Constraint Programming (Lecture 8) Marco Kuhlmann, Guido Tack
Recommend Documents
1. Constraint Programming: Modeling, Arc Consistency and Propagation. 1. Brian
C. Williams. 16.410-13. September 22nd, 2010. Slides draw material from:.
Void pointers. C does not allow us to declare and use void variables. •. • void can
be used only as return type or parameter of a function. • C allows void pointers.
A Subclass is an entity type that has a distinct role and is also a member of the.
Superclass. Subclass. Staff. Superclass/Subclass. Secretary. Manager. Sales_.
Project data in the directions of maximum variance. â« Fisher Linear ... preserves direction useful for data classification ..... Multiple Discriminant Analysis (MDA).
ECE 6640. 5. Proakis Convolution Encoder. John G. Proakis, “Digital
Communications, 4th ed.,” McGraw Hill, Fourth. Edition, 2001. ISBN: 0-07-
232111-3.
Jan 7, 2011 ... Notes are based on Engineering Mechanics: Statics by R. C. Hibbeler, 12th
Edition, Pearson. Dr M. Touahmia & Dr M. Boukendakdji.
3.4 Semidefinite Relaxations for Restricted Constraint Programming ... Recently, semidefinite programming relaxations have been applied in constraint pro-.
•At all types of milling machines, the cutting tool performs a rotational motion, that
is the cutting motion. The rotation axis of the tool could be horizontal or vertical ...
Page 1. Learn to Use. Presentations. Tom Kuhlmann [email protected]
http://bit.ly/more-ppt. Page 2. I need someone well versed in the art of.
sampled outcrops FO, FO4 and FO5 presentremains of. Dusa denticulata Münster. As the stratigraphically higher documented presence of D. denticulata in the ...
Feb 15, 2010 - AI] 15 Feb 2010. Model-Driven ... The platform is open to plug new solvers. ..... type womenList (at line 2 in the data file), thereby the 1st index.
Nov 19, 2009 - 60s, 70s Constraint networks in artificial intelligence. ..... uses clausal normal form and unification ..... Resolution Calculus â Inference Rules.
Constraint Programming (CP) is a powerful technique to solve combinatorial problems. It applies sophisti- ..... a distance-based measure would show progress (e.g., getting increasingly further from the starting so- .... 98â102. IOS Press, 2006.
Like Integer Programming, one states a model of the problem ... express complex problems; each of these primitives, called constraints, may have its own ...
is a solver and framework for constraint integer programming that also features ...... The second presolving technique analyzes the function graph of the problem instance in ..... rule is of major importance (see Achterberg, Koch, and Martin [5]).
Constraint logic programming (CLP) combines logic, which is used to specify ...... Technology, presented on http://www.demon.co.uk/ar/PACT97/index.html.
for 3-SAT. Theoretical Computer Science, 329:303â313, 2004. 7. J. M. Byskov. .... J. M. Robson. Algorithms for maximum independent sets. Journal of Algorithms ...
Held and Karp used it for the TSP [9,10], and it has been applied in many different areas since ... 2 Coupling Propagation Algorithms via Lagrangian Relaxation. We consider ..... The implementation was done in C++ and compiled by gcc 2.95 ...
Concurrent logic/constraint programming is a simple and ..... delaying, coroutining, sound negation-as-failure, and the Andorra principle [37]. ... The solution adopted in PAR- ... The key issue here is how to gather multiple solutions obtained ... E
Mar 2, 2000 - The emergence of constraint logic programming (CLP) as de ned by J. Ja ar ... programming could be generalized to arbitrary mathematical structures ... The set of solutions of a composite model is the intersection of the ... ability of
language and concurrent runtime system designed at the Er- icsson Computer ..... the whole system switches to an âemergency contextâ, be- cause all the ...
Gary Kuhlmann, an editor at The University of Iowa, believes we're defined at
least in part by what we read. These past few months, he returned to Lolita and ...
GIS 1. •GIS Tutorial, Third Edition. GIS Lecture 8: Geocoding. 100. 198. 101 ...
GIS 4. •GIS Tutorial, Third Edition. Geocoding. •Address Matching. - Process of ...
Then try to determine the toll pattern in such a way that the S-O becomes at the same time U-O. Dr. Anna Nagurney. FOMGT 341 Transportation and Logistics ...
Constraint Programming (Lecture 8) Marco Kuhlmann, Guido Tack
Plan for today. • finite set variables. • propagators for constraints on finite sets. •
encoding binary relations. • encoding finite trees ...
Finite Set Constraints Constraint Programming (Lecture 8) Marco Kuhlmann, Guido Tack
Plan for today • finite set variables • propagators for constraints on finite sets • encoding binary relations • encoding finite trees
Finite-set constraints
Finite-set variables • let Δ be a finite interval of integers • finite domain variables take values in Δ • finite set variables take values in P(Δ) • domain: fixed subset of Δ
Basic constraints • assignments to FD variables are approximated using element constraints: I 2D
• assignments to FS variables are approximated using subset constraints: D!S
S !D
• together, these form the basic constraints
FD constraint store x!y
x>3
x
{3,4,5}
FS constraint store S
T
{2,3}
|S|=3
S
{2,3,4,5}
Non-basic constraints just as with FD
• express non-basic constraints in terms of
basic constraints, using sets of inference rules
• monotonicity: more specific premises yield more specific conclusions
• express inferences in terms of the currently entailed lower and upper bounds bS c
D
[f D j D ! S g
dS e
D
\f D j S ! D g
Subset constraint
S1 ! S2
"
bS1 c ! S2
basic constraint
^
S1 ! dS2 e
Union and intersection S1 [ S2 D S3
!
S3 " dS1 e [ dS2 e ^ bS1 c [ bS2 c " S3
S1 \ S2 D S3
!
bS1 c \ bS2 c " S3 ^ S3 " dS1 e \ dS2 e
Cardinality constraint jS j D I >
H)
jbS cj ! I
>
H)
I ! jdS ej
n ! I ^ jdS ej D n
H)
dS e " S
I ! n ^ jbS cj D n
H)
S " bS c
Binary relations
The plan • use FS constraints to encode binary relations on a fixed (and finite) universe
• express constraints on binary relations as constraints on FS variables
Encoding • define the notion of the ‘relational image’ Rx D f y 2 C j Rxy g
• understand binary relations as total functions from the carrier to subsets of the carrier fR D f x 7! Rx j x 2 C g
• represent these functions as vectors on finite set variables
Union and intersection R1 [ R2 D R3
!
R3 D hR1 Œ1! [ R2 Œ1!; : : : ; R1 Œn! [ R2 Œn!i
R1 \ R2 D R3
!
R3 D hR1 Œ1! \ R2 Œ1!; : : : ; R1 Œn! \ R2 Œn!i
How would you do composition?
Selection constraints • generalisation of binary set operations • participating elements are variable, too • example: union with selection SD
[
Si
i2S 0
• propagation in all directions
Union with selection 0
S D [hS1 ; : : : ; Sn iŒS ! H) S 0 ! Œ1; n! H) S ! [f dSj e j j 2 dS 0 e g H) [f bSj c j j 2 bS 0 c g ! S bSj c 6! dS e H) j 62 S 0 bS c n [f dSj e j j 2 dS 0 e n fkg g ¤ 0 H) k 2 S 0 ^ bS c n [f dSj e j j 2 dS 0 e n fkg g ! Sk
Composition 2
R1 B R 2
D
f .x; z/ 2 C j 9y 2 C W R1 xy ^ R2 yz g
R1 B R 2 D R3
!
R3 D h[R2 ŒR1 Œ1!!; : : : ; [R2 ŒR1 Œn!!i
Intersection with selection • intersection with selection 0
S D \hS1 ; : : : ; Sn iŒS !
• defines a new binary relation 2
f .x; z/ 2 C j 8y 2 C W R1 xy H) R2 yz g
• but what is it good for?
A weird relation
2
R1 ! R2 D f .x; z/ 2 C j 8y 2 C W R1 xy H) R2 yz g
• x sees z iff all R1-successors of x R2-see z • x sees z if it does not have any R1-successors
Putting the weird relation to use • require that the weird relation contains the identity relation
• the new relation is quite useful: 8x 2 C W x 2 .R1 ! R2 /x H) R1 " R!1 2 8x 2 C W x 2 .R2 ! R1 /x H) R2 "
• the ‘converse constraint’ on relations
!1 R1
Converse R2 D
!1 R1
i 2C
H)
i 2 \R1 ŒR2 Œi !!
i 2C
H)
i 2 \R2 ŒR1 Œi !!
Summing up • used vectors of FS variables to encode binary relations
• constraints on binary relations
can be stated as constraints on FS variables
• featured on next assignment
Solving tree descriptions
The plan • use binary relations and set variables to encode various kinds of trees
• use FS constraints and constraints on binary relations to encode constraints on trees
Tree regions self up down side
Rooted tree constraint rootedTree.v1 ; : : : ; vn ; R/ H) succ D pred
!1
H) succ" D Id [ succC H) succC D succ B succ" H) jRj D 1 H) V D R ] succ.v1 / ] : : : succ.vn / v 2 V H) v 2 R () pred.x/ D ;
Tree constraints root.v/
!
pred.v/ D ;
leaf.v/
!
succ.v/ D ;
edge.v1 ; v2 /
!
v2 2 succ.v1 /
dominates.v1 ; v2 /
!
v2 2 succ! .v1 /
Fourth graded assignment • implement a structure for constraints on binary relations
• implement solvers for rooted trees: • unordered trees • ordered trees