{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:15:40Z","timestamp":1725909340904},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319661575"},{"type":"electronic","value":"9783319661582"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66158-2_45","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T07:24:38Z","timestamp":1503386678000},"page":"707-722","source":"Crossref","is-referenced-by-count":7,"title":["Search Strategies for Floating Point Constraint\u00a0Systems"],"prefix":"10.1007","author":[{"given":"Heytem","family":"Zitoun","sequence":"first","affiliation":[]},{"given":"Claude","family":"Michel","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Rueher","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Michel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"45_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-7091-6217-0_3","volume-title":"Topics in Numerical Analysis: With Special Emphasis on Nonlinear Problems","author":"GE Alefeld","year":"2001","unstructured":"Alefeld, G.E., Potra, F.A., Shen, Z.: On the existence theorems of Kantorovich, Moore and Miranda. In: Alefeld, G., Chen, X. (eds.) Topics in Numerical Analysis: With Special Emphasis on Nonlinear Problems, vol. 15, pp. 21\u201328. Springer, Vienna (2001). doi:\n10.1007\/978-3-7091-6217-0_3"},{"key":"45_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-642-33558-7_12","volume-title":"Principles and Practice of Constraint Programming","author":"MS Belaid","year":"2012","unstructured":"Belaid, M.S., Michel, C., Rueher, M.: Boosting local consistency algorithms over floating-point numbers. In: Milano, M. (ed.) CP 2012. LNCS, pp. 127\u2013140. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-33558-7_12"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Benz, F., Hildebrandt, A., Hack, S.: A dynamic program analysis to find floating-point accuracy problems. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012, Beijing, China, 11\u201316 June 2012, pp. 453\u2013462 (2012)","DOI":"10.1145\/2254064.2254118"},{"key":"45_CR4","unstructured":"Boussemart, F., Hemery, F., Lecoutre, C., Sais, L.: Boosting systematic search by weighting constraints. In: ECAI 2004, pp. 146\u2013150 (2004)"},{"key":"45_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-319-47443-4_13","volume-title":"Testing Software and Systems","author":"H Collavizza","year":"2016","unstructured":"Collavizza, H., Michel, C., Rueher, M.: Searching critical values for floating-point programs. In: Wotawa, F., Nica, M., Kushik, N. (eds.) ICTSS 2016. LNCS, vol. 9976, pp. 209\u2013217. Springer, Cham (2016). doi:\n10.1007\/978-3-319-47443-4_13"},{"issue":"2","key":"45_CR6","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/s10601-009-9089-9","volume":"15","author":"H Collavizza","year":"2010","unstructured":"Collavizza, H., Rueher, M., Van Hentenryck, P.: CPBPV: A constraint-programming framework for bounded program verification. Constraints 15(2), 238\u2013264 (2010)","journal-title":"Constraints"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Collavizza, H., Le Vinh, N., Rueher, M., Devulder, S., Gueguen, T.: A dynamic constraint-based BMC strategy for generating counterexamples. In: 26th ACM Symposium On Applied Computing (2011)","DOI":"10.1145\/1982185.1982528"},{"key":"45_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-23219-5_10","volume-title":"Principles and Practice of Constraint Programming","author":"S Gay","year":"2015","unstructured":"Gay, S., Hartert, R., Lecoutre, C., Schaus, P.: Conflict ordering search for scheduling problems. In: Pesant, G. (ed.) CP 2015. LNCS, vol. 9255, pp. 140\u2013148. Springer, Cham (2015). doi:\n10.1007\/978-3-319-23219-5_10"},{"issue":"1","key":"45_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/103162.103163","volume":"23","author":"D Goldberg","year":"1991","unstructured":"Goldberg, D.: What every computer scientist should know about floating-point arithmetic. ACM Comput. Surv. 23(1), 5\u201348 (1991)","journal-title":"ACM Comput. Surv."},{"key":"45_CR10","unstructured":"IEEE: IEEE standard for binary floating-point arithmetic. ANSI\/IEEE Standard, 754 (2008)"},{"key":"45_CR11","unstructured":"Jussien, N., Lhomme, O.: Dynamic domain splitting for numeric CSPs. In: ECAI, pp. 224\u2013228 (1998)"},{"issue":"3","key":"45_CR12","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1145\/29380.29862","volume":"13","author":"RB Kearfott","year":"1987","unstructured":"Kearfott, R.B.: Some tests of generalized bisection. ACM Trans. Math. Softw. 13(3), 197\u2013220 (1987)","journal-title":"ACM Trans. Math. Softw."},{"key":"45_CR13","unstructured":"Lhomme, O.: Consistency techniques for numeric CSPs. In: Proceedings of 13th International Joint Conference on Artifical Intelligence, IJCAI 1993, vol. 1, pp. 232\u2013238. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"issue":"2","key":"45_CR14","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1287\/ijoc.11.2.173","volume":"11","author":"JT Linderoth","year":"1999","unstructured":"Linderoth, J.T., Savelsbergh, M.W.P.: A computational study of search strategies for mixed integer programming. INFORMS J. Comput. 11(2), 173\u2013187 (1999)","journal-title":"INFORMS J. Comput."},{"key":"45_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-642-29828-8_15","volume-title":"Integration of AI and OR Techniques in Contraint Programming for Combinatorial Optimzation Problems","author":"L Michel","year":"2012","unstructured":"Michel, L., Van Hentenryck, P.: Activity-based search for black-box constraint programming solvers. In: Beldiceanu, N., Jussien, N., Pinson, \u00c9. (eds.) CPAIOR 2012. LNCS, vol. 7298, pp. 228\u2013243. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-29828-8_15"},{"issue":"2","key":"45_CR16","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s10515-014-0154-2","volume":"23","author":"O Ponsini","year":"2016","unstructured":"Ponsini, O., Michel, C., Rueher, M.: Verifying floating-point programs with constraint programming and abstract interpretation techniques. Autom. Softw. Eng. 23(2), 191\u2013217 (2016)","journal-title":"Autom. Softw. Eng."},{"key":"45_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-30201-8_41","volume-title":"Principles and Practice of Constraint Programming \u2013 CP 2004","author":"P Refalo","year":"2004","unstructured":"Refalo, P.: Impact-based search strategies for constraint programming. In: Wallace, M. (ed.) CP 2004. LNCS, vol. 3258, pp. 557\u2013571. Springer, Heidelberg (2004). doi:\n10.1007\/978-3-540-30201-8_41"},{"key":"45_CR18","series-title":"Prentice-Hall Series in Automatic Computation","volume-title":"Floating-Point Computation","author":"PH Sterbenz","year":"1973","unstructured":"Sterbenz, P.H.: Floating-Point Computation. Prentice-Hall Series in Automatic Computation. Prentice-Hall, Upper Saddle River (1973)"}],"container-title":["Lecture Notes in Computer Science","Principles and Practice of Constraint Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66158-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T07:48:50Z","timestamp":1503388130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66158-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319661575","9783319661582"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66158-2_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}