Given an arbitrary constraint a on 71 variables with domain size d, we show how to generate a custom propagator that establishes GAC in time O(nd) by precomputing the propagation that would be performed on every reach...
详细信息
ISBN:
(纸本)9783642153952
Given an arbitrary constraint a on 71 variables with domain size d, we show how to generate a custom propagator that establishes GAC in time O(nd) by precomputing the propagation that would be performed on every reachable subdomain of scope(c). Our propagators are stateless: they store no state between calls, and so incur no overhead in storing and backtracking state during search. the preprocessing step can take exponential time and the custom propagator is potentially exponential in size. However, for small constraints used repeatedly, in one problem or many, this technique can provide substantial practical gains. Our experimental results show that, compared with optimised implementations of the table constraint;this technique can lead to an order of magnitude speedup;while doing identical search on realistic problems. the technique can also be many times faster than a decomposition into primitive constraints in the Minion solver. Propagation is so fast that, for constraints available in our solver, the generated propagator compares well with a human-optimised propagator for the same constraint.
Many tasks in automated reasoning can be modeled as weighted constraint satisfaction problems over Boolean variables (Boolean WCSPs). Tractable classes of Such problems have traditionally been identified by exploiting...
详细信息
ISBN:
(纸本)9783540859574
Many tasks in automated reasoning can be modeled as weighted constraint satisfaction problems over Boolean variables (Boolean WCSPs). Tractable classes of Such problems have traditionally been identified by exploiting either: (a) the topology of the associated constraint network, or (b) the structure of the weighted constraints. In this paper, we introduce the notion of a constraint composite graph (CCG) associated with a given (Boolean) WCSP. the CCG provides it unifying framework for characterizing/exploiting boththe graphical structure of the constraint network as well as the structure of the weighted constraints. We show that a given (Boolean) WCSP can be reduced to the problem of computing the minimum weighted vertex cover for its associated CM and we establish the following two important results: ( 1) "the CCG of a given Boolean WCSP has the same treewidth as its associated constraint network," and (2) "many classes of Boolean WCSPs that are tractable by, virtue of the structure of their weighted constraints have associated CCGs that arc bipartite in nature."
Cost based filtering is a novel approach that combines techniques from Operations Research and constraintprogramming to filter from decision variable domains values that, do not lead to better solutions [7]. Stochast...
详细信息
ISBN:
(纸本)9783540859574
Cost based filtering is a novel approach that combines techniques from Operations Research and constraintprogramming to filter from decision variable domains values that, do not lead to better solutions [7]. Stochastic: constraintprogramming is a. framework for modeling combinatorial optimization problems that, involve uncertainty [19]. In this work;we show how to perform cost;based filtering for certain classes of stochastic constraint, programs. Our approach is based oil a set of known inequalities borrowed from Stochastic programming - a branch of OR. concerned with modeling and solving problems involving. uncertainty. We discuss bound generation and cost-based domain filtering procedures for a well-known problem in the Stochastic. programming literature, the static stochastic knapsack problem. We also apply our technique to a stochastic sequencing problem. Our results clearly show the value of the proposed approach over;I pure scenario-based Stochastic constraintprogramming formulation both in terms of explored nodes and run times.
We present the w constraint combinator that models while loops in constraintprogramming. Embedded in a finite domain constraint solver, it allows programmers to develop non-trivial arithmetical relations using loops,...
详细信息
ISBN:
(纸本)9783540749691
We present the w constraint combinator that models while loops in constraintprogramming. Embedded in a finite domain constraint solver, it allows programmers to develop non-trivial arithmetical relations using loops, exactly as in an imperative language style. the deduction capabilities of this combinator come from abstract interpretation over the polyhedra abstract domain. this combinator has already demonstrated its utility in constraint- based verification and we argue that it also facilitates the rapid prototyping of arithmetic constraints (e.g. power, gcd or sum).
Since electromagnetic waves are strongly attenuated inside the water, the satellite based global positioning system (cpS) cannot be used by submarine robots except at the surface of the water. this paper shows that th...
详细信息
ISBN:
(纸本)3540462678
Since electromagnetic waves are strongly attenuated inside the water, the satellite based global positioning system (cpS) cannot be used by submarine robots except at the surface of the water. this paper shows that the localization problem in deep water can often be cast into a continuous constraints satisfaction problem where interval constraints propagation algorithms are particularly efficient. the efficiency of the resulting propagation methods is illustrated on the localization of a submarine robot, named Redermor. the experiments have been collected by the GESMA (Groupe d'Etude Sous-Marine de l'Atlantique) in the Douarnenez bay, in Brittany.
the French nuclear park comprises 58 nuclear reactors distributed through the national territory on 19 geographical sites. they must be repeatedly stopped, for refueling and maintenance. the scheduling of these outage...
详细信息
ISBN:
(纸本)3540462678
the French nuclear park comprises 58 nuclear reactors distributed through the national territory on 19 geographical sites. they must be repeatedly stopped, for refueling and maintenance. the scheduling of these outages has to comply with various constraints, regarding safety, maintenance logistic, and plant operation, whilst it must contribute to the producer profit maximization. this industrial problem appears to be a hard combinatorial problem that conventional methods used up to now by Electricite de France (mainly based on Mixed Integer programming) fail to solve properly. We present in this paper a new approach for modeling and solving this problem, combining constraintprogramming (cp) and Local Search. cp is used to find solutions to the outage scheduling problem, while Local Search is used to improve solutions with respect to a heuristic cost criterion. It leads to find solutions as good as withthe conventional approaches, but taking into account all the constraints and in very reduced computing time.
We give an approximate and often extremely fast method of solving a portfolio optimisation (PO) problem in financial mathematics, which has applications in the credit derivatives market. Its corresponding satisfaction...
详细信息
One of the most powerful techniques for solving centralized constraint satisfaction problems (CSPs) consists of maintaining local consistency during backtrack search (e.g. [11]). Yet, no work has been reported on such...
详细信息
Most of complete search algorithms over constraint Satisfaction Problems (csp) are based on Standard Backtracking. Two main enhancements of this basic scheme have been studied: first, to integrate constraint propagati...
详细信息
Since the origins of the constraint satisfaction paradigm, its restriction to binary constraints has concentrated a significant part of the work. this is understandable because new ideas/techniques are usually much si...
详细信息
ISBN:
(纸本)3540666265
Since the origins of the constraint satisfaction paradigm, its restriction to binary constraints has concentrated a significant part of the work. this is understandable because new ideas/techniques are usually much simpler to present/elaborate by first restricting them to the binary case. (See for example the are consistency algorithms, such as AC-3 or AC-4, which have been presented first in their binary version [10, 12], before being extended to non-binary constraints [11, 13].) But this inclination has highly increased in the early nineties. Authors indeed justified this restriction by the fact that any non-binary constraint network can polyniomally be converted into an equivalent binary one [6,8,5,19]. And, in most cases, they never extended their work to non-binary constraints.
暂无评论