The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
1996
DOI: 10.1007/3-540-61551-2_66
|View full text |Cite
|
Sign up to set email alerts
|

MAC and combined heuristics: Two reasons to forsake FC (and CBJ?) on hard problems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
135
0
5

Year Published

2001
2001
2012
2012

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 184 publications
(143 citation statements)
references
References 10 publications
3
135
0
5
Order By: Relevance
“…• For binary CSPs,for a long time it was considered that the Forward Checking algorithm (the filtering algorithms are triggered only when some variables are instantiated) was the most efficient one, but several studies showed that the systematic call of filtering algorithms after every modification is worthwhile (for instance see (Bessière and Régin, 1996)). All industrial solver vendors aim to solve real world applications and claim that the use of strong filtering algorithms is often essential.…”
Section: Power Of a Filtering Algorithmmentioning
confidence: 99%
“…• For binary CSPs,for a long time it was considered that the Forward Checking algorithm (the filtering algorithms are triggered only when some variables are instantiated) was the most efficient one, but several studies showed that the systematic call of filtering algorithms after every modification is worthwhile (for instance see (Bessière and Régin, 1996)). All industrial solver vendors aim to solve real world applications and claim that the use of strong filtering algorithms is often essential.…”
Section: Power Of a Filtering Algorithmmentioning
confidence: 99%
“…; init (X i ) denotes the set of nodes sharing an edge with the node X i (its initial neighbors). We de ne the set ; (X i ) as the current neighborhood of X i , namely, the neighbors remaining uninstantiated once a backtracking search procedure has instantiated 1 However, the techniques presented in the following of this paper can easily be extended to general non-binary constraint n e t works. the set Y = fX i1 : : : X i k g of variables, i.e., ; (X i ) = ; init (X i ) n Y .…”
Section: De Nitions and Notationsmentioning
confidence: 99%
“…Many works have studied the different levels of ltering that can be applied at each node of the search tree. In the following, we will use maintaining arc consistency (MAC) as our search algorithm 13,1].…”
Section: Introductionmentioning
confidence: 99%
“…• dom/ddeg [3]: it selects first the variable having the minimal ratio between domain size and degree. The degree can be computed dynamically by the number of constraints linking a given variable to uninstantiate variables;…”
Section: Introductionmentioning
confidence: 99%