948 research outputs found
Upper and Lower Bounds for Weak Backdoor Set Detection
We obtain upper and lower bounds for running times of exponential time
algorithms for the detection of weak backdoor sets of 3CNF formulas,
considering various base classes. These results include (omitting polynomial
factors), (i) a 4.54^k algorithm to detect whether there is a weak backdoor set
of at most k variables into the class of Horn formulas; (ii) a 2.27^k algorithm
to detect whether there is a weak backdoor set of at most k variables into the
class of Krom formulas. These bounds improve an earlier known bound of 6^k. We
also prove a 2^k lower bound for these problems, subject to the Strong
Exponential Time Hypothesis.Comment: A short version will appear in the proceedings of the 16th
International Conference on Theory and Applications of Satisfiability Testin
Linear Time Parameterized Algorithms via Skew-Symmetric Multicuts
A skew-symmetric graph is a directed graph with an
involution on the set of vertices and arcs. In this paper, we
introduce a separation problem, -Skew-Symmetric Multicut, where we are given
a skew-symmetric graph , a family of of -sized subsets of
vertices and an integer . The objective is to decide if there is a set
of arcs such that every set in the family has a vertex
such that and are in different connected components of
. In this paper, we give an algorithm for
this problem which runs in time , where is the
number of arcs in the graph, the number of vertices and the length
of the family given in the input.
Using our algorithm, we show that Almost 2-SAT has an algorithm with running
time and we obtain algorithms for {\sc Odd Cycle Transversal}
and {\sc Edge Bipartization} which run in time and
respectively. This resolves an open problem posed by Reed,
Smith and Vetta [Operations Research Letters, 2003] and improves upon the
earlier almost linear time algorithm of Kawarabayashi and Reed [SODA, 2010].
We also show that Deletion q-Horn Backdoor Set Detection is a special case of
3-Skew-Symmetric Multicut, giving us an algorithm for Deletion q-Horn Backdoor
Set Detection which runs in time . This gives the first
fixed-parameter tractable algorithm for this problem answering a question posed
in a paper by a superset of the authors [STACS, 2013]. Using this result, we
get an algorithm for Satisfiability which runs in time where
is the size of the smallest q-Horn deletion backdoor set, with being
the length of the input formula
Structure and Problem Hardness: Goal Asymmetry and DPLL Proofs in<br> SAT-Based Planning
In Verification and in (optimal) AI Planning, a successful method is to
formulate the application as boolean satisfiability (SAT), and solve it with
state-of-the-art DPLL-based procedures. There is a lack of understanding of why
this works so well. Focussing on the Planning context, we identify a form of
problem structure concerned with the symmetrical or asymmetrical nature of the
cost of achieving the individual planning goals. We quantify this sort of
structure with a simple numeric parameter called AsymRatio, ranging between 0
and 1. We run experiments in 10 benchmark domains from the International
Planning Competitions since 2000; we show that AsymRatio is a good indicator of
SAT solver performance in 8 of these domains. We then examine carefully crafted
synthetic planning domains that allow control of the amount of structure, and
that are clean enough for a rigorous analysis of the combinatorial search
space. The domains are parameterized by size, and by the amount of structure.
The CNFs we examine are unsatisfiable, encoding one planning step less than the
length of the optimal plan. We prove upper and lower bounds on the size of the
best possible DPLL refutations, under different settings of the amount of
structure, as a function of size. We also identify the best possible sets of
branching variables (backdoors). With minimum AsymRatio, we prove exponential
lower bounds, and identify minimal backdoors of size linear in the number of
variables. With maximum AsymRatio, we identify logarithmic DPLL refutations
(and backdoors), showing a doubly exponential gap between the two structural
extreme cases. The reasons for this behavior -- the proof arguments --
illuminate the prototypical patterns of structure causing the empirical
behavior observed in the competition benchmarks
Guarantees and Limits of Preprocessing in Constraint Satisfaction and Reasoning
We present a first theoretical analysis of the power of polynomial-time
preprocessing for important combinatorial problems from various areas in AI. We
consider problems from Constraint Satisfaction, Global Constraints,
Satisfiability, Nonmonotonic and Bayesian Reasoning under structural
restrictions. All these problems involve two tasks: (i) identifying the
structure in the input as required by the restriction, and (ii) using the
identified structure to solve the reasoning task efficiently. We show that for
most of the considered problems, task (i) admits a polynomial-time
preprocessing to a problem kernel whose size is polynomial in a structural
problem parameter of the input, in contrast to task (ii) which does not admit
such a reduction to a problem kernel of polynomial size, subject to a
complexity theoretic assumption. As a notable exception we show that the
consistency problem for the AtMost-NValue constraint admits a polynomial kernel
consisting of a quadratic number of variables and domain values. Our results
provide a firm worst-case guarantees and theoretical boundaries for the
performance of polynomial-time preprocessing algorithms for the considered
problems.Comment: arXiv admin note: substantial text overlap with arXiv:1104.2541,
arXiv:1104.556
- …