Sciweavers

2978 search results - page 191 / 596
» Operations Research
Sort
View
164
Voted
MINENET
2006
ACM
15 years 9 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
115
Voted
CPAIOR
2009
Springer
15 years 10 months ago
Six Ways of Integrating Symmetries within Non-overlapping Constraints
Abstract: This paper introduces six ways for handling a chain of lexicographic ordering constraint between the origins of identical orthotopes (e.g., rectangles, boxes, hyper-recta...
Magnus Ågren, Nicolas Beldiceanu, Mats Carls...
124
Voted
CPAIOR
2009
Springer
15 years 10 months ago
Reformulating Global Grammar Constraints
An attractive mechanism to specify global constraints in rostering and other domains is via formal languages. For instance, the REGULAR and GRAMMAR constraints specify constraints ...
George Katsirelos, Nina Narodytska, Toby Walsh
130
Voted
CPAIOR
2009
Springer
15 years 10 months ago
The Polytope of Context-Free Grammar Constraints
Context-free grammar constraints enforce that a sequence of variables forms a word in a language defined by a context-free grammar. The constraint has received a lot of attention ...
Gilles Pesant, Claude-Guy Quimper, Louis-Martin Ro...
129
Voted
CPAIOR
2009
Springer
15 years 10 months ago
Solution Enumeration for Projected Boolean Search Problems
Many real-world problems require the enumeration of all solutions of combinatorial search problems, even though this is often infeasible in practice. However, not always all parts ...
Martin Gebser, Benjamin Kaufmann, Torsten Schaub