Login / Signup

Modeling and detecting the cascade vulnerability problem using soft constraints.

Stefano BistarelliSimon N. FoleyBarry O'Sullivan
Published in: SAC (2004)
Keyphrases
  • soft constraints
  • constraint propagation
  • hard constraints
  • constraint satisfaction
  • constraint violations
  • genetic algorithm
  • constraint satisfaction problems
  • computationally efficient
  • utility theory