Modelling search strategies in Rules2CP

François Fages, Julien Martin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this abstract, we present a rule-based modelling language for constraint programming, called Rules2CP [1], and a library PKML for modelling packing problems. Unlike other modelling languages, Rules2CP adopts a single knowledge representation paradigm based on logical rules without recursion, and a restricted set of data structures based on records and enumerated lists given with iterators. We show that this is sufficient to model constraint satisfaction problems together with search strategies, where search trees are expressed by logical formulae, and heuristic choice criteria are defined by preference orderings on variables and formulae. Rules2CP statements are compiled to constraint programs over finite domains (currently SICStus-prolog and soon Choco-Java) by term rewriting and partial evaluation.

Original languageEnglish
Title of host publicationIntegration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems - 6th International Conference, CPAIOR 2009, Proceedings
Pages321-322
Number of pages2
DOIs
Publication statusPublished - 10 Sept 2009
Externally publishedYes
Event6th International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2009 - Pittsburgh, PA, United States
Duration: 27 May 200931 May 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5547 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2009
Country/TerritoryUnited States
CityPittsburgh, PA
Period27/05/0931/05/09

Fingerprint

Dive into the research topics of 'Modelling search strategies in Rules2CP'. Together they form a unique fingerprint.

Cite this