830,495 Hits in 4.0 sec

Fixing Configuration Inconsistencies across File Type Boundaries

Christoph Elsner, Daniel Lohmann, Wolfgang Schroder-Preikschat
2011 2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications  
Enforcing constraints across file types boundaries already at configuration is necessary to prevent inconsistencies, which otherwise are costly to discover and resolve later on.  ...  We present a pragmatic framework to specify and apply inconsistency-resolving fixes on configuration files of arbitrary types.  ...  APPLIED TO SEVEN CONFIGURATION FILE TYPES.  ... 
doi:10.1109/seaa.2011.26 dblp:conf/euromicro/ElsnerLS11 fatcat:e3og2pykrbh6damgtgtj34rvqi

Entropy Maximization and the Spatial Distribution of Species

Bart Haegeman, Rampal S. Etienne
2010 American Naturalist  
We show that the EM outcome depends on (1) the choice of configuration set, (2) the way constraints are imposed, and (3) the scale on which the EM procedure is applied.  ...  It has been applied recently to predict ecological patterns, such as species abundance distributions and species-area relationships.  ...  APPENDIX A EM for Labeled Configurations We apply the EM algorithm under the assumption that labeled configurations m are a priori equally probable. We  ... 
doi:10.1086/650718 pmid:20166816 fatcat:ild754mtx5hspf63thp3765igu

Guaranteeing Soundness of Configurable Process Variants in Provop

Alena Hallerbach, Thomas Bauer, Manfred Reichert
2009 2009 IEEE Conference on Commerce and Enterprise Computing  
In this paper we discuss advanced concepts for the context-and constraint-based configuration of process variants, and show how they can be utilized to ensure soundness of the configured process variants  ...  the large number of process variants that exist in practice as well as the many syntactical and semantical constraints they have to obey.  ...  This paper has put emphasis on how to ensure soundness of the configurable variants of a whole process family, taking into account semantical as well as structural constraints.  ... 
doi:10.1109/cec.2009.62 dblp:conf/wecwis/HallerbachBR09 fatcat:ubektqfoereyxgq4n7oyu2cwse

Evaluating Feature Change Impact on Multi-product Line Configurations Using Partial Information [chapter]

Nicolas Dintzner, Uirá Kulesza, Arie van Deursen, Martin Pinzger
2014 Lecture Notes in Computer Science  
In this paper, we present an approach for computing the impact of a feature change on the existing configurations of a multi-product line, using partial information regarding constraints between feature  ...  Evolving large-scale, complex and highly variable systems is known to be a difficult task, where a single change can ripple through various parts of the system with potentially undesirable effects.  ...  We apply the operations described in Algorithm 2. If any configuration is invalidated, we use the output of this step to re-apply Step 3.1. Step 4: Consolidate results.  ... 
doi:10.1007/978-3-319-14130-5_1 fatcat:hf7ycfy37vc3bo4i34ghvfbriu

Automated Completion of Partial Configurations as a Diagnosis Task Using FastDiag to Improve Performance [chapter]

Cristian Vidal-Silva, José A. Galindo, Jesús Giráldez-Cru, David Benavides
2021 Studies in Computational Intelligence  
In this work, we propose an approach to define the completion of a partial configuration like a diagnosis task to solve it by applying the FastDiag algorithm, an efficient solution for preferred minimal  ...  Existing solutions, such as those which use modern constraint satisfaction solvers, perform a complete search, making them unsuitable on large-scale configurations.  ...  [2] apply a model-based diagnosis to identify the set of relaxable constraints on conflict sets in a CSP context.  ... 
doi:10.1007/978-3-030-67148-8_9 fatcat:gbpogh7kgbei3mv2v4c7ox5zni

A Six Degree-of-Freedom God-Object Method for Haptic Display of Rigid Bodies with Surface Properties

Michael Ortega, Stephane Redon, Sabine Coquillart
2007 IEEE Transactions on Visualization and Computer Graphics  
The constraint-based force applied to the user, which handles any number of simultaneous contact points, is computed within a few microseconds, while the update of the configuration of the rigid god-object  ...  The force applied to the user is computed using a novel constraint-based quasi-static approach, which allows us to suppress force artifacts typically found in previous methods.  ...  They also wish to thank Dr. Ming C. Lin and Dr. Miguel A. Otaduy for insightful discussions, and Stanford University for the original bunny models.  ... 
doi:10.1109/tvcg.2007.1028 pmid:17356213 fatcat:ngzctletprhl5jgeyeicrsdquu

Towards a Search-based Interactive Configuration of Cyber Physical System Product Lines

Kunming Nie, Tao Yue, Shaukat Ali
2013 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
Then we conducted some pilot experiments on applying search algorithms to find optimal decision orders for configuring a product.  ...  A CPS often contains many heterogeneous components with complex constraints relevant to product configuration in the context of PLE.  ...  In our solution, we need to transform UML class diagrams with the SimPL profile applied and OCL constraints into the configuration model.  ... 
dblp:conf/models/NieYA13 fatcat:iaqopz4y2ffuppeb4mzw6o42eq

Level set-based topology optimisation of a compliant mechanism design using mathematical programming

M. Otomori, T. Yamada, K. Izui, S. Nishiwaki
2011 Mechanical Sciences  
To verify its capability, we apply our method to compliant mechanism design problems that include displacement constraints and stress constraints.</p>  ...  Level set-based topology optimisation methods are immune to the problem of grayscales since the boundaries of the optimal configuration are implicitly represented using the level set function.  ...  The authors would like to gratefully acknowledge Krister Svanberg's help in providing MMA code.  ... 
doi:10.5194/ms-2-91-2011 fatcat:3cprsdscc5bvxa7efmgse4jgiu

Information Support of FMS Configuration Design [chapter]

Alexander V. Smirnov, Leonid B. Sheremetov, Pavel A. Turbin
1996 IFIP Advances in Information and Communication Technology  
This paper describes an approach to configuration design, based on an integration of dynamic constraint network and object-oriented paradigms for knowledge representation.  ...  An implementation of the concept for information support of configuration design of FMS is considered on an example of environment for the Design of Structured Objects -DESO.  ...  Dynamic constraint network model To deal with the concept scheme of configuration design process defined in terms of constraints, DCN model is applied.  ... 
doi:10.1007/978-0-387-35065-3_35 fatcat:s4n6ybnraffsvkfm4mwrosrofi

Adding Image Constraints to Inverse Kinematics for Human Motion Capture

Antoni Jaume-i-Capó, Javier Varona, Manuel González-Hidalgo, Francisco J. Perales
2009 EURASIP Journal on Advances in Signal Processing  
In this paper, we present how to add image constraints to inverse kinematics in order to estimate human motion.  ...  Specifically, we explain how to define a criterion to use images in order to guide the posture reconstruction of the articulated chain.  ...  Next, we apply the inverse kinematics approach, from initial configuration with and without image constraint, to estimate the objective configuration of the articulated chain.  ... 
doi:10.1155/2010/142354 fatcat:7bnrqsevlzenzfelnxsd5fvmpi

Generating range fixes for software configuration

Yingfei Xiong, Arnaud Hubaux, Steven She, Krzysztof Czarnecki
2012 2012 34th International Conference on Software Engineering (ICSE)  
To prevent ill-formed configurations, highly configurable software often allows defining constraints over the available options.  ...  As these constraints can be complex, fixing a configuration that violates one or more constraints can be challenging.  ...  to read and apply.  ... 
doi:10.1109/icse.2012.6227206 dblp:conf/icse/XiongHSC12 fatcat:fsy6xke4ynewdoksxu5hmijt7a

Special Issue: Configuration Design

1998 Artificial intelligence for engineering design, analysis and manufacturing  
Based on the submissions for this special issue, we are encouraged by the variety of techniques currently being applied to configuration problems.  ...  Configuration design was an early success in applying artificial intelligence~AI! techniques, specifically expert or rule-based systems, to practical problems.  ...  Based on the submissions for this special issue, we are encouraged by the variety of techniques currently being applied to configuration problems.  ... 
doi:10.1017/s0890060498124010 fatcat:cncrw5udsfeixfz6xliiv74kfu

Bounds on the capacity of constrained two-dimensional codes

J. Justesen, S. Forchhammer
2000 IEEE Transactions on Information Theory  
The bounds of Calkin and Wilf apply to first-order symmetric constraints. The bounds are generalized in a weaker form to higher order and nonsymmetric constraints.  ...  Results are given for constraints specified by run-length limits or a minimum distance between pixels of a given value.  ...  As FB (n; m) F (n; m) the bound in (17) also applies to the constraint in question.  ... 
doi:10.1109/18.887878 fatcat:kuxrhwofjncuphkrwnhoyuf2ee

Sales Configurator Information Systems Design Theory

Juha Tiihonen, Tomi Männistö, Alexander Felfernig
2014 International Configuration Workshop  
SCISDT aims to support development of generic configurators (aka configuration toolkits) that enable the creation of configurator instantiations for individual companies or product lines to provide choice  ...  Generalizing from the novel principles of our earlier work applied in the construction of a sales configuration system called WeCoTin, we present the Sales Configurator Information Systems Design Theory  ...  We also express our gratitude to companies that have offered us access in the context of earlier research that this work is based on.  ... 
dblp:conf/confws/TiihonenMF14 fatcat:ojy52gtq5zdhnbbk7zkckphzte

24. PuK-Workshop: Planung/Scheduling und Konfigurieren/Entwerfen: Construction of Configuration Models [chapter]

Lothar Hotz
2010 Multikonferenz Wirtschaftsinformatik 2010  
With this approach inference techniques that are normally used for configuration of technical systems can be applied for the construction of configuration model, i.e. during knowledge acquisition and evolution  ...  In this paper, a novel approach for creating configuration models is supplied y introducing a meta-knowledge base that enables the construction of configuration models.  ...  as partial configuration of domain model Meta-knowledge server applied to constructing a configuration.  ... 
doi:10.17875/gup2010-1473 fatcat:mmzcwyacafbwtmsqjlsphjphxa
« Previous Showing results 1 — 15 out of 830,495 results