Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Semirings for Soft Constraint Solving and Programming (LECTURE NOTES IN COMPUTER SCIENCE)July 2004
Publisher:
  • SpringerVerlag
ISBN:978-3-540-21181-5
Published:01 July 2004
Skip Bibliometrics Section
Reflects downloads up to 30 Aug 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Schiendorfer A, Knapp A, Anders G and Reif W (2018). MiniBrass, Constraints, 23:4, (403-450), Online publication date: 1-Oct-2018.
  2. ACM
    Green T and Tannen V The Semiring Framework for Database Provenance Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (93-99)
  3. ACM
    Tannen V (2017). Provenance analysis for FOL model checking, ACM SIGLOG News, 4:1, (24-36), Online publication date: 9-Feb-2017.
  4. ACM
    Gao P, Miao H, Baras J and Golbeck J STAR Proceedings of the 10th ACM Conference on Recommender Systems, (301-308)
  5. ACM
    Amor I, Benbernou S, Ouziri M, Malik Z and Medjahed B (2016). Discovering Best Teams for Data Leak-Aware Crowdsourcing in Social Networks, ACM Transactions on the Web, 10:1, (1-27), Online publication date: 17-Feb-2016.
  6. Werner T (2015). Marginal Consistency: Upper-Bounding Partition Functions over Commutative Semirings, IEEE Transactions on Pattern Analysis and Machine Intelligence, 37:7, (1455-1468), Online publication date: 1-Jul-2015.
  7. ACM
    Arbab F, Santini F, Bistarelli S and Pirolandi D Towards a similarity-based web service discovery through soft constraint satisfaction problems Proceedings of the 2nd International Workshop on Semantic Search over the Web, (1-8)
  8. ACM
    Anders T and Miranda E (2011). Constraint programming systems for modeling music theories and composition, ACM Computing Surveys, 43:4, (1-38), Online publication date: 1-Oct-2011.
  9. Moffitt M (2011). On the modelling and optimization of preferences in constraint-based temporal reasoning, Artificial Intelligence, 175:7-8, (1390-1409), Online publication date: 1-May-2011.
  10. Brafman R (2011). Relational preference rules for control, Artificial Intelligence, 175:7-8, (1180-1193), Online publication date: 1-May-2011.
  11. ACM
    Bistarelli S, Campli P and Santini F Finding partitions of arguments with Dung's properties via SCSPs Proceedings of the 2011 ACM Symposium on Applied Computing, (913-919)
  12. Bistarelli S, Gadducci F, Larrosa J, Rollon E and Santini F Extending soft arc consistency algorithms to non-invertible semirings Proceedings of the 9th Mexican international conference on Advances in artificial intelligence: Part I, (386-398)
  13. Bistarelli S, Martinelli F and Santini F A formal framework for trust policy negotiation in autonomic systems Proceedings of the 7th international conference on Autonomic and trusted computing, (268-282)
  14. ACM
    Bistarelli S, Montanari U, Rossi F and Santini F (2010). Unicast and multicast QoS routing with soft-constraint logic programming, ACM Transactions on Computational Logic, 12:1, (1-48), Online publication date: 1-Oct-2010.
  15. Bistarelli S and Santini F A Common Computational Framework for Semiring-based Argumentation Systems Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (131-136)
  16. Bistarelli S, Pirolandi D and Santini F Solving weighted argumentation frameworks with soft constraints Proceedings of the 14th Annual ERCIM international conference on Constraint solving and constraint logic programming, (1-18)
  17. Bistarelli S and Santini F (2009). A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation, Electronic Notes in Theoretical Computer Science (ENTCS), 236, (147-162), Online publication date: 1-Apr-2009.
  18. ACM
    Green T Containment of conjunctive queries on annotated relations Proceedings of the 12th International Conference on Database Theory, (296-309)
  19. Bistarelli S and Santini F SCLP for Trust Propagation in Small-World Networks Recent Advances in Constraints, (32-46)
  20. Brafman R Relational preference rules for control Proceedings of the Eleventh International Conference on Principles of Knowledge Representation and Reasoning, (552-559)
  21. Santini F Managing quality of service with soft constraints Proceedings of the 23rd national conference on Artificial intelligence - Volume 3, (1869-1870)
  22. Bistarelli S, Gabbrielli M, Meo M and Santini F Timed soft concurrent constraint programs Proceedings of the 10th international conference on Coordination models and languages, (50-66)
  23. Bistarelli S and Rossi F Semiring-Based Soft Constraints Concurrency, Graphs and Models, (155-173)
  24. Lapadula A, Pugliese R and Tiezzi F (2008). Service Discovery and Negotiation With COWS, Electronic Notes in Theoretical Computer Science (ENTCS), 200:3, (133-154), Online publication date: 1-May-2008.
  25. Foley S, Bella G and Bistarelli S Security protocol deployment risk Proceedings of the 16th International conference on Security protocols, (12-20)
  26. ACM
    Bistarelli S and Santini F Propagating multitrust within trust networks Proceedings of the 2008 ACM symposium on Applied computing, (1990-1994)
  27. Smith B, Bistarelli S and O'Sullivan B Constraint symmetry for the soft CSP Proceedings of the 13th international conference on Principles and practice of constraint programming, (872-879)
  28. Wirsing M, Denker G, Talcott C, Poggio A and Briesemeister L (2007). A Rewriting Logic Framework for Soft Constraints, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (181-197), Online publication date: 1-Jul-2007.
  29. Bistarelli S and Bonchi F (2007). Soft constraint based pattern mining, Data & Knowledge Engineering, 62:1, (118-137), Online publication date: 1-Jul-2007.
  30. ACM
    Werner T What is decreased by the max-sum arc consistency algorithm? Proceedings of the 24th international conference on Machine learning, (1007-1014)
  31. Zheng Y, Wang J and Xue J Agent based framework for emergency rescue and assistance planning Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics, (70-81)
  32. Foley S, Fitzgerald W, Bistarelli S, O'Sullivan B and Foghlú M Principles of secure network configuration Proceedings of the 6th IEEE international conference on IP Operations and Management, (168-180)
  33. Zheng Y, Wang L and Xue J An a-team based architecture for constraint programming Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems, (552-557)
  34. Chang L and Mackworth A Local consistency in junction graphs for constraint-based inference proceedings of the 21st national conference on Artificial intelligence - Volume 2, (1861-1862)
  35. Bistarelli S and Gadducci F Enhancing constraints manipulation in semiring-based formalisms Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy, (63-67)
  36. Aziz B (2006). A Semiring-based Quantitative Analysis of Mobile Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 157:1, (3-21), Online publication date: 1-May-2006.
  37. Delgado A, Pérez J and Rueda C Implementing an abstraction framework for soft constraints Proceedings of the 6th international conference on Abstraction, Reformulation and Approximation, (60-75)
  38. Delgado A, Olarte C, Pérez J and Rueda C Implementing semiring-based constraints using mozart Proceedings of the Second international conference on Multiparadigm Programming in Mozart/Oz, (224-236)
Contributors
  • University of Perugia

Reviews

Jonathan Samuel Golan

Semirings (essentially, "rings without subtraction") are algebraic structures that have found many important applications in computer science, both on the theoretical and applied levels. Especially useful are complete lattice-ordered semirings, which also have the structure of a complete lattice for which the semiring addition and the lattice max operation coincide. One of the major applications of such semirings is shown here, in the area of constraint satisfaction problems (CSPs). The extension of CSPs to the more general notion of soft constraint satisfaction problems (SCSPs), by using semirings, is the subject of this monograph, which constitutes an extended and revised version of Bistarelli's Ph.D. thesis, written under the direction of two acknowledged masters in this area: Ugo Montanari, of the University of Pisa, and Francesca Rossi, of the University of Padova. The definitions of constraint satisfaction problems and soft constraint satisfaction problems are highly technical, and beyond the scope of a short review. Very roughly, however, we note that the distinction between them is that SCSPs allow us to cope with incomplete knowledge of real problems, to solve over-constrained problems, or to represent cost-optimization problems. This, therefore, provides a framework that includes, not only (crisp) CSPs, but also fuzzy, probabilistic, and weighted CSPs. After a brief introduction to constraint satisfaction problems and constraint logical programming (CLP), the book covers the following major topics: SCSPs and their solutions, SCSP abstraction, higher-order semiring-based constraints, soft CLP and its application to generalized shortest path problems, soft concurrent constraint programming, interchangeability in SCSPs, and SCSPs for modeling attacks on security protocols. It ends with short conclusions, and suggested directions for future research. There is no index, which is a definite drawback. Another unfortunate point is the author's lack of familiarity with the (very extensive) algebraic literature on semirings, which would have considerably simplified some of his definitions and proofs. It would be very useful to have available a deeper mathematical treatment of some of the topics covered here, though this (I definitely wish to emphasize) does not detract from the importance of this volume. The author begins by quoting Eugene Freuder: "Constraint programming represents one of the closest approaches computer science has yet made to the Holy Grail of programming: the user states the problem, the computer solves it." Soft constraint programming takes us closer still, though at the cost of demanding considerably more mathematical sophistication. It is a cost that computer scientists will have to learn to pay.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations