Contractor programming

G Chabert, L Jaulin - Artificial Intelligence, 2009 - Elsevier
This paper describes a solver programming method, called contractor programming, that
copes with two issues related to constraint processing over the reals. First, continuous …

Convex restriction of power flow feasibility sets

D Lee, HD Nguyen, K Dvijotham… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The convex restriction of power flow feasibility sets identifies the convex subset of power
injections where a solution for power flow equations is guaranteed to exist and satisfy the …

Solvability regions of affinely parameterized quadratic equations

K Dvijotham, H Nguyen… - IEEE Control Systems …, 2017 - ieeexplore.ieee.org
Quadratic systems of equations appear in several applications. The results in this letter are
motivated by quadratic systems of equations that describe equilibrium behavior of physical …

Set-membership state estimation with fleeting data

F Le Bars, J Sliwka, L Jaulin, O Reynet - Automatica, 2012 - Elsevier
This paper deals with offline nonlinear state estimation where measurements are available
only when some given equality conditions are satisfied. For this type of problems, which are …

Performance analysis and design of parallel kinematic machines using interval analysis

C Viegas, D Daney, M Tavakoli… - Mechanism and Machine …, 2017 - Elsevier
Some design methodologies for Parallel Kinematic Machines (PKM) have been proposed
but with limitations regarding two main problems: how to improve multiple properties of …

The codac library

S Rohou, B Desrochers, F Le Bars - Acta Cybernetica, 2024 - hal.science
Codac (Catalog Of Domains And Contractors) is a C++/Python library providing tools for
constraint programming over reals, trajectories and sets. It has many applications in …

Inner and outer characterization of the projection of polynomial equations using symmetries, quotients and intervals

L Jaulin - International Journal of Approximate Reasoning, 2023 - Elsevier
In this paper, we propose a new approach to compute the projection of a set defined by
polynomial equations. It assumes that the polynomial equations have some nice symmetries …

Inner approximation of the range of vector-valued functions

A Goldsztejn, L Jaulin - Reliable Computing, 2010 - hal.science
No method for the computation of a reliable subset of the range of vector-valued functions is
available today. A method for computing such inner approximations is proposed in the …

Searching feasible design space by solving quantified constraint satisfaction problems

J Hu, M Aminzadeh, Y Wang - Journal of …, 2014 - asmedigitalcollection.asme.org
In complex systems design, multidisciplinary constraints are imposed by stakeholders.
Engineers need to search feasible design space for a given problem before searching for …

Secure broadcasting: The secrecy rate region

G Bagherikaram, AS Motahari… - 2008 46th Annual …, 2008 - ieeexplore.ieee.org
In this paper, we consider a scenario where a source node wishes to broadcast two
confidential messages for two respective receivers, while a wire-tapper also receives the …