A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fixing Configuration Inconsistencies across File Type Boundaries
2011
2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications
Enforcing constraints across file types boundaries already at configuration is necessary to prevent inconsistencies, which otherwise are costly to discover and resolve later on. ...
We present a pragmatic framework to specify and apply inconsistency-resolving fixes on configuration files of arbitrary types. ...
APPLIED TO SEVEN CONFIGURATION FILE TYPES. ...
doi:10.1109/seaa.2011.26
dblp:conf/euromicro/ElsnerLS11
fatcat:e3og2pykrbh6damgtgtj34rvqi
Entropy Maximization and the Spatial Distribution of Species
2010
American Naturalist
We show that the EM outcome depends on (1) the choice of configuration set, (2) the way constraints are imposed, and (3) the scale on which the EM procedure is applied. ...
It has been applied recently to predict ecological patterns, such as species abundance distributions and species-area relationships. ...
APPENDIX A EM for Labeled Configurations We apply the EM algorithm under the assumption that labeled configurations m are a priori equally probable. We ...
doi:10.1086/650718
pmid:20166816
fatcat:ild754mtx5hspf63thp3765igu
Guaranteeing Soundness of Configurable Process Variants in Provop
2009
2009 IEEE Conference on Commerce and Enterprise Computing
In this paper we discuss advanced concepts for the context-and constraint-based configuration of process variants, and show how they can be utilized to ensure soundness of the configured process variants ...
the large number of process variants that exist in practice as well as the many syntactical and semantical constraints they have to obey. ...
This paper has put emphasis on how to ensure soundness of the configurable variants of a whole process family, taking into account semantical as well as structural constraints. ...
doi:10.1109/cec.2009.62
dblp:conf/wecwis/HallerbachBR09
fatcat:ubektqfoereyxgq4n7oyu2cwse
Evaluating Feature Change Impact on Multi-product Line Configurations Using Partial Information
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we present an approach for computing the impact of a feature change on the existing configurations of a multi-product line, using partial information regarding constraints between feature ...
Evolving large-scale, complex and highly variable systems is known to be a difficult task, where a single change can ripple through various parts of the system with potentially undesirable effects. ...
We apply the operations described in Algorithm 2. If any configuration is invalidated, we use the output of this step to re-apply Step 3.1. Step 4: Consolidate results. ...
doi:10.1007/978-3-319-14130-5_1
fatcat:hf7ycfy37vc3bo4i34ghvfbriu
Automated Completion of Partial Configurations as a Diagnosis Task Using FastDiag to Improve Performance
[chapter]
2021
Studies in Computational Intelligence
In this work, we propose an approach to define the completion of a partial configuration like a diagnosis task to solve it by applying the FastDiag algorithm, an efficient solution for preferred minimal ...
Existing solutions, such as those which use modern constraint satisfaction solvers, perform a complete search, making them unsuitable on large-scale configurations. ...
[2] apply a model-based diagnosis to identify the set of relaxable constraints on conflict sets in a CSP context. ...
doi:10.1007/978-3-030-67148-8_9
fatcat:gbpogh7kgbei3mv2v4c7ox5zni
A Six Degree-of-Freedom God-Object Method for Haptic Display of Rigid Bodies with Surface Properties
2007
IEEE Transactions on Visualization and Computer Graphics
The constraint-based force applied to the user, which handles any number of simultaneous contact points, is computed within a few microseconds, while the update of the configuration of the rigid god-object ...
The force applied to the user is computed using a novel constraint-based quasi-static approach, which allows us to suppress force artifacts typically found in previous methods. ...
They also wish to thank Dr. Ming C. Lin and Dr. Miguel A. Otaduy for insightful discussions, and Stanford University for the original bunny models. ...
doi:10.1109/tvcg.2007.1028
pmid:17356213
fatcat:ngzctletprhl5jgeyeicrsdquu
Towards a Search-based Interactive Configuration of Cyber Physical System Product Lines
2013
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems
Then we conducted some pilot experiments on applying search algorithms to find optimal decision orders for configuring a product. ...
A CPS often contains many heterogeneous components with complex constraints relevant to product configuration in the context of PLE. ...
In our solution, we need to transform UML class diagrams with the SimPL profile applied and OCL constraints into the configuration model. ...
dblp:conf/models/NieYA13
fatcat:iaqopz4y2ffuppeb4mzw6o42eq
Level set-based topology optimisation of a compliant mechanism design using mathematical programming
2011
Mechanical Sciences
To verify its capability, we apply our method to compliant mechanism design problems that include displacement constraints and stress constraints.</p> ...
Level set-based topology optimisation methods are immune to the problem of grayscales since the boundaries of the optimal configuration are implicitly represented using the level set function. ...
The authors would like to gratefully acknowledge Krister Svanberg's help in providing MMA code. ...
doi:10.5194/ms-2-91-2011
fatcat:3cprsdscc5bvxa7efmgse4jgiu
Information Support of FMS Configuration Design
[chapter]
1996
IFIP Advances in Information and Communication Technology
This paper describes an approach to configuration design, based on an integration of dynamic constraint network and object-oriented paradigms for knowledge representation. ...
An implementation of the concept for information support of configuration design of FMS is considered on an example of environment for the Design of Structured Objects -DESO. ...
Dynamic constraint network model To deal with the concept scheme of configuration design process defined in terms of constraints, DCN model is applied. ...
doi:10.1007/978-0-387-35065-3_35
fatcat:s4n6ybnraffsvkfm4mwrosrofi
Adding Image Constraints to Inverse Kinematics for Human Motion Capture
2009
EURASIP Journal on Advances in Signal Processing
In this paper, we present how to add image constraints to inverse kinematics in order to estimate human motion. ...
Specifically, we explain how to define a criterion to use images in order to guide the posture reconstruction of the articulated chain. ...
Next, we apply the inverse kinematics approach, from initial configuration with and without image constraint, to estimate the objective configuration of the articulated chain. ...
doi:10.1155/2010/142354
fatcat:7bnrqsevlzenzfelnxsd5fvmpi
Generating range fixes for software configuration
2012
2012 34th International Conference on Software Engineering (ICSE)
To prevent ill-formed configurations, highly configurable software often allows defining constraints over the available options. ...
As these constraints can be complex, fixing a configuration that violates one or more constraints can be challenging. ...
to read and apply. ...
doi:10.1109/icse.2012.6227206
dblp:conf/icse/XiongHSC12
fatcat:fsy6xke4ynewdoksxu5hmijt7a
Special Issue: Configuration Design
1998
Artificial intelligence for engineering design, analysis and manufacturing
Based on the submissions for this special issue, we are encouraged by the variety of techniques currently being applied to configuration problems. ...
Configuration design was an early success in applying artificial intelligence~AI! techniques, specifically expert or rule-based systems, to practical problems. ...
Based on the submissions for this special issue, we are encouraged by the variety of techniques currently being applied to configuration problems. ...
doi:10.1017/s0890060498124010
fatcat:cncrw5udsfeixfz6xliiv74kfu
Bounds on the capacity of constrained two-dimensional codes
2000
IEEE Transactions on Information Theory
The bounds of Calkin and Wilf apply to first-order symmetric constraints. The bounds are generalized in a weaker form to higher order and nonsymmetric constraints. ...
Results are given for constraints specified by run-length limits or a minimum distance between pixels of a given value. ...
As FB (n; m) F (n; m) the bound in (17) also applies to the constraint in question. ...
doi:10.1109/18.887878
fatcat:kuxrhwofjncuphkrwnhoyuf2ee
Sales Configurator Information Systems Design Theory
2014
International Configuration Workshop
SCISDT aims to support development of generic configurators (aka configuration toolkits) that enable the creation of configurator instantiations for individual companies or product lines to provide choice ...
Generalizing from the novel principles of our earlier work applied in the construction of a sales configuration system called WeCoTin, we present the Sales Configurator Information Systems Design Theory ...
We also express our gratitude to companies that have offered us access in the context of earlier research that this work is based on. ...
dblp:conf/confws/TiihonenMF14
fatcat:ojy52gtq5zdhnbbk7zkckphzte
24. PuK-Workshop: Planung/Scheduling und Konfigurieren/Entwerfen: Construction of Configuration Models
[chapter]
2010
Multikonferenz Wirtschaftsinformatik 2010
With this approach inference techniques that are normally used for configuration of technical systems can be applied for the construction of configuration model, i.e. during knowledge acquisition and evolution ...
In this paper, a novel approach for creating configuration models is supplied y introducing a meta-knowledge base that enables the construction of configuration models. ...
as partial configuration of domain model Meta-knowledge server applied to constructing a configuration. ...
doi:10.17875/gup2010-1473
fatcat:mmzcwyacafbwtmsqjlsphjphxa
« Previous
Showing results 1 — 15 out of 830,495 results