832 research outputs found
A Backtracking-Based Algorithm for Computing Hypertree-Decompositions
Hypertree decompositions of hypergraphs are a generalization of tree
decompositions of graphs. The corresponding hypertree-width is a measure for
the cyclicity and therefore tractability of the encoded computation problem.
Many NP-hard decision and computation problems are known to be tractable on
instances whose structure corresponds to hypergraphs of bounded
hypertree-width. Intuitively, the smaller the hypertree-width, the faster the
computation problem can be solved. In this paper, we present the new
backtracking-based algorithm det-k-decomp for computing hypertree
decompositions of small width. Our benchmark evaluations have shown that
det-k-decomp significantly outperforms opt-k-decomp, the only exact hypertree
decomposition algorithm so far. Even compared to the best heuristic algorithm,
we obtained competitive results as long as the hypergraphs are not too large.Comment: 19 pages, 6 figures, 3 table
Perfect Scalars on the Lattice
We perform renormalization group transformations to construct optimally local
perfect lattice actions for free scalar fields of any mass. Their couplings
decay exponentially. The spectrum is identical to the continuum spectrum, while
thermodynamic quantities have tiny lattice artifacts. To make such actions
applicable in simulations, we truncate the couplings to a unit hypercube and
observe that spectrum and thermodynamics are still drastically improved
compared to the standard lattice action. We show how preconditioning techniques
can be applied successfully to this type of action. We also consider a number
of variants of the perfect lattice action, such as the use of an anisotropic or
triangular lattice, and modifications of the renormalization group
transformations motivated by wavelets. Along the way we illuminate the
consistent treatment of gauge fields, and we find a new fermionic fixed point
action with attractive properties.Comment: 26 pages, 11 figure
High precision Monte Carlo study of the 3D XY-universality class
We present a Monte Carlo study of the two-component model on the
simple cubic lattice in three dimensions. By suitable tuning of the coupling
constant we eliminate leading order corrections to scaling. High
statistics simulations using finite size scaling techniques yield
and , where the statistical and
systematical errors are given in the first and second bracket, respectively.
These results are more precise than any previous theoretical estimate of the
critical exponents for the 3D XY universality class.Comment: 13 page
Towards Efficient Reasoning under Guarded-based Disjunctive Existential Rules
International audienceThe complete picture of the complexity of answering (unions of) conjunctive queries under the main guarded-based classes of disjunc- tive existential rules has been recently settled. It has been shown that the problem is very hard, namely 2ExpTime-complete, even for fixed sets of rules expressed in lightweight formalisms. This gives rise to the question whether its complexity can be reduced by restricting the query language. Several subclasses of conjunctive queries have been proposed with the aim of reducing the complexity of classical database problems such as query evaluation and query containment. Three of the most prominent subclasses of this kind are queries of bounded hypertree-width, queries of bounded treewidth and acyclic queries. The central objective of the present paper is to understand whether the above query languages have a positive impact on the complexity of query answering under the main guarded-based classes of disjunctive existential rules. We show that (unions of) conjunctive queries of bounded hypertree- width and of bounded treewidth do not reduce the complexity of our problem, even if we focus on predicates of bounded arity, or on fixed sets of disjunctive existential rules. Regarding acyclic queries, although our problem remains 2ExpTime-complete in general, in some relevant set- tings the complexity reduces to ExpTime-complete; in fact, this requires to bound the arity of the predicates, and for some expressive guarded- based formalisms, to fix the set of rules
On The Power of Tree Projections: Structural Tractability of Enumerating CSP Solutions
The problem of deciding whether CSP instances admit solutions has been deeply
studied in the literature, and several structural tractability results have
been derived so far. However, constraint satisfaction comes in practice as a
computation problem where the focus is either on finding one solution, or on
enumerating all solutions, possibly projected to some given set of output
variables. The paper investigates the structural tractability of the problem of
enumerating (possibly projected) solutions, where tractability means here
computable with polynomial delay (WPD), since in general exponentially many
solutions may be computed. A general framework based on the notion of tree
projection of hypergraphs is considered, which generalizes all known
decomposition methods. Tractability results have been obtained both for classes
of structures where output variables are part of their specification, and for
classes of structures where computability WPD must be ensured for any possible
set of output variables. These results are shown to be tight, by exhibiting
dichotomies for classes of structures having bounded arity and where the tree
decomposition method is considered
Ontology-Based Data Access and Integration
An ontology-based data integration (OBDI) system is an information management system consisting of three components: an ontology, a set of data sources, and the mapping between the two. The ontology is a conceptual, formal description of the domain of interest to a given organization (or a community of users), expressed in terms of relevant concepts, attributes of concepts, relationships between concepts, and logical assertions characterizing the domain knowledge. The data sources are the repositories accessible by the organization where data concerning the domain are stored. In the general case, such repositories are numerous, heterogeneous, each one managed and maintained independently from the others. The mapping is a precise specification of the correspondence between the data contained in the data sources and the elements of the ontology. The main purpose of an OBDI system is to allow information consumers to query the data using the elements in the ontology as predicates.
In the special case where the organization manages a single data source, the term ontology-based data access (ODBA) system is used
The XY Model and the Three-state Antiferromagnetic Potts model in Three Dimensions: Critical Properties from Fluctuating Boundary Conditions
We present the results of a Monte Carlo study of the three-dimensional XY
model and the three-dimensional antiferromagnetic three-state Potts model. In
both cases we compute the difference in the free energies of a system with
periodic and a system with antiperiodic boundary conditions in the
neighbourhood of the critical coupling. From the finite-size scaling behaviour
of this quantity we extract values for the critical temperature and the
critical exponent nu that are compatible with recent high statistics Monte
Carlo studies of the models. The results for the free energy difference at the
critical temperature and for the exponent nu confirm that both models belong to
the same universality class.Comment: 13 pages, latex-file+2 ps-files KL-TH-94/8 and CERN-TH.7290/9
ON THE LOW-TEMPERATURE ORDERING OF THE 3D ATIFERROMAGNETIC THREE-STATE POTTS MODEL
The antiferromagnetic three-state Potts model on the simple-cubic lattice is
studied using Monte Carlo simulations. The ordering in a medium temperature
range below the critical point is investigated in detail. Two different regimes
have been observed: The so-called broken sublattice-symmetry phase dominates at
sufficiently low temperatures, while the phase just below the critical point is
characterized by an effectively continuous order parameter and by a fully
restored rotational symmetry. However, the later phase is not the
permutationally sublattice symmetric phase recently predicted by the cluster
variation method.Comment: 20 pages with 9 figures in a single postscript file (compressed and
uuencoded by uufiles -gz -9) plus two big figures in postscript file
Polynomial combined first-order rewritings for linear and guarded existential rules
We consider the problem of ontological query answering, that is, the problem of answering a database query (typically a conjunctive query) in the presence of an ontology. This means that during the query answering process we also need to take into account the knowledge that can be inferred from the given database and ontology. Building, however, ontology-aware database systems from scratch, with sophisticated optimization techniques, is a highly non-trivial task that requires a great engineering effort. Therefore, exploiting conventional database systems is an important route towards efficient ontological query answering. Nevertheless, standard database systems are unaware of ontologies. An approach to ontological query answering that enables the use of standard database systems is the so-called polynomial combined query rewriting, originally introduced in the context of description logics: the conjunctive query q and the ontology Σ are rewritten in polynomial time into a first-order query qΣ (in a database-independent way), while the database D and the ontology Σ are rewritten in polynomial time into a new database DΣ (in a query-independent way), such that the answer to q in the presence of Σ over D coincides with the answer to qΣ over DΣ. The latter can then be computed by exploiting a conventional database system. In this work, we focus on linear and guarded existential rules, which form robust rule-based languages for modeling ontologies, and investigate the limits of polynomial combined query rewriting. In particular, we show that this type of rewriting can be successfully applied to (i) linear existential rules when the rewritten query can use the full power of first-order queries, (ii) linear existential rules when the arity of the underlying schema is fixed and the rewritten query is positive existential, namely it uses only existential quantification, conjunction, and disjunction, and (iii) guarded existential rules when the underlying schema is fixed and the rewritten query is positive existential. We can show that the above results reach the limits (under standard complexity-theoretic assumptions such as [Formula presented]) of polynomial combined query rewriting in the case of linear and guarded existential rules
- …