Detecting and Exploiting Subproblem Tractability Christian Bessiere, - - PowerPoint PPT Presentation

detecting and exploiting subproblem tractability
SMART_READER_LITE
LIVE PREVIEW

Detecting and Exploiting Subproblem Tractability Christian Bessiere, - - PowerPoint PPT Presentation

Detecting and Exploiting Subproblem Tractability Christian Bessiere, Cl ement Carbonnel, Emmanuel Hebrard, George Katsirelos and Toby Walsh August 6th 2013 Emmanuel Hebrard () Subproblem Tractability August 6th 2013 1 / 16 Tractability


slide-1
SLIDE 1

Detecting and Exploiting Subproblem Tractability

Christian Bessiere, Cl´ ement Carbonnel, Emmanuel Hebrard, George Katsirelos and Toby Walsh August 6th 2013

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 1 / 16

slide-2
SLIDE 2

Tractability

Lots of research on tractable constraint problems

Restricted language (e.g. 2SAT) Restricted constraint structure (e.g. tree)

But solvers often perform poorly on tractable problems

Not enough to know it is tractable [Petke & Jeavons 2009] Detect membership to a tractable and apply the proper algorithm

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 2 / 16

slide-3
SLIDE 3

Tractability

Lots of research on tractable constraint problems

Restricted language (e.g. 2SAT) Restricted constraint structure (e.g. tree)

But solvers often perform poorly on tractable problems

Not enough to know it is tractable [Petke & Jeavons 2009] Detect membership to a tractable and apply the proper algorithm

Problems might be nearly-tractable

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 2 / 16

slide-4
SLIDE 4

Near-Tractability

a b c e f g d Solid edges: “easy” constraints / Dashed edges: “hard” constraints

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 3 / 16

slide-5
SLIDE 5

Near-Tractability

a b c e f g d = v Solid edges: “easy” constraints / Dashed edges: “hard” constraints Branch on d

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 3 / 16

slide-6
SLIDE 6

Near-Tractability

a b c e f g Solid edges: “easy” constraints / Dashed edges: “hard” constraints Branch on d

Remove (a, d) and (d, g)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 3 / 16

slide-7
SLIDE 7

Motivation

x y y 1 1 1 P1 P2 P3 P4 Assigned variables Tractable CSPs

Identify a (hopefully) small number of variables Branch on these to give tractable subproblems

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 4 / 16

slide-8
SLIDE 8

Motivation

x y y 1 1 1 P1 P2 P3 P4 Assigned variables Tractable CSPs

Identify a (hopefully) small number of variables Branch on these to give tractable subproblems find a backdoor [Williams et al. 2003]

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 4 / 16

slide-9
SLIDE 9

Contributions

Detecting tractable classes Exploiting tractable classes

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 5 / 16

slide-10
SLIDE 10

Contributions

Detecting tractable classes

Detecting set of relations closed by a majority polymorphism Detecting set of relations closed by a Mal’tsev polymorphism

Exploiting tractable classes

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 5 / 16

slide-11
SLIDE 11

Contributions

Detecting tractable classes

Detecting set of relations closed by a majority polymorphism Detecting set of relations closed by a Mal’tsev polymorphism

Exploiting tractable classes

If given a tractable sublanguage: easy Otherwise: hard (but there are positive results!)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 5 / 16

slide-12
SLIDE 12

Polymorphisms and Tractability

Constraint problems are tractable if their relations are closed under majority polymorphisms [Jeavons et al 1997]

Generalization of 2-SAT and 0/1/all constraints

Constraint problems are tractable if their relations are closed under Mal’tsev polymorphisms [Bulatov & Dalmau 2006]

Generalization of linear equations over a field

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 6 / 16

slide-13
SLIDE 13

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-14
SLIDE 14

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-15
SLIDE 15

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-16
SLIDE 16

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-17
SLIDE 17

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-18
SLIDE 18

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-19
SLIDE 19

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-20
SLIDE 20

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-21
SLIDE 21

Polymorphism

Operation f maps m values v1, . . . , vm to another value f (v1, . . . , vm) Similarly it maps m tuples τ1, . . . , τm to another tuple f (τ1, . . . , τm) f is a polymorphism of R iff applying f to tuples of R does not produce new tuples Example f (x, y) = (x + y mod 2) 1 1 1 1 1 1 R :

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 7 / 16

slide-22
SLIDE 22

Detecting Majority

f is a majority operation iff f (v, v, w) = f (v, w, v) = f (w, v, v) = v

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

slide-23
SLIDE 23

Detecting Majority

f is a majority operation iff f (v, v, w) = f (v, w, v) = f (w, v, v) = v Theorem 1 Majority polymorphisms can be detected in polynomial time

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

slide-24
SLIDE 24

Detecting Majority

f is a majority operation iff f (v, v, w) = f (v, w, v) = f (w, v, v) = v Polymorphisms of P are solutions of its indicator problem [Jeavons et

  • al. 1997]

P and its indicator problem share the same set of relations

A CSP closed under a majority polymorphism is solved backtrack-free by maintaining singleton arc consistency [Chen et al. 2013] Theorem 1 Majority polymorphisms can be detected in polynomial time

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

slide-25
SLIDE 25

Detecting Majority

f is a majority operation iff f (v, v, w) = f (v, w, v) = f (w, v, v) = v Polymorphisms of P are solutions of its indicator problem [Jeavons et

  • al. 1997]

P and its indicator problem share the same set of relations

A CSP closed under a majority polymorphism is solved backtrack-free by maintaining singleton arc consistency [Chen et al. 2013] Theorem 1 Majority polymorphisms can be detected in polynomial time Proof Run maintain SAC on the indicator problem

If success, we obtain a solution, hence a polymorphism of P If at any point there is a fail, we can deduce that the indicator problem has no majority polymorphism

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 8 / 16

slide-26
SLIDE 26

Detecting (conservative) Mal’tsev

f is a Mal’tsev operation iff f (v, w, w) = f (w, w, v) = v f is conservative iff f (u, v, w) ∈ {u, v, w} Theorem 2 Conservative Mal’tsev polymorphisms can be detected in polynomial time

  • n binary relations

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 9 / 16

slide-27
SLIDE 27

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable?

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 10 / 16

slide-28
SLIDE 28

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable?

Backdoor of size k: search tree of size dk

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 10 / 16

slide-29
SLIDE 29

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable?

Backdoor of size k: search tree of size dk

Fixed Parameter Tractability Given a problem A and a parameter k Fixed Parameter Tractable (FPT) iff there exists an algorithm which complexity is in O(f (k)P(n))

Any computable function f of k (for ex. 2k) A polynomial P(n) in the size of the problem n

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 10 / 16

slide-30
SLIDE 30

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable?

Backdoor of size k: search tree of size dk

Fixed Parameter Tractability Given a problem A and a parameter k Fixed Parameter Tractable (FPT) iff there exists an algorithm which complexity is in O(f (k)P(n))

Any computable function f of k (for ex. 2k) A polynomial P(n) in the size of the problem n

W [m]-hardness by reduction from a W [m]-hard pair A′, k′

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 10 / 16

slide-31
SLIDE 31

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-32
SLIDE 32

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-33
SLIDE 33

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d The polymorphism is conservative

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-34
SLIDE 34

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d The polymorphism is conservative f (v1, . . . , vm) ∈ {v1, . . . , vm}

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-35
SLIDE 35

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d The polymorphism is conservative f (v1, . . . , vm) ∈ {v1, . . . , vm} Unary relations are closed under any conservative operation

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-36
SLIDE 36

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d The polymorphism is conservative f (v1, . . . , vm) ∈ {v1, . . . , vm} Unary relations are closed under any conservative operation Eliminating a constraint ↔ assigning all (but one) of its variables

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-37
SLIDE 37

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d The polymorphism is conservative f (v1, . . . , vm) ∈ {v1, . . . , vm} Unary relations are closed under any conservative operation Eliminating a constraint ↔ assigning all (but one) of its variables Backdoor: vertex cover of the primal graph of B [O(2k)]

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-38
SLIDE 38

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d = v The polymorphism is conservative f (v1, . . . , vm) ∈ {v1, . . . , vm} Unary relations are closed under any conservative operation Eliminating a constraint ↔ assigning all (but one) of its variables Backdoor: vertex cover of the primal graph of B [O(2k)]

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-39
SLIDE 39

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g The polymorphism is conservative f (v1, . . . , vm) ∈ {v1, . . . , vm} Unary relations are closed under any conservative operation Eliminating a constraint ↔ assigning all (but one) of its variables Backdoor: vertex cover of the primal graph of B [O(2k)]

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-40
SLIDE 40

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g The polymorphism is conservative f (v1, . . . , vm) ∈ {v1, . . . , vm} Unary relations are closed under any conservative operation Eliminating a constraint ↔ assigning all (but one) of its variables Backdoor: vertex cover of the primal graph of B [O(2k)] Explore a dk search tree

FPT in d + k (domain size and size of the vertex cover of B)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-41
SLIDE 41

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? a b c e f g d The polymorphism is idempotent f (v, . . . , v) = v Eliminating a constraint ↔ assigning all its variables Backdoor: all variables of B

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-42
SLIDE 42

Exploiting Tractability

Input: A CSP P = (X, D, C), a set B such that C \ B has a polymorphism Question: is P satisfiable? b c e f d = v a = u g = w The polymorphism is idempotent f (v, . . . , v) = v Eliminating a constraint ↔ assigning all its variables Backdoor: all variables of B

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 11 / 16

slide-43
SLIDE 43

Identifying Tractable Subproblems

What if we don’t know B?

Finding a min backdoor to majority: Partition-Majority-CSP

particular case: f is conservative majority, P = (X, D, C) is binary compute a subset B of C such that C \ B is closed under some majority

  • peration and the vertex cover of B’s graph is minimum

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 12 / 16

slide-44
SLIDE 44

Identifying Tractable Subproblems

What if we don’t know B?

Finding a min backdoor to majority: Partition-Majority-CSP

particular case: f is conservative majority, P = (X, D, C) is binary compute a subset B of C such that C \ B is closed under some majority

  • peration and the vertex cover of B’s graph is minimum

Theorem 5 Partition-Majority-CSP is NP-hard

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 12 / 16

slide-45
SLIDE 45

Identifying Tractable Subproblems

What if we don’t know B?

Finding a min backdoor to majority: Partition-Majority-CSP

particular case: f is conservative majority, P = (X, D, C) is binary compute a subset B of C such that C \ B is closed under some majority

  • peration and the vertex cover of B’s graph is minimum

Theorem 5 Partition-Majority-CSP is NP-hard Theorem 6 Partition-Majority-CSP is W[2]-hard when the parameter is the size of the vertex cover

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 12 / 16

slide-46
SLIDE 46

Identifying Tractable Subproblems

What if we don’t know B?

Finding a min backdoor to majority: Partition-Majority-CSP

particular case: f is conservative majority, P = (X, D, C) is binary compute a subset B of C such that C \ B is closed under some majority

  • peration and the vertex cover of B’s graph is minimum

Theorem 5 Partition-Majority-CSP is NP-hard Theorem 6 Partition-Majority-CSP is W[2]-hard when the parameter is the size of the vertex cover Theorem 7 Partition-Majority-CSP is FPT for domain + cover + language

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 12 / 16

slide-47
SLIDE 47

Empirical Results

We used benchmarks from the 4th CSP Solver Competition

Are there almost-majority-closed problems? If so, can we compute small backdoors in practice?

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 13 / 16

slide-48
SLIDE 48

Empirical Results

We used benchmarks from the 4th CSP Solver Competition

Are there almost-majority-closed problems? If so, can we compute small backdoors in practice?

Algorithm Explore the possible partitions of the language of relations (branch & bound) Given a partition we compute the minimal vertex cover (to be used to branch & bound)

Cache partitions that block majority (nogoods) Efficient algorithm for SAC (SAC3-SDS) [Bessiere et al. 2008] Efficient algorithm for vertex cover [Balasubramanian et al. 1998]

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 13 / 16

slide-49
SLIDE 49

Empirical Results

We used benchmarks from the 4th CSP Solver Competition

Are there almost-majority-closed problems? If so, can we compute small backdoors in practice?

Out of 191 instances put in extensional form:

On 135 instances, the indicator problem is too large On 40 instances, the backdoor is large (trivial)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 13 / 16

slide-50
SLIDE 50

Empirical Results

We used benchmarks from the 4th CSP Solver Competition

Are there almost-majority-closed problems? If so, can we compute small backdoors in practice?

Out of 191 instances put in extensional form:

On 135 instances, the indicator problem is too large On 40 instances, the backdoor is large (trivial) On a serie of 5 prime instances we found small backdoors (0 to 6 variables out of 100) On 1 driverlogw instance we found a non-trivial backdoor (22 variables out of 71)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 13 / 16

slide-51
SLIDE 51

Empirical Results

We used benchmarks from the 4th CSP Solver Competition

Are there almost-majority-closed problems? A few If so, can we compute small backdoors in practice? Sometimes

Out of 191 instances put in extensional form:

On 135 instances, the indicator problem is too large On 40 instances, the backdoor is large (trivial) On a serie of 5 prime instances we found small backdoors (0 to 6 variables out of 100) On 1 driverlogw instance we found a non-trivial backdoor (22 variables out of 71)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 13 / 16

slide-52
SLIDE 52

Conclusion

We can exploit constraint problems that are nearly tractable

Compute a tractable sub-language

Detect membership efficiently

Compute a backdoor to this sub-language Branch on the backdoor

Computing a majority-backdoor is W[2]-hard in the vertex cover size, however FPT in d + k + r

Domain size, vertex cover size, language cardinality

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 14 / 16

slide-53
SLIDE 53

Conclusion

We can exploit constraint problems that are nearly tractable

Compute a tractable sub-language

Detect membership efficiently

Compute a backdoor to this sub-language Branch on the backdoor

Computing a majority-backdoor is W[2]-hard in the vertex cover size, however FPT in d + k + r

Domain size, vertex cover size, language cardinality

Questions?

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 14 / 16

slide-54
SLIDE 54

Detecting (conservative) Mal’tsev

f is a Mal’tsev operation iff f (v, w, w) = f (w, w, v) = v

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 15 / 16

slide-55
SLIDE 55

Detecting (conservative) Mal’tsev

f is a Mal’tsev operation iff f (v, w, w) = f (w, w, v) = v Theorem 2 Conservative Mal’tsev polymorphisms can be detected in polynomial time

  • n binary relations

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 15 / 16

slide-56
SLIDE 56

Detecting (conservative) Mal’tsev

f is a Mal’tsev operation iff f (v, w, w) = f (w, w, v) = v f is conservative iff f (u, v, w) ∈ {u, v, w} (vars of the indicator problem) If R is binary and Mal’tsev, then it is a set of bicliques [Bulatov 2002] Theorem 2 Conservative Mal’tsev polymorphisms can be detected in polynomial time

  • n binary relations

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 15 / 16

slide-57
SLIDE 57

Detecting (conservative) Mal’tsev

f is a Mal’tsev operation iff f (v, w, w) = f (w, w, v) = v f is conservative iff f (u, v, w) ∈ {u, v, w} (vars of the indicator problem) If R is binary and Mal’tsev, then it is a set of bicliques [Bulatov 2002] Theorem 2 Conservative Mal’tsev polymorphisms can be detected in polynomial time

  • n binary relations

Proof: only three cases

1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 15 / 16

slide-58
SLIDE 58

Indicator Problem

Given a set of relations Γ:

CSP which solutions are polymorphisms of Γ A variable for each m-tuple of values

represents the image of this m-tuple by the polymorphism

For each relation R ∈ Γ, and for each permutation of m tuples τ1, . . . , τm ∈ R we post the constraint R on the image variables

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 16 / 16

slide-59
SLIDE 59

Indicator Problem

Given a set of relations Γ:

CSP which solutions are polymorphisms of Γ A variable for each m-tuple of values

represents the image of this m-tuple by the polymorphism

For each relation R ∈ Γ, and for each permutation of m tuples τ1, . . . , τm ∈ R we post the constraint R on the image variables

1 1 1 1 1 1 x11 x10 x11

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 16 / 16

slide-60
SLIDE 60

Indicator Problem

Given a set of relations Γ:

CSP which solutions are polymorphisms of Γ A variable for each m-tuple of values

represents the image of this m-tuple by the polymorphism

For each relation R ∈ Γ, and for each permutation of m tuples τ1, . . . , τm ∈ R we post the constraint R on the image variables

1 1 1 1 1 1 x11 x10 x11 ⇒ R(x11, x10, x11)

Emmanuel Hebrard () Subproblem Tractability August 6th 2013 16 / 16