques can improve the efficiency and applicability of grid-based algorithms for optimising surface contact between complex solids. We use BiGGER [1] (Bimolecu... 详细信息
来源: 评论
Beyond Consistency and Substitutability
Beyond Consistency and Substitutability
收藏 引用
20th international conference on the principles and practice of constraint programming (CP)
作者: Cooper, Martin C. Univ Toulouse 3 IRIT F-31062 Toulouse France
Elimination of inconsistent values in instances of the constraint satisfaction problem (CSP) conserves all solutions. Elimination of substitutable values conserves at least one solution. We show that certain values wh... 详细信息
来源: 评论
Deployment of Mobile Wireless Sensor Networks for Crisis Management: A constraint-Based Local Search Approach
Deployment of Mobile Wireless Sensor Networks for Crisis Man...
收藏 引用
20th international conference on the principles and practice of constraint programming (CP)
作者: Pralet, Cedric Lesire, Charles Off Natl Etud & Rech Aerosp French Aerosp Lab F-31055 Toulouse France
In this paper, we consider a problem of management of crisis situations (incidents on nuclear or chemical plants, natural disasters...) that require remote sensing, using a set of ground and aerial robots. In this pro... 详细信息
来源: 评论
principles and practice of programming in Java - Proceedings of the 6th international conference, PPPJ 2008
Principles and Practice of Programming in Java - Proceedings...
收藏 引用
6th international conference on principles and practice of programming in Java, PPPJ 2008
the proceedings contain 19 papers. the topics discussed include: the JavaFest: a collaborative learning technique for Java programming courses;an experimental environment for teaching Java security;patterns and tracea...
来源: 评论