Skip to main content

Backdoors to Tractable Valued CSP

  • Conference paper
  • First Online:
Principles and Practice of Constraint Programming (CP 2016)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9892))

  • 1970 Accesses

Abstract

We extend the notion of a strong backdoor from the CSP setting to the Valued CSP setting (VCSP, for short). This provides a means for augmenting a class of tractable VCSP instances to instances that are outside the class but of small distance to the class, where the distance is measured in terms of the size of a smallest backdoor. We establish that VCSP is fixed-parameter tractable when parameterized by the size of a smallest backdoor into every tractable class of VCSP instances characterized by a (possibly infinite) tractable valued constraint language of finite arity and finite domain. We further extend this fixed-parameter tractability result to so-called “scattered classes” of VCSP instances where each connected component may belong to a different tractable class.

The authors acknowledge support by the Austrian Science Fund (FWF, project P26696). Robert Ganian is also affiliated with FI MU, Brno, Czech Republic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The literature also defines the notion of tractability [17, 19], which we do not consider here. We remark that, to the best of our knowledge, all known tractable constraint languages are also globally tractable [17, 19].

References

  1. Bessiere, C., Carbonnel, C., Hebrard, E., Katsirelos, G., Walsh, T.: Detecting and exploiting subproblem tractability. In: Rossi, F. (ed.) Proceedings of the 23rd International Joint Conference on Artificial Intelligence, IJCAI 2013, Beijing, China, 3–9 August. IJCAI/AAAI (2013)

    Google Scholar 

  2. Carbonnel, C., Cooper, M.C.: Tractability in constraint satisfaction problems: a survey. Constraints 21(2), 115–144 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  3. Carbonnel, C., Cooper, M.C., Hebrard, E.: On backdoors to tractable constraint languages. In: O’Sullivan, B. (ed.) CP 2014. LNCS, vol. 8656, pp. 224–239. Springer, Heidelberg (2014)

    Google Scholar 

  4. Cohen, D.A., Jeavons, P.G., Zivny, S.: The expressive power of valued constraints: hierarchies and collapses. Theoret. Comput. Sci. 409(1), 137–153 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  5. Cygan, M., Fomin, F.V., Kowalik, L., Lokshtanov, D., Marx, D., Pilipczuk, M., Pilipczuk, M., Saurabh, S.: Parameterized Algorithms. Springer, New York (2015)

    Book  MATH  Google Scholar 

  6. Dilkina, B.N., Gomes, C.P., Sabharwal, A.: Tradeoffs in the complexity of backdoor detection. In: Bessière, C. (ed.) CP 2007. LNCS, vol. 4741, pp. 256–270. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Dilkina, B.N., Gomes, C.P., Sabharwal, A.: Backdoors in the context of learning. In: Kullmann, O. (ed.) SAT 2009. LNCS, vol. 5584, pp. 73–79. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Downey, R.G., Fellows, M.R.: Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, New York (2013)

    Google Scholar 

  9. Dvorák, W., Ordyniak, S., Szeider, S.: Augmenting tractable fragments of abstract argumentation. Artif. Intell. 186, 157–173 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  10. Fichte, J.K., Szeider, S.: Backdoors to normality for disjunctive logic programs. ACM Trans. Comput. Log. 17(1), 1–23 (2015)

    Article  MathSciNet  Google Scholar 

  11. Fichte, J.K., Szeider, S.: Backdoors to tractable answer set programming. Artif. Intell. 220, 64–103 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  12. Flum, J., Grohe, M.: Parameterized Complexity Theory. Texts in Theoretical Computer Science. An EATCS Series, vol. XIV. Springer, Berlin (2006)

    Google Scholar 

  13. Ganian, R., Ordyniak, S.: The complexity landscape of decompositional parameters for ILP. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI Press (to appear, 2016)

    Google Scholar 

  14. Ganian, R., Ramanujan, M.S., Szeider, S.: Discovering archipelagos of tractability for constraint satisfaction and counting. In: Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, 10–12 January, pp. 1670–1681 (2016)

    Google Scholar 

  15. Gaspers, S., Misra, N., Ordyniak, S., Szeider, S., Živný, S.: Backdoors into heterogeneous classes of SAT and CSP. In: Brodley, C.E., Stone, P. (eds.) Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, Québec City, Québec, Canada, 27–31 July, pp. 2652–2658. AAAI Press (2014)

    Google Scholar 

  16. Gaspers, S., Szeider, S.: Backdoors to satisfaction. In: Bodlaender, H.L., Downey, R., Fomin, F.V., Marx, D. (eds.) The Multivariate Algorithmic Revolution and Beyond. LNCS, vol. 7370, pp. 287–317. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  17. Jeavons, P., Krokhin, A.A., Živný, S.: The complexity of valued constraint satisfaction. Bull. Eur. Assoc. Theoret. Comput. Sci. 113 (2014)

    Google Scholar 

  18. Kolmogorov, V., Živný, S.: The complexity of conservative valued CSPs. J. ACM 60(2), Art. 10, 38 (2013)

    Google Scholar 

  19. Krokhin, A., Bulatov, A., Jeavons, P.: The complexity of constraint satisfaction: an algebraic approach. In: Structural Theory of Automata, Semigroups and Universal Algebra, Montreal, 2003. NATO Science Series II: Mathematics, Physics, and Chemistry, vol. 207, pp. 181–213 (2005)

    Google Scholar 

  20. LeBras, R., Bernstein, R., Gomes, C.P., Selman, B., van Dover, R.B.: Crowdsourcing backdoor identification for combinatorial optimization. In Rossi, F. (ed.) Proceedings of the 23rd International Joint Conference on Artificial Intelligence, IJCAI 2013, Beijing, China, 3–9 August 2013

    Google Scholar 

  21. Niedermeier, R.: Invitation to Fixed-Parameter Algorithms. Oxford Lecture Series in Mathematics and its Applications. Oxford University Press, Oxford (2006)

    Google Scholar 

  22. Nishimura, N., Ragde, P., Szeider, S.: Detecting backdoor sets with respect to Horn and binary clauses. In: Proceedings of Seventh International Conference on Theory and Applications of Satisfiability Testing, SAT 2004, Vancouver, BC, Canada, 10–13 May, pp. 96–103 (2004)

    Google Scholar 

  23. Papadimitriou, C.H., Yannakakis, M.: On the complexity of database queries. J. Comput. Syst. Sci. 58(3), 407–427 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  24. Schaefer, T.J.: The complexity of satisfiability problems. In: Conference Record of the Tenth Annual ACM Symposium on Theory of Computing, San Diego, Calif., 1978, pp. 216–226. ACM (1978)

    Google Scholar 

  25. Thapper, J., Živný, S.: Necessary conditions for tractability of valued CSPs. SIAM J. Discrete Math. 29(4), 2361–2384 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  26. Živný, S.: The Complexity of Valued Constraint Satisfaction Problems. Cognitive Technologies. Springer, New York (2012)

    Google Scholar 

  27. Williams, R., Gomes, C., Selman, B.: Backdoors to typical case complexity. In: Gottlob, G., Walsh, T. (eds.) Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, IJCAI 2003, pp. 1173–1178. Morgan Kaufmann (2003)

    Google Scholar 

  28. Williams, R., Gomes, C., Selman, B.: On the connections between backdoors, restarts, and heavy-tailedness in combinatorial search. In: Informal Proceedings of the Sixth International Conference on Theory and Applications of Satisfiability Testing, SAT 2003 S. Margherita Ligure - Portofino, Italy, 5–8 May, pp. 222–230 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Szeider .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ganian, R., Ramanujan, M.S., Szeider, S. (2016). Backdoors to Tractable Valued CSP. In: Rueher, M. (eds) Principles and Practice of Constraint Programming. CP 2016. Lecture Notes in Computer Science(), vol 9892. Springer, Cham. https://doi.org/10.1007/978-3-319-44953-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44953-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44952-4

  • Online ISBN: 978-3-319-44953-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics