Proceedings of the 2002 ACM Symposium on Applied Computing 2002
DOI: 10.1145/508791.508793
|View full text |Cite
|
Sign up to set email alerts
|

Soft constraint propagation and solving in CHRs

Abstract: Soft comtr~dnts are a generalizatkm of classical constraints, where constraints and/or partial n-'miLmments are associated to preferenco or importance levels, and constraints are combined according to combinators which expLe~ the demLred optimization criteria. Constraint I~anrllin~ RuleS (CHI~) constitute a high-level natural formalism to specify constraint sol,ram and propagation algorithrn~. In this paper we present a framework to design and specify soft coustraint solvers by using CHRs. In this way, we exte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2004
2004
2015
2015

Publication Types

Select...
8
1
1

Relationship

4
6

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…As a future work, we plan to extend in SWI-Prolog the existent CHR module implementing soft constraints [3], by adding the ÷ operator inside the soft module. In this way we could implement a stand-alone policy-based authorization system based on constraint programming.…”
Section: Discussionmentioning
confidence: 99%
“…As a future work, we plan to extend in SWI-Prolog the existent CHR module implementing soft constraints [3], by adding the ÷ operator inside the soft module. In this way we could implement a stand-alone policy-based authorization system based on constraint programming.…”
Section: Discussionmentioning
confidence: 99%
“…While mechanical analysis was outside our aims, we have implemented a mechanical checker for l-confidentiality on top of the existing Constraint Handling Rule (CHR) framework [3]. For example, when we input the policy SCSP for the Needham-Schroeder protocol and the imputable SCSP corresponding to Lowe's attack, the checker outputs checking(principal(a)) checking(principal(b)) attack(n_a, policy_level(unknown), attack_level(traded_1)) checking(principal(c)) attack(enk(k(a),pair(n_a,n_b)), policy_level(unknown), attack_level(traded_1)) attack(n_b, policy_level(unknown), attack_level(traded1))…”
Section: Discussionmentioning
confidence: 99%
“…CHR [43,42,15,41] is a committed-choice declarative language which has been originally designed for writing constraint solvers and which is nowadays a general purpose language.…”
Section: Constraint Handling Rules: Notationmentioning
confidence: 99%