Login / Signup
Modeling and detecting the cascade vulnerability problem using soft constraints.
Stefano Bistarelli
Simon N. Foley
Barry O'Sullivan
Published in:
SAC (2004)
Keyphrases
</>
soft constraints
constraint propagation
hard constraints
constraint satisfaction
constraint violations
genetic algorithm
constraint satisfaction problems
computationally efficient
utility theory