{"id":"https://openalex.org/W2073414479","doi":"https://doi.org/10.1017/s0890060403171053","title":"Decomposition strategies for configuration problems","display_name":"Decomposition strategies for configuration problems","publication_year":2003,"publication_date":"2003-02-01","ids":{"openalex":"https://openalex.org/W2073414479","doi":"https://doi.org/10.1017/s0890060403171053","mag":"2073414479"},"language":"en","primary_location":{"id":"doi:10.1017/s0890060403171053","is_oa":false,"landing_page_url":"https://doi.org/10.1017/s0890060403171053","pdf_url":null,"source":{"id":"https://openalex.org/S4210193102","display_name":"Artificial intelligence for engineering design analysis and manufacturing","issn_l":"0890-0604","issn":["0890-0604","1469-1760"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Artificial Intelligence for Engineering Design, Analysis and Manufacturing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082432511","display_name":"Diego Magro","orcid":"https://orcid.org/0000-0001-9681-0080"},"institutions":[{"id":"https://openalex.org/I55143463","display_name":"University of Turin","ror":"https://ror.org/048tbm396","country_code":"IT","type":"education","lineage":["https://openalex.org/I55143463"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"DIEGO MAGRO","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 di Torino, 10149 Torino, Italy","Dipartimento di Informatica, Universita' di Torino, 10149 Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 di Torino, 10149 Torino, Italy","institution_ids":["https://openalex.org/I55143463"]},{"raw_affiliation_string":"Dipartimento di Informatica, Universita' di Torino, 10149 Torino, Italy","institution_ids":["https://openalex.org/I55143463"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112713365","display_name":"Pietro Torasso","orcid":null},"institutions":[{"id":"https://openalex.org/I55143463","display_name":"University of Turin","ror":"https://ror.org/048tbm396","country_code":"IT","type":"education","lineage":["https://openalex.org/I55143463"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"PIETRO TORASSO","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 di Torino, 10149 Torino, Italy","Dipartimento di Informatica, Universita' di Torino, 10149 Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 di Torino, 10149 Torino, Italy","institution_ids":["https://openalex.org/I55143463"]},{"raw_affiliation_string":"Dipartimento di Informatica, Universita' di Torino, 10149 Torino, Italy","institution_ids":["https://openalex.org/I55143463"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082432511"],"corresponding_institution_ids":["https://openalex.org/I55143463"],"apc_list":null,"apc_paid":null,"fwci":5.3748,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.95343511,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"17","issue":"1","first_page":"51","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11729","display_name":"Product Development and Customization","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11729","display_name":"Product Development and Customization","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/configurator","display_name":"Configurator","score":0.9697028398513794},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7711181640625},{"id":"https://openalex.org/keywords/decomposition","display_name":"Decomposition","score":0.7008854150772095},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.685386061668396},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5938174724578857},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5084763765335083},{"id":"https://openalex.org/keywords/decomposition-method","display_name":"Decomposition method (queueing theory)","score":0.47470512986183167},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4694114625453949},{"id":"https://openalex.org/keywords/configuration-design","display_name":"Configuration design","score":0.468910813331604},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24183055758476257},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22204017639160156},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.07803377509117126}],"concepts":[{"id":"https://openalex.org/C2777210712","wikidata":"https://www.wikidata.org/wiki/Q15221050","display_name":"Configurator","level":2,"score":0.9697028398513794},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7711181640625},{"id":"https://openalex.org/C124681953","wikidata":"https://www.wikidata.org/wiki/Q339062","display_name":"Decomposition","level":2,"score":0.7008854150772095},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.685386061668396},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5938174724578857},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5084763765335083},{"id":"https://openalex.org/C2778258933","wikidata":"https://www.wikidata.org/wiki/Q16918986","display_name":"Decomposition method (queueing theory)","level":2,"score":0.47470512986183167},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4694114625453949},{"id":"https://openalex.org/C10451660","wikidata":"https://www.wikidata.org/wiki/Q5160113","display_name":"Configuration design","level":2,"score":0.468910813331604},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24183055758476257},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22204017639160156},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.07803377509117126},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1017/s0890060403171053","is_oa":false,"landing_page_url":"https://doi.org/10.1017/s0890060403171053","pdf_url":null,"source":{"id":"https://openalex.org/S4210193102","display_name":"Artificial intelligence for engineering design analysis and manufacturing","issn_l":"0890-0604","issn":["0890-0604","1469-1760"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Artificial Intelligence for Engineering Design, Analysis and Manufacturing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W34851352","https://openalex.org/W55799245","https://openalex.org/W153230822","https://openalex.org/W207647324","https://openalex.org/W1481601796","https://openalex.org/W1509205813","https://openalex.org/W1568721683","https://openalex.org/W1970590090","https://openalex.org/W1995176426","https://openalex.org/W2014341247","https://openalex.org/W2014899604","https://openalex.org/W2031162680","https://openalex.org/W2034674470","https://openalex.org/W2106149277","https://openalex.org/W2122060442","https://openalex.org/W2169406772","https://openalex.org/W2550165819","https://openalex.org/W2746524454","https://openalex.org/W6602266191","https://openalex.org/W6606242250","https://openalex.org/W6698406154"],"related_works":["https://openalex.org/W2068266569","https://openalex.org/W4320802547","https://openalex.org/W2166829200","https://openalex.org/W1995000674","https://openalex.org/W1995950394","https://openalex.org/W2648404564","https://openalex.org/W2073414479","https://openalex.org/W3163476457","https://openalex.org/W4233214470","https://openalex.org/W72895114"],"abstract_inverted_index":{"The":[0,21,98,252],"paper":[1,22,99],"introduces":[2,100],"and":[3,40,55,126,153,222,272],"discusses":[4],"the":[5,14,50,53,75,79,83,124,133,137,140,151,156,163,171,176,194,197,202,223,226,230,233,243,255,262],"notion":[6,102],"of":[7,9,16,37,52,62,68,78,103,115,150,173,187,209,215,225,232,240,245,254,261,268,270],"decomposition":[8,63,118,144,167,218,227,277],"a":[10,17,27,35,45,85,101,185,192,207,238,249,258],"configuration":[11,29,198,244],"problem":[12,30,199],"within":[13],"framework":[15],"structured":[18],"logical":[19],"approach.":[20],"describes":[23],"under":[24],"which":[25,107],"conditions":[26],"given":[28],"can":[31,181],"be":[32,179,182],"decomposed":[33],"into":[34,184,206],"set":[36,172,186,208,239],"noninteracting":[38,188],"subproblems":[39],"how":[41],"to":[42,132,162,178],"exploit":[43],"such":[44,143,191],"decomposition,":[46],"both":[47],"for":[48,56,93,110,175],"improving":[49],"performance":[51,231],"configurator":[54,141,195,234],"supporting":[57],"interactive":[58],"configuration.":[59],"Different":[60,213],"kinds":[61],"are":[64,129,159,220,279],"considered,":[65,221],"but":[66],"all":[67],"them":[69],"exploit,":[70],"as":[71,73,248],"much":[72],"possible,":[74],"explicit":[76],"representation":[77,88],"partonomic":[80],"relations":[81],"in":[82,266,273],"language,":[84],"KL-One":[86],"like":[87],"formalism":[89],"augmented":[90],"with":[91],"constraints":[92,134,174],"expressing":[94],"complex":[95],"interrole":[96],"relations.":[97],"boundness":[104],"among":[105],"constraints,":[106],"is":[108,235],"used":[109],"formally":[111],"specifying":[112],"different":[113],"types":[114],"decomposition.":[116],"One":[117],"strategy":[119,168],"aims":[120],"at":[121],"singling":[122],"out":[123],"components":[125],"subcomponents":[127],"that":[128,148,158],"directly":[130],"related":[131,161],"put":[135],"by":[136,145,200],"user's":[138,164],"requirements;":[139],"exploits":[142],"first":[146],"configuring":[147,155],"portion":[149],"product":[152,177],"then":[154],"parts":[157],"not":[160],"requirements.":[165],"Another":[166],"verifies":[169],"whether":[170],"configured":[180],"split":[183],"problems.":[189],"In":[190],"case":[193],"solves":[196],"splitting":[201],"whole":[203],"search":[204,211],"space":[205],"smaller":[210],"spaces.":[212],"combinations":[214],"these":[216],"two":[217],"techniques":[219],"impact":[224],"strategies":[228,278],"on":[229],"evaluated":[236],"via":[237],"experiments":[241,256],"using":[242],"computer":[246],"systems":[247],"test":[250],"bed.":[251],"results":[253],"show":[257],"significant":[259],"reduction":[260],"computational":[263],"effort":[264],"(both":[265],"terms":[267],"number":[269],"backtrackings":[271],"CPU":[274],"time)":[275],"when":[276],"used.":[280]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
