咨询与建议

限定检索结果

文献类型

  • 1,022 篇 期刊文献
  • 820 篇 会议
  • 20 篇 学位论文

馆藏范围

  • 1,862 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,605 篇 工学
    • 1,336 篇 计算机科学与技术...
    • 491 篇 软件工程
    • 178 篇 电气工程
    • 134 篇 机械工程
    • 133 篇 控制科学与工程
    • 54 篇 信息与通信工程
    • 51 篇 土木工程
    • 40 篇 交通运输工程
    • 36 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 石油与天然气工程
    • 15 篇 航空宇航科学与技...
    • 14 篇 材料科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 电子科学与技术(可...
    • 10 篇 仪器科学与技术
    • 10 篇 生物工程
    • 8 篇 动力工程及工程热...
    • 6 篇 生物医学工程(可授...
  • 616 篇 管理学
    • 597 篇 管理科学与工程(可...
    • 119 篇 工商管理
    • 12 篇 图书情报与档案管...
    • 6 篇 公共管理
  • 484 篇 理学
    • 361 篇 数学
    • 165 篇 系统科学
    • 31 篇 生物学
    • 17 篇 物理学
  • 77 篇 经济学
    • 64 篇 应用经济学
    • 14 篇 理论经济学
  • 14 篇 医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 农学
  • 7 篇 教育学
  • 4 篇 法学
  • 4 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 1,862 篇 constraint progr...
  • 175 篇 scheduling
  • 84 篇 optimization
  • 65 篇 integer programm...
  • 42 篇 combinatorial op...
  • 39 篇 mixed integer pr...
  • 35 篇 local search
  • 35 篇 integer linear p...
  • 29 篇 machine learning
  • 28 篇 mathematical pro...
  • 28 篇 constraint satis...
  • 24 篇 mixed integer li...
  • 23 篇 planning
  • 23 篇 column generatio...
  • 22 篇 large neighborho...
  • 22 篇 mixed-integer pr...
  • 22 篇 linear programmi...
  • 22 篇 global constrain...
  • 22 篇 constraint propa...
  • 20 篇 search

机构

  • 24 篇 pontificia univ ...
  • 13 篇 univ autonoma ch...
  • 13 篇 univ st andrews ...
  • 12 篇 univ toronto dep...
  • 11 篇 univ san sebasti...
  • 10 篇 univ cient sur l...
  • 9 篇 univ bologna dei...
  • 9 篇 brown univ provi...
  • 8 篇 univ tehran coll...
  • 8 篇 univ cent chile ...
  • 7 篇 katholieke univ ...
  • 7 篇 carnegie mellon ...
  • 7 篇 univ toronto dep...
  • 7 篇 univ playa ancha...
  • 7 篇 natl univ irelan...
  • 7 篇 univ valparaiso ...
  • 7 篇 new mexico state...
  • 6 篇 katholieke univ ...
  • 6 篇 natl yunlin univ...
  • 6 篇 univ nantes lina...

作者

  • 30 篇 crawford broderi...
  • 29 篇 beck j. christop...
  • 26 篇 stuckey peter j.
  • 24 篇 monfroy eric
  • 23 篇 soto ricardo
  • 23 篇 schaus pierre
  • 21 篇 rousseau louis-m...
  • 20 篇 milano michela
  • 18 篇 van hentenryck p...
  • 18 篇 o'sullivan barry
  • 17 篇 lombardi michele
  • 16 篇 miguel ian
  • 15 篇 guns tias
  • 14 篇 wallace mark
  • 14 篇 hofstedt petra
  • 13 篇 nijssen siegfrie...
  • 13 篇 castro carlos
  • 13 篇 loudni samir
  • 12 篇 boizumault patri...
  • 12 篇 nightingale pete...

语言

  • 1,725 篇 英文
  • 103 篇 其他
  • 11 篇 中文
  • 4 篇 法文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"主题词=Constraint Programming"
1862 条 记 录,以下是501-510 订阅
排序:
Parallel Batch Processing for the Coating Problem  33
Parallel Batch Processing for the Coating Problem
收藏 引用
33rd International Conference on Automated Planning and Scheduling, ICAPS 2023
作者: Horn, Matthias Demirovic, Emir Yorke-Smith, Neil Algorithmics Group Delft University of Technology Netherlands
We solve a challenging scheduling problem with parallel batch processing and two-dimensional shelf strip packing constraints that arises in the tool coating field. Tools are assembled on so-called planetaries (batches... 详细信息
来源: 评论
Multi-objective Optimization for the Design of Salary Structures  20th
Multi-objective Optimization for the Design of Salary Struct...
收藏 引用
20th International Conference on the Integration of constraint programming, Artificial Intelligence, and Operations Research (CPAIOR)
作者: Tremblay, Francois-Alexandre Piche-Meunier, Dominique Dubois, Louis Univ Laval Dept Comp Sci & Software Engn Quebec City PQ Canada
In a context of labor shortage and strong global competition for talent, salary management is becoming a critical issue for companies wishing to attract, engage and retain qualified employees. This paper presents a mu... 详细信息
来源: 评论
Parsimonious Clone Tree Integration in cancer
收藏 引用
ALGORITHMS FOR MOLECULAR BIOLOGY 2022年 第1期17卷 1-14页
作者: Sashittal, Palash Zaccaria, Simone El-Kebir, Mohammed Univ Illinois Dept Comp Sci Urbana IL 61801 USA UCL Computat Canc Genom Res Grp Canc Inst London England UCL Canc Res UK Lung Canc Ctr Excellence Canc Inst London England Univ Illinois Canc Ctr Illinois Urbana IL 61801 USA
Background Every tumor is composed of heterogeneous clones, each corresponding to a distinct subpopulation of cells that accumulated different types of somatic mutations, ranging from single-nucleotide variants (SNVs)... 详细信息
来源: 评论
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2013年 第11期55卷 1948-1973页
作者: Jesus Varela-Vaca, Angel Gasca, Rafael M. Univ Seville ETS Ingn Informat Dept Comp Languages & Syst Seville 41012 Spain
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these sy... 详细信息
来源: 评论
A Finite-Domain constraint-Based Approach on the Stockyard Planning Problem  34th
A Finite-Domain Constraint-Based Approach on the Stockyard P...
收藏 引用
34th International Conference on Database and Expert Systems Applications (DEXA)
作者: Loeffler, Sven Becker, Ilja Hofstedt, Petra Brandenburg Univ Technol Cottbus Senftenberg Konrad Wachsmann Allee 5 Cottbus Germany
Transport problems are a significant challenge for companies, i.e. due to concerns about climate change and the constant increase in raw material prices, such as for petrol. One issue in transporting bulk materials is... 详细信息
来源: 评论
Aerial Vehicle Routing and Scheduling for UAS Traffic Management: A Hybrid Monte Carlo Tree Search Approach  42
Aerial Vehicle Routing and Scheduling for UAS Traffic Manage...
收藏 引用
IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC)
作者: Chour, Kenny Pradeep, Priyank Munishkin, Alexey A. Kalyanam, Krishna M. NASA Ames Res Ctr Metis Technol Solut Moffett Field CA 94035 USA NASA Ames Res Ctr USRA Moffett Field CA 94035 USA NASA Ames Res Ctr Aviat Syst Div Moffett Field CA 94035 USA
We present the Multi-Route Weighted Package Delivery Problem (MRWPDP) and a scalable solution methodology as a major step towards enabling an airspace deconfliction service for drone delivery operations. The problem i... 详细信息
来源: 评论
Binary Search-Based Methods for Solving constraint Hierarchies over Finite Domains  35
Binary Search-Based Methods for Solving Constraint Hierarchi...
收藏 引用
35th IEEE International Conference on Tools with Artificial Intelligence (ICTAI)
作者: Hosobe, Hiroshi Satoh, Ken Hosei Univ Fac Comp & Informat Sci Tokyo Japan Natl Inst Informat Principles Informat Res Div Tokyo Japan
constraint programming is a powerful tool for modeling and solving various problems. Especially, soft constraints are useful since they enable the treatment of over- and under-constrained real-world problems by relaxi... 详细信息
来源: 评论
Measures of balance in combinatorial optimization
收藏 引用
4OR-A QUARTERLY JOURNAL OF OPERATIONS RESEARCH 2022年 第3期20卷 391-415页
作者: Olivier, Philippe Lodi, Andrea Pesant, Gilles Polytech Montreal Montreal PQ Canada Canada Excellence Res Chair Montreal PQ Canada
The concept of balance plays an important role in many combinatorial optimization problems. Yet there exist various ways of expressing balance, and it is not always obvious how best to achieve it. In this methodology-... 详细信息
来源: 评论
Multi-objective Finite-Domain constraint-Based Forest Management  22nd
Multi-objective Finite-Domain Constraint-Based Forest Manage...
收藏 引用
22nd Regular meeting of the Portuguese-Association-of-Operational-Research (APDIO)
作者: Eloy, Eduardo Bushenkov, Vladimir Abreu, Salvador Univ Evora Evora Portugal Univ Evora CIMA Evora Portugal Univ Evora NOVA LINCS Evora Portugal
This paper describes an implementation of a constraint programming approach to the problem of multi-criteria forest management optimization. The goal is to decide when to harvest each forest unit while striving to opt... 详细信息
来源: 评论
Securing Optimized Code Against Power Side Channels  36
Securing Optimized Code Against Power Side Channels
收藏 引用
IEEE 36th Computer Security Foundations Symposium (CSF)
作者: Tsoupidi, Rodothea Myrsini Lozano, Roberto Casta Neda Troubitsyna, Elena Papadimitratos, Panagiotis Royal Inst Technol KTH Stockholm Sweden
Side-channel attacks impose a serious threat to cryptographic algorithms, including widely employed ones, such as AES and RSA. These attacks take advantage of the algorithm implementation in hardware or software to ex... 详细信息
来源: 评论