• Nenhum resultado encontrado

Constraint programming (Computer science)

Subexponential concurrent constraint programming

Subexponential concurrent constraint programming

... of programming languages. In fact, new programming con- structs have been proposed by following tight connections between programming languages and proof ...concurrent constraint ...

23

Automated verification of care pathways using constraint programming

Automated verification of care pathways using constraint programming

... to constraint programming allied with a DSL to encode and verify care pathways, checking four possible problems: states in deadlock, non-determinism, inaccessible steps and transitions with logically ...

99

Rapid Prediction of Bacterial Heterotrophic Fluxomics Using Machine Learning and Constraint Programming.

Rapid Prediction of Bacterial Heterotrophic Fluxomics Using Machine Learning and Constraint Programming.

... by constraint programming and quadratic optimi- zation, our platform based on machine learning (ML) can predict meaningful metabolic information about bacterial species in their ...

22

Dynamic spaces in concurrent constraint programming

Dynamic spaces in concurrent constraint programming

... Concurrent constraint programming (CCP) is a declarative model for concurrency where agents interact with each other by posting (telling) and asking constraints (formulas in logic) in a shared store of ...

19

A proof theoretic study of soft concurrent constraint programming

A proof theoretic study of soft concurrent constraint programming

... Soft concurrent constraint programming (Soft-CCP) (Bistarelli et al. 2006) is an extension of CCP where agents are allowed to tell and ask soft constraints, i.e., constraints with certain level of ...

15

Proving concurrent constraint programming correct, revisited

Proving concurrent constraint programming correct, revisited

... Concurrent Constraint Programming (CCP) is a simple and powerful model of concurrency where processes interact by telling and asking constraints into a global store of partial ...

17

Digital forensics research using constraint programming

Digital forensics research using constraint programming

... all constraint solvers use it as a basic step [46]. Constraint propagation uses semantics of constraints to identify and discard incompatible combinations of val- ...

56

On the Scalability of Constraint Programming on Hierarchical Multiprocessor Systems

On the Scalability of Constraint Programming on Hierarchical Multiprocessor Systems

... MaCS uses a compact and self-contained representation of a store. A store becomes an independent unit of work, suitable to relocation and to be handled by all participating workers. This representation allowed us to ...

10

A Constraint Programming Approach to Optimize Network Calls by Minimizing Variance in Data Availability Times

A Constraint Programming Approach to Optimize Network Calls by Minimizing Variance in Data Availability Times

... combinatorial Constraint Optimization Problem. Using two Constraint Satisfaction Solvers, we have addressed the problem using distinct ...additional constraint is added to cut the search space, by ...

93

Constraint programming on a heterogeneous multicore architecture

Constraint programming on a heterogeneous multicore architecture

... The local search algorithm choosen was Adaptive search, an heuristic method in which. the key idea of the approach is to take into account the structure of the probl[r] ...

116

DSM-PM2 adequacy for distributed constraint programming

DSM-PM2 adequacy for distributed constraint programming

... A major DSM-PM2 sychronization overhead may be a possible explana- tion for the poor results of the centralized model as the single distributed DSM data structure, that[r] ...

115

A Symbolic model for timed concurrent constraint programming

A Symbolic model for timed concurrent constraint programming

... One of the main difficulties to develop automatic verification techniques for ntcc programs is the fact that the semantics of processes is given by two different transition systems, namely, [r] ...

17

Probabilistic constraint reasoning

Probabilistic constraint reasoning

... continuous constraint paradigm has been often used to model safe reasoning in applications where uncertainty ...arises. Constraint propagation propagates intervals of uncertainty among the variables of the ...

283

A constraint logic programming approach to examination scheduling

A constraint logic programming approach to examination scheduling

... the constraint logic programming approach [1, 4, 7, ...of constraint solving methods, enable a system to solve a very large timetabling problem within a small amount of ...powerful constraint ...

7

Constraint-based reachability

Constraint-based reachability

... call Constraint-based reachability, is proposed to address reachability problems by exploring program states using a constraint model of the whole ...of constraint over a computational domain. By ...

19

Mixed integer linear programming and constraint logic programming : towards a unified modeling framework

Mixed integer linear programming and constraint logic programming : towards a unified modeling framework

... and Constraint Programming (CP) optimization techniques are beginning to converge, despite their very different ...Linear Programming (MILP) and Constraint Logic Programming (CLP) are ...

188

A Simplex Based Parametric Programming Method for the Large Linear Programming Problem

A Simplex Based Parametric Programming Method for the Large Linear Programming Problem

... The simplex-based parametric programming methodology was first provided by Gass and Saaty [2] in 1955. By taking advantage of the iterations in simplex algorithm, this methodology tries to find the parametric ...

5

QUADRATIC PROGRAMMING VERSUS SECOND ORDER CONE PROGRAMMING IN PORTFOLIO OPTIMIZATION

QUADRATIC PROGRAMMING VERSUS SECOND ORDER CONE PROGRAMMING IN PORTFOLIO OPTIMIZATION

... Carhart (1997) and Black – Litterman by Black and Litterman (1991), but few on how the actual portfolio optimal combination is computed. The traditional Markowitz optimization model is solved by a Quadratic ...

23

Comment-based Keyword Programming

Comment-based Keyword Programming

... keyword programming is very useful for such ...for programming by analyzing open source project forums with TF/IDF to take priorities of words into ...keyword programming cannot handle synonyms like ...

5

QUADRATIC BI-LEVEL PROGRAMMING PROBLEM BASED ON FUZZY GOAL PROGRAMMING APPROACH

QUADRATIC BI-LEVEL PROGRAMMING PROBLEM BASED ON FUZZY GOAL PROGRAMMING APPROACH

... level programming is a NP-hard ...bi-level programming problem based on Karush – Kuhn – Tucker conditions and duality ...quadratic programming to determine a solution of a convex ...

19

Show all 600 documents...

temas relacionados