Algorithmica

, Volume 74, Issue 1, pp 540–557 | Cite as

Backdoors to q-Horn

  • Serge Gaspers
  • Sebastian Ordyniak
  • M. S. Ramanujan
  • Saket Saurabh
  • Stefan Szeider
Article

Abstract

The class \(\text {q-Horn}\), introduced by Boros, Crama and Hammer in 1990, is one of the largest known classes of propositional CNF formulas for which satisfiability can be decided in polynomial time. This class properly contains the fundamental classes of Horn and 2-CNF formulas as well as the class of renamable (or disguised) Horn formulas. In this paper we extend this class so that its favorable algorithmic properties can be made accessible to formulas that are outside but “close” to this class. We show that deciding satisfiability is fixed-parameter tractable parameterized by the distance of the given formula from \(\text {q-Horn}\). The distance is measured by the smallest number of variables that we need to delete from the formula in order to get a \(\text {q-Horn}\) formula, i.e., the size of a smallest deletion backdoor set into the class \(\text {q-Horn}\). This result generalizes known fixed-parameter tractability results for satisfiability decision with respect to the parameters distance from Horn, 2-CNF, and renamable Horn.

Keywords

Algorithms and data structures Backdoor sets Satisfiability Fixed parameter tractability 

References

  1. 1.
    Alekhnovich, M., Razborov, A.A.: Satisfiability, branch-width and Tseitin tautologies. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS’02), pp. 593–603 (2002)Google Scholar
  2. 2.
    Aspvall, B., Plass, M.F., Tarjan, R.E.: A linear-time algorithm for testing the truth of certain quantified Boolean formulas. Inf. Process. Lett. 8(3), 121–123 (1979)MATHMathSciNetCrossRefGoogle Scholar
  3. 3.
    Biere, A.: Bounded model checking. In: Biere, A., Heule, M., van Maaren, H., Walsh, T. (eds.) Handbook of Satisfiability, volume 185 of Frontiers in Artificial Intelligence and Applications, pp. 457–481. IOS Press (2009)Google Scholar
  4. 4.
    Biere, A., Heule, M., van Maaren, H., Walsh, T. (eds.): Handbook of Satisfiability, volume 185 of Frontiers in Artificial Intelligence and Applications. IOS Press (2009)Google Scholar
  5. 5.
    Bjesse, P., Leonard, T., Mokkedem, A.: Finding bugs in an alpha microprocessor using satisfiability solvers. In: Berry, G., Comon, H., Finkel, A. (eds.) Computer Aided Verification: 13th International Conference, CAV 2001, Paris, France, July 18–22, 2001, Proceedings, pp. 454–464 (2001)Google Scholar
  6. 6.
    Boros, E., Crama, Y., Hammer, P.L.: Polynomial-time inference of all valid implications for horn and related formulae. Ann. Math. Artif. Intell. 1, 21–32 (1990)MATHCrossRefGoogle Scholar
  7. 7.
    Boros, E., Hammer, P.L., Sun, X.: Recognition of \(q\)-Horn formulae in linear time. Discret. Appl. Math. 55(1), 1–13 (1994)MATHMathSciNetCrossRefGoogle Scholar
  8. 8.
    Cook, S.A.: The complexity of theorem-proving procedures. In: Proceedings of the 3rd Annual Symposium on Theory of Computing, pp. 151–158. Shaker Heights, Ohio (1971)Google Scholar
  9. 9.
    Crama, Y., Ekin, O., Hammer, P.L.: Variable and term removal from Boolean formulae. Discret. Appl. Math. 75(3), 217–230 (1997)MATHMathSciNetCrossRefGoogle Scholar
  10. 10.
    Downey, R.G., Fellows, M.R.: Parameterized Complexity. Monographs in Computer Science. Springer, New York (1999)CrossRefGoogle Scholar
  11. 11.
    Downey, R.G., Fellows, M.R., McCartin, C.: Parameterized approximation problems. In: Parameterized and Exact Computation, Second International Workshop, IWPEC 2006, volume 4169 of Lecture Notes in Computer Science, pp. 121–129. Springer, Berlin (2006)Google Scholar
  12. 12.
    Fischer, E., Makowsky, J.A., Ravve, E.R.: Counting truth assignments of formulas of bounded tree-width or clique-width. Discret. Appl. Math. 156(4), 511–529 (2008)MATHMathSciNetCrossRefGoogle Scholar
  13. 13.
    Flum, J., Grohe, M.: Parameterized Complexity Theory, volume XIV of Texts in Theoretical Computer Science. An EATCS Series. Springer, Berlin (2006)Google Scholar
  14. 14.
    Ford Jr, L.R., Fulkerson, D.R.: Maximal flow through a network. Can. J. Math. 8, 399–404 (1956)MATHMathSciNetCrossRefGoogle Scholar
  15. 15.
    Ganian, R., Hlinený, P., Obdrzálek, J.: Better algorithms for satisfiability problems for formulas of bounded rank-width. In: IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2010, December 15–18, 2010, Chennai, India, volume 8 of LIPIcs, pp. 73–83 (2010)Google Scholar
  16. 16.
    Gaspers, S., Szeider, S.: Backdoors to satisfaction. In: Bodlaender, H.L., Downey, R., Fomin, F.V., Marx, D. (eds.) The Multivariate Algorithmic Revolution and Beyond—Essays Dedicated to Michael R. Fellows on the Occasion of His 60th Birthday volume 7370 of Lecture Notes in Computer Science, pp. 287–317. Springer, Berlin (2012)Google Scholar
  17. 17.
    Gomes, C.P., Kautz, H., Sabharwal, A., Selman, B.: Satisfiability solvers. In: Handbook of Knowledge Representation, volume 3 of Foundations of Artificial Intelligence, pp. 89–134. Elsevier, Amsterdam (2008)Google Scholar
  18. 18.
    Kautz, H.A., Selman, B.: Planning as satisfiability. In: Proceedings ECAI, pp. 359–363 (1992)Google Scholar
  19. 19.
    Lewis, H.R.: Renaming a set of clauses as a Horn set. J. ACM 25(1), 134–135 (1978)MATHCrossRefGoogle Scholar
  20. 20.
    Prasad, A.G.M., Biere, A.: A survey of recent advances in SAT-based formal verification. Softw. Tools Technol. Transf. 7(2), 156–173 (2005)CrossRefGoogle Scholar
  21. 21.
    Marx, D.: Can you beat treewidth? Theory Comput. 6, 85–112 (2010)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Nishimura, N., Ragde, P., Szeider, S.: Detecting backdoor sets with respect to Horn and binary clauses. In: Proceedings of SAT 2004 (Seventh International Conference on Theory and Applications of Satisfiability Testing, 10–13 May, 2004, Vancouver, BC, Canada), pp. 96–103 (2004)Google Scholar
  23. 23.
    Ramanujan, M.S., Saurabh, S.: Linear time parameterized algorithms via skew-symmetric multicuts. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5–7, 2014, pp. 1739–1748 (2014)Google Scholar
  24. 24.
    Razgon, I., O’Sullivan, B.: Almost 2-SAT is fixed parameter tractable. J. Comput. Syst. Sci. 75(8), 435–450 (2009)MATHMathSciNetCrossRefGoogle Scholar
  25. 25.
    Samer, M., Szeider, S.: Algorithms for propositional model counting. J. Discret. Algorithms 8(1), 50–64 (2010)MATHMathSciNetCrossRefGoogle Scholar
  26. 26.
    Schaefer, T.J.: The complexity of satisfiability problems. In: Conference Record of the Tenth Annual ACM Symposium on Theory of Computing (San Diego, Calif., 1978), pp. 216–226. ACM (1978)Google Scholar
  27. 27.
    Velev, M.N., Bryant, R.E.: Effective use of Boolean satisfiability procedures in the formal verification of superscalar and VLIW microprocessors. J. Symb. Comput. 35(2), 73–106 (2003)MATHMathSciNetCrossRefGoogle Scholar
  28. 28.
    Williams, R., Gomes, C., Selman, B.: Backdoors to typical case complexity. In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, IJCAI, 2003, pp. 1173–1178 (2003)Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Serge Gaspers
    • 1
    • 2
  • Sebastian Ordyniak
    • 3
  • M. S. Ramanujan
    • 4
  • Saket Saurabh
    • 4
  • Stefan Szeider
    • 5
  1. 1.The University of New South WalesSydneyAustralia
  2. 2.National ICT AustraliaSydneyAustralia
  3. 3.Masaryk UniversityBrnoCzech Republic
  4. 4.The Institute of Mathematical SciencesChennaiIndia
  5. 5.Institute of Information SystemsVienna University of TechnologyViennaAustria

Personalised recommendations