The present invention relates to a method of configuring feature subscriptions and in particular to a method of configuring feature subscriptions such that feature interactions can be detected and incompatible feature interactions flagged to a user.
Information and communication services, from newsfeeds to internet telephony, are playing an increasing, and potentially disruptive, role in our lives. As a result, service providers seek personalisation solutions to allow customers control and enhance the way digital services are delivered; for example, call control has received much attention in Plain-Old Telephony Service and Intelligent Network environments. An outcome of that work is the emergence of features as fundamental primitives for personalisation.
A feature is an increment of functionality which modifies the basic service behaviour, e.g., call-divert-on-busy, multimedia ring back tone, interactive voice response, find-me, etc. Features are optional and must be activated to fulfil their role. Once activated, they execute automatically (e.g., call-logging) or interactively (e.g., call-transfer). Service personalisation refers to the problem of selecting which features should be active and when. In this context, a challenge is to provide effective tool support to service subscribers.
Any personalisation capability is intrinsically dependent on the way features are realised in the underlying service application architecture. Modern architectures, notably those based on the Session Initiation Protocol, are user-centric and delegate control over the selection and composition of applications. The management of interactions between applications remains incomplete or restrictive.
The SIP specification prescribes an abstract architecture comprising entities such as user agents, proxy servers and registrars. Proxy servers route messages between user agents and dialogs are set up, modified, and terminated through series of request-response transactions between adjacent entities on the connection path. Referring to
Various capabilities have been proposed to program or exert control over SIP entities. SIP scripting languages, for instance, allow one to specify fine-grained call control rules in the form of scripts combining conditions and actions. Scripts are uploaded to devices or application servers and interpreted by embedded engines at runtime. Examples of this approach include CPL and LESS. An alternative is SIP APIs; the SIP servlet API, for instance, provides real-time and operational control over the invocations of SIP servlets. The scope of these capabilities remain limited to the devices and servers where scripts, policies, rules or servlets are deployed.
DFC is a virtual network architecture with its own signalling and media protocols. It applies a SIP-like composition-by-proxying style and, similarly to the IMS, uses dedicated routers to invoke and sequence the features subscribed by session participants. Feature subscriptions are sequences of features constructed from structured sets of features which are referred to as catalogues. Catalogues comprise feature interaction resolution constraints which are formulated by designers and enforced on subscriptions at configuration time. These constraints avoid undesirable feature interactions and enable desirable ones at run-time.
A dialog is set up in a DFC network by chaining run-time entities, known as boxes, between two endpoints. The resulting chain, known as a usage, is built incrementally and dynamically by routing a setup request that is generated by an interface box (i.e., a box interfacing with a device, a gateway or a media server) through a sequence of feature boxes to another interface box. This process is carried out using interchangeable and stateless routers. DFC routers act as proxies for boxes, that is, any setup request sent by a box goes through a router which processes and forwards it to the next box.
The routing process starts with the construction of the source zone corresponding to the address originating the call. Any feature box included in the source zone may change the source address encapsulated in the incoming setup request at its discretion (e.g., an identification feature). If so, a new zone corresponding to the resulting source address is constructed. The process iterates until the source region is exhausted. The construction of the first target zone then starts using the target address. Again, a change of target address performed by a feature box triggers the construction of a new target zone (e.g., a location feature). Eventually, the target region is exhausted and an interface box associated to the target address is reached.
The way an interface or feature box populates an outgoing setup message depends on whether it initiates a new call, continues a setup request or places a new call relating to a previous usage. A router, on the other hand, deterministically transforms the requests it receives. Specifically, it unfolds or reinitialises the route, preserves or advances the region from source to target and ultimately chooses the box to send the request to. As discussed above, the route is reinitialised when a new zone must be constructed after a change of address or region. If so, it is set to the sequence of feature box types (FBT) the source address has subscribed to if the source region is the current region or that the target address has subscribed to otherwise. This is the mechanism by which subscribers control the setup of usages.
FBT are implementation modules, deployed as feature boxes in a network. Their deployment is constrained by the fact that feature boxes such as call-waiting have to be persistent and bound to the same address over time. For this reason, DFC classifies FBT as bound or free. Routers use this information to look up features boxes from FBT and subscription addresses when proxying requests. DFC also distinguishes between source FBT such as originating-call-screening and target FBT such as terminating-call-screening based on their routing region. DFC classifies some of the FBT that are both source and target as reversible. Reversible FBT include FBT such as mid-call-move that can initiate calls in the context of existing dialogs and bound FBT such as call-waiting that must be routed in the source and target regions.
The DFC approach to feature interaction management relies on the formulation of binary precedence constraints over FBT when creating catalogues and their subsequent enforcement when creating subscriptions. These constraints are formulated by designers who analyse all possible pairs of FBT in each region and determine those that are prone to interactions. For each pair, this involves determining which routing order, if any, could lead to an interaction during a session. Any uncovered interaction is then resolved, i.e., avoided or enabled according to its desirability, by formulating a precedence constraint between the two FBT. The resulting set of constraints form two irreflexive binary relations, one defined over the set of source FBT which we refer to as the source precedence relation, one defined over the set of target FBT which we refer to as the target precedence relation.
On this basis, a catalogue is defined as a set of FBT, their attributes (source, etc), a source precedence relation and a target precedence relation. A subscription is defined from a catalogue by a subset of source FBT (also referred to as a source set), a subset of target FBT (also referred to as a target set), a strict total ordering of the source set (also referred to as a source sequence) and a strict total ordering of the target set (also referred to as a target sequence) such that every reversible FBT belongs to the source set if and only if it belongs to the target set. In order to ensure an orderly and “interaction-free” routing, DFC imposes the following consistency rules on subscriptions:
Rule 1. The source (resp., target) sequence contains the source (resp., target) precedence relation induced by the source (resp., target) set.
Rule 2. The ordering of the reversible FBT in the source sequence is the inverse of their ordering in the target sequence.
It follows from Rule 2 that the source and target sequences of a consistent subscription are interdependent. In order to make their computation independent, DFC imposes the following rules on catalogues:
Rule 3. The source and target precedence relations are transitive.
Rule 4. The restrictions of the source and target precedence relations to the set of reversible FBT are strict total orders.
Rule 5. The restrictions of the source and target precedence relations to the set of reversible FBT are inverse relations.
Any set of FBT selected from a catalogue satisfying Rule 3 can be turned into a subscription that satisfies Rule 1 (Rule 3 implies that the precedence relations are strict partial orders and therefore directed acyclic graphs (DAGs)). On the other hand, any set of FBT determines a source set and a target set verifying that every reversible FBT belongs to the source set if and only if it belongs to the target set. Therefore, the subgraph of the source (respectively, target) precedence graph induced by the source (resp., target) set is a DAG and, since any DAG can be extended into a total order, the result follows.
A topological sort algorithm can be used to compute such a subscription in a time that is linear with the size of the precedence relations. Rule 4 implies that the ordering of the reversible FBT in the source and target sequences is the same for all consistent subscriptions, that is, subscribers have no choice over these orderings. Besides, as a consequence of Rule 5 and Rule 4, Rule 2 is necessarily satisfied by any subscription satisfying Rule 1. Therefore, the three rules on catalogues guarantee that any set of FBT can be turned into a consistent subscription in linear time.
Although they facilitate the computation of consistent subscriptions, the DFC rules on catalogues are overly restrictive. On the one hand, Rule 3 prohibits cycles in precedence relations and, in particular, prohibits the inclusion of mutually incompatible FBT in catalogues, i.e., FBT such as call-waiting and call-forwarding-on-busy which form a precedence cycle. As a result, service providers will have to arbitrarily discard FBT from their catalogues to break cycles, e.g., rejecting call-waiting in favour of call-forwarding-on-busy.
Rule 3 also assumes that precedence relations are closed by transitivity although the precedence constraints uncovered by designers may not originally form a transitive relation. If so, making the relations transitive will create precedence constraints that do not correspond to any real interactions. Likewise, Rule 4 may force designers/providers to add arbitrary precedence constraints to the original source and target precedence relations in order to make them total in the reversible region. All these constraints will effectively label some of the safe subscriptions as inconsistent and will prevent their selection at subscription configuration time.
The three rules on catalogues can actually be dropped as long as a subscription configuration system enforces the two consistency rules on subscriptions. This approach brings more flexibility to service providers when creating FBT catalogues since source and target precedence relations need not be transitive or acyclic, nor total or inverse in the reversible region. In particular, mutually exclusive FBT can be tolerated in the same catalogue. In addition, the approach provides subscribers with a wider range of choices since fewer subscriptions will be tagged inconsistent.
At the same time, allowing cyclic precedence relations means that some FBT sets may not be convertible into consistent subscriptions as they may have no source and target orderings satisfying both Rule 1 and Rule 2. More generally, it may not be possible to convert partially ordered sets of FBT into consistent subscriptions. Concretely, this means that a subscriber submitting a set of FBT together with sequencing constraints to a subscription configuration system may see his request rejected as there may be no way of inferring a consistent subscription. Therefore, a subscription configuration system allowing subscribers to arbitrarily select and sequence features must be capable of detecting and managing inconsistent requirements, e.g., by suggesting consistent alternatives.
“Prioritizing Features Through Categorization: An Approach to Resolving Feature Interactions”, a PhD thesis by P A Zimmer (which can be retrieved from http://hdl.handle.net/10012/3350) discloses a system which can be used to determine whether a particular set of features are consistent. However, the system disclosed Zimmer can only operate on a predetermined set of features—there is no disclosure that a user is able to configure their own set of features. Furthermore, in the event that a particular set of features is not consistent then Zimmer's system merely reports that an inconsistency is present—there is no mechanism that can provide a user with one or more potential solutions for which one or more constraints have been relaxed in order to provide a consistent solution.
According to a first aspect of the present invention, there is provided a method of configuring a feature subscription, the method comprising the steps of: a) retrieving a feature subscription, the feature subscription comprising one or more features; b) configuring the feature subscription; c) determining if there is a consistent solution of the feature subscription configured in step b); and d) if there is a consistent solution determined in step c), selecting it for use, otherwise; e) if there is no consistent solution determined in step c) presenting one or more partially consistent solutions to the feature subscription configured in step b).
The consistent selection selected in step d) may be used to determine the routing of a communication session. The method may also comprise the further step of: f) retrieving a feature catalogue; wherein step e) is performed after step a) and before step b).
In one embodiment of the present invention, step b) comprises the steps of i) deleting one or more features from the feature subscription; and/or ii) adding one or more features from the feature catalogue to the feature subscription.
In an alternative embodiment of the present invention, step b) comprises the step of modifying a feature present in the feature subscription.
According to a second aspect of the present invention, there is provided a computer program product comprising computer executable code for performing one of the methods as described above.
According to a third aspect of the present invention, there is provided a service configuration system comprising: a user interface, a configuration engine, a catalogue data store and a subscription data store, wherein, in use, a feature subscription comprising one or more features is retrieved from the subscription data store; the retrieved feature subscription is configured; one or more consistent solutions of the configured feature subscription are determined; and if there is a consistent solution to the configured feature subscription selecting it for use, otherwise if there is no consistent solution presenting one or more partially consistent solutions to the configured feature subscription.
Embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which:
If the user chooses to select the batch configuration mode then at S420 the user requests the modification of a subscription and at S425 the CE then determines the consistency of the resulting subscription (see below). If the subscription is consistent, it returns its partially ordered consistent (POC) closure and a set of totally ordered consistent (TOG) extensions (S455). If the subscription is inconsistent, it returns a set of POC contractions also known as relaxations (S430). Regardless of the determination made at S425, the user has to select one of the consistent subscriptions (S460) before proceeding. The user may then choose to repeat the process, by returning to S415, or to terminate the session if he is satisfied with the current subscription and if the subscription is totally ordered (S465).
If the user selects the incremental configuration mode at S415 then the user may only make atomic modifications at each iteration, for example adding a single feature or precedence constraint to the subscription or retracting a single feature or precedence constraint from the subscription. Although less flexible than the batch configuration mode, the incremental configuration mode guarantees the consistency of the subscription throughout a session, that is, any incremental modification necessarily results in a consistent subscription. Therefore, the CE never faces the task of detecting inconsistency and computing relaxations in incremental mode and the user is never confronted with the task of selecting relaxations. At S455, the partially ordered consistent (POC) closure and a set of totally ordered consistent (TOC) extensions (S455) are computed prior to the selection of a consistent subscription (S460). The user may then choose to repeat the process, by returning to S415, or to terminate the session if he is satisfied with the current subscription and if the subscription is totally ordered (S465). If at S465, the user chooses to re-configure a subscription then there is the option of switching to the other configuration mode before requesting new modifications to the current subscription.
However, if the user chooses to terminate the session (S465), at S435 the user provides the required operational data for the subscribed features. The subscription is then saved in the FSS (S440) and will serve as the initial configuration for the next configuration session. Until it is changed, the subscription will be used by routers when setting up usages involving the address as an originating party or as a terminating party.
The data objects that are manipulated and exchanged between the user, the UI and the CE will now be described in greater detail.
A feature is an object with a list of data types and two boolean attributes named source and target such that one of them at least is true. Features that are both source and target will be referred to as reversible.
A feature catalogue is defined by a set F of features, an irreflexive binary relation defined over the set of source features in F (known as source precedence relation) and an irreflexive binary relation defined over the set of target features in F (known as target precedence relation). As discussed above, it is not required, that the source and precedence relations be acyclic or transitive, nor total or inverse over the set of reversible features (Rule 3, Rule 4 and Rule 5).
Table 1 below shows an example of a feature set. For Table 1 and
It can be seen from Table 1 that originating-call-screening (OCS) is a non-reversible source feature, terminating-call-screening (TCS) is a non-reversible target feature and mid-call-move (MCM) is a reversible feature.
A feature subscription is defined from a catalogue by a subset F of its features, a binary relation defined over the set of source features in F, a binary relation defined over the set of target features in F and values for the list of data types of each feature in F.
The source set is defined as the set of source features in the subscription, the source order the binary relation defined over the source set and the source graph the directed graph <source set, source order>. Similarly, the target set is defined as the set of target features in the subscription, the target order the binary relation defined over the target set and the target graph the directed graph <target set, target order>. Furthermore, the reversible set is defined as the set of reversible features in the subscription.
A subscription is partially ordered if and only if its source and target orders are strict partial orders. A strict partial order is an irreflexive and transitive binary relation and therefore a directed acyclic graph The subscription shown in
It is possible to use graph-theoretic definitions to define the notions of extension, contraction and consistency of subscriptions such that:
The above notions are not strict, i.e., every directed graph is a subgraph of itself.
A subscription is consistent with a catalogue if and only if can be arc-extended into a totally ordered subscription verifying the following rules:
Rule 6. The source (respectively, target) graph arc-extends the subgraph of the source (resp., target) precedence graph induced by the source (resp., target) set.
Rule 7. The ordering of the reversible features in the source order is the inverse of their ordering in the target order.
It follows from Rule 6 that a subscription cannot be consistent if either the subgraph of the source precedence graph induced by the source set or the subgraph of the target precedence graph induced by the target set is cyclic. Note that operational parameters play no role in determining the consistency of subscriptions.
The subscription shown in
The following subscription properties hold:
For instance, the subscription shown in
For every consistent subscription X, there can be associated a triple (N,As,At) which is defined as follows:
Such triples are referred to as anti-subscriptions. Note that anti-subscriptions do not correspond to directed graphs like subscriptions since some of the features connected in As or At may not belong to N.
Any DFC catalogue of feature box types (FBT) can be transformed into a catalogue of features as follows. Any FBT that is source and target but not reversible is converted into two features. Both features get the data types of the FBT and one is source but not target while the other is target but not source. Any other FBT is converted into a single feature which gets the data types and source and target values of the FBT. Any precedence constraint between two source FBTs is then converted into a precedence constraint between the corresponding source features (which exist and are uniquely defined by definition of the mapping between FBT and features). Similarly, any precedence constraint between two target FBTs is converted into a precedence constraint between the corresponding target features (which exist and are uniquely defined by definition of the mapping between FBT and features).
Any feature set obtained and structured through this transformation forms a feature catalogue. This transformation also ensures the equivalence between the notion of consistent DFC subscription and TOC feature subscription. Specifically, it determines a one-to-one mapping between the set of DFC subscriptions consistent with a DFC catalogue and the set of totally ordered subscriptions consistent with the associated feature catalogue.
The UI and CE of the SCS are independent modules which co-operate to service the requests of users. During a configuration session, a user interacts with the UI and the UI uses the CE as a black-box to handle configuration requests. The CE provides a unique method to serve all configuration requests submitted by the UI. It is transaction stateless, that is, it maintains no state information relating to previous transactions with the UI. This means that the state of a session has to be encapsulated in each request submitted by the UI to the CE.
The following discussion provides a state-based specification of the UI and a specification of the interface and behaviour of the CE during configuration sessions. It does not model the final operations following the user's decision to exit, e.g., the instantiation of the operational parameters of the subscribed features, the saving of the resulting subscription in the FSS. The reason is these operations play no role as such in the computation of subscriptions and do not involve the CE.
A subscription configuration session may be viewed as a traversal of a subscription space associated to a feature catalogue. A session starts from a TOC subscription and through a series of transitions leads to another TOC subscription.
There are two types of user inputs made in this particular session. The first consists of adding a single feature to the subscription and is denoted by the command ‘sfa’. For instance, ‘> sfa AC’ adds the feature AC to the initial and empty subscription (not shown here) and the result is the first matrix 1200. The second consists of sequencing two features in a region and is denoted by the command ‘saa’. For instance, ‘> saa s AC OCS’ adds the arc (AC,OCS) to the source subscription and the result is the matrix 1220.
The state transitions are the following:
Based on this model, the trace corresponding to the configuration session described above with reference to
Each state is defined as a list of data comprising
Since subscriptions are configured iteratively, it is convenient for the user to be able to revise past decisions during a session, e.g., to retract arcs or features previously added. More importantly, the CE which is transaction stateless must be able to differentiate between factual information (i.e., catalogue precedence constraints), user decisions (i.e., user-defined precedence constraints) and inferred information (i.e., CE-inferred precedence constraints) when it has to compute relaxations. This information is recorded in each state by labelling the arcs of the source and target subscription graphs using the following convention: label ‘p’ for predefined arcs, label ‘u’ for user-defined arcs and label ‘c’ for the arcs generated by the CE.
A session state can be formalised using the following list of variables:
Table 2 below provides the definition of the initial state which corresponds to the subscription S stored in the subscriber profile. This subscription is either the empty subscription or a subscription generated from a configuration session. In either case, it is TOC. Furthermore, its anti-subscription and list of possible extensions are not stored in the profile and need to be recomputed, hence the setting of the fields.
Table 3 provides the semantics of the various transition types by the means of pre- and post-conditions on state variables. The specification relies on the following methods:
Table 4 below shows the semantics of the configuration method:
It follows from this specification that:
The CE is implemented using Constraint Programming technology to provide the service described above. Constraint Programming has been successfully used in planning, scheduling, resource allocation, routing, bio-informatics, and many other domains. Here problems are primarily stated as Constraint Satisfaction Problems (CSP) where the goal is to assign values to variables, in a given set of alternatives, that respect a set of constraints. The basic approach to solve CSP is to use a backtracking search algorithm which interleaves two processes: constraint propagation and labelling. Constraint propagation is about discarding options that do not lead to any solution of the problem. Labelling consists in choosing an alternative that may lead to a solution.
The Valued Constraint Satisfaction Problem (VCSP) framework is an extension of the CSP framework for solving constraint optimisation problems. It is able to take into account costs, preferences and priorities. Weighted CSP (WCSP) is a specific subclass of VCSP for which the aggregation operator is the ordinary sum. For the feature subscription problem, we consider a further specialisation of WCSP, namely, the Variable Weighted Constraint Satisfaction Problem (VWCSP). This framework covers a wide range of applications. It is particulary suited to model and solve knapsack-like problems where a maximum number of objects have to be selected subject to a set of constraints.
A VWCSP is defined by a set of n “selection variables” X1 . . . Xn, a set of m integer variables Z1 . . . Zm and an objective variable Ω=SUM(wiXi) where wi is some non-negative weight associated to Xi. The domain of each selection variable is a subset of {0,1}. At least one selection variable is involved in each constraint and when any one of the selection variables involved in a constraint is instantiated to 0, the constraint is not activated, i.e., it is considered satisfied. In other words, a constraint is only activated if all of its selection variables are instantiated to 1.
A solution to a VWCSP is an instantiation of the variables that satisfies every activated constraint. For instance, a trivial solution to any VWCSP is Xi=0 (i=1 . . . n) and Z1 . . . Zm taking arbitrary values. The objective is generally to find a maximum solution, that is, a solution that maximises Ω, the sum of the weights of the selection variables which are not instantiated to the rejection value 0. However, searching for a maximum solution is NP-hard. Therefore, in cases when finding a maximum solution is time consuming, we may opt to find one or more maximal solutions. A solution is maximal if it becomes inconsistent when any of its selection variables that was instantiated to 0 is instantiated to 1. It should be noted that a maximum solution is necessarily maximal.
Given a catalogue and a subscription defined from a feature set that satisfies Rule 6, the CE has to perform the following tasks:
The CE carries out the above tasks using a VWCSP formulation. This formulation relies on a preliminary conversion of the input subscription into a labelled directed graph called “subscription graph”. The latter has the set of features of the subscription for set of nodes. Its set of arcs is the set union of the source order with the inverse of the target order of the subscription. In other words, each labelled arc in the source graph is preserved, each labelled arc in the target graph is inversed and duplicate arcs resulting from this process are merged. When duplicate arcs with different labels are merged into one, the label ‘p’ (i.e., a catalogue constraint) takes precedence over the label ‘u’ (i.e., a user-defined constraint).
Once the CE has finished manipulating or computing subscription graphs, it converts them back into labelled subscriptions as follows. Firstly, the subscription has for a feature set the node set of the subscription graph. Secondly, each arc <x,y> of the subscription graph that connects two source nodes is converted into an arc <x,y> in the source order and each arc <x,y> that connects two target features is converted into an arc <y,x> in the target order. Labels are preserved. Finally, every arc connecting two non-reversible features, one source, the other target, is simply ignored and not converted.
It follows from these definitions/procedures that:
The VWCSP instance constructed from a subscription graph is given below where
To each feature node fi in F is associated
Each pair of features <fi,fj> in F2 is associated with a boolean variable bpij which is instantiated to 1 or 0 depending on whether fi and fj are both included in the subscription and fi precedes fj or not. Each bpij variable which corresponds to an arc (<fi,fj>,‘u’) in U is a selection variable.
Each arc (<fi,fj>,‘p’) in P corresponds to a precedence constraint from the catalogue and is modelled as follows:
bfîbfjpfi<pfj (1)
Note that the precedence constraint on the right-hand side is only activated if the selection variables bfi and bfj are both instantiated to 1.
Each arc (<fi,fj>,‘u’) in U corresponds to a user-defined precedence constraint and is modelled as follows:
bpijbfiΛbfĵ(pfi<pfj) (2)
Note that the inclusion and precedence constraints on the right-hand side are only activated if the selection variable bpij is intantiated to 1.
The fact that any two features fi and fj cannot have the same position in a subscription is modelled as follows:
bfîbfjpfi≠pfj (3)
Note that the difference constraint on the right-hand side is only activated if the selection variables bfi and bfj are both instantiated to 1.
The precedence relations should respect transitivity which is enforced using the following global constraint:
TransitiveClosure(bp12, bp13, . . . , bpn(n-2), bpn(n-1)) (4)
The semantics of this constraint is: bpiĵbpjkbpik. This is implemented following the approach described in R. Barták and O.Cepek, “Incremental Filtering Algorithms for Precedence and Dependency Constraints”, Proc. 18th IEEE Int Conf on Tools with Artificial Intelligence (ICTAI 2006), pp. 416-423.
The objective of finding a preferred relaxation of an inconsistent subscription is modelled as follows:
Maximise SUM(fi∈F,bfi.wfi)+SUM(pij∈P,bpij.wpij) (5)
where wfi is some non-negative weight associated to the selection variable bfi (i.e., the inclusion of the feature fi in the subscription) and wpij is some non-negative weight associated to the selection variable bpij (i.e., the satisfaction of the user-defined constraint “fi precedes fj”). By default the weight associated with each boolean variable of each feature and boolean variable of each user precedence is set to 1. However, depending upon the requirements, weights can be adjusted. For example, if it is desired that the system first maximises the number of features and then user precedences, the weight assigned to each feature should be more than the sum of all the weights associated with user-defined precedence constraints.
In order to determine whether the input subscription is consistent, the CE must determine whether the corresponding subscription graph is acyclic. To this end, it computes arc-consistency on the binary CSP obtained by instantiating all the selection variables of the VWCSP to 1. This CSP consists of the inequalities ‘pfi<pfj’ and disequalities ‘pfi≠pfj’ resulting from the simplification of the constraints of type (1), (2) and (3). Arc-consistency computation is a form of constraint propagation which removes some “inconsistent values” from the domains of variables, i.e., some value assignments that cannot lead to any solution of the CSP. In the case where arc-consistency computation wipes out a domain then the CSP is guaranteed to have no solution.
In the present case, it can be shown that a domain wipe out occurs if, and only if, the input subscription graph is cyclic. In other words, computing arc-consistency on the binary CSP is a correct method for determining the consistency of a subscription. This computation is affordable too since when there are only precedence constraints—a class of monotonic constraints—and disequalities—a class of anti-functional constraints. More precisely, the worst-case time complexity of enforcing arc consistency is O(e.d) where e is the number of constraints and d the maximum domain size of all the variables.
In order to generate a TOC arc-extension of the input subscription (when consistent), the CE must compute a topological sort of the corresponding subscription graph. To this end, it starts from the binary CSP obtained after computing arc-consistency in (T1). It then runs a backtracking algorithm which labels the position variables (the pfi's) one after the other and maintains arc-consistency at each node of the search tree. A backtrack-free search is guaranteed and the resulting values for the position variables provide a topological sort of the subscription graph which corresponds to a TOC arc-extension of the input subscription. More topological sorts can be generated by instantiating position variables to different values and the overhead is linear in the number of solutions requested. Note though that different topological sorts may produce the same TOC subscription after conversion. The time complexity of finding all total orders is linear with respect to the number of total orders.
In order to compute the consistent closure of the input subscription (when consistent), the CE must compute the transitive closure of the corresponding subscription graph. To this end, it runs the filtering algorithm presented in Barták op cit on the CSP which is composed of the bpij variables and the global constraint TransitiveClosure (4) and such that all the selection variables amongst the bpij's are instantiated to 1. The worst case time complexity of this algorithm is O(n̂3) and its space complexity is O(n̂2) where n is the number of features in F. The transitive closure of the subscription then corresponds to the set of variables that are instantiated to 1.
In order to generate maximal relaxations of the input subscription (when inconsistent), the CE solves the VWCSP using a backtrack search procedure. The first maximal relaxation can be found in a backtrack-free manner. However, the CE may have to backtrack to compute additional relaxations. Finding the set of all maximal relaxations is NP-hard. If the CE can generate n-1 maximal relaxations in the given time limit t, then it looks for a maximum solution in the remaining time. To this end, it solves the VWCSP using branch and bound—a technique to compute optimal solutions for constraint optimisation problems. Branch and bound employs a backtrack search algorithm which stores the value of the best solution found during search and uses it to avoid non-promising search spaces. More precisely, whenever the algorithm encounters a partial solution that cannot be extended into a solution of greater value than the stored best value, the algorithm backtracks instead of trying to extend this solution. Although the worst-case time complexity of the algorithm is exponential, its efficiency can be improved significantly by using search heuristics and constraint propagation techniques and by computing tighter bounds at each node of the search tree. Computing maximum relaxations of an inconsistent subscription is NP-hard. This can be proved by reducing the feedback vertex set problem, which is known to be NP-hard, to the present problem. Given a directed graph <V,E>, the feedback vertex set problem is to find a minimal set of nodes V′⊂V whose deletion makes the graph acyclic. Our reduction consists in associating nodes with features and edges with hard precedence relations
Note that the transitive closure of each maximal subscription is given by the set of bpij variables instantiated to 1 since the constraint TransitiveClosure is part of the VWCSP and is propagated during search.
In order to compute the anti-subscription of the consistent closure of the input subscription (when consistent) the CE must create a CSP, which is composed of all the possible bpij precedence Boolean variables of the catalogue and bfi feature Boolean variables of the catalogue. The transitive closure of the subscription should be computed by initializing the Boolean variables that are included in the subscription to 1. The anti subscription then corresponds to the set of variables that are instantiated to 0, i.e. the set of features and precedence constraints that would make the input subscription inconsistent if added. The worst time complexity of this function is n̂3 where n is the number of features in the catalogue.
It will be understood from the foregoing discussion that the present invention will be implemented in software on a general purpose computer, or on a cluster of computing devices. The functionality that enables a computing device to perform the method of the present invention may be provided by providing one or more additional computer programs or applications. It will be understood that such software may be deployed to such a computing device via download, for example via the internet, or on some physical media, for example, DVD, CD-ROM, USB memory stick, etc.
Number | Date | Country | Kind |
---|---|---|---|
08251040.5 | Mar 2008 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/GB2009/000785 | 3/25/2009 | WO | 00 | 9/10/2010 |