Skip to main content

From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets

  • Conference paper
MICAI 2007: Advances in Artificial Intelligence (MICAI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4827))

Included in the following conference series:

  • 1043 Accesses

Abstract

Identifying and exploiting hidden problem structures is recognized as a fundamental way to deal with the intractability of combinatorial problems. Recently, a particular structure called (strong) backdoor has been identified in the context of the satisfiability problem. Connections has been established between backdoors and problem hardness leading to a better approximation of the worst case time complexity. Strong backdoor sets can be computed for any tractable class. In [1], a method for the approximation of strong backdoor sets for the Horn-Sat fragment was proposed. This approximation is realized in two steps. First, the best Horn renaming of the original CNF formula, in term of number of clauses, is computed. Then a Horn strong backdoor set is extracted from the non Horn part of the renamed formula. in this article, we propose computing Horn strong backdoor sets using the same scheme but minimizing the number of positive literals in the non Horn part of the renamed formula instead of minimizing the number of non Horn clauses. Then we extend this method to the class of ordered formulas [2] which is an extension of the Horn class. This method insure to obtain ordered strong backdoor sets of size less or equal than the size of Horn strong backdoor sets (never greater). Experimental results show that these new methods allow to reduce the size of strong backdoor sets on several instances and that their exploitation also allow to enhance the efficiency of satisfiability solvers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Paris, L., Ostrowski, R., Siegel, P., Saïs, L.: Computing and exploiting horn strong backdoor sets thanks to local search. In: ICTAI 2006. Proceedings of the 18th International Conference on Tools with Artificial Intelligence, Washington DC, United States, pp. 139–143 (2006)

    Google Scholar 

  2. Benoist, E., Hébrard, J.J.: Ordered formulas. In: Les cahiers du GREYC, CNRS - UPRES-A 6072 (search report). Number 14, Université de Caen - Basse-Normandie (1999)

    Google Scholar 

  3. Davis, M., Logemann, G., Loveland, D.: A machine program for theorem-proving. Communications of the ACM 5, 394–397 (1962)

    Article  MATH  MathSciNet  Google Scholar 

  4. Selman, B., Kautz, H.A.: An empirical study of greedy local search for satisfiability testing (1993)

    Google Scholar 

  5. Mazure, B., Saïs, L., Grégoire, É.: Tabu search for SAT. In: AAAI 1997/ IAAI 1997. Proceedings of the 14th National Conference on Artificial Intelligence and 9th Innovative Applications of Artificial Intelligence Conference, pp. 281–285. AAAI Press, Stanford (1997)

    Google Scholar 

  6. Dubois, O., Dequen, G.: A backbone-search heuristic for efficient solving of hard 3–sat formulae. In: IJCAI 2001. Proceedings of the 17th International Joint Conference on Artificial Intelligence (2001)

    Google Scholar 

  7. Williams, R., Gomes, C., Selman, B.: On the connections between heavy-tails, backdoors, and restarts in combinatorial search. In: Giunchiglia, E., Tacchella, A. (eds.) SAT 2003. LNCS, vol. 2919, Springer, Heidelberg (2004)

    Google Scholar 

  8. Williams, R., Gomes, C., Selman, B.: Backdoors to typical case complexity. In: IJCAI 2003. Procceding of Intenrational Joint Conference on Artificial Intelligence (2003)

    Google Scholar 

  9. Li, C.M.: Integrating equivalency reasoning into davis-putnam procedure. In: proceedings of Conference on Artificial Intelligence AAAI, pp. 291–296. AAAI Press, USA (2000)

    Google Scholar 

  10. Grégoire, E., Mazure, B., Ostrowski, R., Saïs, L.: Automatic extraction of functional dependencies. In: Hoos, H.H., Mitchell, D.G. (eds.) SAT 2004. LNCS, vol. 3542, pp. 122–132. Springer, Heidelberg (2005)

    Google Scholar 

  11. Kilby, P., Slaney, J., Thiebaux, S., Walsh, T.: Backbones and backdoors in satisfiability. In: AAAI 2005 (2005)

    Google Scholar 

  12. Maaren, H.V., Norden, L.V.: Correlations between horn fractions, satisfiability and solver performance for fixed density random 3-cnf instances. Annals of Mathematics and Artificial Intelligence 44, 157–177 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  13. Lynce, I., Marques-Silva, J.P.: Hidden structure in unsatisfiable random 3-sat: An empirical study. In: Proc. of ICTAI 2004 (2004)

    Google Scholar 

  14. Tseitin, G.: On the complexity of derivations in the propositional calculus. In: Slesenko, H. (ed.) Structures in Constructives Mathematics and Mathematical Logic, Part II, pp. 115–125 (1968)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Alexander Gelbukh Ángel Fernando Kuri Morales

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Paris, L., Ostrowski, R., Siegel, P., Saïs, L. (2007). From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets. In: Gelbukh, A., Kuri Morales, Á.F. (eds) MICAI 2007: Advances in Artificial Intelligence. MICAI 2007. Lecture Notes in Computer Science(), vol 4827. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76631-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76631-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76630-8

  • Online ISBN: 978-3-540-76631-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics