24 research outputs found

    Linear Datalog and Bounded Path Duality of Relational Structures

    Full text link
    In this paper we systematically investigate the connections between logics with a finite number of variables, structures of bounded pathwidth, and linear Datalog Programs. We prove that, in the context of Constraint Satisfaction Problems, all these concepts correspond to different mathematical embodiments of a unique robust notion that we call bounded path duality. We also study the computational complexity implications of the notion of bounded path duality. We show that every constraint satisfaction problem \csp(\best) with bounded path duality is solvable in NL and that this notion explains in a uniform way all families of CSPs known to be in NL. Finally, we use the results developed in the paper to identify new problems in NL

    nn-permutability and linear Datalog implies symmetric Datalog

    Full text link
    We show that if A\mathbb A is a core relational structure such that CSP(A\mathbb A) can be solved by a linear Datalog program, and A\mathbb A is nn-permutable for some nn, then CSP(A\mathbb A) can be solved by a symmetric Datalog program (and thus CSP(A\mathbb A) lies in deterministic logspace). At the moment, it is not known for which structures A\mathbb A will CSP(A\mathbb A) be solvable by a linear Datalog program. However, once somebody obtains a characterization of linear Datalog, our result immediately gives a characterization of symmetric Datalog

    Robust algorithms with polynomial loss for near-unanimity CSPs

    Get PDF
    An instance of the Constraint Satisfaction Problem (CSP) is given by a family of constraints on overlapping sets of variables, and the goal is to assign values from a xed domain to the variables so that all constraints are satised. In the optimization version, the goal is to maximize the number of satised constraints. An approximation algorithm for CSP is called robust if it outputs an assignment satisfying an (1????g("))-fraction of constraints on any (1????")-satisable instance, where the loss function g is such that g(") ! 0 as " ! 0. We study how the robust approximability of CSPs depends on the set of constraint relations allowed in instances, the so-called constraint language. All constraint languages admitting a robust polynomial-time algorithm (with some g) have been characterised by Barto and Kozik, with the general bound on the loss g being doubly exponential, specically g(") = O((log log(1="))= log(1=")). It is natural to ask when a better loss can be achieved: in particular, polynomial loss g(") = O("1=k) for some constant k. In this paper, we consider CSPs with a constraint language having a nearunanimity polymorphism. This general condition almost matches a known necessary condition for having a robust algorithm with polynomial loss. We give two randomized robust algorithms with polynomial loss for such CSPs: one works for any near-unanimity polymorphism and the parameter k in the loss depends on the size of the domain and the arity of the relations in ????, while the other works for a special ternary near-unanimity operation called dual discriminator with k = 2 for any domain size. In the latter case, the CSP is a common generalisation of Unique Games with a xed domain and 2-Sat. In the former case, we use the algebraic approach to the CSP. Both cases use the standard semidenite programming relaxation for CSP

    Series-Parallel Posets and Polymorphisms

    Get PDF
    We examine various aspects of the poset retraction problem for series-parallel posets. In particular we show that the poset retraction problem for series-parallel posets that are already solvable in polynomial time are actually also solvable in nondeterministic logarithmic space (assuming P 6= NP). We do this by showing that these series-parallel posets when expanded by constants have bounded path duality. We also give a recipe for constructing members of this special class of series-parallel poset analogous to the construction of all series-parallel posets. Piecing together results from [5],[15],[14] and [12] one can deduce that if a relational structure expanded by constants has bounded path duality then it admits SD-join operations. We directly prove the existence of SD-join operations on members of this class by providing an algorithm which constructs them. Moreover, we obtain a polynomial upper bound to the length of the sequence of these operations. This also proves that for this class of series-parallel posets, having bounded path duality when expanded by constants is equivalent to admitting SD-join operations. This equivalence is not yet known to be true for general relational structures; only the forward direction is proven. However the reverse direction is known to be true for structures that admit NU operations. Zádori has classified in [26] the class of series-parallel posets admitting an NU operation and has shown that every such poset actually admits a 5-ary NU operation. We give a recipe for constructing series-parallel posets of this class analogous to the one mentioned before. Then we show an alternative proof for Zádori's result

    The complexity of the list homomorphism problem for graphs

    Get PDF
    We completely classify the computational complexity of the list H-colouring problem for graphs (with possible loops) in combinatorial and algebraic terms: for every graph H the problem is either NP-complete, NL-complete, L-complete or is first-order definable; descriptive complexity equivalents are given as well via Datalog and its fragments. Our algebraic characterisations match important conjectures in the study of constraint satisfaction problems.Comment: 12 pages, STACS 201

    The number of clones determined by disjunctions of unary relations

    Full text link
    We consider finitary relations (also known as crosses) that are definable via finite disjunctions of unary relations, i.e. subsets, taken from a fixed finite parameter set Γ\Gamma. We prove that whenever Γ\Gamma contains at least one non-empty relation distinct from the full carrier set, there is a countably infinite number of polymorphism clones determined by relations that are disjunctively definable from Γ\Gamma. Finally, we extend our result to finitely related polymorphism clones and countably infinite sets Γ\Gamma.Comment: manuscript to be published in Theory of Computing System

    On Maltsev digraphs

    Get PDF
    The original publication is available at www.springerlink.com Copyright SpringerWe study digraphs preserved by a Maltsev operation, Maltsev digraphs. We show that these digraphs retract either onto a directed path or to the disjoint union of directed cycles, showing that the constraint satisfaction problem for Maltsev digraphs is in logspace, L. (This was observed in [19] using an indirect argument.) We then generalize results in [19] to show that a Maltsev digraph is preserved not only by a majority operation, but by a class of other operations (e.g., minority, Pixley) and obtain a O(V G4)-time algorithm to recognize Maltsev digraphs. We also prove analogous results for digraphs preserved by conservative Maltsev operations which we use to establish that the list homomorphism problem for Maltsev digraphs is in L. We then give a polynomial time characterisation of Maltsev digraphs admitting a conservative 2-semilattice operation. Finally, we give a simple inductive construction of directed acyclic digraphs preserved by a Maltsev operation.Peer reviewe
    corecore