Filters








198 Hits in 6.6 sec

Constraint based system-level diagnosis of multiprocessors [chapter]

J. Altmann, T. Bartha, A. Pataricza, A. Petri, P. Urbán
1996 Lecture Notes in Computer Science  
The CSP based approach is able to handle detailed and inhomogeneous functional fault models to a similar depth as the Russel-Kime model [18] .  ...  Two algorithms for the Parsytec GCel massively parallel system are used as illustration in the paper: the centralized method uses a detailed system model, and provides a fine-granular diagnostic image  ...  Different models and algorithms were developed for system-level diagnosis typically originating in the first graph theory based "system-level models" (PMC for symmetric and BGM for asymmetric test invalidation  ... 
doi:10.1007/3-540-61772-8_51 fatcat:ivt67qhsj5dflknwl2xldpjsmm

Conflict-Directed A* Search for Soft Constraints [chapter]

Martin Sachenbacher, Brian C. Williams
2006 Lecture Notes in Computer Science  
Within the plateaus, familiar techniques for satisfiability can be exploited.  ...  In this paper, we present an approach to solving soft constraints that exploits this disparity by re-formulating soft constraints into an optimization part (with unary objective functions), and a satisfiability  ...  Truth maintenance systems (TMS) [13] , which keep track of the dependencies in the implication graph, are frequently used in model-based reasoning and diagnosis for this purpose.  ... 
doi:10.1007/11757375_16 fatcat:6fbinxwzava4nn4uwpf7cuxjre

Mapping constrained optimization problems to quantum annealing with application to fault diagnosis [article]

Zhengbing Bian, Fabian Chudak, Robert Israel, Brad Lackey, William G. Macready, Aidan Roy
2016 arXiv   pre-print
In particular we develop a new embedding algorithm for mapping a CSP onto a hardware Ising model with a fixed sparse set of interactions, and propose two new decomposition algorithms for solving problems  ...  In contrast, global embedding techniques generate a hardware independent Ising model for all the constraints, and then use a minor-embedding algorithm to generate a hardware compatible Ising model.  ...  With these bounds we can perform a heuristic binary search for the optimal maximal chain length, and beginning with the good lower bound provided by the LP relaxation of (BCR) will significantly reduce  ... 
arXiv:1603.03111v1 fatcat:swf2k6epkvha3eytigbyjaxh7y

Mapping Constrained Optimization Problems to Quantum Annealing with Application to Fault Diagnosis

Zhengbing Bian, Fabian Chudak, Robert Brian Israel, Brad Lackey, William G. Macready, Aidan Roy
2016 Frontiers in ICT  
In particular, we develop a new embedding algorithm for mapping a CSP onto a hardware Ising model with a fixed sparse set of interactions and propose two new decomposition algorithms for solving problems  ...  By contrast, global embedding techniques generate a hardware-independent Ising model for all the constraints, and then use a minor-embedding algorithm to generate a hardware compatible Ising model.  ...  AUTHOR CONTRIBUTIONS All authors contributed to the research and writing of this manuscript.  ... 
doi:10.3389/fict.2016.00014 fatcat:jhllmgm6njfklnpsnlazurexpi

Regression Heuristics by Optimal Tridimensional Features of Electrocardiogram for Arrhythmia Detection

2019 International Journal of Engineering and Advanced Technology  
Particularly, the accuracy and sensitivity are more vital in computer-aided heart disease prediction methods.  ...  The experimental study evincing the significance of the proposed model that scaled against the contemporary methods.  ...  International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 -8958, Volume-9 Issue-1S5, December, 2019  ... 
doi:10.35940/ijeat.a1036.1291s52019 fatcat:tp3p4vftpzb5tlx5dcgtz5sd2i

Page 3336 of Mathematical Reviews Vol. , Issue 2001E [page]

2001 Mathematical Reviews  
Badaloni and M. Giacomin, A fuzzy extension of Allen’s interval algebra (155- 165); Andrea Panati, Non binary CSPs and heuristics for modeling and diagnosing dynamic systems (166-177); M. Botta, A.  ...  correctness and binary decision diagrams.  ... 

A Divide-And-Conquer-Method for Computing Multiple Conflicts for Diagnosis

Kostyantyn M. Shchekotykhin, Dietmar Jannach, Thomas Schmitz
2015 IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes  
The design of the algorithm aims at scenarios in which the goal is to find a few leading diagnoses and the algorithm can -due to its non-intrusive design -be used in combination with various underlying  ...  In classical hitting set algorithms for Model-Based Diagnosis (MBD) that use on-demand conflict generation, a single conflict is computed whenever needed during tree construction.  ...  I 2144 N-15 and JA 2095/4-1 (Project "Debugging of Spreadsheet Programs").  ... 
dblp:conf/safeprocess/ShchekotykhinJS15 fatcat:3kxufbxcebf73mrypa2qwqau7q

Conflict-directed A* and its role in model-based embedded systems

Brian C. Williams, Robert J. Ragno
2007 Discrete Applied Mathematics  
Reiter, Characterizing diagnoses and systems, Artif. Intell. 56 (1992) 197-222] and in dependency-directed search [R. Stallman, G.J.  ...  Conflict-directed A * is a fundamental tool for building model-based embedded systems, and has been used to solve a range of problems, including fault isolation [J. de Kleer, B.C.  ...  Finally, we would like to thank members of the MIT Model-based Embedded and Robotic Systems group, particularly Seung Chung, Paul Elliott, Michael Hofbaur and Mitch Ingham, as well as Kaijen Hsaio, for  ... 
doi:10.1016/j.dam.2005.10.022 fatcat:hjbiups2argjxjj2crqwkxmuna

Smart Bound Selection for the Verification of UML/OCL Class Diagrams

Robert Clariso, Carlos A. Gonzalez, Jordi Cabot
2017 IEEE Transactions on Software Engineering  
Hence, choosing suitable bounds is a non-trivial process as there is a trade-off between the verification time (faster for smaller domains) and the confidence in the result (better for larger domains).  ...  This approach may increase the usability of UML/OCL bounded verification tools and improve the efficiency of the verification process.  ...  The authors would like to thank the anonymous reviewers and Dr. Tim Nelson for their valuable comments.  ... 
doi:10.1109/tse.2017.2777830 fatcat:zn2nhmkfarbgnozlev2xm7a42i

ON FINDING MINIMALLY UNSATISFIABLE CORES OF CSPs

ÉRIC GRÉGOIRE, BERTRAND MAZURE, CÉDRIC PIETTE
2008 International journal on artificial intelligence tools  
Acknowledgment The authors thanks the anonymous reviewers for their very valuable suggestions and advices.  ...  However, delivering one MUC is a very valuable piece of information since it can help one to diagnose, understand and fix a CSP that does not have any solution.  ...  Hence, it is a dynamic and adaptive gregoire-IJAIT-mainFile 6Éric Grégoire, Bertrand Mazure, Cédric Piette variable ordering heuristic that can be expected to guide the systematic search toward unsatisfiable  ... 
doi:10.1142/s0218213008004138 fatcat:rpchj3tbhzghvdfidnceo5sazi

An Advanced Accurate Intrusion Detection System for Smart Grid Cybersecurity Based on Evolving Machine Learning

Tong Yu, Kai Da, Zhiwen Wang, Ying Ling, Xin Li, Dongmei Bin, Chunyan Yang
2022 Frontiers in Energy Research  
This article tries to introduce an advanced and unique intrusion detection model capable of classifying binary-class, trinary-class, and multiple-class CDs and electrical network incidents for smart grids  ...  Smart grids, the next generation of electricity systems, would be intelligent and self-aware of physical and cyber activity in the control area.  ...  The present study proposes the use of ANN training with the gray wolf algorithm (GWA) for creating an intrusion diagnosing layout. GWA-ANN is the name for this model.  ... 
doi:10.3389/fenrg.2022.903370 fatcat:ay5z4xx77jcwnkh763mtbjnsr4

Applying Constraint Solving to the Management of Distributed Applications [article]

Andrew McCarthy, Alan Dearle, Graham Kirby
2010 arXiv   pre-print
We present our approach for deploying and managing distributed component-based applications.  ...  A Desired State Description (DSD), written in a high-level declarative language, specifies requirements for a distributed application.  ...  The knowledge required for automatic management is specified in the form of a set of available hardware and software resources and sets of constraints over their deployment.  ... 
arXiv:1006.3463v1 fatcat:lsqtzzpuwbf65kdibd6hdl5bx4

Index—Volumes 1–89

1997 Artificial Intelligence  
consultation system 264 for diagnosing rheumatic diseases 264 expert consulling program system, XPLAIN 256 critiquing systems 446 database systems 623 domain -503 generic knowledge of a domain  ...  composition -659 model selection -I272 MTD(f) search -1374 negamax -558 non-optimal -1125 of Han and Lee, path-consistency -529 of Hart, Nilsson and Raphael, A* -215 of Kim and Pearl, polytree  ...  -150 mechanism 381 mechanized formal -152 meta-level -185 method geometric -12 17 methods choices of -1157 models inexact -906 multiple inheritance -966 multiple lines of -2 10 mundane -593 non-logical  ... 
doi:10.1016/s0004-3702(97)80122-1 fatcat:6az7xycuifaerl7kmv7l3x6rpm

A Review on the Service Virtualisation and Its Structural Pillars

Zeinab Farahmandpour, Mehdi Seyedmahmoudian, Alex Stojcevski
2021 Applied Sciences  
model, data model and multi-service dependencies.  ...  Therefore, an empirical approach that has been utilised to overcome these challenges is to automate software testing by virtualising the requisite services' behaviour for the system being tested.  ...  To derive such formats, they presented a method called hierarchical CSP and recursive CSP.  ... 
doi:10.3390/app11052381 fatcat:hqp47almpnet3kty7zikqmaqga

Efficient Algorithms for the Inference of Minimum Size DFAs

Arlindo L. Oliveira, João P. Marques Silva
2001 Machine Learning  
The algorithms presented represent the state of the art for this problem, known to be computationally very hard.  ...  This work describes algorithms for the inference of minimum size deterministic automata consistent with a labeled training set.  ...  They also thank Tiziano Villa and Timothy Kam for their help in different stages of this work. Finally, they thank the Portuguese PRAXIS XXI program, project CYTED VII.13 (AMYRI) and Prof.  ... 
doi:10.1023/a:1010828029885 dblp:journals/ml/OliveiraS01 fatcat:zwn6fjxlg5eltj5ipfbfvdh7la
« Previous Showing results 1 — 15 out of 198 results