{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:11:56Z","timestamp":1743149516348,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319232188"},{"type":"electronic","value":"9783319232195"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23219-5_25","type":"book-chapter","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T10:17:33Z","timestamp":1439374653000},"page":"351-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Randomness as a Constraint"],"prefix":"10.1007","author":[{"given":"Steven D.","family":"Prestwich","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"S. Armagan","family":"Tarim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"unstructured":"Apt, K.R., Wallace, M.: Constraint Logic Programming Using Eclipse. Cambridge University Press (2007)","key":"25_CR1"},{"doi-asserted-by":"crossref","unstructured":"Beltrami, E.: What Is Random? Chance and Order in Mathematics and Life. Copernicus (1999)","key":"25_CR2","DOI":"10.1007\/978-1-4612-1472-4"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"584","DOI":"10.3758\/BF03193889","volume":"38","author":"M van Casteren","year":"2006","unstructured":"van Casteren, M., Davis, M.H.: Mix, a Program for Pseudorandomization. Behaviour Research Methods 38(4), 584\u2013589 (2006)","journal-title":"Behaviour Research Methods"},{"issue":"4","key":"25_CR4","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1109\/TIT.2005.844059","volume":"51","author":"R Cilibrasi","year":"2005","unstructured":"Cilibrasi, R., Vit\u00e1nyi, P.M.B.: Clustering by Compression. IEEE Transactions on Information Theory 51(4), 1523\u20131545 (2005)","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Chaitin, G.J.: Algorithmic Information Theory. Cambridge University Press (1987)","key":"25_CR5","DOI":"10.1017\/CBO9780511608858"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-07151-0_2","volume-title":"Functional and Logic Programming","author":"K Claessen","year":"2014","unstructured":"Claessen, K., Dureg\u00e5rd, J., Pa\u0142ka, M.H.: Generating constrained random data with uniform distribution. In: Codish, M., Sumii, E. (eds.) FLOPS 2014. LNCS, vol. 8475, pp. 18\u201334. Springer, Heidelberg (2014)"},{"unstructured":"Cutler, C.C.: Differential Quantization for Television Signals. U. S. Patent 2, 605, 361, July 1952","key":"25_CR7"},{"unstructured":"Dechter, R., Kask, K., Bin, E., Emek, R.: Generating random solutions for constraint satisfaction problems. In: Proceedings of the 18th National Conference on Artificial Intelligence, pp. 15\u201321 (2002)","key":"25_CR8"},{"unstructured":"Ermon, S., Gomes, C.P., Selman, B.: Uniform solution sampling using a constraint solver as an oracle. In: Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, pp. 255\u2013264. AUAI Press (2012)","key":"25_CR9"},{"issue":"4","key":"25_CR10","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.3758\/BRM.41.4.1233","volume":"41","author":"RM French","year":"2009","unstructured":"French, R.M., Perruchet, P.: Generating Constrained Randomized Sequences: Item Frequency Matters. Behaviour Research Methods 41(4), 1233\u20131241 (2009)","journal-title":"Behaviour Research Methods"},{"unstructured":"Hebrard, E., Hnich, B., O\u2019Sullivan, B., Walsh, T.: Finding diverse and similar solutions in constraint programming. In: Proceedings of the 20th National Conference on Artificial Intelligence (2005)","key":"25_CR11"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/978-3-642-04244-7_61","volume-title":"Principles and Practice of Constraint Programming - CP 2009","author":"P Van Hentenryck","year":"2009","unstructured":"Van Hentenryck, P., Coffrin, C., Gutkovich, B.: Constraint-based local search for the automatic generation of architectural tests. In: Gent, I.P. (ed.) CP 2009. LNCS, vol. 5732, pp. 787\u2013801. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Hinkelmann, K., Kempthorne, O.: Design and Analysis of Experiments I and II. Wiley (2008)","key":"25_CR13","DOI":"10.1002\/9780470191750"},{"issue":"5","key":"25_CR14","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1080\/106351501753328776","volume":"50","author":"EA Housworth","year":"2001","unstructured":"Housworth, E.A., Martins, E.P.: Random Sampling of Constrained Phylogenies: Conducting Phylogenetic Analyses When the Philogeny is Partially Known. Syst. Biol. 50(5), 628\u2013639 (2001)","journal-title":"Syst. Biol."},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"DA Huffman","year":"1951","unstructured":"Huffman, D.A.: A Method for the Construction of Minimum Redundancy Codes. Proceedings of the IRE 40, 1098\u20131101 (1951)","journal-title":"Proceedings of the IRE"},{"doi-asserted-by":"crossref","unstructured":"Kitchen, N., Kuehlmann, A.: Stimulus generation for constrained random simulation. In: Proceedings of the 2007 IEEE\/ACM International Conference on Computer-Aided Design, pp. 258\u2013265. IEEE Press (2007)","key":"25_CR16","DOI":"10.1109\/ICCAD.2007.4397275"},{"unstructured":"Knuth, D.E.: The Art of Computer Programming. Seminumerical Algorithms, 2nd edn., vol. 2, p. 89. Addison-Wesley (1981)","key":"25_CR17"},{"doi-asserted-by":"crossref","unstructured":"Marsaglia, G., Tsang, W.W.: Some Difficult-to-pass Tests of Randomness. Journal of Statistical Software 7(3) (2002)","key":"25_CR18","DOI":"10.18637\/jss.v007.i03"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/978-3-642-40627-0_60","volume-title":"Principles and Practice of Constraint Programming","author":"R Naveh","year":"2013","unstructured":"Naveh, R., Metodi, A.: Beyond feasibility: CP usage in constrained-random functional hardware verification. In: Schulte, C. (ed.) CP 2013. LNCS, vol. 8124, pp. 823\u2013831. Springer, Heidelberg (2013)"},{"unstructured":"Ouellet, P., Quimper, C.-G.: The multi-inter-distance constraint. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence, pp. 629\u2013634 (2011)","key":"25_CR20"},{"issue":"2","key":"25_CR21","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/s10601-010-9101-4","volume":"16","author":"F Pachet","year":"2011","unstructured":"Pachet, F., Roy, P.: Markov Constraints: Steerable Generation of Markov Sequences. Constraints 16(2), 148\u2013172 (2011)","journal-title":"Constraints"},{"key":"25_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/11564751_35","volume-title":"Principles and Practice of Constraint Programming - CP 2005","author":"G Pesant","year":"2005","unstructured":"Pesant, G., R\u00e9gin, J.-C.: SPREAD: a balancing constraint based on statistics. In: van Beek, P. (ed.) CP 2005. LNCS, vol. 3709, pp. 460\u2013474. Springer, Heidelberg (2005)"},{"issue":"4","key":"25_CR23","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/BF01619355","volume":"7","author":"SM Pincus","year":"1991","unstructured":"Pincus, S.M., Gladstone, I.M., Ehrenkranz, R.A.: A Regularity Statistic for Medical Data Analysis. Journal of Clinical Monitoring and Computing 7(4), 335\u2013345 (1991)","journal-title":"Journal of Clinical Monitoring and Computing"},{"key":"25_CR24","volume-title":"Numerical Recipes in C","author":"WH Press","year":"1992","unstructured":"Press, W.H., Flannery, B.P., Teukolsky, S.A., Vetterling, W.T.: Numerical Recipes in C, 2nd edn. Cambridge University Press, UK (1992)","edition":"2"},{"issue":"1","key":"25_CR25","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1112\/plms\/s2-30.1.264","volume":"30","author":"FP Ramsey","year":"1930","unstructured":"Ramsey, F.P.: On a Problem of Formal Logic. Proceedings London Mathematical Society s2 30(1), 264\u2013286 (1930)","journal-title":"Proceedings London Mathematical Society s2"},{"key":"25_CR26","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-30201-8_41","volume-title":"Principles and Practice of Constraint Programming \u2013 CP 2004","author":"P Refalo","year":"2004","unstructured":"Refalo, P.: Impact-based search strategies for constraint programming. In: Wallace, M. (ed.) CP 2004. LNCS, vol. 3258, pp. 557\u2013571. Springer, Heidelberg (2004)"},{"unstructured":"R\u00e9gin, J.-C.: Generalized Arc Consistency for Global Cardinality Constraint. In: 14th National Conference on Artificial Intelligence, pp. 209\u2013215 (1996)","key":"25_CR27"},{"unstructured":"R\u00e9gin, J.-C.: A filtering algorithm for constraints of difference in CSPs. In: Proceedings of the 12th National Conference on Artificial Intelligence, Vol. 1, pp. 362\u2013367 (1994)","key":"25_CR28"},{"issue":"2","key":"25_CR29","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1147\/rd.232.0149","volume":"23","author":"JJ Rissanen","year":"1979","unstructured":"Rissanen, J.J., Langdon, G.G.: Arithmetic Coding. IBM Journal of Research and Development 23(2), 149\u2013162 (1979)","journal-title":"IBM Journal of Research and Development"},{"unstructured":"Rossi, R., Prestwich, S., Tarim, S.A.: Statistical constraints. In: 21st European Conference on Artificial Intelligence (2014)","key":"25_CR30"},{"doi-asserted-by":"crossref","unstructured":"Sayood, K.: Introduction to Data Compression. Morgan Kaufmann (2012)","key":"25_CR31","DOI":"10.1016\/B978-0-12-415796-5.00001-6"},{"issue":"3","key":"25_CR32","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal 27(3), 379\u2013423 (1948)","journal-title":"Bell System Technical Journal"},{"key":"25_CR33","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/103085.103089","volume":"34","author":"GK Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG Still Picture Compression Standard. Communications of the ACM 34, 31\u201344 (1991)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Welch, T.A.: A Technique for High-Performance Data Compression. IEEE Computer, 8\u201319, June 1984","key":"25_CR34","DOI":"10.1109\/MC.1984.1659158"},{"issue":"3","key":"25_CR35","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIT.1977.1055714","volume":"23","author":"J Ziv","year":"1977","unstructured":"Ziv, J., Lempel, A.: A Universal Algorithm for Data Compression. IEEE Transactions on Information Theory IT 23(3), 337\u2013343 (1977)","journal-title":"IEEE Transactions on Information Theory IT"},{"issue":"5","key":"25_CR36","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TIT.1978.1055934","volume":"24","author":"J Ziv","year":"1978","unstructured":"Ziv, J., Lempel, A.: Compression of Individual Sequences via Variable-Rate Coding. IEEE Transactions on Information Theory IT 24(5), 530\u2013536 (1978)","journal-title":"IEEE Transactions on Information Theory IT"}],"container-title":["Lecture Notes in Computer Science","Principles and Practice of Constraint Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23219-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:51:20Z","timestamp":1676472680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23219-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319232188","9783319232195"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23219-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}