detecting and exploiting subproblem tractability
play

Detecting and Exploiting Subproblem Tractability Christian Bessiere, - PowerPoint PPT Presentation

Detecting and Exploiting Subproblem Tractability Christian Bessiere, Cl ement Carbonnel, Emmanuel Hebrard, George Katsirelos and Toby Walsh August 6th 2013 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 1 / 16 Tractability


  1. Detecting and Exploiting Subproblem Tractability Christian Bessiere, Cl´ ement Carbonnel, Emmanuel Hebrard, George Katsirelos and Toby Walsh August 6th 2013 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 1 / 16

  2. Tractability Lots of research on tractable constraint problems Restricted language (e.g. 2SAT) Restricted constraint structure (e.g. tree) But solvers often perform poorly on tractable problems Not enough to know it is tractable [Petke & Jeavons 2009] Detect membership to a tractable and apply the proper algorithm Emmanuel Hebrard () Subproblem Tractability August 6th 2013 2 / 16

  3. Tractability Lots of research on tractable constraint problems Restricted language (e.g. 2SAT) Restricted constraint structure (e.g. tree) But solvers often perform poorly on tractable problems Not enough to know it is tractable [Petke & Jeavons 2009] Detect membership to a tractable and apply the proper algorithm Problems might be nearly-tractable Emmanuel Hebrard () Subproblem Tractability August 6th 2013 2 / 16

  4. Near-Tractability a c b e d f g Solid edges: “easy” constraints / Dashed edges: “hard” constraints Emmanuel Hebrard () Subproblem Tractability August 6th 2013 3 / 16

  5. Near-Tractability a c b d = v e f g Solid edges: “easy” constraints / Dashed edges: “hard” constraints Branch on d Emmanuel Hebrard () Subproblem Tractability August 6th 2013 3 / 16

  6. Near-Tractability a c b e f g Solid edges: “easy” constraints / Dashed edges: “hard” constraints Branch on d Remove ( a , d ) and ( d , g ) Emmanuel Hebrard () Subproblem Tractability August 6th 2013 3 / 16

  7. Motivation x 0 1 Assigned variables y y 0 1 0 1 P 1 P 2 P 3 P 4 Tractable CSPs Identify a (hopefully) small number of variables Branch on these to give tractable subproblems Emmanuel Hebrard () Subproblem Tractability August 6th 2013 4 / 16

  8. Motivation x 0 1 Assigned variables y y 0 1 0 1 P 1 P 2 P 3 P 4 Tractable CSPs Identify a (hopefully) small number of variables Branch on these to give tractable subproblems find a backdoor [Williams et al. 2003] Emmanuel Hebrard () Subproblem Tractability August 6th 2013 4 / 16

  9. Contributions Detecting tractable classes Exploiting tractable classes Emmanuel Hebrard () Subproblem Tractability August 6th 2013 5 / 16

  10. Contributions Detecting tractable classes Detecting set of relations closed by a majority polymorphism Detecting set of relations closed by a Mal’tsev polymorphism Exploiting tractable classes Emmanuel Hebrard () Subproblem Tractability August 6th 2013 5 / 16

  11. Contributions Detecting tractable classes Detecting set of relations closed by a majority polymorphism Detecting set of relations closed by a Mal’tsev polymorphism Exploiting tractable classes If given a tractable sublanguage: easy Otherwise: hard (but there are positive results!) Emmanuel Hebrard () Subproblem Tractability August 6th 2013 5 / 16

  12. Polymorphisms and Tractability Constraint problems are tractable if their relations are closed under majority polymorphisms [Jeavons et al 1997] Generalization of 2-SAT and 0/1/all constraints Constraint problems are tractable if their relations are closed under Mal’tsev polymorphisms [Bulatov & Dalmau 2006] Generalization of linear equations over a field Emmanuel Hebrard () Subproblem Tractability August 6th 2013 6 / 16

  13. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  14. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  15. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  16. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  17. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  18. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  19. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  20. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  21. Polymorphism Operation f maps m values v 1 , . . . , v m to another value f ( v 1 , . . . , v m ) Similarly it maps m tuples τ 1 , . . . , τ m to another tuple f ( τ 1 , . . . , τ m ) f is a polymorphism of R iff applying f to tuples of R does not produce new tuples Example f ( x , y ) = ( x + y mod 2) 1 1 1 1 0 1 R : 0 1 0 0 0 0 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

  22. Detecting Majority f is a majority operation iff f ( v , v , w ) = f ( v , w , v ) = f ( w , v , v ) = v Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

  23. Detecting Majority f is a majority operation iff f ( v , v , w ) = f ( v , w , v ) = f ( w , v , v ) = v Theorem 1 Majority polymorphisms can be detected in polynomial time Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

  24. Detecting Majority f is a majority operation iff f ( v , v , w ) = f ( v , w , v ) = f ( w , v , v ) = v Polymorphisms of P are solutions of its indicator problem [Jeavons et al. 1997] P and its indicator problem share the same set of relations A CSP closed under a majority polymorphism is solved backtrack-free by maintaining singleton arc consistency [Chen et al. 2013] Theorem 1 Majority polymorphisms can be detected in polynomial time Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

  25. Detecting Majority f is a majority operation iff f ( v , v , w ) = f ( v , w , v ) = f ( w , v , v ) = v Polymorphisms of P are solutions of its indicator problem [Jeavons et al. 1997] P and its indicator problem share the same set of relations A CSP closed under a majority polymorphism is solved backtrack-free by maintaining singleton arc consistency [Chen et al. 2013] Theorem 1 Majority polymorphisms can be detected in polynomial time Proof Run maintain SAC on the indicator problem If success, we obtain a solution, hence a polymorphism of P If at any point there is a fail, we can deduce that the indicator problem has no majority polymorphism Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

  26. Detecting (conservative) Mal’tsev f is a Mal’tsev operation iff f ( v , w , w ) = f ( w , w , v ) = v f is conservative iff f ( u , v , w ) ∈ { u , v , w } Theorem 2 Conservative Mal’tsev polymorphisms can be detected in polynomial time on binary relations Emmanuel Hebrard () Subproblem Tractability August 6th 2013 9 / 16

  27. Exploiting Tractability Input: A CSP P = ( X , D , C ), a set B such that C \ B has a polymorphism Question: is P satisfiable? Emmanuel Hebrard () Subproblem Tractability August 6th 2013 10 / 16

  28. Exploiting Tractability Input: A CSP P = ( X , D , C ), a set B such that C \ B has a polymorphism Question: is P satisfiable? Backdoor of size k : search tree of size d k Emmanuel Hebrard () Subproblem Tractability August 6th 2013 10 / 16

  29. Exploiting Tractability Input: A CSP P = ( X , D , C ), a set B such that C \ B has a polymorphism Question: is P satisfiable? Backdoor of size k : search tree of size d k Fixed Parameter Tractability Given a problem A and a parameter k Fixed Parameter Tractable (FPT) iff there exists an algorithm which complexity is in O ( f ( k ) P ( n )) Any computable function f of k (for ex. 2 k ) A polynomial P ( n ) in the size of the problem n Emmanuel Hebrard () Subproblem Tractability August 6th 2013 10 / 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend