메뉴 건너뛰기




Volumn 2962, Issue , 2004, Pages

Semirings for soft constraint solving and programming

(1)  Bistarelli, Stefano a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 29244468339     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (124)

References (196)
  • 1
    • 84957668700 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Proc. 3rd International Symposium on Theoretical Aspects of Computer Software (TACS97), Springer
    • M. Abadi. Secrecy by typing in security protocols. In Proc. 3rd International Symposium on Theoretical Aspects of Computer Software (TACS97), volume 1281 of Lecture Notes in Computer Science (LNCS), pages 611-638. Springer, 1997.
    • (1997) Lecture Notes in Computer Science (LNCS) , vol.1281 , pp. 611-638
    • Abadi, M.1
  • 2
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. Journal of the ACM (JACM), 46(5):749-786, 1999.
    • (1999) Journal of the ACM (JACM) , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 6
    • 50449105335 scopus 로고
    • Clément-Juglar, orig. 1943: À La Recherche d'une Discipline Économique
    • M.F.C. Allais. Traité d'économie pure. Clément- Juglar, 1971. orig. 1943: À La Recherche d'une Discipline Économique.
    • (1971) Traité D'économie Pure
    • Allais, M.F.C.1
  • 7
    • 4444239267 scopus 로고    scopus 로고
    • On name generation and set-based analysis in dolev-yao model
    • INRIA
    • R.M. Amadio and W. Charatonik. On name generation and set-based analysis in dolev-yao model. Research Report 4379, INRIA, 2002.
    • (2002) Research Report , vol.4379
    • Amadio, R.M.1    Charatonik, W.2
  • 9
    • 35048879871 scopus 로고    scopus 로고
    • The essence of constraint propagation
    • K.R. Apt. The essence of constraint propagation. CWI Quarterly, 11(2-3):215-248, 1998.
    • (1998) CWI Quarterly , vol.11 , Issue.2-3 , pp. 215-248
    • Apt, K.R.1
  • 10
    • 0001751689 scopus 로고    scopus 로고
    • The essence of Constraint Propagation
    • K.R. Apt. The essence of Constraint Propagation. Theoretical Computer Science, 221(1-2):179-210, 1999.
    • (1999) Theoretical Computer Science , vol.221 , Issue.1-2 , pp. 179-210
    • Apt, K.R.1
  • 11
    • 84957371655 scopus 로고    scopus 로고
    • The Rough Guide to Constraint Propagation (corrected version)
    • Proc. 5th International Conference on Principles and Practice of Constraint Programming (CP99), Springer, invited lecture
    • K.R. Apt. The Rough Guide to Constraint Propagation (corrected version). In Proc. 5th International Conference on Principles and Practice of Constraint Programming (CP99), volume 1713 of Lecture Notes in Computer Science (LNCS), pages 1-23. Springer, 1999. invited lecture.
    • (1999) Lecture Notes in Computer Science (LNCS) , vol.1713 , pp. 1-23
    • Apt, K.R.1
  • 15
    • 17244371611 scopus 로고
    • Refining abstract state machine specifications of the steam boiler control to well documented executable code
    • Formal Methods for Industrial Applications: The Steam-Boiler Case Study, Springer
    • C. Beierle, E. Börger, I. Durdanivich, U. Glässer, and E. Riccobene. Refining abstract state machine specifications of the steam boiler control to well documented executable code. In Formal Methods for Industrial Applications: The Steam-Boiler Case Study, volume 1165 of Lecture Notes in Computer Science (LNCS), pages 52-78. Springer, 1995.
    • (1995) Lecture Notes in Computer Science (LNCS) , vol.1165 , pp. 52-78
    • Beierle, C.1    Börger, E.2    Durdanivich, I.3    Glässer, U.4    Riccobene, E.5
  • 16
    • 0012639813 scopus 로고    scopus 로고
    • PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge
    • G. Bella. Inductive Verification of Cryptographic Protocols. PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge, 2000.
    • (2000) Inductive Verification of Cryptographic Protocols
    • Bella, G.1
  • 18
    • 84948414101 scopus 로고    scopus 로고
    • Soft constraints for security protocol analysis: Confidentiality
    • Proc. 3nd International Symposium on Practical Aspects of Declarative Languages (PADL'01), Springer
    • G. Bella and S. Bistarelli. Soft constraints for security protocol analysis: Confidentiality. In Proc. 3nd International Symposium on Practical Aspects of Declarative Languages (PADL'01), volume 1990 of Lecture Notes in Computer Science (LNCS), pages 108-122. Springer, 2001.
    • (2001) Lecture Notes in Computer Science (LNCS) , vol.1990 , pp. 108-122
    • Bella, G.1    Bistarelli, S.2
  • 19
    • 35048872309 scopus 로고    scopus 로고
    • Confidentiality levels and deliberate/indeliberate protocol attacks
    • Lecture Notes in Computer Science (LNCS). Springer, To appear
    • G. Bella and S. Bistarelli. Confidentiality levels and deliberate/indeliberate protocol attacks. In Proc. 10th International Cambridge Security Protocol Workshop, Lecture Notes in Computer Science (LNCS). Springer, 2002. To appear.
    • (2002) Proc. 10th International Cambridge Security Protocol Workshop
    • Bella, G.1    Bistarelli, S.2
  • 20
    • 35048872309 scopus 로고    scopus 로고
    • Confidentiality levels and deliberate/indeliberate protocol attacks
    • Lecture Notes in Computer Science (LNCS). Springer, Forthcoming
    • G. Bella and S. Bistarelli. Confidentiality levels and deliberate/indeliberate protocol attacks. In Proc. 10th Cambridge International Security Protocol Workshop (CISPW2002), Lecture Notes in Computer Science (LNCS). Springer, 2002. Forthcoming.
    • (2002) Proc. 10th Cambridge International Security Protocol Workshop (CISPW2002)
    • Bella, G.1    Bistarelli, S.2
  • 22
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version iv: Inductive analysis of the secrecy goals
    • J.-J Quisquater, Y. Desware, C. Meadows, and D. Gollmann, editors, Proc. European Symposium on Research in Computer Security (ESORICS98), SV
    • G. Bella and L.C. Paulson. Kerberos version iv: Inductive analysis of the secrecy goals. In J.-J Quisquater, Y. Desware, C. Meadows, and D. Gollmann, editors, Proc. European Symposium on Research in Computer Security (ESORICS98), volume 1485 of Lecture Notes in Computer Science (LNCS), pages 361-375. SV, 1998.
    • (1998) Lecture Notes in Computer Science (LNCS) , vol.1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 29
    • 0028336331 scopus 로고
    • Arc-consistency and arc-consistency again
    • C. Bessière. Arc-consistency and arc-consistency again. Artificial Intelligence, 65(1):179-190, 1994.
    • (1994) Artificial Intelligence , vol.65 , Issue.1 , pp. 179-190
    • Bessière, C.1
  • 31
    • 0041884691 scopus 로고
    • Master's thesis, Dipartimento di Informatica, Università di Pisa, Italy, In Italian
    • S. Bistarelli. Programmazione con vincoli pesati e ottimizzazione. Master's thesis, Dipartimento di Informatica, Università di Pisa, Italy, 1994. In Italian.
    • (1994) Programmazione con Vincoli Pesati e Ottimizzazione
    • Bistarelli, S.1
  • 34
    • 84948416791 scopus 로고    scopus 로고
    • Labeling and partial local consistency for soft constraint programming
    • Proc. 2nd International Workshop on Practical Aspects of Declarative Languages (PADL'00), Springer
    • S. Bistarelli, P. Codognet, Y. Georget, and F. Rossi. Labeling and partial local consistency for soft constraint programming. In Proc. 2nd International Workshop on Practical Aspects of Declarative Languages (PADL'00), volume 1753 of Lecture. Notes in Computer Science (LNCS), pages 230-248. Springer, 2000.
    • (2000) Lecture. Notes in Computer Science (LNCS) , vol.1753 , pp. 230-248
    • Bistarelli, S.1    Codognet, P.2    Georget, Y.3    Rossi, F.4
  • 35
    • 84942889171 scopus 로고    scopus 로고
    • An abstraction framework for soft constraint
    • Proc. Symposium on Abstraction, Reformulation and Approximation (SARA2000), Springer
    • S. Bistarelli, P. Codognet, and F. Rossi. An abstraction framework for soft constraint. In Proc. Symposium on Abstraction, Reformulation and Approximation (SARA2000), volume 1864 of Lecture, Notes in Artificial Intelligence (LNAI), pages 71-86. Springer, 2000.
    • (2000) Lecture, Notes in Artificial Intelligence (LNAI) , vol.1864 , pp. 71-86
    • Bistarelli, S.1    Codognet, P.2    Rossi, F.3
  • 36
    • 0036680316 scopus 로고    scopus 로고
    • Abstracting soft constraints: Framework, properties, examples
    • S. Bistarelli, P. Codognet, and F. Rossi. Abstracting soft constraints: Framework, properties, examples. Artificial Intelligence, 139(2):175-211, 2002.
    • (2002) Artificial Intelligence , vol.139 , Issue.2 , pp. 175-211
    • Bistarelli, S.1    Codognet, P.2    Rossi, F.3
  • 37
    • 84957034298 scopus 로고    scopus 로고
    • Interchangeability in soft csps
    • Proc. 8th International Conference on Principles and Practice of Constraint Programming (CP2002), Springer
    • S. Bistarelli, B. Faltings, and N. Neagu. Interchangeability in soft csps. In Proc. 8th International Conference on Principles and Practice of Constraint Programming (CP2002), volume 2470 of Lecture Notes in Computer Science (LNCS). Springer, 2002.
    • (2002) Lecture Notes in Computer Science (LNCS) , vol.2470
    • Bistarelli, S.1    Faltings, B.2    Neagu, N.3
  • 43
    • 84945896852 scopus 로고    scopus 로고
    • Constraint propagation for soft constraint satisfaction problems: Generalization and termination conditions
    • Proc. 6th International Conference on Principles and Practice of Constraint Programming (CP2000), Springer
    • S. Bistarelli, R. Gennari, and F. Rossi. Constraint propagation for soft constraint satisfaction problems: Generalization and termination conditions. In Proc. 6th International Conference on Principles and Practice of Constraint Programming (CP2000), volume 1894 of Lecture Notes in Computer Science (LNCS), pages 83-97. Springer, 2000.
    • (2000) Lecture Notes in Computer Science (LNCS) , vol.1894 , pp. 83-97
    • Bistarelli, S.1    Gennari, R.2    Rossi, F.3
  • 44
    • 0037284793 scopus 로고    scopus 로고
    • General properties and termination conditions for soft constraint propagation
    • S. Bistarelli, R. Gennari, and F. Rossi. General properties and termination conditions for soft constraint propagation. Constraints, 8(1):79-97, 2003.
    • (2003) Constraints , vol.8 , Issue.1 , pp. 79-97
    • Bistarelli, S.1    Gennari, R.2    Rossi, F.3
  • 47
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based Constraint Solving and Optimization
    • S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM (JACM), 44(2):201-236, 1997.
    • (1997) Journal of the ACM (JACM) , vol.44 , Issue.2 , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 51
    • 0036182777 scopus 로고    scopus 로고
    • Soft constraint logic programming and generalized shortest path problems
    • S. Bistarelli, U. Montanari, and F. Rossi. Soft constraint logic programming and generalized shortest path problems. Journal of Heuristics, 8(1):25-41, 2001.
    • (2001) Journal of Heuristics , vol.8 , Issue.1 , pp. 25-41
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 55
    • 7044247315 scopus 로고    scopus 로고
    • Interchangeability in soft csps
    • Recent Advances in Constraints, Proc. Joint ERCIM/CologNet International Workshop on Constraint Solving and Constraint Logic Programming, Cork, Ireland, June 19-21, 2002. Selected Papers, Springer
    • Stefano Bistarelli, Boi Faltings, and Nicoleta Neagu. Interchangeability in soft csps. In Recent Advances in Constraints, Proc. Joint ERCIM/CologNet International Workshop on Constraint Solving and Constraint Logic Programming, Cork, Ireland, June 19-21, 2002. Selected Papers, volume 2627 of Lecture Notes in Computer Science (LNCS). Springer, 2003.
    • (2003) Lecture Notes in Computer Science (LNCS) , vol.2627
    • Bistarelli, S.1    Faltings, B.2    Neagu, N.3
  • 57
    • 84937553676 scopus 로고    scopus 로고
    • Static analysis for secrecy and non-interference in networks of processes
    • Proc. 6th International Conference on Parallel Computing Technologies (PaCT 2001), Springer
    • C. Bodei, P. Degano, F. Nielson, and H.R. Nielson. Static analysis for secrecy and non-interference in networks of processes. In Proc. 6th International Conference on Parallel Computing Technologies (PaCT 2001), volume 2127 of Lecture Notes in Computer Science (LNCS), pages 27-41. Springer, 2001.
    • (2001) Lecture Notes in Computer Science (LNCS) , vol.2127 , pp. 27-41
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 58
    • 85030151043 scopus 로고
    • A fully abstract model for concurrent constraint programming
    • Proc. Colloquium on Trees in Algebra and Programming (CAAP91), Springer
    • F.S. De Boer and C. Palamidessi. A fully abstract model for concurrent constraint programming. In Proc. Colloquium on Trees in Algebra and Programming (CAAP91), volume 493 of Lecture Notes in Computer Science (LNCS), pages 296-319. Springer, 1991.
    • (1991) Lecture Notes in Computer Science (LNCS) , vol.493 , pp. 296-319
    • De Boer, F.S.1    Palamidessi, C.2
  • 60
    • 84976722628 scopus 로고
    • The programming language aspects of thinglab, a constraint oriented simulation laboratory
    • A. Borning. The programming language aspects of thinglab, a constraint oriented simulation laboratory. ACM Transaction on Programming Languages and Systems (TOPLAS), 3(4):353-387, 1981.
    • (1981) ACM Transaction on Programming Languages and Systems (TOPLAS) , vol.3 , Issue.4 , pp. 353-387
    • Borning, A.1
  • 63
    • 4344632496 scopus 로고    scopus 로고
    • Distributed constrained agents for allocating service demands in multi-provider networks
    • Special Issue on Constraint-Based Problem Solving
    • M. Calisti and B. Faltings. Distributed constrained agents for allocating service demands in multi-provider networks,. Journal of the Italian Operational Research Society, XXIX(91), 2000. Special Issue on Constraint-Based Problem Solving.
    • (2000) Journal of the Italian Operational Research Society , vol.29 , Issue.91
    • Calisti, M.1    Faltings, B.2
  • 71
    • 0003639291 scopus 로고
    • Rfc1102: Policy routing in internet protocols
    • Network Working Group
    • D. Clark. Rfc1102: Policy routing in internet protocols. Technical report, Network Working Group, 1989.
    • (1989) Technical Report
    • Clark, D.1
  • 72
  • 73
    • 35048845873 scopus 로고    scopus 로고
    • Gestion optimisee de ressources humaines pour l'audiovisuel
    • C. Collignon. Gestion optimisee de ressources humaines pour l'audiovisuel. In Proc. CHIP users' club 96, 1996.
    • (1996) Proc. CHIP Users' Club 96
    • Collignon, C.1
  • 74
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints and ping-pong protocols
    • Proc. 28th Int. Coll. Automata, Languages, and Programming (ICALP'2001), Springer, To appear
    • H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints and ping-pong protocols. In Proc. 28th Int. Coll. Automata, Languages, and Programming (ICALP'2001), volume 2076 of Lecture Notes in Computer Science (LNCS), pages 682-693. Springer, 2001. To appear.
    • (2001) Lecture Notes in Computer Science (LNCS) , vol.2076 , pp. 682-693
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 76
    • 2342508189 scopus 로고
    • Asynchronous iterative methods for solving a fixed point system of monotone equations in a complete lattice
    • Institut National Polytechnique de Grenoble
    • P. Cousot. Asynchronous iterative methods for solving a fixed point system of monotone equations in a complete lattice. Technical Report R.R.88, Institut National Polytechnique de Grenoble, 1977.
    • (1977) Technical Report R.R. , vol.88
    • Cousot, P.1
  • 77
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. 4th ACM Symposium on Principles of Programming Languages (POPL77), pages 238-252, 1977.
    • (1977) Proc. 4th ACM Symposium on Principles of Programming Languages (POPL77) , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 79
    • 0000911801 scopus 로고
    • Abstract interpretation and application to logic programming
    • P. Cousot and R. Cousot. Abstract interpretation and application to logic programming. Journal of Logic Programming, 13(2-3):103-179, 1992.
    • (1992) Journal of Logic Programming , vol.13 , Issue.2-3 , pp. 103-179
    • Cousot, P.1    Cousot, R.2
  • 81
    • 0004393405 scopus 로고
    • From Concurrent Logic Programming to Concurrent Constraint Programming
    • Oxford University Press
    • F. de Boer and C. Palamidessi. From Concurrent Logic Programming to Concurrent Constraint Programming. In Advances in Logic Programming Theory, pages 55-113. Oxford University Press, 1994.
    • (1994) Advances in Logic Programming Theory , pp. 55-113
    • De Boer, F.1    Palamidessi, C.2
  • 85
    • 0041377554 scopus 로고
    • Network-Based Heuristics for Constraint-Satisfaction Problems
    • Springer
    • R. Dechter and J. Pearl. Network-Based Heuristics for Constraint-Satisfaction Problems. In Search in Artificial Intelligence, pages 370-425. Springer, 1988.
    • (1988) Search in Artificial Intelligence , pp. 370-425
    • Dechter, R.1    Pearl, J.2
  • 87
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning. A lattice model of secure information flow. Communications of the ACM (CACM), 19(5):236-242, 1976.
    • (1976) Communications of the ACM (CACM) , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 90
    • 0000418612 scopus 로고
    • An appraisal of some shortest-paths algorithms
    • S.E. Dreyfus. An appraisal of some shortest-paths algorithms. Operation Research, 17:395-412, 1969.
    • (1969) Operation Research , vol.17 , pp. 395-412
    • Dreyfus, S.E.1
  • 91
    • 0027206949 scopus 로고
    • The calculus of fuzzy restrictions as a basis for flexible constraint satisfaction
    • IEEE Computer Society
    • D. Dubois, H. Fargier, and H. Prade. The calculus of fuzzy restrictions as a basis for flexible constraint satisfaction. In Proc. IEEE International Conference on Fuzzy Systems, pages 1131-1136. IEEE Computer Society, 1993.
    • (1993) Proc. IEEE International Conference on Fuzzy Systems , pp. 1131-1136
    • Dubois, D.1    Fargier, H.2    Prade, H.3
  • 92
    • 35048834070 scopus 로고    scopus 로고
    • Application EPPER planification des ageents roulants
    • A. Dubos and A. Du Jeu. Application EPPER planification des ageents roulants. In Proc. CHIP users' club 96, 1996.
    • (1996) Proc. CHIP Users' Club 96
    • Dubos, A.1    Du Jeu, A.2
  • 94
    • 0005844163 scopus 로고
    • Synthesis of abstraction hierarchies for constraint satisfaction by clustering approximately equivalent objects
    • T. Ellman. Synthesis of abstraction hierarchies for constraint satisfaction by clustering approximately equivalent objects. In Proc. of International Conference on Machine Learning, pages 104-111, 1993.
    • (1993) Proc. of International Conference on Machine Learning , pp. 104-111
    • Ellman, T.1
  • 95
    • 0022693287 scopus 로고
    • Quantitative deduction and its fixpoint theory
    • M.H. Van Emden. Quantitative deduction and its fixpoint theory. Journal of Logic Programming, 3(1):37-53, 1986.
    • (1986) Journal of Logic Programming , vol.3 , Issue.1 , pp. 37-53
    • Van Emden, M.H.1
  • 96
    • 85029518573 scopus 로고
    • Uncertainty in constraint satisfaction problems: A probabilistic approach
    • Proc. European Conference on Symbolic and Qualitative Approaches to Reasoning and Uncertainty (ECSQARU), Springer
    • H. Fargier and J. Lang. Uncertainty in constraint satisfaction problems: a probabilistic approach. In Proc. European Conference on Symbolic and Qualitative Approaches to Reasoning and Uncertainty (ECSQARU), volume 747 of Lecture Notes in Computer Science (LNCS), pages 97-104. Springer, 1993.
    • (1993) Lecture Notes in Computer Science (LNCS) , vol.747 , pp. 97-104
    • Fargier, H.1    Lang, J.2
  • 97
    • 0009345118 scopus 로고
    • REF-ARF: A system for solving problems stated as procedures
    • R.E. Fikes. REF-ARF: A system for solving problems stated as procedures. Artificial Intelligence, 1:27-120, 1970.
    • (1970) Artificial Intelligence , vol.1 , pp. 27-120
    • Fikes, R.E.1
  • 98
    • 44949277265 scopus 로고
    • Bilattices and the semantics of logic programming
    • M. Fitting. Bilattices and the semantics of logic programming. Journal of Logic Programming, 11(1-2):91-116, 1981.
    • (1981) Journal of Logic Programming , vol.11 , Issue.1-2 , pp. 91-116
    • Fitting, M.1
  • 102
    • 84974597207 scopus 로고    scopus 로고
    • Non interference for the analysis of cryptographic protocols
    • Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP00), Springer
    • R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP00), volume 1853 of Lecture Notes in Computer Science (LNCS), pages 354-372. Springer, 2000.
    • (2000) Lecture Notes in Computer Science (LNCS) , vol.1853 , pp. 354-372
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 103
    • 35048846369 scopus 로고    scopus 로고
    • Personal conversations, nov
    • S. Foley. Personal conversations, nov 2002.
    • (2002)
    • Foley, S.1
  • 104
    • 0018031196 scopus 로고
    • Synthesizing constraint expressions
    • E.C. Freuder. Synthesizing constraint expressions. Communication of the ACM (CACM), 21(11):958-966, 1978.
    • (1978) Communication of the ACM (CACM) , vol.21 , Issue.11 , pp. 958-966
    • Freuder, E.C.1
  • 105
    • 0041508106 scopus 로고
    • Backtrack-free and backtrack-bounded search
    • Springer
    • E.C. Freuder. Backtrack-free and backtrack-bounded search. In Search in Artificial Intelligence, pages 343-369. Springer, 1988.
    • (1988) Search in Artificial Intelligence , pp. 343-369
    • Freuder, E.C.1
  • 106
    • 84958062112 scopus 로고
    • Eliminating interchangeable values in constraint satisfaction subproblems
    • P. Marcotte and S. Nguyen, editors
    • E.C. Freuder. Eliminating interchangeable values in constraint satisfaction subproblems. In P. Marcotte and S. Nguyen, editors, Proc. 10th National Conference on Artificial Intelligence (AAAI-91), pages 227-233, 1991.
    • (1991) Proc. 10th National Conference on Artificial Intelligence (AAAI-91) , pp. 227-233
    • Freuder, E.C.1
  • 112
    • 84957628788 scopus 로고    scopus 로고
    • Compiling semiring-based constraints with clp(fd,s)
    • Proc, 4th International Conference on Principles and Practice of Constraint Programming (CP98), Springer
    • Y. Georget and P. Codognet. Compiling semiring-based constraints with clp(fd,s). In Proc, 4th International Conference on Principles and Practice of Constraint Programming (CP98), volume 1520 of Lecture Notes in Computer Science (LNCS), pages 205-219. Springer, 1998.
    • (1998) Lecture Notes in Computer Science (LNCS) , vol.1520 , pp. 205-219
    • Georget, Y.1    Codognet, P.2
  • 114
    • 0346775510 scopus 로고
    • A Generalized Semantics for Constraint Logic Programs
    • ICOT
    • R. Giacobazzi, S.K. Debray, and G. Levi. A Generalized Semantics for Constraint Logic Programs. In Proc. FGCS92, pages 581-591. ICOT, 1992.
    • (1992) Proc. FGCS92 , pp. 581-591
    • Giacobazzi, R.1    Debray, S.K.2    Levi, G.3
  • 116
    • 0019623906 scopus 로고
    • Dynamic programming as graph searching: An algebraic approach
    • S. Gnesi, A. Martelli, and U. Montanari. Dynamic programming as graph searching: an algebraic approach. Journal of the ACM (JACM), 28(5):737-751, 1981.
    • (1981) Journal of the ACM (JACM) , vol.28 , Issue.5 , pp. 737-751
    • Gnesi, S.1    Martelli, A.2    Montanari, U.3
  • 118
    • 0002017107 scopus 로고
    • Evolving algebras 1993: Lipari guide
    • Oxford University Press
    • Y. Gurevich. Evolving algebras 1993: Lipari guide. In Specification and Validation Methods, pages 9-36. Oxford University Press, 1995.
    • (1995) Specification and Validation Methods , pp. 9-36
    • Gurevich, Y.1
  • 119
    • 0028400405 scopus 로고
    • Decomposing Constraint Satisfaction Problems Using Database Techniques
    • M. Gyssens, P.G. Jeavons, and D.A. Cohen. Decomposing Constraint Satisfaction Problems Using Database Techniques. Artificial Intelligence, 66(1):57-89, 1994.
    • (1994) Artificial Intelligence , vol.66 , Issue.1 , pp. 57-89
    • Gyssens, M.1    Jeavons, P.G.2    Cohen, D.A.3
  • 122
    • 0026941401 scopus 로고
    • A generic arc-consistency algorithm and its specializations
    • P. Van Hentenryck, Y. Deville, and C.M. Teng. A generic arc-consistency algorithm and its specializations. Artificial Intelligence, 57:291-321, 1992.
    • (1992) Artificial Intelligence , vol.57 , pp. 291-321
    • Van Hentenryck, P.1    Deville, Y.2    Teng, C.M.3
  • 125
    • 0003903607 scopus 로고
    • Constraint logic programming
    • IBM T.J. Watson Research Center, Yorktown Heights
    • J. Jaffar and J.L. Lassez. Constraint logic programming. Technical report, IBM T.J. Watson Research Center, Yorktown Heights, 1986.
    • (1986) Technical Report
    • Jaffar, J.1    Lassez, J.L.2
  • 127
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • J. Jaffar and M.J. Maher. Constraint logic programming: A survey. Journal of Logic Programming, 19-20:503-581, 1994.
    • (1994) Journal of Logic Programming , vol.19-20 , pp. 503-581
    • Jaffar, J.1    Maher, M.J.2
  • 128
  • 129
    • 84949014862 scopus 로고
    • Constraint programming and database query languages
    • Proc. 2nd International Symposium on Theoretical Aspects of Computer Software (TACS94), Springer
    • P.C. Kanellakis and D.Q. Goldin. Constraint programming and database query languages. In Proc. 2nd International Symposium on Theoretical Aspects of Computer Software (TACS94), volume 789 of Lecture Notes in Computer Science (LNCS), pages 66-77. Springer, 1994.
    • (1994) Lecture Notes in Computer Science (LNCS) , vol.789 , pp. 66-77
    • Kanellakis, P.C.1    Goldin, D.Q.2
  • 132
    • 0002514541 scopus 로고
    • Algorithms for constraint satisfaction problems: A survey
    • V. Kumar. Algorithms for constraint satisfaction problems: a survey. AI Magazine, 13(1):32-44, 1992.
    • (1992) AI Magazine , vol.13 , Issue.1 , pp. 32-44
    • Kumar, V.1
  • 133
    • 0002931606 scopus 로고
    • A language and a program for stating and solving combinatorial problems
    • J-L. Lauriere. A language and a program for stating and solving combinatorial problems. Artifical Intelligence, 10:29-127, 1978.
    • (1978) Artifical Intelligence , vol.10 , pp. 29-127
    • Lauriere, J.-L.1
  • 136
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 138
    • 49449120803 scopus 로고
    • Consistency in networks of relations
    • A.K. Mackworth. Consistency in networks of relations. Artificial Intelligence, 8(1):99-118, 1977.
    • (1977) Artificial Intelligence , vol.8 , Issue.1 , pp. 99-118
    • Mackworth, A.K.1
  • 139
  • 140
    • 0021828305 scopus 로고
    • The complexity of some polynomial network consistency algorithms for constraint satisfaction problems
    • A.K. Mackworth and E.C. Freuder. The complexity of some polynomial network consistency algorithms for constraint satisfaction problems. Artificial Intelligence, 25:65-74, 1985.
    • (1985) Artificial Intelligence , vol.25 , pp. 65-74
    • Mackworth, A.K.1    Freuder, E.C.2
  • 142
    • 5844331793 scopus 로고
    • Nonserial dynamic programming: On the optimal strategy of variable elimination for the rectangular lattice
    • A. Martelli and U. Montanari. Nonserial dynamic programming: on the optimal strategy of variable elimination for the rectangular lattice. Journal of Mathematical Analysis and Application, 40:226-242, 1972.
    • (1972) Journal of Mathematical Analysis and Application , vol.40 , pp. 226-242
    • Martelli, A.1    Montanari, U.2
  • 148
    • 0030785869 scopus 로고    scopus 로고
    • Multi-valued logic programming semantics: An algebraic approach
    • B. Mobasher, D. Pigozzi, and G. Slutzki. Multi-valued logic programming semantics: An algebraic approach. Theoretical Computer Science, 171(1-2):77-109, 1997.
    • (1997) Theoretical Computer Science , vol.171 , Issue.1-2 , pp. 77-109
    • Mobasher, B.1    Pigozzi, D.2    Slutzki, G.3
  • 149
    • 35048873000 scopus 로고
    • Fundamental properties and applications to picture processing, information sciences
    • Dept. of Computer Science, Carnegie Mellon University
    • U. Montanari. Fundamental properties and applications to picture processing, information sciences. Technical Report 71-1, Dept. of Computer Science, Carnegie Mellon University, 1971.
    • (1971) Technical Report , vol.71 , Issue.1
    • Montanari, U.1
  • 150
    • 0016050041 scopus 로고
    • Networks of constraints: Fundamental properties and applications to picture processing
    • U. Montanari. Networks of constraints: Fundamental properties and applications to picture processing. Information Science, 7:95-132, 1974.
    • (1974) Information Science , vol.7 , pp. 95-132
    • Montanari, U.1
  • 151
    • 85013901244 scopus 로고
    • An efficient algorithm for the solution of hierachical networks of constraints
    • Proc. 3rd International Workshop on Graph Grammars and their Application to Computer Science, Springer
    • U. Montanari and F. Rossi. An efficient algorithm for the solution of hierachical networks of constraints. In Proc. 3rd International Workshop on Graph Grammars and their Application to Computer Science, volume 291 of Lecture Notes in Computer Science (LNCS), pages 440-457. Springer, 1986.
    • (1986) Lecture Notes in Computer Science (LNCS) , vol.291 , pp. 440-457
    • Montanari, U.1    Rossi, F.2
  • 152
    • 0026120001 scopus 로고
    • Constraint relaxation may be perfect
    • U. Montanari and F. Rossi. Constraint relaxation may be perfect. Artificial Intelligence, 48:143-170, 1991.
    • (1991) Artificial Intelligence , vol.48 , pp. 143-170
    • Montanari, U.1    Rossi, F.2
  • 155
    • 84956703557 scopus 로고    scopus 로고
    • Exploiting interchangeabilities for case adaptation
    • Lecture Notes in Computer Science (LNCS), Springer
    • N. Neagu and B. Faltings. Exploiting interchangeabilities for case adaptation. In International Conference on Case-Based Reasoning (ICCBR'02), Lecture Notes in Computer Science (LNCS), pages 422-436. Springer, 2001.
    • (2001) International Conference on Case-Based Reasoning (ICCBR'02) , pp. 422-436
    • Neagu, N.1    Faltings, B.2
  • 157
    • 84948956409 scopus 로고    scopus 로고
    • Set constraints: A pearl in research on constraints (invited tutorial)
    • Proc. Principles and Practice of Constraint Programming (CP97), Springer
    • L. Pacholski and A. Podelski. Set constraints: A pearl in research on constraints (invited tutorial). In Proc. Principles and Practice of Constraint Programming (CP97), volume 1330 of Lecture Notes in Computer Science (LNCS), pages 549-562. Springer, 1997.
    • (1997) Lecture Notes in Computer Science (LNCS) , vol.1330 , pp. 549-562
    • Pacholski, L.1    Podelski, A.2
  • 158
    • 8344256722 scopus 로고    scopus 로고
    • chapter 11. Shortest Path Algorithms in Transportation Models: Classical and Innovative Aspects, Kluwer
    • S. Pallottino and M.G. Scutellà. Equilibrium and Advanced Transportation Modelling, chapter 11. Shortest Path Algorithms in Transportation Models: Classical and Innovative Aspects, pages 245-281. Kluwer, 1998.
    • (1998) Equilibrium and Advanced Transportation Modelling , pp. 245-281
    • Pallottino, S.1    Scutellà, M.G.2
  • 159
  • 160
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 161
    • 0026154325 scopus 로고
    • Using constraint logic programming techniques in container port planning
    • M. Perrett. Using constraint logic programming techniques in container port planning. ICL Technical Journal, pages 537-545, 1991.
    • (1991) ICL Technical Journal , pp. 537-545
    • Perrett, M.1
  • 162
    • 0003486721 scopus 로고
    • Post-graduate lecture notes in advanced domain theory (incorporating the pisa lecture notes)
    • Dept. of Computer Science, Univ. of Edinburgh
    • G.D. Plotkin. Post-graduate lecture notes in advanced domain theory (incorporating the pisa lecture notes). Technical report, Dept. of Computer Science, Univ. of Edinburgh, 1981.
    • (1981) Technical Report
    • Plotkin, G.D.1
  • 166
    • 84959052730 scopus 로고
    • Redundant hidden variables in finite domain constraint problems
    • Constraint Processing, Springer
    • F. Rossi. Redundant hidden variables in finite domain constraint problems. In Constraint Processing, volume 923 of Lecture Notes in Computer Science (LNCS), pages 205-223. Springer, 1995.
    • (1995) Lecture Notes in Computer Science (LNCS) , vol.923 , pp. 205-223
    • Rossi, F.1
  • 168
    • 0013336137 scopus 로고    scopus 로고
    • Constraint satisfaction - A survey
    • Z. Ruttkay. Constraint satisfaction - a survey. CWI Quarterly, 11(2-3):163-214, 1998.
    • (1998) CWI Quarterly , vol.11 , Issue.2-3 , pp. 163-214
    • Ruttkay, Z.1
  • 169
    • 84948984086 scopus 로고    scopus 로고
    • Bounding the optimum of constraint optimization problems
    • G. Smolka, editor, Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), Springer
    • G. Verfaillie S. de Givry and T. Schiex. Bounding the optimum of constraint optimization problems. In G. Smolka, editor, Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), volume 1330 of Lecture Notes in Computer Science (LNCS), pages 405-419. Springer, 1997.
    • (1997) Lecture Notes in Computer Science (LNCS) , vol.1330 , pp. 405-419
    • Verfaillie, G.1    De Givry, S.2    Schiex, T.3
  • 170
    • 84948980924 scopus 로고    scopus 로고
    • Understanding and improving the mac algorithm
    • Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), Springer
    • D. Sabin and E.C. Freuder. Understanding and improving the mac algorithm. In Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), volume 1330 of Lecture Notes in Computer Science (LNCS), pages 167-181. Springer, 1997.
    • (1997) Lecture Notes in Computer Science (LNCS) , vol.1330 , pp. 167-181
    • Sabin, D.1    Freuder, E.C.2
  • 173
    • 0001553684 scopus 로고
    • Possibilistic constraint satisfaction problems, or "how to handle soft constraints?"
    • Morgan Kaufmann
    • T. Schiex. Possibilistic constraint satisfaction problems, or "how to handle soft constraints?". In Proc. 8th Conference of Uncertainty in Artificial Intelligence (UAI92), pages 269-275. Morgan Kaufmann, 1992.
    • (1992) Proc. 8th Conference of Uncertainty in Artificial Intelligence (UAI92) , pp. 269-275
    • Schiex, T.1
  • 178
    • 0000196776 scopus 로고
    • Valuation-based systems for discrete optimization
    • Elsevier Science
    • P. Shenoy. Valuation-based systems for discrete optimization. In Uncertainty in Artificial Intelligence. Elsevier Science, 1991.
    • (1991) Uncertainty in Artificial Intelligence
    • Shenoy, P.1
  • 179
    • 0002231085 scopus 로고
    • Valuation-based systems: A framework for managing uncertainty in expert systems
    • John Wiley & Sons Ltd.
    • P. Shenoy. Valuation-based systems: A framework for managing uncertainty in expert systems. In Fuzzy Logic for the Management of Uncertainty, pages 83-104. John Wiley & Sons Ltd., 1994.
    • (1994) Fuzzy Logic for the Management of Uncertainty , pp. 83-104
    • Shenoy, P.1
  • 181
    • 55849106116 scopus 로고
    • Modelling producer/consumer constraints
    • Proc. 1st International Conference on Principles and Practice of Constraint Programming (CP95), Springer
    • H. Simonis and T. Cornelissens. Modelling producer/consumer constraints. In Proc. 1st International Conference on Principles and Practice of Constraint Programming (CP95), volume 976 of Lecture Notes in Computer Science (LNCS), pages 449-462. Springer, 1995.
    • (1995) Lecture Notes in Computer Science (LNCS) , vol.976 , pp. 449-462
    • Simonis, H.1    Cornelissens, T.2
  • 183
    • 0003156307 scopus 로고
    • 3000000 queens in less than one minute
    • R. Sosic and J. Gu. 3000000 queens in less than one minute. SIGART Bulletin, 2(3):22-24, 1991.
    • (1991) SIGART Bulletin , vol.2 , Issue.3 , pp. 22-24
    • Sosic, R.1    Gu, J.2
  • 186
    • 0019044566 scopus 로고
    • CONSTRAINTS - A language for expressing almost-hierarchical descriptions
    • G.J. Sussman and G.L. Steele. CONSTRAINTS - a language for expressing almost-hierarchical descriptions. Artificial Intelligence, 14(1):1-39, 1980.
    • (1980) Artificial Intelligence , vol.14 , Issue.1 , pp. 1-39
    • Sussman, G.J.1    Steele, G.L.2
  • 187
    • 85059208150 scopus 로고
    • Sketchpad: A man-machine graphical communication system
    • Proc. Spring Joint Computer Conference
    • I. Sutherland. Sketchpad: a man-machine graphical communication system. In Proc. Spring Joint Computer Conference, volume 23 of AFIPS, pages 329-346, 1963.
    • (1963) AFIPS , vol.23 , pp. 329-346
    • Sutherland, I.1
  • 188
    • 84972541021 scopus 로고
    • A lattice-theoretical fixpoint theorem and its applications
    • A. Tarski. A lattice-theoretical fixpoint theorem and its applications. Pacific Journal of Mathematics, 5:285-309, 1955.
    • (1955) Pacific Journal of Mathematics , vol.5 , pp. 285-309
    • Tarski, A.1
  • 190
    • 0001737878 scopus 로고    scopus 로고
    • Practical applications of constraint programming
    • M. Wallace. Practical applications of constraint programming. Constraints, 1(1-2):139-168, 1996.
    • (1996) Constraints , vol.1 , Issue.1-2 , pp. 139-168
    • Wallace, M.1
  • 193
    • 0002680001 scopus 로고
    • Understanding line drawings of scenes with shadows
    • McGraw-Hill
    • D.L. Waltz. Understanding line drawings of scenes with shadows. In The Psychology of Computer Vision, pages 19-91. McGraw-Hill, 1975.
    • (1975) The Psychology of Computer Vision , pp. 19-91
    • Waltz, D.L.1
  • 194
    • 0033325911 scopus 로고    scopus 로고
    • Compiling constraint satisfaction problems
    • R. Weigel and B. Faltings. Compiling constraint satisfaction problems. Artificial Intelligence, 115:257-289, 1999.
    • (1999) Artificial Intelligence , vol.115 , pp. 257-289
    • Weigel, R.1    Faltings, B.2
  • 195
    • 16244376268 scopus 로고    scopus 로고
    • Interchangeability for case adaptation in configuration problems
    • Madison, Wisconsin, USA, July AAAI Press
    • Rainer Weigel, Boi Faltings, and Marc Torrens. Interchangeability for case adaptation in configuration problems. In Workshop on Case-Based Reasoning Integrations (AAAI-98), volume WS-98-15, pages 166-171, Madison, Wisconsin, USA, July 1998. AAAI Press.
    • (1998) Workshop on Case-Based Reasoning Integrations (AAAI-98) , vol.WS-98-15 , pp. 166-171
    • Weigel, R.1    Faltings, B.2    Torrens, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.