52 research outputs found

    Breaking Instance-Independent Symmetries In Exact Graph Coloring

    Full text link
    Code optimization and high level synthesis can be posed as constraint satisfaction and optimization problems, such as graph coloring used in register allocation. Graph coloring is also used to model more traditional CSPs relevant to AI, such as planning, time-tabling and scheduling. Provably optimal solutions may be desirable for commercial and defense applications. Additionally, for applications such as register allocation and code optimization, naturally-occurring instances of graph coloring are often small and can be solved optimally. A recent wave of improvements in algorithms for Boolean satisfiability (SAT) and 0-1 Integer Linear Programming (ILP) suggests generic problem-reduction methods, rather than problem-specific heuristics, because (1) heuristics may be upset by new constraints, (2) heuristics tend to ignore structure, and (3) many relevant problems are provably inapproximable. Problem reductions often lead to highly symmetric SAT instances, and symmetries are known to slow down SAT solvers. In this work, we compare several avenues for symmetry breaking, in particular when certain kinds of symmetry are present in all generated instances. Our focus on reducing CSPs to SAT allows us to leverage recent dramatic improvement in SAT solvers and automatically benefit from future progress. We can use a variety of black-box SAT solvers without modifying their source code because our symmetry-breaking techniques are static, i.e., we detect symmetries and add symmetry breaking predicates (SBPs) during pre-processing. An important result of our work is that among the types of instance-independent SBPs we studied and their combinations, the simplest and least complete constructions are the most effective. Our experiments also clearly indicate that instance-independent symmetries should mostly be processed together with instance-specific symmetries rather than at the specification level, contrary to what has been suggested in the literature

    Resolution cannot polynomially simulate compressed-BFS

    Full text link
    Many algorithms for Boolean satisfiability (SAT) work within the framework of resolution as a proof system, and thus on unsatisfiable instances they can be viewed as attempting to find proofs by resolution. However it has been known since the 1980s that every resolution proof of the pigeonhole principle (PHP n m ), suitably encoded as a CNF instance, includes exponentially many steps [18]. Therefore SAT solvers based upon the DLL procedure [12] or the DP procedure [13] must take exponential time. Polynomial-sized proofs of the pigeonhole principle exist for different proof systems, but general-purpose SAT solvers often remain confined to resolution. This result is in correlation with empirical evidence. Previously, we introduced the Compressed-BFS algorithm to solve the SAT decision problem. In an earlier work [27], an implementation of a Compressed-BFS algorithm empirically solved instances in Θ( n 4 ) time. Here, we add to this claim, and show analytically that these instances are solvable in polynomial time by Compressed-BFS. Thus the class of tautologies efficiently provable by Compressed-BFS is different than that of any resolution-based procedure. We hope that the details of our complexity analysis shed some light on the proof system implied by Compressed-BFS. Our proof focuses on structural invariants within the compressed data structure that stores collections of sets of open clauses during the Compressed-BFS algorithm. We bound the size of this data structure, as well as the overall memory, by a polynomial. We then use this to show that the overall runtime is bounded by a polynomial.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/41774/1/10472_2004_Article_5379427.pd

    Randomized controlled trial of urokinase versus placebo for nondraining malignant pleural effusion

    Get PDF
    Rationale: Patients with malignant pleural effusion experience breathlessness, which is treated by drainage and pleurodesis. Incomplete drainage results in residual dyspnea and pleurodesis failure. Intrapleural fibrinolytics lyse septations within pleural fluid, improving drainage. Objectives: To assess the effects of intrapleural urokinase on dyspnea and pleurodesis success in patients with nondraining malignant effusion. Methods: We conducted a prospective, double-blind, randomized trial. Patients with nondraining effusion were randomly allocated in a 1:1 ratio to intrapleural urokinase (100,000 IU, three doses, 12-hourly) or matched placebo. Measurements and Main Results: Co–primary outcome measures were dyspnea (average daily 100-mm visual analog scale scores over 28 d) and time to pleurodesis failure to 12 months. Secondary outcomes were survival, hospital length of stay, and radiographic change. A total of 71 subjects were randomized (36 received urokinase, 35 placebo) from 12 U.K. centers. The baseline characteristics were similar between the groups. There was no difference in mean dyspnea between groups (mean difference, 3.8 mm; 95% confidence interval [CI], −12 to 4.4 mm; P = 0.36). Pleurodesis failure rates were similar (urokinase, 13 of 35 [37%]; placebo, 11 of 34 [32%]; adjusted hazard ratio, 1.2; P = 0.65). Urokinase was associated with decreased effusion size visualized by chest radiography (adjusted relative improvement, −19%; 95% CI, −28 to −11%; P < 0.001), reduced hospital stay (1.6 d; 95% CI, 1.0 to 2.6; P = 0.049), and improved survival (69 vs. 48 d; P = 0.026). Conclusions: Use of intrapleural urokinase does not reduce dyspnea or improve pleurodesis success compared with placebo and cannot be recommended as an adjunct to pleurodesis. Other palliative treatments should be used. Improvements in hospital stay, radiographic appearance, and survival associated with urokinase require further evaluation. Clinical trial registered with ISRCTN (12852177) and EudraCT (2008-000586-26)

    Lytic activity by temperate phages of Pseudomonas aeruginosa in long-term cystic fibrosis chronic lung infections

    Get PDF
    Pseudomonas aeruginosa is the most common bacterial pathogen infecting the lungs of cystic fibrosis (CF) patients. The transmissible Liverpool epidemic strain (LES) harbours multiple inducible prophages (LESϕ2; LESϕ3; LESϕ4; LESϕ5; and LESϕ6), some of which are known to confer a competitive advantage in an in vivo rat model of chronic lung infection. We used quantitative PCR (Q-PCR) to measure the density and dynamics of all five LES phages in the sputa of 10 LES-infected CF patients over a period of 2 years. In all patients, the densities of free-LES phages were positively correlated with the densities of P. aeruginosa, and total free-phage densities consistently exceeded bacterial host densities 10–100-fold. Further, we observed a negative correlation between the phage-to-bacterium ratio and bacterial density, suggesting a role for lysis by temperate phages in regulation of the bacterial population densities. In 9/10 patients, LESϕ2 and LESϕ4 were the most abundant free phages, which reflects the differential in vitro induction properties of the phages. These data indicate that temperate phages of P. aeruginosa retain lytic activity after prolonged periods of chronic infection in the CF lung, and suggest that temperate phage lysis may contribute to regulation of P. aeruginosa density in vivo

    Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking

    No full text
    Digital Twins (DTs) have been gaining popularity in various applications, such as smart manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is described as a virtual replica of a given physical product, system, or process. It consists of three major segments: the physical entity, its virtual counterpart, and the connections between them. While the data is collected from a physical entity, processed at the virtual layer, and accessed in the form of a DT at the application layer, it is exposed to several security risks. To ensure the applicability of a DT system, it is imperative to understand these security risks and their implications. However, there is a lack of a framework that can be used to assess the security of a DT. This paper presents a framework in which the security of a DT can be analyzed with the help of a formal verification technique. The framework captures the defense of the system at different layers and considers various attacks at each layer. The security of the DT system is represented as a state-transition system and the security properties are captured in temporal logic. Probabilistic model checking (PMC) is used to verify the systems against these properties. In particular, the framework is used to analyze the probability of success and the cost of various potential attacks that can occur at each layer in a DT system. The applicability of the proposed framework is demonstrated with the help of a detailed case study in the healthcare domain
    corecore