Binary constraints, Computer Engineering

Binary Constraints:

Alternatively unary constraints specify that a particular variable can take certain values that basically restricts the domain for that variable thus should be taken care of where specifying the CSP.  Whether Binary constraints relate two variables, and to binary constraint problems  are individual CSPs that involve only binary constraints.

Whenever Binary CSPs have a special place in the theory than all CSPs can be written as binary CSPs as we don't go into the details of this here, and while it is possible in theory to do so there in practice the translation is hardly ever used. In fact there binary CSPs can be represented both graphically and utilizing matrices that can make them easier to understand. 

However Binary constraint graphs like the one below afford a nice presentation of constraint problems in which the nodes are the variables and the edges represent the constraints on the variables between the two variables joined through the edge as keep in mind that the constraints state that values can be taken at the same time. 

191_Binary Constraints.png

Binary constraints can also be represented as matrices, with a single matrix for each constraint. For example, in the above constraint graph, the constraint between variables x4 and x5  is {(1,3),(2,4),(7,6)}. This can be represented as the following matrix.

Posted Date: 1/11/2013 7:35:00 AM | Location : United States







Related Discussions:- Binary constraints, Assignment Help, Ask Question on Binary constraints, Get Answer, Expert's Help, Binary constraints Discussions

Write discussion on Binary constraints
Your posts are moderated
Related Questions
Write a 'C' program to accept any 3 digit integer number from the keyboard and display the word equivalent representation of the given number

Q. Explain the Instruction Decode? Instruction Decode: This phase is performed under control of Control Unit of computer. The Control Unit determines the operation which is t

Define MFC. To accommodate the variability in response time, the processor waits unless it receives an indication that the requested read operation has been done. The control s


Q. Show the conflict in register? All micro-operations written on a line are to be executed at same time provided the statements or a group of statements to be implemented toge

In IP addressing scheme, class used for multicasting is: A class used for multicasting in IP addressing scheme is class D.

What is Race condition? Race condition: The circumstances where several processes access - and manipulate shared data-concurrently. The last value of the shared data depends

Propositional truth tables: There {X\t} is a substitution that replaces all occurances of variable X with a term representing an object t as:  ∀X. A is true if and only

What are the different kinds of lock modes? There are three types of lock modes:- Shared lock Exclusive lock. Extended exclusive list.

Which of following can not be accessed randomly DRAM, SRAM, ROM or Magnetic tape ? Ans. Magnetic tape cannot be accessed randomly; it can only be accessed sequentially.