Tradeoffs in the complexity of backdoor detection

作者: Bistra Dilkina , Carla P. Gomes , Ashish Sabharwal

DOI: 10.1007/978-3-540-74970-7_20

关键词:

摘要: There has been considerable interest in the identification of structural properties combinatorial problems that lead to efficient algorithms for solving them. Some these are "easily" identifiable, while others because they capture key aspects state-of-the-art constraint solvers. In particular, it was recently shown problem identifying a strong Horn- or 2CNF-backdoor can be solved by exploiting equivalence with deletion backdoors, and is NP-complete. We prove backdoor becomes harder than NP (unless NP=coNP) as soon inconsequential sounding feature empty clause detection (present all modern SAT solvers) added. More interestingly, practice such well polynomial time propagation mechanisms often much smaller sets. fact, despite worst-case complexity results detection, we show Satz-Rand remarkably good at finding small backdoors on range experimental domains. Our suggest notions explored designing should both statically dynamically identifiable properties.

参考文章(29)
Chu Min Li, Anbulagan Anbulagan, Heuristics based on unit propagation for satisfiability problems international joint conference on artificial intelligence. pp. 366- 371 ,(1997)
Sylvie Thiébaux, Philip Kilby, John Slaney, Toby Walsh, Backbones and backdoors in satisfiability national conference on artificial intelligence. pp. 1368- 1373 ,(2005)
Joseph C. Culberson, Mark Brockington, Camouflaging independent sets in quasi-random graphs. Cliques, Coloring, and Satisfiability. pp. 75- 88 ,(1993)
Eugene C. Freuder, Complexity of K-tree structured constraint satisfaction problems national conference on artificial intelligence. pp. 4- 9 ,(1990)
Pascal Van Hentenryck, Yves Deville, An efficient arc consistency algorithm for a class of CSP problems international joint conference on artificial intelligence. pp. 325- 330 ,(1991)
Hubie Chen, Carla Gomes, Bart Selman, Formal Models of Heavy-Tailed Behavior in Combinatorial Search principles and practice of constraint programming. pp. 408- 421 ,(2001) , 10.1007/3-540-45578-7_28
Stefan Szeider, Naomi Nishimura, Prabhakar Ragde, Detecting Backdoor Sets with Respect to Horn and Binary Clauses. theory and applications of satisfiability testing. pp. 96- 103 ,(2004)
Bart Selman, Carla P. Gomes, Ryan Williams, Backdoors to typical case complexity international joint conference on artificial intelligence. pp. 1173- 1178 ,(2003)
Hubie Chen, Víctor Dalmau, Beyond Hypertree Width: Decomposition Methods Without Decompositions Principles and Practice of Constraint Programming - CP 2005. pp. 167- 181 ,(2005) , 10.1007/11564751_15
Lionel Paris, Richard Ostrowski, Pierre Siegel, Lakhdar Sais, Computing Horn Strong Backdoor Sets Thanks to Local Search international conference on tools with artificial intelligence. pp. 139- 143 ,(2006) , 10.1109/ICTAI.2006.43