Constraint-satisfaction search

Size: px
Start display at page:

Download "Constraint-satisfaction search"

Transcription

1 Lecture 6 onstraint-satisfaction search Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square Search problem search problem: Search space (or state space): a set of objects among which we conduct the search; Initial state: an object we start to search from; Operators (actions): transform one state in the search space to the other; Goal condition: describes the object we search for Possible metric on a search space: measures the quality of the object with regard to the goal Search problems occur in planning optimizations learning

2 onstraint satisfaction problem (SP) onstraint satisfaction problem (SP) is a configuration search problem where: state is defined by a set of variables Goal condition is represented by a set constraints on possible variable values Special properties of the SP allow more specific procedures to be designed and applied for solving them ample of a SP: N-queens Goal: n queens placed in non-attacking positions on the board Variables: Represent queens one for each column: Q1 Q Q3 Q Values: Row placement of each queen on the board {1 3 } Q1 = Q = onstraints: Qi Q j Q Q i j i j Two queens not in the same row Two queens not on the same diagonal

3 Satisfiability (ST) problem etermine whether a sentence in the conjunctive normal form (N) is satisfiable (can evaluate to true) Used in the propositional logic (covered later) ( P Q R) ( P R S ) ( P Q T )K Variables: Propositional symbols (P R T S) Values: True alse onstraints: very conjunct must evaluate to true at least one of the literals must evaluate to true ( P Q R) True ( P R S ) True K Other real world SP problems Scheduling problems:.g. telescope scheduling High-school class schedule esign problems: Hardware configurations VLSI design More comple problems may involve: real-valued variables additional preferences on variable assignments the optimal configuration is sought

4 Map coloring olor a map using k different colors such that no adjacent countries have the same color Variables:? Variable values:? onstraints:? Map coloring olor a map using k different colors such that no adjacent countries have the same color Variables: Represent countries Values: K -different colors {Red lue Green..} onstraints:?

5 Map coloring olor a map using k different colors such that no adjacent countries have the same color Variables: Represent countries Values: K -different colors {Red lue Green..} onstraints: etc n eample of a problem with binary constraints onstraint satisfaction as a search problem ormulation of a SP as a search problem: States. ssignments(partial complete) of values to variables. Initial state. No variable is assigned a value. Operators. ssign a value to one of the unassigned variables. Goal condition. ll variables are assigned no constraints are violated. onstraints can be represented: plicitly by a set of allowable values Implicitly by a function that tests for the satisfaction of constraints

6 Solving SP as a standard search Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q Q3 ssigned: Q 1 = 1 Unassigned: Q Q Q3 ssigned: Q 1 = Unassigned: ssigned: Q Q Q 3 = Q 1 = Solving a SP through standard search Maimum depth of the tree (m):? epth of the solution (d) :? ranching factor (b) :? Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: Q 3 Q ssigned: Q = Q 1 =

7 Solving a SP through standard search Maimum depth of the tree: Number of variables of the SP epth of the solution: Number of variables of the SP ranching factor: if we fi the order of variable assignments the branch factor depends on the number of their values Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: ssigned: Q Q Q 3 = Q 1 = Solving a SP through standard search What search algorithm to use:? epth of the tree = epth of the solution=number of vars Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: Q 3 Q ssigned: Q = Q 1 =

8 Solving a SP through standard search What search algorithm to use: epth first search Since we know the depth of the solution S in contet of SP is also referred to as backtracking Unassigned: Q Q Q Q ssigned: 1 3 Unassigned: Q Q3 Q ssigned: Q = 1 1 Unassigned: Q Q Q3 ssigned: Q = 1 Unassigned: ssigned: Q Q Q 3 = Q 1 = hecking constraint consistency The violation of constraints needs to be checked for each node either during its generation or before its epansion onsistency of constraints: urrent variable assignments together with constraints restrict remaining legal values of unassigned variables; The remaining legal and illegal values of variables may be inferred (effect of constraints propagates) To prevent blind search space eploration it is necessary to keep track of the remaining legal values so we know when the constraints are violated and when to terminate the search

9 onstraint propagation state (more broadly) is defined by a set of variables and their legal and illegal assignments Legal and illegal assignments can be represented through variable equations and variable disequations ample: map coloring quation = Red isequation Red onstraints + assignments can entail new equations and disequations = Red Red onstraint propagation: the process of inferring of new equations and disequations from eisting equations and disequations onstraint propagation ssign - equations - disequations

10 onstraint propagation ssign = - equations - disequations onstraint propagation ssign =lue =lue

11 onstraint propagation ssign =lue =? =lue onstraint propagation ssign =Green =Green =lue

12 onstraint propagation ssign =Green =Green =? =lue onstraint propagation ssign =Green =Green =? =lue onflict!!! No legal assignments available for and

13 onstraint propagation We can derive remaining legal values through propagation =Green =Green =? =? =lue onstraint propagation We can derive remaining legal values through propagation =? =? =lue =? =Green =Green =Red

14 onstraint propagation We can derive remaining legal values through propagation =lue =Green =Green =Red =Green =Green =Red onstraint propagation Three known techniques for propagating the effects of past assignments and constraints: Value propagation rc consistency orward checking ifference: ompleteness of inferences Time compleity of inferences.

15 onstraint propagation 1. Value propagation. Infers: equations from the set of equations defining the partial assignment and a constraint. rc consistency. Infers: disequations from the set of equations and disequations defining the partial assignment and a constraint equations through the ehaustion of alternatives 3. orward checking. Infers: disequations from a set of equations defining the partial assignment and a constraint quations through the ehaustion of alternatives Restricted forward checking: uses only active constraints (active constraint only one variable unassigned in the constraint) Value propagation: analysis Value propagation. Infers: equations from the set of equations defining the partial assignment and a constraint Procedure: t every step after a new variable gets assigned a value we check if a constrain does not imply a new equation on yet to be assigned variable. set of equations may be inferred

16 orward checking: analysis orward checking. Infers: disequations from a set of equations defining the partial assignment and a constraint quations through the ehaustion of alternatives Procedure: t every step after a new variable gets assigned a value (a new equation is created) we check a constraint if it does not imply a new disequation on yet to be assigned variable. fter all possible disequations are derived we check if a new equation is not implied by a set of disequations nd repeat till no new derivations can be made set of disequations and equations may be inferred rc consistency: analysis rc consistency. Infers: disequations from the set of equations and disequations defining the partial assignment and a constraint equations through the ehaustion of alternatives Procedure: t every step after a new equation or a disequation is generated we need to check constraints if a new disequation is not implied on yet to be assigned variable. fter all possible disequations are derived we check if a new equation is not implied by a set of disequations. nd repeat till no new derivations are possible set of disequations and equations may be inferred

17 Heuristics for SPs acktracking searches the space in the depth-first manner. ut we still can choose: Which variable to assign net? Which value to choose first? Heuristics Most constrained variable Which variable is likely to become a bottleneck? Least constraining value Which value gives us more fleibility later? amples: map coloring Heuristics for SP Heuristics Most constrained variable ountry is the most constrained one (cannot use Red Green) Least constraining value ssume we have chosen variable Red is the least constraining valid color for the future

Smart Graphics: Methoden 3 Suche, Constraints

Smart Graphics: Methoden 3 Suche, Constraints Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated

More information

Satisfiability Checking

Satisfiability Checking Satisfiability Checking SAT-Solving Prof. Dr. Erika Ábrahám Theory of Hybrid Systems Informatik 2 WS 10/11 Prof. Dr. Erika Ábrahám - Satisfiability Checking 1 / 40 A basic SAT algorithm Assume the CNF

More information

Today s topic: So far, we have talked about. Question. Task models

Today s topic: So far, we have talked about. Question. Task models Overall Stucture of Real Time Systems So far, we have talked about Task...... Task n Programming Languages to implement the Tasks Run-TIme/Operating Systems to run the Tasks RTOS/Run-Time System Hardware

More information

Y. Xiang, Constraint Satisfaction Problems

Y. Xiang, Constraint Satisfaction Problems Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are

More information

o Graph an expression as a function of the chosen independent variable to determine the existence of a minimum or maximum

o Graph an expression as a function of the chosen independent variable to determine the existence of a minimum or maximum Two Parabolas Time required 90 minutes Teaching Goals:. Students interpret the given word problem and complete geometric constructions according to the condition of the problem.. Students choose an independent

More information

Resources, process calculi and Godel-Dummett logics

Resources, process calculi and Godel-Dummett logics Resources, process calculi and Godel-Dummett logics Dominique Larchey LORIA { CNRS Nancy, France 1 Gödel-Dummett logics LC Most studied intermediate logic IL LC CL Proof theory, proof-search IL (Dyckho

More information

Optimizing Description Logic Subsumption

Optimizing Description Logic Subsumption Topics in Knowledge Representation and Reasoning Optimizing Description Logic Subsumption Maryam Fazel-Zarandi Company Department of Computer Science University of Toronto Outline Introduction Optimization

More information

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed shf_ibrahim@yahoo.com Khaled M. F. Elsayed, senior member IEEE khaled@ieee.org Department

More information

Traditional Conjoint Analysis with Excel

Traditional Conjoint Analysis with Excel hapter 8 Traditional onjoint nalysis with Excel traditional conjoint analysis may be thought of as a multiple regression problem. The respondent s ratings for the product concepts are observations on the

More information

CS510 Software Engineering

CS510 Software Engineering CS510 Software Engineering Propositional Logic Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15-cs510-se

More information

Sudoku puzzles and how to solve them

Sudoku puzzles and how to solve them Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned

More information

Roots of equation fx are the values of x which satisfy the above expression. Also referred to as the zeros of an equation

Roots of equation fx are the values of x which satisfy the above expression. Also referred to as the zeros of an equation LECTURE 20 SOLVING FOR ROOTS OF NONLINEAR EQUATIONS Consider the equation f = 0 Roots of equation f are the values of which satisfy the above epression. Also referred to as the zeros of an equation f()

More information

University of Potsdam Faculty of Computer Science. Clause Learning in SAT Seminar Automatic Problem Solving WS 2005/06

University of Potsdam Faculty of Computer Science. Clause Learning in SAT Seminar Automatic Problem Solving WS 2005/06 University of Potsdam Faculty of Computer Science Clause Learning in SAT Seminar Automatic Problem Solving WS 2005/06 Authors: Richard Tichy, Thomas Glase Date: 25th April 2006 Contents 1 Introduction

More information

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various

More information

Checking for Dimensional Correctness in Physics Equations

Checking for Dimensional Correctness in Physics Equations Checking for Dimensional Correctness in Physics Equations C.W. Liew Department of Computer Science Lafayette College liew@cs.lafayette.edu D.E. Smith Department of Computer Science Rutgers University dsmith@cs.rutgers.edu

More information

Decision making in the presence of uncertainty II

Decision making in the presence of uncertainty II CS 274 Knowledge representation Lecture 23 Decision making in the presence of uncertainty II Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Information-gathering actions Many actions and their

More information

Resources Management

Resources Management Resources Management. Introduction s we have seen in network scheduling, the basic inputs to criticalpath analysis are the individual project activities, their durations, and their dependency relationships.

More information

A Tool for Generating Partition Schedules of Multiprocessor Systems

A Tool for Generating Partition Schedules of Multiprocessor Systems A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.

More information

D1.1 Service Discovery system: Load balancing mechanisms

D1.1 Service Discovery system: Load balancing mechanisms D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction

More information

Mathematics More Visual Using Algebra Tiles

Mathematics More Visual Using Algebra Tiles www.cpm.org Chris Mikles CPM Educational Program A California Non-profit Corporation 33 Noonan Drive Sacramento, CA 958 (888) 808-76 fa: (08) 777-8605 email: mikles@cpm.org An Eemplary Mathematics Program

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

UPnP Logo Usage Guidelines 2016 Open Interconnect Consortium, Inc. All rights reserved. UPnP Logo Usage Guidelines

UPnP Logo Usage Guidelines 2016 Open Interconnect Consortium, Inc. All rights reserved. UPnP Logo Usage Guidelines UPnP Logo Usage Guidelines Prepared by Updated January 2016 1 Legal Disclaimer LEGAL DISCLAIMER: NOTHING CONTAINED IN THIS DOCUMENT SHALL BE DEEMED AS GRANTING YOU ANY KIND OF LICENSE IN ITS CONTENT, EITHER

More information

A search based Sudoku solver

A search based Sudoku solver A search based Sudoku solver Tristan Cazenave Labo IA Dept. Informatique Université Paris 8, 93526, Saint-Denis, France, cazenave@ai.univ-paris8.fr Abstract. Sudoku is a popular puzzle. In this paper we

More information

Sudoku as a SAT Problem

Sudoku as a SAT Problem Sudoku as a SAT Problem Inês Lynce IST/INESC-ID, Technical University of Lisbon, Portugal ines@sat.inesc-id.pt Joël Ouaknine Oxford University Computing Laboratory, UK joel@comlab.ox.ac.uk Abstract Sudoku

More information

Introduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four

Introduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four March 9, 2010 is a tic-tac-toe like game in which two players drop discs into a 7x6 board. The first player to get four in a row (either vertically, horizontally, or diagonally) wins. The game was first

More information

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q... Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00

More information

USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE

USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE Keith Brandt, Kevin R. Burger, Jason Downing, Stuart Kilzer Mathematics, Computer Science, and Physics Rockhurst University, 1100 Rockhurst Road,

More information

Lab 4: 26 th March 2012. Exercise 1: Evolutionary algorithms

Lab 4: 26 th March 2012. Exercise 1: Evolutionary algorithms Lab 4: 26 th March 2012 Exercise 1: Evolutionary algorithms 1. Found a problem where EAs would certainly perform very poorly compared to alternative approaches. Explain why. Suppose that we want to find

More information

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015 Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students

More information

Integrating Benders decomposition within Constraint Programming

Integrating Benders decomposition within Constraint Programming Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

Integration of ACO in a Constraint Programming Language

Integration of ACO in a Constraint Programming Language Integration of ACO in a Constraint Programming Language Madjid Khichane 12, Patrick Albert 1, and Christine Solnon 2 1 ILOG 2 LIRIS, UMR 5205 CNRS / University of Lyon ANTS 08 Motivations Ant Colony Optimization

More information

6. Cholesky factorization

6. Cholesky factorization 6. Cholesky factorization EE103 (Fall 2011-12) triangular matrices forward and backward substitution the Cholesky factorization solving Ax = b with A positive definite inverse of a positive definite matrix

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

EXAM. Exam #3. Math 1430, Spring 2002. April 21, 2001 ANSWERS

EXAM. Exam #3. Math 1430, Spring 2002. April 21, 2001 ANSWERS EXAM Exam #3 Math 1430, Spring 2002 April 21, 2001 ANSWERS i 60 pts. Problem 1. A city has two newspapers, the Gazette and the Journal. In a survey of 1, 200 residents, 500 read the Journal, 700 read the

More information

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations

More information

Enumerating possible Sudoku grids

Enumerating possible Sudoku grids Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany bf@mail.inf.tu-dresden.de Frazer Jarvis Department of Pure Mathematics University of Sheffield,

More information

BOOLEAN ALGEBRA & LOGIC GATES

BOOLEAN ALGEBRA & LOGIC GATES BOOLEAN ALGEBRA & LOGIC GATES Logic gates are electronic circuits that can be used to implement the most elementary logic expressions, also known as Boolean expressions. The logic gate is the most basic

More information

Constrained Clustering of Territories in the Context of Car Insurance

Constrained Clustering of Territories in the Context of Car Insurance Constrained Clustering of Territories in the Context of Car Insurance Samuel Perreault Jean-Philippe Le Cavalier Laval University July 2014 Perreault & Le Cavalier (ULaval) Constrained Clustering July

More information

Project Scheduling. Introduction

Project Scheduling. Introduction Project Scheduling Introduction In chapter, the O and ON networks were presented, also the time and cost of individual activities based were calculated. Yet, however, we do not know how long is the total

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

Minerva Access is the Institutional Repository of The University of Melbourne

Minerva Access is the Institutional Repository of The University of Melbourne Minerva Access is the Institutional Repository of The University of Melbourne Author/s: Chu, Geoffrey G. Title: Improving combinatorial optimization Date: 2011 Citation: Chu, G. G. (2011). Improving combinatorial

More information

The Operational Value of Social Media Information. Social Media and Customer Interaction

The Operational Value of Social Media Information. Social Media and Customer Interaction The Operational Value of Social Media Information Dennis J. Zhang (Kellogg School of Management) Ruomeng Cui (Kelley School of Business) Santiago Gallino (Tuck School of Business) Antonio Moreno-Garcia

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering

More information

Incremental Reduction of Binary Decision Diagrams

Incremental Reduction of Binary Decision Diagrams Abstract Incremental Reduction of Binar Decision Diagrams R. Jacobi, N. Calazans, C. Trullemans. Université de Louvain Laboratoire de Microélectronique - Place du Levant, 3 B1348 Louvain-la-Neuve Belgium

More information

10/13/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening

10/13/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening 10/1/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening When answering the question in Parts C.1 and C. below, assume you have already applied minimax with alpha-beta pruning and progressive

More information

Implementing Graph Pattern Queries on a Relational Database

Implementing Graph Pattern Queries on a Relational Database LLNL-TR-400310 Implementing Graph Pattern Queries on a Relational Database Ian L. Kaplan, Ghaleb M. Abdulla, S Terry Brugger, Scott R. Kohn January 8, 2008 Disclaimer This document was prepared as an account

More information

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA jiangh@benedict.edu ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has

More information

each college c i C has a capacity q i - the maximum number of students it will admit

each college c i C has a capacity q i - the maximum number of students it will admit n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i

More information

Logic Cuts Generation in a Branch and Cut Framework for Location Problems Mara A. Osorio Lama School of Computer Science Autonomous University of Puebla, Puebla 72560 Mexico Rosalba Mujica Garca Abstract

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Operational Indicators for public transport companies

Operational Indicators for public transport companies Operational Indicators for public transport companies João Mendes Moreira, Jorge Freire de Sousa INEGI, Rua dos Bragas, 4099 Porto Code, Portugal Tel: +351-2-2073650 Fa: +351-2-2073659 Email: joao@gist.fe.up.pt

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Computer Network Design - 6

Computer Network Design - 6 opyright Review of fundamentals working concepts ndrea ianco Paolo Giaccone Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ Quest opera è protetta dalla licenza

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Access control for data integration in presence of data dependencies. Mehdi Haddad, Mohand-Saïd Hacid

Access control for data integration in presence of data dependencies. Mehdi Haddad, Mohand-Saïd Hacid Access control for data integration in presence of data dependencies Mehdi Haddad, Mohand-Saïd Hacid 1 Outline Introduction Motivating example Related work Approach Detection phase (Re)configuration phase

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

Constraints Propagation Techniques in Batch Plants Planning and Scheduling

Constraints Propagation Techniques in Batch Plants Planning and Scheduling European Symposium on Computer Arded Aided Process Engineering 15 L. Puigjaner and A. Espuña (Editors) 2005 Elsevier Science B.V. All rights reserved. Constraints Propagation Techniques in Batch Plants

More information

Polynomial Degree and Finite Differences

Polynomial Degree and Finite Differences CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson you will learn the terminology associated with polynomials use the finite differences method to determine the degree of a polynomial

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2

IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2 IEOR 4404 Homework # Intro OR: Deterministic Models February 14, 011 Prof. Jay Sethuraman Page 1 of 5 Homework #.1 (a) What is the optimal solution of this problem? Let us consider that x 1, x and x 3

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

(b) (b) f 1 = x 1 x 2 ( x 3 v x 4 )

(b) (b) f 1 = x 1 x 2 ( x 3 v x 4 ) On Bi-Decompositions of Logic Functions Tsutomu Sasao Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka 820, Japan Jon T. Butler Department of Electrical and Computer

More information

STATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. Clarificationof zonationprocedure described onpp. 238-239

STATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. Clarificationof zonationprocedure described onpp. 238-239 STATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. by John C. Davis Clarificationof zonationprocedure described onpp. 38-39 Because the notation used in this section (Eqs. 4.8 through 4.84) is inconsistent

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Important Notice RAID System Monitoring on VMware vsphere 5 vsphere Client

Important Notice RAID System Monitoring on VMware vsphere 5 vsphere Client Important Notice RAID System Monitoring on VMware vsphere 5 vsphere Client This document includes important notice for using vsphere Client of VMware vsphere 5 for monitoring the statuses of RAID Controller.

More information

Oracle Primavera. P6 Resource Leveling Demo Script

Oracle Primavera. P6 Resource Leveling Demo Script Oracle Primavera P6 Resource Leveling Demo Script Script Team Information Role Name Email Primary Author L. Camille Frost Camille.Frost@oracle.com Contributor Reviewer Geoff Roberts Geoff.Roberts@oracle.com

More information

9.3 OPERATIONS WITH RADICALS

9.3 OPERATIONS WITH RADICALS 9. Operations with Radicals (9 1) 87 9. OPERATIONS WITH RADICALS In this section Adding and Subtracting Radicals Multiplying Radicals Conjugates In this section we will use the ideas of Section 9.1 in

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without

More information

Heuristics for Dynamically Adapting Constraint Propagation in Constraint Programming

Heuristics for Dynamically Adapting Constraint Propagation in Constraint Programming Heuristics for Dynamically Adapting Constraint Propagation in Constraint Programming Kostas Stergiou AI Lab University of the Aegean Greece CPAIOR 09 Workshop on Bound reduction techniques for CP and MINLP

More information

query Form and Comprehension in Expressible Lisp

query Form and Comprehension in Expressible Lisp A New Advanced Query Web Page and its query language To replace the advanced query web form on www.biocyc.org Mario Latendresse Bioinformatics Research Group SRI International Mario@ai.sri.com 1 The Actual

More information

Online Store order process within SAP 2 nd December 2013

Online Store order process within SAP 2 nd December 2013 Information Systems Services Online Store order process within SAP 2 nd December 2013 Contents Overview of functionality within SAP... 2 Store transaction / order reporting... 2 Printing invoices... 3

More information

X_TRADER Spread Matrix

X_TRADER Spread Matrix X_TRADER Spread Matrix Version 7.x Setup Guide 03 Introduction 04 Launching the Spread Matrix 05 Navigating the Spread Matrix 08 Configuring the Spread Matrix 11 Trading from the Spread Matrix Displaying

More information

CGN 3421 - Computer Methods

CGN 3421 - Computer Methods CGN 3421 - Computer Methods Class web site: www.ce.ufl.edu/~kgurl Class text books: Recommended as a reference Numerical Methods for Engineers, Chapra and Canale Fourth Edition, McGraw-Hill Class software:

More information

Clustering and scheduling maintenance tasks over time

Clustering and scheduling maintenance tasks over time Clustering and scheduling maintenance tasks over time Per Kreuger 2008-04-29 SICS Technical Report T2008:09 Abstract We report results on a maintenance scheduling problem. The problem consists of allocating

More information

Any two nodes which are connected by an edge in a graph are called adjacent node.

Any two nodes which are connected by an edge in a graph are called adjacent node. . iscuss following. Graph graph G consist of a non empty set V called the set of nodes (points, vertices) of the graph, a set which is the set of edges and a mapping from the set of edges to a set of pairs

More information

Survey and remarks on Viro s definition of Khovanov homology

Survey and remarks on Viro s definition of Khovanov homology RIMS Kôkyûroku Bessatsu B39 (203), 009 09 Survey and remarks on Viro s definition of Khovanov homology By Noboru Ito Abstract This paper reviews and offers remarks upon Viro s definition of the Khovanov

More information

Lecture 10: TEM, TE, and TM Modes for Waveguides. Rectangular Waveguide.

Lecture 10: TEM, TE, and TM Modes for Waveguides. Rectangular Waveguide. Whites, EE 481/581 Lecture 10 Page 1 of 10 Lecture 10: TEM, TE, and TM Modes for Waveguides. Rectangular Waveguide. We will now generalie our discussion of transmission lines by considering EM waveguides.

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

For each Circle C, find the value of x. Assume that segments that appear to be tangent are tangent. 1. x = 2. x =

For each Circle C, find the value of x. Assume that segments that appear to be tangent are tangent. 1. x = 2. x = Name: ate: Period: Homework - Tangents For each ircle, find the value of. ssume that segments that appear to be tangent are tangent. 1. =. = ( 5) 1 30 0 0 3. =. = (Leave as simplified radical!) 3 8 In

More information

Test Problem Construction for Single-Objective Bilevel Optimization

Test Problem Construction for Single-Objective Bilevel Optimization Test Problem Construction for Single-Objective Bilevel Optimization Ankur Sinha, Pekka Malo Department of Information and Service Economy Aalto University School of Business, Finland {Firstname.Lastname}@aalto.fi

More information

Lecture 7: NP-Complete Problems

Lecture 7: NP-Complete Problems IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit

More information

MetaGame: An Animation Tool for Model-Checking Games

MetaGame: An Animation Tool for Model-Checking Games MetaGame: An Animation Tool for Model-Checking Games Markus Müller-Olm 1 and Haiseung Yoo 2 1 FernUniversität in Hagen, Fachbereich Informatik, LG PI 5 Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de

More information

A Direct Numerical Method for Observability Analysis

A Direct Numerical Method for Observability Analysis IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards

More information

Sudoku Madness. Team 3: Matt Crain, John Cheng, and Rabih Sallman

Sudoku Madness. Team 3: Matt Crain, John Cheng, and Rabih Sallman Sudoku Madness Team 3: Matt Crain, John Cheng, and Rabih Sallman I. Problem Description Standard Sudoku is a logic-based puzzle in which the user must fill a 9 x 9 board with the appropriate digits so

More information

Differential privacy in health care analytics and medical research An interactive tutorial

Differential privacy in health care analytics and medical research An interactive tutorial Differential privacy in health care analytics and medical research An interactive tutorial Speaker: Moritz Hardt Theory Group, IBM Almaden February 21, 2012 Overview 1. Releasing medical data: What could

More information

Circuit Analysis using the Node and Mesh Methods

Circuit Analysis using the Node and Mesh Methods Circuit Analysis using the Node and Mesh Methods We have seen that using Kirchhoff s laws and Ohm s law we can analyze any circuit to determine the operating conditions (the currents and voltages). The

More information

A puzzle. Suppose that you want to run some JavaScript programs---all the cool kids are doing it.

A puzzle. Suppose that you want to run some JavaScript programs---all the cool kids are doing it. A puzzle Suppose that you want to run some JavaScript programs---all the cool kids are doing it. However, you are deathly afraid that your mom/ significant other/boss will see the curse word b00 appear

More information

Likewise, we have contradictions: formulas that can only be false, e.g. (p p).

Likewise, we have contradictions: formulas that can only be false, e.g. (p p). CHAPTER 4. STATEMENT LOGIC 59 The rightmost column of this truth table contains instances of T and instances of F. Notice that there are no degrees of contingency. If both values are possible, the formula

More information

Binary Adders: Half Adders and Full Adders

Binary Adders: Half Adders and Full Adders Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order

More information

CS311 Lecture: Sequential Circuits

CS311 Lecture: Sequential Circuits CS311 Lecture: Sequential Circuits Last revised 8/15/2007 Objectives: 1. To introduce asynchronous and synchronous flip-flops (latches and pulsetriggered, plus asynchronous preset/clear) 2. To introduce

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Utility Maximization

Utility Maximization Utility Maimization Given the consumer's income, M, and prices, p and p y, the consumer's problem is to choose the a ordable bundle that maimizes her utility. The feasible set (budget set): total ependiture

More information

Mathematics Test Book 1

Mathematics Test Book 1 Mathematics Test ook 1 Grade 7 March 9 13, 2009 21317 eveloped and published under contract with the New York State Education epartment by T/McGraw-Hill LL, a subsidiary of The McGraw-Hill ompanies, Inc.,

More information

Educator s Guide to Excel Graphing

Educator s Guide to Excel Graphing Educator s Guide to Excel Graphing Overview: Students will use Excel to enter data into a spreadsheet and make a graph. Grades and Subject Areas: Grade 3-6 Subject Math Objectives: Students will: make

More information