Skip to main content
Log in

Breaking symmetries in graph search with canonizing sets

  • Published:
Constraints Aims and scope Submit manuscript

Abstract

There are many complex combinatorial problems which involve searching for an undirected graph satisfying given constraints. Such problems are often highly challenging because of the large number of isomorphic representations of their solutions. This paper introduces effective and compact, complete symmetry breaking constraints for small graph search. Enumerating with these symmetry breaks generates all and only non-isomorphic solutions. For small search problems, with up to 10 vertices, we compute instance independent symmetry breaking constraints. For small search problems with a larger number of vertices we demonstrate the computation of instance dependent constraints which are complete. We illustrate the application of complete symmetry breaking constraints to extend two known sequences from the OEIS related to graph enumeration. We also demonstrate the application of a generalization of our approach to fully-interchangeable matrix search problems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Alavi, Y., Chartrand, G., Chung, F.R., Erdös, P., Graham, R.L., & Oellermann, O.R. (1987). Highly irregular graphs. Journal of Graph Theory, 11(2), 235–249.

    Article  MathSciNet  MATH  Google Scholar 

  2. Aloul, F.A. (2010). Symmetry in boolean satisfiability. Symmetry, 2(2), 1121–1134. doi:10.3390/sym2021121.

    Article  MathSciNet  Google Scholar 

  3. Aloul, F.A., Markov, I.L., Ramani, A., & Sakallah, K.A. (2011). Breaking instance-independent symmetries in exact graph coloring. CoRR 1109.2347.

  4. Aloul, F.A., Sakallah, K.A., & Markov, I.L. (2006). Efficient symmetry breaking for boolean satisfiability. IEEE Transactions on Computers, 55(5), 549–558. doi:10.1109/TC.2006.75.

    Article  Google Scholar 

  5. Audemard, G., & Simon, L. Glucose 4.0 SAT Solver.http://www.labri.fr/perso/lsimon/glucose/.

  6. Babai, L., & Luks, E.M. (1983). Canonical labeling of graphs. In Proceedings of the fifteenth annual ACM symposium on theory of computing (pp. 171–183). ACM.

  7. Brinkmann, G. (1996). Fast generation of cubic graphs. Journal of Graph Theory, 23(2), 139–149.

    Article  MathSciNet  MATH  Google Scholar 

  8. Cameron, R., Colbourn, C., Read, R., & Wormald, N.C. (1985). Cataloguing the graphs on 10 vertices. Journal of Graph Theory, 9(4), 551–562.

    Article  MathSciNet  MATH  Google Scholar 

  9. Codish, M., Miller, A., Prosser, P., & Stuckey, P.J. (2013). Breaking symmetries in graph representation. In Rossi, F. (Ed.), Proceedings of the 23rd international joint conference on artificial intelligence, Beijing, China, August 3-9, 2013, IJCAI 2013. IJCAI/AAAI. http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6480.

  10. Codish, M., Miller, A., Prosser, P., & Stuckey, P.J. Constraints for symmetry breaking in graph representation (2014). Full version of [9] (in preparation).

  11. Crawford, J.M., Ginsberg, M.L., Luks, E.M., & Roy, A. (1996). Symmetry-breaking predicates for search problems. In Aiello, L.C., Doyle, J., & Shapiro, S.C. (Eds.), Proceedings of the fifth international conference on principles of knowledge representation and reasoning (KR’96), Cambridge, Massachusetts, USA, November 5-8, 1996 (pp. 148–159). Morgan Kaufmann.

  12. Faradzev, I. (1978). Constructive enumeration of combinatorial objects. Problmes Combinatoires et Thorie des Graphes Colloque Internat, Paris (pp. 131–135).

  13. Flener, P., Frisch, A.M., Hnich, B., Kiziltan, Z., Miguel, I., Pearson, J., & Walsh, T. (2002). Breaking row and column symmetries in matrix models. In Hentenryck, P.V. (Ed.), Principles and practice of constraint programming - CP 2002, 8th international conference, CP 2002, Ithaca, NY, USA, September 9-13, 2002, proceedings, lecture notes in computer science (Vol. 2470, pp. 462–476). Springer. http://link.springer.de/link/service/series/0558/bibs/2470/24700462.htm.

  14. Frisch, A.M., Jefferson, C., & Miguel, I. (2003). Constraints for breaking more row and column symmetries. In Rossi, F. (Ed.), Principles and practice of constraint programming - CP 2003, 9th international conference, CP 2003, Kinsale, Ireland, September 29 - October 3, 2003, Proceedings, lecture notes in computer science (Vol. 2833, pp. 318–332). Springer. doi:10.1007/978-3-540-45193-8_22.

  15. Grayland, A., Miguel, I., & Roney-Dougal, C.M. (2009). Snake lex: An alternative to double lex. In Principles and practice of constraint programming - CP 2009, 15th international conference, CP 2009, Lisbon, Portugal, September 20-24, 2009, Proceedings (pp. 391–399). doi:10.1007/978-3-642-04244-7_32.

  16. Katebi, H., Sakallah, K.A., & Markov, I.L. (2010). Symmetry and satisfiability: An update. In Strichman, O., & Szeider, S. (Eds.), Theory and applications of satisfiability testing - SAT 2010, 13th international conference, SAT 2010, Edinburgh, UK, July 11-14, 2010. Proceedings, lecture notes in computer science (Vol. 6175, pp. 113–127). Springer. doi:10.1007/978-3-642-14186-7_11 .

  17. Katebi, H., Sakallah, K.A., & Markov, I.L. (2012). Conflict anticipation in the search for graph automorphisms. In Bjørner, N., & Voronkov, A. (Eds.), Logic for programming, artificial intelligence, and reasoning - 18th international conference, LPAR-18, Mérida, Venezuela, March 11-15, 2012. Proceedings, lecture notes in computer science (Vol. 7180, pp. 243–257). Springer. doi:10.1007/978-3-642-28717-6_20.

  18. Katebi, H., Sakallah, K.A., & Markov, I.L. (2012). Graph symmetry detection and canonical labeling: Differences and synergies. In Voronkov, A. (Ed.), Turing-100 - The Alan Turing Centenary, Manchester, UK, June 22-25, 2012, EPiC Series (Vol. 10, pp. 181–195). EasyChair. http://www.easychair.org/publications/?page=949492057.

  19. Katsirelos, G., Narodytska, N., & Walsh, T. (2010). On the complexity and completeness of static constraints for breaking row and column symmetry. In Cohen, D. (Ed.), Principles and practice of constraint programming - CP 2010 - 16th international conference, CP 2010, St. Andrews, Scotland, UK, September 6-10, 2010. Proceedings, lecture notes in computer science (Vol. 6308, pp. 305–320). Springer. doi:10.1007/978-3-642-15396-9_26.

  20. Luks, E.M., & Roy, A. (2004). The complexity of symmetry-breaking formulas. Annals of Mathematics and Artificial Intelligence, 41(1), 19–45.

    Article  MathSciNet  MATH  Google Scholar 

  21. Majcher, Z., & Michael, J. (1997). Degree sequences of highly irregular graphs. Discrete Mathematics, 164(1), 225–236.

    Article  MathSciNet  MATH  Google Scholar 

  22. McKay, B. (1990). nauty user’s guide (version 1.5). Tech. Rep. TR-CS-90-02. Australian National University. Computer Science Department.

  23. McKay, B.D. (1998). Isomorph-free exhaustive generation. Journal of Algorithms, 26(2), 306–324.

    Article  MathSciNet  MATH  Google Scholar 

  24. McKay, B.D., & Radziszowski, S.P. (1995). R(4, 5) = 25. Journal of Graph Theory, 19(3), 309–322. doi:10.1002/jgt.3190190304.

    Article  MathSciNet  MATH  Google Scholar 

  25. McMillan, K.L. (2002). Applying SAT methods in unbounded symbolic model checking. In Brinksma, E., & Larsen, K.G. (Eds.), Computer aided verification, 14th international conference, proceedings, lecture notes in computer science (Vol. 2404, pp. 250–264). Springer. doi:10.1007/3-540-45657-0_19.

  26. Metodi, A., Codish, M., & Stuckey, P.J. (2013). Boolean equi-propagation for concise and efficient SAT encodings of combinatorial problems. Journal of Artificial Intelligence Research (JAIR), 46, 303–341.

    MathSciNet  MATH  Google Scholar 

  27. Narodytska, N., & Walsh, T. (2013). Breaking symmetry with different orderings. In Principles and practice of constraint programming (pp. 545–561). Springer.

  28. The on-line encyclopedia of integer sequences. published electronically at http://oeis.org (2010).

  29. Puget, J. (1993). On the satisfiability of symmetrical constrained satisfaction problems. In Komorowski, H.J., & Ras Z.W. (Eds.), Methodologies for intelligent systems, 7th international symposium, ISMIS ’93, Trondheim, Norway, June 15-18, 1993, Proceedings, lecture notes in computer science (Vol. 689, pp. 350–361). Springer. doi:10.1007/3-540-56804-2_33.

  30. Radziszowski, S.P. (1994). Small Ramsey numbers. Electronic Journal of Combinatorics. http://www.combinatorics.org/. Revision #14: January, 2014.

  31. Read, R.C. (1978). Every one a winner or how to avoid isomorphism search when cataloguing combinatorial configurations. Ann. Discrete Math, 2, 107–120.

    Article  MathSciNet  MATH  Google Scholar 

  32. Read, R.C. (1981). A survey of graph generation techniques. In Combinatorial mathematics VIII (pp. 77–89). Springer.

  33. Shlyakhter, I. (2007). Generating effective symmetry-breaking predicates for search problems. Discrete Applied Mathematics, 155(12), 1539–1548. doi:10.1016/j.dam.2005.10.018.

    Article  MathSciNet  MATH  Google Scholar 

  34. Walsh, T. (2006). General symmetry breaking constraints. In Benhamou, F. (Ed.), Principles and practice of constraint programming - CP 2006, 12th international conference, CP 2006, Nantes, France, September 25-29, 2006, Proceedings, lecture notes in computer science (Vol. 4204, pp. 650–664). Springer. doi:10.1007/11889205_46.

  35. Walsh, T. (2012). Symmetry breaking constraints: Recent results. In Hoffmann, J., & Selman, B. (Eds.), Proceedings of the twenty-sixth AAAI conference on artificial intelligence, July 22-26, 2012, Toronto, Ontario, Canada. AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI12/paper/view/4974.

  36. Yip, J., & Hentenryck, P.V. (2011). Symmetry breaking via lexleader feasibility checkers. In Walsh, T. (Ed.), Proceedings of the 22nd international joint conference on artificial intelligence, IJCAI 2011, Barcelona, Catalonia, Spain, July 16-22, 2011 (pp. 687–692). IJCAI/AAAI. http://ijcai.org/papers11/Papers/IJCAI11-121.pdf.

Download references

Acknowledgments

We thank the anonymous reviewers of this paper for their constructive suggestions. In particular the addition of Section 5 is in view of the comments of the reviewers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Codish.

Additional information

Supported by the Israel Science Foundation, grant 182/13.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Itzhakov, A., Codish, M. Breaking symmetries in graph search with canonizing sets. Constraints 21, 357–374 (2016). https://doi.org/10.1007/s10601-016-9244-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10601-016-9244-z

Keywords

Navigation