Improved branch and bound in constraint logic programming

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

Constraint logic programming has been applied to cost minimization problems such as job-shop scheduling with some success, using the (depth-first) branch and bound method. Recent work has shown that problem-specific heuristics can improve the performance of CLP systems on combinatorial optimisation problems. In this paper we take an orthogonal approach, by developing a generic parallel branch and bound strategy which improves existing CLP strategies in several ways: by avoiding the sometimes prohibitive overheads common to existing implementations; by speeding up convergence to optimal solutions; and by speeding up the proof of optimality for suboptimal solutions. The latter two improvements exploit parallelism in novel ways, which can be smoothly integrated with Or-parallelism. We evaluate these ideas on a set of job-shop scheduling problems, in some cases achieving order of magnitude speedups.

Original languageEnglish
Title of host publicationPrinciples and Practice of Constraint Programming — CP 1995 - 1st International Conference, CP 1995, Proceedings
EditorsUgo Montanari, Francesca Rossi
PublisherSpringer Verlag
Pages533-548
Number of pages16
ISBN (Print)3540602992, 9783540602996
DOIs
Publication statusPublished - 1995
Externally publishedYes
Event1st International Conference on Principles and Practice of Constraint Programming, CP 1995 - Cassis, France
Duration: 19 Sep 199522 Sep 1995

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume976
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Principles and Practice of Constraint Programming, CP 1995
Country/TerritoryFrance
CityCassis
Period19/09/9522/09/95

Fingerprint

Dive into the research topics of 'Improved branch and bound in constraint logic programming'. Together they form a unique fingerprint.

Cite this