Par exemple, si nous enlevons la moitié des instances STRUCT, la stratégie Good sélectionne (CBT,FC,d) en troisième position et (BTD,FC,w) en quatrième position, le reste étant inchangé. Cependant, si nous enlevons toutes les instances STRUCT, l'ordre devient très différent et la meilleure configuration basée sur BTD devient (BTD,FC,w) et est sélectionnée en quatrième position, Voici l'ordre de sélection donné par la stratégie Good avec la moitié des instances STRUCT en moins ,
w) ,
An Empirical Evaluation of Portfolios Approaches for Solving CSPs, Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, pp.316-324, 2013. ,
DOI : 10.1007/978-3-642-38171-3_21
URL : https://hal.archives-ouvertes.fr/hal-00909297
A Gender-Based Genetic Algorithm for the Automatic Configuration of Algorithms, Principles and Practice of Constraint Programming-CP 2009, pp.142-157 ,
DOI : 10.1007/BF02430370
The hazards of fancy backtracking, AAAI, pp.288-293, 1994. ,
The LION Way : Machine Learning plus Intelligent Optimization. Lionsolver inc, 2013. ,
Learning implied global constraints, IJCAI, pp.44-49, 2007. ,
DOI : 10.1007/11564751_57
URL : https://hal.archives-ouvertes.fr/lirmm-00195896
Boosting systematic search by weighting constraints, ECAI, p.146, 2004. ,
Experimental Comparison of BTD and Intelligent Backtracking: Towards an Automatic Per-instance Algorithm Selector, Principles and Practice of Constraint Programming -20th International Conference, CP 2014 Proceedings, pp.190-206, 2014. ,
DOI : 10.1007/978-3-319-10428-7_16
URL : https://hal.archives-ouvertes.fr/hal-01301069
MAC and combined heuristics: Two reasons to forsake FC (and CBJ?) on hard problems, Principles and Practice of Constraint Programming?CP96, pp.61-75, 1996. ,
DOI : 10.1007/3-540-61551-2_66
A racing algorithm for configuring metaheuristics, GECCO, pp.11-18, 2002. ,
Nearest neighbor pattern classification. Information Theory, IEEE Transactions on, vol.13, issue.1, pp.21-27, 1967. ,
Apprentissage artificiel : concepts et algorithmes . Algorithmes (Paris). Eyrolles, 2002. ,
[CvB01] Xinguang Chen and Peter van Beek. Conflict-directed backjumping revisited, Machine LearningDar01] A. Darwiche. Recursive conditioning, pp.273-29753, 1995. ,
Ant colony optimization, Encyclopedia of machine learning, pp.36-39, 2010. ,
Exploiting tree decomposition and soft local consistency in weighted csp AND/OR search spaces for graphical models The Cycle-cutset method for Improving Search Performance in AI Applications, AAAI Proceedings of the third IEEE on Artificial Intelligence ApplicationsDP89] R. Dechter and J. Pearl. Tree-Clustering for Constraint Networks, pp.1-673, 1987. ,
An instance of adaptive constraint propagation Self-decomposable global constraints Czech Republic -Including Prestigious Applications of Intelligent Systems Taking Advantage of Stable Sets of Variables in Constraint Satisfaction Problems Using model trees for classification, Principles and Practice of Constraint Programming?CP96 ECAI 2014 -21st European Conference on Artificial Intelligence Proceedings of the ninth International Joint Conference on Artificial IntelligenceFre78] E. Freuder. Synthesizing constraint expressions. CACMFWI + 98] Eibe Frank Machine Learning, pp.164-178, 1978. ,
Dynamic backtracking, Journal of Artificial Intelligence Research, vol.1, pp.25-46, 1993. ,
DOI : 10.1007/3-540-58601-6_105
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.4126
Algorithm portfolios, A Comparison of Structural CSP Decomposition Methods. Artificial Intelligence Artificial Intelligence, vol.124, issue.1261, pp.343-28243, 1997. ,
Classification and Clustering, Journal of Marketing Research, vol.18, issue.4, 1975. ,
DOI : 10.2307/3151350
WEKA: a machine learning workbench, Proceedings of ANZIIS '94, Australian New Zealnd Intelligent Information Systems Conference, pp.357-361, 1994. ,
DOI : 10.1109/ANZIIS.1994.396988
Learning the k in k-means Advances in neural information processing systems, p.281, 2004. ,
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
Discriminating instance generation for automated constraint model selection, CP, 2014. ,
Paramils : an automatic algorithm configuration framework, Journal of Artificial Intelligence Research, vol.36, issue.1, pp.267-306, 2009. ,
Proteus: A Hierarchical Portfolio of Solvers and Transformations, CPAIOR, 2014. ,
DOI : 10.1007/978-3-319-07046-9_22
Programming by optimization, Communications of the ACM, vol.55, pp.70-80, 2012. ,
Local search with constraint propagation and??conflict-based heuristics, Artificial Intelligence, vol.139, issue.1, pp.21-45, 2002. ,
DOI : 10.1016/S0004-3702(02)00221-7
URL : https://hal.archives-ouvertes.fr/hal-00869124
Computing and exploiting treedecompositions for solving constraint networks, Proceedings of CP, pp.777-781, 2005. ,
Strategies and Heuristics for Exploiting Tree-decompositions of Constraint Networks, Inference methods based on graphical structures of knowledge (WIGSK'06), ECAI workshop, pp.13-18, 2006. ,
Dynamic Management of Heuristics for Solving Structured CSPs, Proceedings of 13th International Conference on Principles and Practice of Constraint Programming (CP-2007), pp.364-378, 2007. ,
Dynamic Management of Heuristics for Solving Structured CSPs, Proceedings of the 13th international conference on Principles and practice of constraint programming , CP'07, pp.364-378, 2007. ,
DOI : 10.1007/978-3-540-74970-7_27
Hybrid backtracking bounded by treedecomposition of constraint networks, Artificial Intelligence, vol.146, pp.43-75, 2003. ,
Hybrid backtracking bounded by tree-decomposition of constraint networks, Artificial Intelligence, vol.146, issue.1, pp.43-75, 2003. ,
DOI : 10.1016/S0004-3702(02)00400-9
Triangulation of graphs -algorithms giving small total state space, 1990. ,
Algorithm Selection and Scheduling, Principles and Practice of Constraint Programming?CP 2011, pp.454-469, 2011. ,
DOI : 10.1007/978-3-642-23786-7_35
Simulated annealing : theory and applications, 1987. ,
DOI : 10.1007/978-94-015-7744-1
Backjumpbased techniques versus conflict-directed heuristics, 16th IEEE International Conference on, pp.549-557, 2004. ,
DOI : 10.1109/ictai.2004.37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.175.7092
Constraint Networks : Techniques and Algorithms, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00870016
DASH: Dynamic Approach for Switching Heuristics, European Journal of Operational Research, vol.248, issue.3, 1307. ,
DOI : 10.1016/j.ejor.2015.08.018
Variable neighborhood search, Computers & Operations Research, vol.24, issue.11, pp.1097-1100, 1997. ,
DOI : 10.1016/S0305-0548(97)00031-2
URL : https://hal.archives-ouvertes.fr/hal-00979295
Microstructures for csps with constraints of arbitrary arity, Proceedings of the Tenth Symposium on Abstraction, Reformulation, and Approximation, pp.11-12, 2013. ,
Solving XCSP problems by using Gecode. arXiv preprint arXiv :1112, 2011. ,
Activity-based search for black-box contraint-programming solvers, 2011. ,
Using case-based reasoning in an algorithm portfolio for constraint solving, Irish Conference on Artificial Intelligence and Cognitive Science, 2008. ,
Travelling in the World of Local Searches in the Space of Partial Assignments, CPAIOR, pp.240-255, 2004. ,
DOI : 10.1007/978-3-540-24664-0_17
Impact-Based Search Strategies for Constraint Programming, Principles and Practice of Constraint Programming?CP 2004, pp.557-571, 2004. ,
DOI : 10.1007/978-3-540-30201-8_41
The algorithm selection problem Advances in Computers, pp.65-118, 1976. ,
Graph minors. II. Algorithmic aspects of tree-width, Journal of Algorithms, vol.7, issue.3, pp.309-322, 1986. ,
DOI : 10.1016/0196-6774(86)90023-4
Locating the phase transition in binary constraint satisfaction problems, Artificial Intelligence, vol.81, issue.1, pp.155-181, 1996. ,
Noise strategies for improving local search, Proceedings of the Twelfth National Conference on Artificial Intelligence, pp.337-343, 1994. ,
Understanding line drawings of scenes with shadows, The Psychology of Computer Vision, pp.19-91, 1975. ,
Evaluating Component Solver Contributions to Portfolio-Based Algorithm Selectors, Theory and Applications of Satisfiability Testing -SAT 2012 -15th International Conference. Proceedings, pp.228-241, 2012. ,
DOI : 10.1007/978-3-642-31612-8_18
Satzilla : Portfolio-based algorithm selection for SAT, J. Artif. Intell. Res.(JAIR), vol.32, pp.565-606, 2008. ,
Hydra, Proceedings of the 2005 ACM workshop on Storage security and survivability , StorageSS '05, pp.210-216, 2010. ,
DOI : 10.1145/1103780.1103797
Retroactive Ordering for Dynamic Backtracking, CP, pp.766-771, 2006. ,
DOI : 10.1007/11889205_67