D. Conte, P. Foggia, C. Sansone, and M. Vento, THIRTY YEARS OF GRAPH MATCHING IN PATTERN RECOGNITION, International Journal of Pattern Recognition and Artificial Intelligence, vol.18, issue.03, pp.265-298, 2004.
DOI : 10.1142/S0218001404003228

URL : https://hal.archives-ouvertes.fr/hal-01408706

J. Larrosa and G. Valiente, Constraint satisfaction algorithms for graph pattern matching, Mathematical Structures in Computer Science, vol.12, issue.04, pp.403-422, 2002.
DOI : 10.1017/S0960129501003577

R. 1. Baumgartner and F. Massacci, The Taming of the (X)OR, Computational Logic ? CL 2000, pp.508-522, 2000.
DOI : 10.1007/3-540-44957-4_34

N. Een and N. Sörensson, An extensible sat-solver [ver 1.2, SAT 2003, pp.502-508, 2003.

D. Goossens, Bipartitions et equations lineaires, Programmation en logique avec contraintes, pp.299-302, 2003.

M. Heule and H. Van-maaren, Aligning CNF- and Equivalence-Reasoning, Seventh International Conference on Theory and Applications of Satisfiability Testing, 2004.
DOI : 10.1007/11527695_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.2212

I. Lynce and J. Marques-silva, The puzzling role of simplification in propositional satisfiability, EPIA'01 Workshop on Constraint Satisfaction and Operational Research Techniques for Problem Solving (EPIA-CSOR), 2001.

M. W. Moskewicz, C. F. Madigan, Y. Zhao, L. Zhang, and S. Malik, Chaff, Proceedings of the 38th conference on Design automation , DAC '01, 2001.
DOI : 10.1145/378239.379017

G. S. Huang, N. Dershowitz, J. Hsiang, and D. Kaiss, Boolean ring satisfiability, Seventh International Conference on Theory and Applications of Satisfiability Testing, pp.281-286, 2004.

M. A. Papalaskaris and L. K. Schubert, Parts Inference: Closed and Semi-closed Partitioning graphs, Proceedings of the 7th IJCAI, pp.304-309, 1981.

T. J. Schaefer, The complexity of satisfiability problems, Proceedings of the tenth annual ACM symposium on Theory of computing , STOC '78, pp.216-226, 1978.
DOI : 10.1145/800133.804350

S. Subbarayan and D. Pradhan, NiVER: Non-increasing Variable Elimination Resolution for Preprocessing SAT Instances, Selected Revised Papers of International Conference on Theory and Applications of Satisfiability Testing Conference (Springer LNCS), pp.276-291, 2004.
DOI : 10.1007/11527695_22

J. P. Warners and H. Van-maaren, A two-phase algorithm for solving a class of hard satisfiability problems, Operations Research Letters, vol.23, issue.3-5, pp.81-88, 1998.
DOI : 10.1016/S0167-6377(98)00052-2

B. Zanuttini, Approximating propositional knowledge with affine formulas, Proc. 15th European Conference on Artificial Intelligence (ECAI'02), pp.287-291, 2002.
URL : https://hal.archives-ouvertes.fr/hal-00995239

7. $. %4&, %0)($2%)&0$)20, 8& $0& %/K& 6."H$.& :"%0)($2%)0& $%=& 0/$(:-& )/:-%2L7/0&$%0)($2%)%0)($2%)0& 2%&702"%08& $%=&%0)($2%)& #"=/.& K2)-& N0%2L7/& 20& %")& "%.4& :"#G./)/.4& 2%=%0)($2%)&, pp.2-6

$. /. 32%6&-gh and . #&-2%&-$-%&&-g, &2#G&RSI&$%=&T5& 0, 2%6& )$0+&#7.$)2"%&07:-&$0&=2%6&$%=&H=2%6& N2%)("=7:/=& 2%& XC[Z& $%=& ;"(#$..4& =/0:(2H/=& 2%& X\ZP?& 107$..4& )#7.$)2"%& 20& 7G& )"& )-/& 70/(& H4& 702%6& )/:-%2L7/0&07:-&$0&$==2%6&04##/)(4&H(/$+2%6&"(&2#G.2/=&:"%0)($2%)08&/%:"=2%6&G$(, p.70

&. $. Gg, 2)&2%;"(#$)2"%&, %0)($2%)0&$%6/(& :"%020)/%:4& )/:-%2L7/8&%020)/%:4& 2%0)/$=& ";& $(:& :"%020)/%:4?& M"K/3/(8& )-/& #$2%& G("H./#& K2)-& 0)("%6/(& :"%020)/%:4& )/:-%2L7/0& 20& )-/2(& )2#/& $%=& 0G$:/& :"#G./J2)4& K-2:-& =20L7$.248& 0)32%6&2%2)2$..4&2%:"%020)/%)&3$.7/0&;("#&3$%0)($2%)0& )-$)& $(/& =/=7:/=& =7(2%6& )-/& 2%2)2$.& :"%020)/%:4& G%0)($2%)&%& $(:& :"%020)/%:4&XBZ&)"&=%0)($2%)0&H%&3$&_G.$2%`&:"%020)/%:4&)/:-%2L7/0&07:-&$0&$(:& :"%020)/%:4&"(&G$)-&:"%020)/%:4P?&I-%020)/%:4& 20& $%&%0)($2%)0&)-$)&K/&$8& 2#G.2:$)2"%8& $%=& /J:.702"%& :"%0)($2%)0?2H7)/0&$&.")&)"&(/#"32%6&2%2)2$.& 2%:"%020)%0)($2%)0&=#&RS,&:$%&G& 2%&G("H./#&0".32%6?& I-/&G$G/(&20&"(6$%2F/=&$0&K0?&S;)/(&6232%6&)-/&2%2)2$.&#")23$)2"%&;"(&"7(&K, pp.3-3
URL : https://hal.archives-ouvertes.fr/hal-00093459

$. #g, &H($%:-2%6P?&I, 2=2)4&3$%0)($2%)0&0G%0)($2%)&&3$.2=2)4&3$

/. and $. .. Og, %0)($2%), 0& )-$)& :$%& =/=7:/& 2#G.2/=& :"%0)($2%)0& 2#G2=2)4& 0)$)70& 20& 2=0&$%=&/J:.702"%0?& I-/& $H"3/& G("H./#& 20& %")& )-/& "%.4& G("H./#& :"#H2%2%6& '""./$%& $%=& )/#G"($.&, pp.2-926770

G. %=&, %:2.2$)2, %& 3$.2=2), p.4

$. H. &h, %:2.2$)2"%&G, =&, vol.2, issue.00204223, pp.7-13

$. , $. %. #%&-nrs, and $. #g, %& $, R5&$%=&2)0&S,&$%=&RS

G. /. #&-s and &. N. , %O 2%0)$%)2$)/=& N, %020)/%)&3$.7

=. %=&2%=2, *) 8'&, &0$#/&3$.7/&2%& $%4&0".7)2"%&0"&K/&:$%&G7)&/L7$.2)4&:"%0)($2%)&H&2%0)$%)2$)%& 3$(2$H./0& 2%& 58& ="#0N5P& $(/& ="#$2%0& ";& 58& Q d & c& ebf& #/$%0& )-$)& )-/& ="#$2%&, p.7

#. O%-$, %&, %0)($2%)&

#. %&, =>$!?56:4)4@@43$($4, p.4

$. #2%o, %&20&3, %0)($2%)& 0

=. ". =&, %&";&0, %0)($2%)

D. @gc@g, HBCHHEGD

&. #g, %0)($2%)0?&V&0, pp.4-6

7. Rs and &. :. =&, %0)($2%)0& 702%6&, 7%=$)2"%& 7%=/(&)-/&:"%)($:)&%

$. !. &m-)-"-f and . &f%, ++1+K&"%K5)12.8H&& & !%

&. 5. F%, ++1+K& F)5G%$8, #15)&56& "&4$)2"1+& "K$+2& 1/& )$R(1)$9H& Q2& 1/& 2.$& 4+9& #$.14%$, p.62

&. 5%#1+k&56&2, 4215+& 56& 2, %K5)12.8H& J$& $T"42%*& 65%%5L& 2.$& 5)1K1+"%& M)"F.!%"+& "%K5)12.8& $T4$F2& 22& F)5S$4215+& 45+/1/2$+4*& `L12.& )$/F$42& 25& F)5S$4215+& 65)& "& /5%(215+& 56& 2.$& /(FF5)2/& F)5G%$8H& J.$+$#$)& 2.$& G"4,2)"4,1+K&"%K5)12.8&8FF5)21+K&"4215+&65)&"+&"258&1/&/$%$42$9a&, pp.9-41

L. G&, 12$b&, pp.218-866

$. +2&, 1. $. F%-"-+&-$-t2+2&56&2, and *. <. , 4215+& L12+&$T2)"4215+&F, 9#"+2"K$&5+&.")9&F)&1/&(F& 25&"G5(2& !&&&3 H&75)$5#$)&L$&4"+&2&2.$&%")K$)&2.$&F5)215+&56&218$&1/&/F$+2&G*& /$")4.&2.$&G$22$)&2.$&18F)5#$8$+2&G*&(/$&56&F)

!. , G. /. A=&-`-muqena=a@&anx, and A. Uh@&, 4214$H& 75& `g*+"814a& -'!b& fTF%5121+K& fZ_@& ggZ& "+9& 52++1+K&`f++1+K&`f-!N^ea@& =\CN=e=@& _P-'& AX[B@& 'F)1+K$)Nl$)%"K@&A^^eH& AAH& k"(2D@&dH&UH@&'$%8"+@&ZHb&0+16*1+K&)+"215+"%& m51+2& -5+6$)$+4$& 5+& U)216141"%& Q+2$%%1K$+4$& `Qm-UQN^^a@& XABNX=?@& 75)K"+&k, ++1+K&-58F$21215+H&f#$+2& 1+& 28F"21@& 'H@& !"),$)@& fH@& _"8G)$4.2@& fHb& 0+9$)/2"+91+K& "+9& fT2$+91+K& M)"F.!%"+H& Q+& !)54$$91+K/& 56& [2.& f()5F$"+& -5+6$)$+4$& 5+& !%44.(/@& 3Hb& M$+$)"%1D1+K& M)"F.!%"+& G*& 35)8(%"21+K& !%H& Q+& !)54$$91+K/& 56& 2.$& AB2.& Q+2$)+"215+"%& m51+2& -5+6$)$+4$& 5+& U)216141"%& Q+2$%%1K$+4$& `Qm-UQN=CCXa@&^?[N^\C@&75)K"+&k"(68"++&!(G%11+2/&56&g166$)$+4$H&Q+&!)54$$91+K/&56&2.$&A=2.& P"215+"%&-5+6$)$+4$&5+&U)216141"%&Q+2$%%1K$+4$&`UUUQN^[a@&X\=NX\e@&UUUQ&!)$//@&A^^[H& A\H& '812.@& gH& fH@& J$%9@& gH& 'Hb& O$8F5)"%& !%"++1+K& L12.&%& fT4%(/15+& E$"/5+1+KH& Q+& !)5N 4$$91+K/& 56& 2.$& A\2.& Q+2$)+"215+"%& m51+2& -5+6$)$+4$& 5+& U)216141"%& Q+2$%%1K$+4$& `Qm-UQN^^a@& X=\NXXe@&75)K"+&k"(68"++@&A^^^H& AeH& '()*+$&9()1+K& '$")4.H&U44$F2$9&25&2.$&=C2.&3_UQE'&45+6$)$+4$@&k$*&J$/2@&3%5)19"@&0'U@&=CCeH&O$4.+14"%& )$F5)2& +5H& X=B@& QOQ& '$)1$/@& .22Fb>>121H866H4(+1H4D>/$)1$/>1+9$TH.28%@& -.")%$/& 0+1#$)/12*@& !)"N K($@&-D$4.&E$F(G%14@&=CCeH& ABH& '()*+$,@&!Hb&-5+/2)"1+2&Z"/$9&E$"/5+1+K&5#$)&7(2$T&E$%"215+/&1+&!%"++1+K&M)"F./&9()1+K& '$")4.H&O$4.+14"%&)$F5)2&+5H&X=^@&QOQ&'$)1$/@&.22Fb>>121H866H4(+1H4D>/$)1$/>1+9$TH.28%@&-.")%$/& 0+1#$)/12*@&!)"K($@&-D$4.&E$F

A. , @. Hb&-'5%#1+k&g166141, and $. , %& )$F5)2& +5H& X[C@& QOQ& '$)1$/@&, 4215+@& E$65)8(%"215+@& "+9& UFF)5T18"215+&`'215+&`'UEUN=CCea@& -"+"9"@& =CCeH& O$41+2&!)5K)"881+K&UFF)5"4.&25&!%"++1+KH&Q+&!)5N 4$$91+K/& 56& 2.$& A\2.& P"215+"%& -5+6$)$+4$& 5+& U)216141"%& Q+2$%%1K$+4$& `UUUQN^^a@& ?B?N?^C@& UUUQ&!)$//@&A^^^H& References 1. Puget, J.F.: On the satisfiability of symmetrical constrained satisfaction problems. Proc. of ISMIS'93, pp.350-361, 1993.

J. Crawford, G. Luks, M. Ginsberg, and A. Roy, Symmetry breaking predicates for search problems, Proc. of the 5th Int. Conf. on Knowledge Representation and Reasoning, pp.148-159, 1996.

P. Flener, A. Frisch, B. Hnich, Z. Kiziltan, I. Miguel et al., Breaking Row and Column Symmetries in Matrix Models, 8th Int. Conf. on Principles and Practices of Constraint Programming, 2002.
DOI : 10.1007/3-540-46135-3_31

Y. Law and J. Lee, Global Constraints for Integer and Set Value Precedence, Proc. of 10th Int. Conf. on Principles and Practice of Constraint Programming, pp.362-376, 2004.
DOI : 10.1007/978-3-540-30201-8_28

T. Fahle, S. Schamberger, and M. Sellmann, Symmetry Breaking, Proc. of 7th Int. Conf. on Principles and Practice of Constraint Programming (CP2001), pp.93-107, 2001.
DOI : 10.1007/3-540-45578-7_7

I. Gent and . Smith, Symmetry breaking in constraint programming, Proc. of ECAI-2000, pp.599-603, 2000.

C. Roney-dougal, I. Gent, T. Kelsey, and S. Linton, Tractable symmetry breaking using restricted search trees, Proc. of ECAI-2004, 2004.

T. Walsh, Breaking Value Symmetry, NICTA and UNSW, 2007.
DOI : 10.1007/978-3-540-74970-7_67

P. Flener, J. Pearson, M. Sellmann, and P. V. Hentenryck, Static and dynamic structural symmetry breaking, Proc. of 12th Int. Conf. on Principles and Practice of Constraint Programming (CP2006), 2006.

M. Sellmann and P. V. Hentenryck, Structural symmetry breaking, Proc. of 19th IJCAI, 2005.

G. Pesant, A Regular Language Membership Constraint for Finite Sequences of Variables, Proc. of 10th Int. Conf. on Principles and Practice of Constraint Programming, pp.482-295, 2004.
DOI : 10.1007/978-3-540-30201-8_36

C. G. Quimper and T. Walsh, Global Grammar Constraints, 12th Int. Conf. on Principles and Practices of Constraint Programming, p.-Verlag, 2006.
DOI : 10.1007/11889205_64

A. Frisch, B. Hnich, Z. Kiziltan, I. Miguel, and T. Walsh, Propagation algorithms for lexicographic ordering constraints, Artificial Intelligence, vol.170, issue.10, pp.803-908, 2006.
DOI : 10.1016/j.artint.2006.03.002

T. Walsh, Symmetry breaking using value precedence, Proc. of the 17th ECAI, 2006.

C. Quimper, P. Van-beek, A. Lopez-ortiz, and A. Golynski, Improved Algorithms for the Global Cardinality Constraint, Proc. of 10th Int. Conf. on Principles and Practice of Constraint Programming, 2004.
DOI : 10.1007/978-3-540-30201-8_40

J. F. Puget, Breaking All Value Symmetries in Surjection Problems, Proc. of 11th Int. Conf. on Principles and Practice of Constraint Programming (CP2005), 2005.
DOI : 10.1007/11564751_37

Y. Law, Using Constraints to Break Value Symmetries in Constraint Satisfaction Problems, 2005.

I. Shlyakhter, Generating effective symmetry-breaking predicates for search problems, Proc. of LICS workshop on Theory and Applications of Satisfiability Testing, 2001.

J. F. Puget, Breaking symmetries in all different problems, Proc. of 19th IJCAI, pp.272-277, 2005.

Y. Law and J. Lee, Symmetry Breaking Constraints for Value Symmetries in Constraint Satisfaction, Constraints, vol.10, issue.1, pp.221-267, 2006.
DOI : 10.1007/s10601-006-7095-8

A. H. Johnston-m, A Discrete Stochastic Neural Network Algorithm for Constraint Satisfaction Problems, proceedings of the international Joint Conference on Neural Networks, 1990.

B. F. Van, Dynamic Variable Ordering in CSPs, Proceedings the First International Conference on Principle and Practice of Constraint Programming, pp.258-275, 1995.

B. C. and M. P. Freuder-e, on forward checking for non-binary constraint satisfaction, Larrosa J. Artificial Intelligence, vol.141, pp.205-224, 2002.

B. C. Régin-j, MAC and combined heuristics: Two reasons to forsake FC (and CBJ?) on hard problem, CP'96, 1996.

B. C. , R. J. , and Y. R. Zhang-y, An Optimal Coarse-grained Arc Consistency Algorithm, Artificial Intelligence, vol.165, issue.2, pp.165-185, 2001.

G. I. Macintyre-e, S. B. Prosser-p, and . Walsh-t, Random Constraint Satisfaction: Flaws and Structure, Journal of Constraints, vol.6, issue.4, pp.345-372, 2001.

J. B. Ghédira-k, A Study of backtracking based informed algorithms, 2004.

J. D. Papadimitrou-c and . Yannakakis-m, How easy is local search, Journal of Computer and System Sciences, vol.37, pp.79-100, 1988.

J. D. Aragon-c and M. L. Schevon-c, Optimization by simulated annealing: An experimental evaluation, part II, Journal of Operations Research, 1990.

J. M. Minton-s, Analysing a heuristic strategy for constraint-satisfaction and scheduling Intelligent scheduling p, pp.257-290, 1994.

M. S. Johnston-m, . B. Philips-a, and . Laird-p, Solving large scale constraint satisfaction and scheduling problems using a heuristic repair method, proceedings AAAI- 90, pp.17-24, 1990.

M. S. Johnston-m, . B. Philips-a, and P. Laird, Minimizing conflicts: A heuristic repair method for constraint-satisfaction and scheduling problems, Artificial Intelligence, vol.58, pp.161-205, 1992.

S. B. Levesque-h and . Mitchell-d, A new method for solving hard satisfiability problems, proceedings AAAI-92, 1992.

S. R. Gu-j, A polynomial time algorithm for the n-queens problem, 1990.

T. E. and G. Elliot, Foundations of Constraint Satisfaction Problems Increasing tree search efficiency for constraint satisfaction problems, References 1. R. Haralick, pp.263-313, 1980.

D. Sabin and E. Freuder, Contradicting conventional wisdom in constraint satisfaction, Proc. of ECAI, pp.125-129, 1994.
DOI : 10.1007/3-540-58601-6_86

R. Dechter and J. Pearl, Tree clustering for constraint networks, Artificial Intelligence, vol.38, issue.3, pp.353-366, 1989.
DOI : 10.1016/0004-3702(89)90037-4

G. Gottlob, N. Leone, and F. Scarcello, A comparison of structural CSP decomposition methods, Artificial Intelligence, vol.124, issue.2, pp.343-282, 2000.
DOI : 10.1016/S0004-3702(00)00078-3

G. Gottlob, M. Hutle, and F. Wotawa, Combining hypertree, bicomp and hinge decomposition, Proc. of ECAI, pp.161-165, 2002.

P. Jégou and C. Terrioux, Hybrid backtracking bounded by tree-decomposition of constraint networks, Artificial Intelligence, vol.146, issue.1, pp.43-75, 2003.
DOI : 10.1016/S0004-3702(02)00400-9

R. Dechter, Constraint processing, 2003.

P. Prosser, HYBRID ALGORITHMS FOR THE CONSTRAINT SATISFACTION PROBLEM, Computational Intelligence, vol.1, issue.4, pp.268-299, 1993.
DOI : 10.1016/0004-3702(77)90007-8

R. Dechter, Enhancement schemes for constraint processing: Backjumping, learning, and cutset decomposition, Artificial Intelligence, vol.41, issue.3, pp.273-312, 1990.
DOI : 10.1016/0004-3702(90)90046-3

J. Baget and Y. Tognetti, Backtracking Throught Biconnected Components of a Constraint Graph, Proc. of IJCAI, pp.291-296, 2001.

E. Freuder, A sufficient condition for backtrack-bounded search, Journal of the ACM, vol.32, issue.4, pp.755-761, 1985.
DOI : 10.1145/4221.4225

E. Freuder and M. Quinn, Taking Advantage of Stable Sets of Variables in Constraint Satisfaction Problems, Proc. of IJCAI, pp.1076-1078, 1985.

R. J. Bayardo and D. P. Miranker, A Complexity Analysis of Space-Bounded Learning Algorithms for the Constraints Satisfaction Problem, Proc. of AAAI, pp.298-304, 1996.

R. Dechter and R. Mateescu, AND/OR search spaces for graphical models, Artificial Intelligence, vol.171, issue.2-3, pp.73-106, 2007.
DOI : 10.1016/j.artint.2006.11.003

N. Robertson and P. D. Seymour, Graph minors. II. Algorithmic aspects of tree-width, Journal of Algorithms, vol.7, issue.3, pp.309-322, 1986.
DOI : 10.1016/0196-6774(86)90023-4

P. Jégou, S. N. Ndiaye, and C. Terrioux, Dynamic Heuristics for Backtrack Search on Tree-Decomposition of CSPs, Proc. of IJCAI, pp.112-117, 2007.

M. Gyssens, P. Jeavons, and D. Cohen, Decomposing constraint satisfaction problems using database techniques, Artificial Intelligence, vol.66, issue.1, pp.57-89, 1994.
DOI : 10.1016/0004-3702(94)90003-5

F. Gavril, Some NP-complete Problems on Graphs, Proc. of the Conference on Information Sciences and Systems, pp.91-95, 1977.

T. Schiex and G. Verfaillie, Nogood Recording for Static and Dynamic Constraint Satisfaction Problems, IJAIT, vol.3, issue.2, pp.187-207, 1994.

M. Ginsberg, Dynamic Backtracking, Journal of Artificial Intelligence Research, vol.1, pp.25-46, 1993.

S. Bistarelli, H. Fargier, U. Montanari, F. Rossi, T. Schiex et al., Semiring-based CSPs and valued CSPs: Basic properties and comparison, LNCS, pp.1106-121, 1996.
DOI : 10.1007/3-540-61479-6_19

R. 1. Baader and T. Nipkow, Term Rewriting and All That, 1998.

G. J. Duck, P. J. Stuckey, M. J. García-de-la-banda, and C. Holzbaur, Extending arbitrary solvers with constraint handling rules, Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming , PPDP '03, pp.79-90, 2003.
DOI : 10.1145/888251.888260

G. J. Duck, P. J. Stuckey, M. J. García-de-la-banda, and C. Holzbaur, The Refined Operational Semantics of Constraint Handling Rules, LNCS, vol.3132, pp.90-104, 2004.
DOI : 10.1007/978-3-540-27775-0_7

C. Dwork, P. C. Kanellakis, and J. C. Mitchell, On the sequential nature of unification, The Journal of Logic Programming, vol.1, issue.1, pp.35-50, 1984.
DOI : 10.1016/0743-1066(84)90022-0

T. Frühwirth, Theory and practice of constraint handling rules, The Journal of Logic Programming, vol.37, issue.1-3, pp.95-138, 1998.
DOI : 10.1016/S0743-1066(98)10005-5

T. Frühwirth, Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis, ICLP 2005, pp.113-127, 2005.
DOI : 10.1007/11562931_11

T. Frühwirth, Specialization of Concurrent Guarded Multi-set Transformation Rules, LNCS, vol.3573, pp.133-148, 2004.
DOI : 10.1007/11506676_9

T. Frühwirth and S. Abdennadher, Essentials of Constraint Programming, 2003.
DOI : 10.1007/978-3-662-05138-2

G. P. Huet, Confluent Reductions: Abstract Properties and Applications to Term Rewriting Systems: Abstract Properties and Applications to Term Rewriting Systems, Journal of the ACM, vol.27, issue.4, pp.797-821, 1980.
DOI : 10.1145/322217.322230

K. Knight, Unification: a multidisciplinary survey, ACM Computing Surveys, vol.21, issue.1, pp.93-124, 1989.
DOI : 10.1145/62029.62030

M. J. Maher, Complete axiomatizations of the algebras of finite, rational and infinite trees, [1988] Proceedings. Third Annual Information Symposium on Logic in Computer Science, pp.348-357, 1988.
DOI : 10.1109/LICS.1988.5132

A. Martelli and G. Rossi, Efficient unification with infinite terms in logic programming, FGCS'84, pp.202-209, 1984.

M. Meister, K. Djelloul, and T. Frühwirth, Complexity of a CHR Solver for Existentially Quantified Conjunctions of Equations over Trees, Recent Advances in Constraints, of LNCS
DOI : 10.1007/978-3-540-73817-6_9

URL : https://hal.archives-ouvertes.fr/hal-00202313

T. Schrijvers and B. Demoen, The K.U.Leuven CHR system: implementation and application, CHR 2004, Selected Contributions, 2004.

T. Schrijvers and T. Frühwirth, Optimal union-find in Constraint Handling Rules, Theory and Practice of Logic Programming, vol.6, issue.1-2, pp.213-224, 2006.
DOI : 10.1017/S1471068405002541

T. Schrijvers, The Constraint Handling Rules (CHR) web page, 2007.

R. E. Tarjan and J. Van-leeuwen, Worst-case Analysis of Set Union Algorithms, Journal of the ACM, vol.31, issue.2, pp.245-281, 1984.
DOI : 10.1145/62.2160

R. 1. , -. Andreoli, and R. Pareschi, Linear objects: Logical processes with built-in inheritance, New Generation Computing, vol.9, pp.445-473, 1991.

E. Best, F. S. De-boer, and C. Palamidessi, Concurrent constraint programming with information removal, Proceedings of Coordination, Lecture Notes in Computer Science, 1997.

D. Diaz, GNU Prolog user's manual, 1999.

D. Duchier, L. Kornstaedt, C. Schulte, and G. Smolka, A higher-order module discipline with separate compilation, dynamic linking, and pickling, 1998.

P. D. Ed-dbali and L. Cervoni, Prolog: The Standard, 1996.

F. Fages, P. Ruet, and S. Soliman, Linear Concurrent Constraint Programming: Operational and Phase Semantics, Information and Computation, vol.165, issue.1, pp.14-41, 2001.
DOI : 10.1006/inco.2000.3002

URL : https://hal.archives-ouvertes.fr/hal-01431358

J. Girard, Linear logic, Theoretical Computer Science, vol.50, issue.1, 1987.
DOI : 10.1016/0304-3975(87)90045-4

URL : https://hal.archives-ouvertes.fr/inria-00075966

R. Haemmerlé, ICLP 2005 Doctoral Consortium, Proceedings of International Conference on Logic Programming ICLP 2005, pp.448-449, 2005.
DOI : 10.1007/11562931_50

R. Haemmerlé and F. Fages, Modules for Prolog Revisited, Proceedings of International Conference on Logic Programming ICLP 2006, number 4079 in Lecture Notes in Computer Science, pp.41-55, 2006.
DOI : 10.1007/11799573_6

L. Hallnäs, A Proof-Theoretic Approach to Logic Programming, Journal of Logic and Computation, vol.1, issue.5, pp.635-660, 1991.
DOI : 10.1093/logcom/1.5.635

J. Harland, D. J. Pym, and M. Winikoff, Programming in Lygon: An overview, Proceedings of the Fifth International Conference on Algebraic Methodology and Software Technology, pp.391-405, 1996.
DOI : 10.1007/BFb0014329

J. S. Hodas and D. Miller, Logic Programming in a Fragment of Intuitionistic Linear Logic, Information and Computation, vol.110, issue.2, pp.327-365, 1994.
DOI : 10.1006/inco.1994.1036

X. Leroy, A modular module system, Journal of Functional Programming, vol.10, issue.3, pp.269-303, 2000.
DOI : 10.1017/S0956796800003683

URL : https://hal.archives-ouvertes.fr/inria-00073825

C. Palamidessi, V. A. Saraswat, F. D. Valencia, and B. Victor, On the Expressiveness of Linearity vs Persistence in the Asychronous Pi-Calculus, 21st Annual IEEE Symposium on Logic in Computer Science (LICS'06), pp.59-68, 2006.
DOI : 10.1109/LICS.2006.39

URL : https://hal.archives-ouvertes.fr/inria-00201096

P. V. Roy, P. Brand, D. Duchier, S. Haridi, M. Henz et al., Logic programming in the context of multiparadigm programming: the Oz experience, Theory and Practice of Logic Programming, vol.3, issue.6, pp.715-763, 2003.

V. A. Saraswat, Concurrent constraint programming ACM Doctoral Dissertation Awards, 1993.

V. A. Saraswat and P. Lincoln, Higher-order linear concurrent constraint programming, 1992.

M. E. Stickel, A prolog technology theorem prover For the left hand side premise, let {x 1 , x 1 } be a partition of x such as x 1 = x?V P (d 1 ) and x 1 = x\V P (d 1 ) and {t 1 , t 1 } the corresponding partition of t. Hence, we have V P (d 1 [x 1 \t 1 ]) = V P (d 1 ) and therefore by induction hypothesis V P (t 1 ) ? A(V P (d 1 ), ? 1 ) Using, the same reasoning we infer that V P (t 2 ) ? A(V P (d 2 ), ? 2 ) where t 2 is the subsequence of t which corresponds to x 2 = x ? V P (d 2 ). By hypothesis we have x ? V P (d 1 ? d 2 ) an then V P (t) ? (A(V P (d 1 ), ? 1 ) ? A(V P (d 2 ), ? 2 )) ? A(V P, pp.353-380, 1988.

M. Meister and P. , Properties (i-iv) hold in state S 0 by our encoding of the initial pre-flow

R. 1. Abdennadher, T. Frühwirth, and H. Meuss, Confluence and semantics of constraint simplification rules, Constraints, vol.4, issue.2, pp.133-165, 1999.
DOI : 10.1023/A:1009842826135

R. J. Anderson and J. C. Setubal, On the parallel implementation of Goldberg's maximum flow algorithm, Proceedings of the fourth annual ACM symposium on Parallel algorithms and architectures , SPAA '92, pp.168-177, 1992.
DOI : 10.1145/140901.140919

J. Banâtre, P. Fradet, and Y. Radenac, Principles of Chemical Programming, Electronic Notes in Theoretical Computer Science, vol.124, issue.1, pp.133-147, 2004.
DOI : 10.1016/j.entcs.2004.07.019

H. Betz and T. Frühwirth, A Linear-Logic Semantics for Constraint Handling Rules, CP 2005, pp.137-151, 2005.
DOI : 10.1007/11564751_13

T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson, Introduction to Algorithms, 2001.

T. Frühwirth, Theory and practice of constraint handling rules, The Journal of Logic Programming, vol.37, issue.1-3, pp.95-138, 1998.
DOI : 10.1016/S0743-1066(98)10005-5

T. Frühwirth, Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis, ICLP 2005, pp.113-127, 2005.
DOI : 10.1007/11562931_11

A. V. Goldberg and R. E. Tarjan, A new approach to the maximum-flow problem, Journal of the ACM, vol.35, issue.4, pp.921-940, 1988.
DOI : 10.1145/48014.61051

M. Meister, Fine-grained parallel implementation of the preflow-push algorithm in CHR, INFSYS Research Report, pp.1843-1849, 2006.

J. Régin, A filtering algorithm for constraints of difference in CSPs, AAAI 1994, pp.362-367, 1994.

V. A. Saraswat, Concurrent constraint programming, Proceedings of the 17th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '90, 1993.
DOI : 10.1145/96709.96733

D. A. Schmidt, Denotational Semantics: A Methodology for Language Development, 1986.

T. Schrijvers and T. Frühwirth, Optimal union-find in Constraint Handling Rules, Theory and Practice of Logic Programming, vol.6, issue.1-2, pp.213-224, 2006.
DOI : 10.1017/S1471068405002541

W. J. Van-hoeve, The alldifferent constraint: A survey, ERCIM Working Group on Constraints, 6th Annual Workshop, 2001.

. Mapgen, Mixed-initiative planning and scheduling for the mars exploration rover mission, IEEE Intelligent Systems, vol.19, issue.1, pp.8-12, 2004.

C. Combi and G. Pozzi, Task scheduling for a temporal workflow management system, Proc. of TIME'06, pp.61-68, 2006.

E. Cox, Fuzzy fundamentals, IEEE Spectrum, vol.29, issue.10, pp.58-61, 1992.
DOI : 10.1109/6.158640

R. Dechter, I. Meiri, and J. Pearl, Temporal constraint networks, Artificial Intelligence, vol.49, issue.1-3, pp.61-95, 1991.
DOI : 10.1016/0004-3702(91)90006-6

D. Dubois and H. Prade, What are fuzzy rules and how to use them. Fuzzy Sets and Systems, pp.169-185, 1996.

L. Khatib, P. Morris, R. A. Morris, and F. Rossi, Temporal constraint reasoning with preferences, IJCAI01, pp.322-327, 2001.

C. C. Lee, Fuzzy logic in control systems: fuzzy logic controller. I, IEEE Transactions on Systems, Man, and Cybernetics, vol.20, issue.2, pp.404-435, 1990.
DOI : 10.1109/21.52551

B. Peintner and M. E. Pollack, Low-cost addition of preferences to dtps and tcsps, Proc. of AAAI'-04, pp.723-728, 2004.

M. E. Pollack, L. E. Brown, D. Colbry, C. E. Mccarthy, C. Orosz et al., Autominder: an intelligent cognitive orthotic system for people with memory impairment, Robotics and Autonomous Systems, vol.44, issue.3-4, pp.3-4273, 2003.
DOI : 10.1016/S0921-8890(03)00077-0

F. Rossi, K. B. Venable, and N. Yorke-smith, Uncertainty in soft temporal constraint problems: a general framework and controllability algorithms for the fuzzy case, Journal of AI Research, vol.27, pp.617-674, 2006.

K. Stergiou and M. Koubarakis, Backtracking algorithms for disjunctions of temporal constraints, Artificial Intelligence, vol.120, issue.1, pp.81-117, 2000.
DOI : 10.1016/S0004-3702(00)00019-9

I. Tsamardinos, Constraint-Based Temporal Reasoning Algorithms with Applications to Planning, 2001.

I. Tsamardinos, T. Vidal, and M. E. Pollack, Ctp: A new constraint-based formalism for conditional, temporal planning, Constraints, vol.8, issue.4, pp.365-388, 2003.
DOI : 10.1023/A:1025894003623

T. Vidal and H. Fargier, Handling contingency in temporal constraint networks: from consistency to controllabilities, Journal of Experimental & Theoretical Artificial Intelligence, vol.6, issue.1, pp.23-45, 0201.
DOI : 10.1016/0933-3657(91)90004-U

J. F. Bard, Practical Bilevel Optimization: Algorithms and Applications, 1998.
DOI : 10.1007/978-1-4757-2836-1

A. Charnes and W. W. Cooper, Preface to topics in data envelopment analysis, Annals of Operations Research, vol.2, issue.1, pp.59-94, 1985.
DOI : 10.1007/BF01874733

A. Charnes, W. W. Cooper, and E. Rhodes, Measuring the efficiency of decision making units, European Journal of Operational Research, vol.2, issue.6, pp.429-444, 1978.
DOI : 10.1016/0377-2217(78)90138-8

W. D. Cook, M. Kress, and L. M. Seiford, On the Use of Ordinal Data in Data Envelopment Analysis, Journal of the Operational Research Society, vol.44, issue.2, pp.133-140, 1993.
DOI : 10.1057/jors.1993.25

W. D. Cook, M. Kress, and L. M. Seiford, Data Envelopment Analysis in the Presence of Both Quantitative and Qualitative Factors, Journal of the Operational Research Society, vol.47, issue.7, pp.945-953, 1996.
DOI : 10.1057/jors.1996.120

W. W. Cooper, K. S. Park, and G. Yu, An Illustrative Application of Idea (Imprecise Data Envelopment Analysis) to a Korean Mobile Telecommunication Company, Operations Research, vol.49, issue.6, pp.807-820, 2001.
DOI : 10.1287/opre.49.6.807.10022

W. W. Cooper, K. S. Park, and G. Yu, IDEA (Imprecise Data Envelopment Analysis) with CMDs (Column Maximum Decision Making Units), Journal of the Operational Research Society, vol.52, issue.2, pp.178-181, 2001.
DOI : 10.1057/palgrave.jors.2601070

W. W. Cooper, K. S. Park, and G. Yu, IDEA and AR-IDEA: Models for Dealing with Imprecise Data in DEA, Management Science, vol.45, issue.4, pp.597-607, 1999.
DOI : 10.1287/mnsc.45.4.597

S. Gattoufi, Data Envelopment Analysis: A taxonomy, A meta review and an extension (Confident-DEA) with application to predicting cross (OECD) country banking systems' efficiency, Ph.D. Dissertation, 2002.

S. Gattoufi and A. Reisman, Content analysis of data envelopment analysis literature and its comparison with that of other OR/MS fields, Modeling, Computation and Optimization in Information Systems and Management Sciences, pp.911-932, 2004.
DOI : 10.1080/002075497194787

S. Gattoufi, M. Oral, A. Kumar, and A. Reisman, Epistemology of data envelopment analysis and comparison with other fields of OR/MS for relevance to applications, Socio-Economic Planning Sciences, vol.38, issue.2-3, pp.123-140, 2004.
DOI : 10.1016/S0038-0121(03)00021-1

B. Golany, Note???A Note on Including Ordinal Relations Among Multipliers in Data Envelopment Analysis, Management Science, vol.34, issue.8, pp.1029-1033, 1988.
DOI : 10.1287/mnsc.34.8.1029

D. E. Goldberg, Genetic algorithms in search, optimization and machine learning, 1989.

P. Hansen, B. Jaumard, and G. Savard, New Branch-and-Bound Rules for Linear Bilevel Programming, SIAM Journal on Scientific and Statistical Computing, vol.13, issue.5, pp.1194-1217, 1992.
DOI : 10.1137/0913069

J. H. Holland, Adaptation in Natural and Artificial Systems, 1992.

R. G. Jeroslow, The polynomial hierarchy and a simple model for competitive analysis, Mathematical Programming, pp.146-164, 1985.
DOI : 10.1007/BF01586088

H. S. Kim, C. G. Park, and K. S. Park, An application of data envelopment analysis in telephone officesevaluation with partial data, Computers & Operations Research, vol.26, issue.1, pp.59-72, 1999.
DOI : 10.1016/S0305-0548(98)00041-0

Y. K. Lee, K. S. Park, and S. H. Kim, Identification of inefficiencies in an additive model based IDEA (imprecise data envelopment analysis), Computers & Operations Research, vol.29, issue.12, pp.1661-76, 2002.
DOI : 10.1016/S0305-0548(01)00049-1

K. F. Man, K. S. Tang, and S. Kwong, Genetic algorithms: concepts and designs, 1999.
DOI : 10.1007/978-1-4471-0577-0

T. Post and J. Spronk, Performance benchmarking using interactive data envelopment analysis, European Journal of Operational Research, vol.115, issue.3, pp.472-487, 1999.
DOI : 10.1016/S0377-2217(98)00022-8