{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:04:45Z","timestamp":1729670685594,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/spac.2017.8304329","type":"proceedings-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T18:52:04Z","timestamp":1520016724000},"page":"497-502","source":"Crossref","is-referenced-by-count":0,"title":["Improving on the restricted path consistency constraint propagation algorithms based on the bitwise"],"prefix":"10.1109","author":[{"given":"Cheng","family":"Zhuyuan","sequence":"first","affiliation":[]},{"given":"Zhang","family":"Yonggang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2005.02.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(77)90007-8"},{"key":"ref12","first-page":"125","article-title":"A Study of Residual Supports in Arc Consistency","author":"licoutre","year":"2007","journal-title":"J International Joint Conference on Ijcai"},{"journal-title":"Research on the contraint propagation based constraint solving methods","year":"2008","author":"liu","key":"ref13"},{"key":"ref14","first-page":"10","article-title":"Contradicting Conventional Wisdom in Constraint Satisfaction C","author":"sabin","year":"1999","journal-title":"Proceedings of CP-1994"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45193-8_67"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(80)90051-X"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48085-3_36"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v35i2.2539"},{"key":"ref19","first-page":"271","article-title":"Experimental Evaluation of Preprocessing Techniques in Constraint Satisfaction Problems C","author":"dechter","year":"1989","journal-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI-1989)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23219-5_30"},{"key":"ref3","first-page":"312","volume":"1330","author":"debruyne","year":"1997","journal-title":"From restricted path consistency to max-restricted path consistency"},{"journal-title":"Research on Techniques od Solving Constraint Satisfaction Problems","year":"2013","author":"guo","key":"ref6"},{"key":"ref5","first-page":"21","article-title":"Enforcing Arc Consistency using Bitwise Operations","volume":"2","author":"lecoutre","year":"2014","journal-title":"Constraint Programming Letters"},{"key":"ref8","first-page":"167","article-title":"Light Algorithms for Maintaining Max-RPC During Search","author":"vion","year":"2009","journal-title":"J Proc Sara"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10601-011-9110-y"},{"key":"ref2","first-page":"15","article-title":"Handbook of constraint programming","author":"francesca","year":"2006","journal-title":"M Netherlands Elsevier"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CAIA.1995.378792"},{"year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3203","DOI":"10.1109\/TIP.2014.2327805","article-title":"Diverse Expected Gradient Active Learning for Relative Attributes","volume":"23","author":"xinge","year":"2014","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.ins.2012.09.003","article-title":"Generalization performance of magnitude-preserving semi-supervised ranking with graph-based regularization","volume":"221","author":"zhibin","year":"2013","journal-title":"Information Science"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280588"},{"key":"ref24","first-page":"354","article-title":"Robust Object Tracking via Key Patch Sparse Representation","author":"zhenyu","year":"2017","journal-title":"IEEE Transactions on Cybernetics"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"3698","DOI":"10.1109\/TIP.2016.2570553","article-title":"Connected Component Model for Multi-Object Tracking","volume":"25","author":"zhenyu","year":"2016","journal-title":"IEEE Trans on Image Processing"}],"event":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2017,12,15]]},"location":"Shenzhen","end":{"date-parts":[[2017,12,17]]}},"container-title":["2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8300290\/8304236\/08304329.pdf?arnumber=8304329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T01:13:17Z","timestamp":1570842797000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8304329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/spac.2017.8304329","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}