Skip to main content

On the Containment of Forbidden Patterns Problems

  • Conference paper
Principles and Practice of Constraint Programming – CP 2010 (CP 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6308))

  • 1285 Accesses

Abstract

Forbidden patterns problems are a generalisation of (finite) constraint satisfaction problems which are definable in Feder and Vardi’s logic mmsnp [1]. In fact, they are examples of infinite constraint satisfaction problems with nice model theoretic properties introduced by Bodirsky [2]. In previous work [3], we introduced a normal form for these forbidden patterns problems which allowed us to provide an effective characterisation of when a problem is a finite or infinite constraint satisfaction problem. One of the central concepts of this normal form is that of a recolouring. In the presence of a recolouring from a forbidden patterns problem Ω1 to another forbidden patterns problem Ω2, containment of Ω1 in Ω2 follows. The converse does not hold in general and it remained open whether it did in the case of problems being given in our normal form. In this paper, we prove that this is indeed the case. We also show that the recolouring problem is \(\Pi^p_2\)-hard and in \(\Sigma^p_3\).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Feder, T., Vardi, M.Y.: The computational structure of monotone monadic SNP and constraint satisfaction: a study through datalog and group theory. SIAM J. Comput. 28, 57–104 (1999); An initial version of this paper appeared in STOC 1993

    Article  MathSciNet  Google Scholar 

  2. Bodirsky, M.: Constraint satisfaction problems with infinite templates. In: Complexity of Constraints, pp. 196–228 (2008)

    Google Scholar 

  3. Madelaine, F., Stewart, I.A.: Constraint satisfaction, logic and forbidden patterns. SIAM Journal on Computing 37(1), 132–163 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  4. Ladner, R.E.: On the structure of polynomial time reducibility. J. Assoc. Comput. Mach. 22, 155–171 (1975)

    MATH  MathSciNet  Google Scholar 

  5. Bulatov, A.A., Valeriote, M.: Recent results on the algebraic approach to the CSP. In: Complexity of Constraints, pp. 68–92 (2008)

    Google Scholar 

  6. Fagin, R.: Generalized first-order spectra and polynomial-time recognizable sets. In: Karp, R.M. (ed.) Complexity of Computation, pp. 43–73 (1974)

    Google Scholar 

  7. Kun, G.: Constraints, MMSNP and expander relational structures. arXiv:0706.1701v1 (June 2007)

    Google Scholar 

  8. Madelaine, F., Stewart, I.A.: Some problems not definable using structures homomorphisms. Ars Combinatoria LXVII (2003)

    Google Scholar 

  9. Madelaine, F.: Constraint satisfaction problems and related logic. PhD thesis, University of Leicester, Department of Maths and Computer Science (2003)

    Google Scholar 

  10. Bodirsky, M., Dalmau, V.: Datalog and constraint satisfaction with infinite templates. In: Durand, B., Thomas, W. (eds.) STACS 2006. LNCS, vol. 3884, pp. 646–659. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Madelaine, F.R.: Universal structures and the logic of forbidden patterns. Logical Methods in Computer Science 5(2) (2009)

    Google Scholar 

  12. Bodirsky, M., Chen, H., Feder, T.: On the complexity of MMSNP (November 2009)

    Google Scholar 

  13. Hell, P., Nešetřil, J.: Graphs and homomorphisms. Oxford University Press, Oxford (2004)

    Book  MATH  Google Scholar 

  14. Cherlin, G., Shelah, S., Shi, N.: Universal graphs with forbidden subgraphs and algebraic closure. Adv. Appl. Math. 22(4), 454–491 (1999)

    MATH  MathSciNet  Google Scholar 

  15. Foniok, J., Nesetril, J., Tardif, C.: Generalised dualities and maximal finite antichains in the homomorphism order of relational structures. Eur. J. Comb. 29(4), 881–899 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  16. Schaefer, M., Umans, C.: Completeness in the polynomial-hierarchy: part I. SIGACT news 33(3), 32–49 (2002); SIGACT news complexity theory column 37, Guest column, introduced by Lane A. Hemaspaandra

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Madelaine, F. (2010). On the Containment of Forbidden Patterns Problems. In: Cohen, D. (eds) Principles and Practice of Constraint Programming – CP 2010. CP 2010. Lecture Notes in Computer Science, vol 6308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15396-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15396-9_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15395-2

  • Online ISBN: 978-3-642-15396-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics