Abstract
We introduce a generic propagation mechanism for constraint programming. The method is based on the results of matching theory which is a mature and well-studied subject of graph theory. A first benefit of our new pruning technique comes from the fact that it can be applied on several global constraints whose solution is representable by a matching in a particular graph. In this work we describe a filtering scheme for such a family based on the Gallai-Edmonds Structure Theorem. In a number of important cases our method achieves hyper-arc consistency in polynomial time.
Similar content being viewed by others
Notes
A barrier is a set \(X \subseteq V\) such that the number of odd components of \(G-X\) is equal to \(|X| + \delta (G)\).
References
Althaus E, Bockmayr A, Elf M, Kasper T, Jünger M, Mehlhorn K (2002) SCIL-symbolic constraints in integer linear programming. Lecture Notes Comput Sci 2461:75–87
Apt KR (2003) Principles of constraint programming. Cambridge University Press, Cambridge
Beldiceanu N, Carlsson M, Rampon J-X (2012) Global constraint catalog. Technical Report T2012–03, Swedish Institute of Computer Science, October 4
Beldiceanu N, Contejean E (1994) Introducing global constraints in CHIP. Math Comput Model 20(12): 97–123
Beldiceanu N, Katriel I, Lorca X (2006) Undirected forest constraints. Lecture Notes Comput Sci 3990: 29–43
Beldiceanu N, Petit T (2004) Cost evaluation of soft global constraints. Lecture Notes Comput Sci 3011: 80–95
Beldiceanu N, Simonis H (2012) A model seeker. Description and detailed results. Update of Technical Report 4C-2012-01, Cork Constraint Computation Centre, University College Cork, 19 May 2012 (unpublished)
Berge C (1957) Two theorems in graph theory. Proc Natl Acad Sci USA 43:842–844
Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms, 2nd edn. MIT Press, Cambridge, MA
Cymer R (2012) Dulmage-Mendelsohn canonical decomposition as a generic pruning technique. Constraints 17(3):234–272
Dechter R (2003) Constraint processing. Morgan Kaufmann Publishers, USA
Edmonds J (1965) Paths, trees and flowers. Can J Math 17:449–467
Gabow HN (1976) An efficient implementation of Edmonds’ algorithm for maximum matching on graphs. J Assoc Comput Mach 23(2):221–234
Gabow HN (1983) An efficient reduction technique for degree-constrained subgraph and bidirected network flow problem. In: Proceedings of the 15th annual ACM symposium on theory of computing, New York, pp 448–456
Gabow HN (1990) Data structures for weighted matching and nearest common ancestors with linking. In: Proceedings of the 1st annual ACM-SIAM symposium on discrete algorithms, Philadephia, pp 434–443
Gabow HN, Tarjan RE (1985) A linear-time algorithm for a special case of disjoint set union. J Comput Syst Sci 30:209–221
Gallai T (1963) Kritische Graphen II. Magyar Tudományos Akadémia; Matematikai Kutató Intézetének Közleményei 8:373–395
Gallai T (1964) Maximale Systeme unabhängiger Kanten. Magyar Tudományos Akadémia; Matematikai Kutató Intézetének Közleményei 9:401–413
Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, San Francisco, CA
Henz M, Müller T, Thiel S (2004) Global constraints for round robin tournament scheduling. Eur J Oper Res 1(153):92–101
Lovász L. (1987) Matching structure and the matching lattice. J Comb Theory (B) 43:187–222
Lovász L, Plummer MD (1986) Matching theory. Annals of discrete mathematics (29). North-Holland, Amsterdam
Mehlhorn K, Näher S (1999) LEDA: a platform for combinatorial and geometric computing. Cambridge University Press, Cambridge
Meijer H, Núñez-Rodríguez Y, Rappaport D (2009) An algorithm for computing simple k-factors. Inf Process Lett 109:620–625
Micali S, Vazirani VV (1980) An \(O(\sqrt{|V|}\cdot |E|)\) algorithm for finding maximum matching in general graphs. In: Proceedings of the 21st annual symposium on foundations of computer science, pp 17–27
Norman RZ, Rabin MO (1959) An algorithm for a minimum cover of a graph. Proc Am Math Soc 10: 315–319
Petersen J (1891) Die Theorie der regulären Graphen. Acta Math 15:193–220
Petit T, Régin J-C, Bessière C (2001) Specific filtering algorithms for over-constrained problems. Lecture Notes Comput Sci 2239:451–463
Régin J.C. (1999) The symmetric alldiff constraint. In: Proceedings of the 16th international joint conference on artificial intelligence (IJCAI-99), pp 420–425
Régin J-C, Petit T, Bessiere C, Puget J-F (2000) An original constraint based approach for solving over constrained problems. Lecture Notes Comput Sci 1894:543–548
Tarjan RE (1983) Data structures and network algorithms. SIAM Press, Philadelphia, PA
Trick MA (2003) Integer and constraint programming approaches for round-robin tournament scheduling. Lecture Notes Comput Sci 2740:63–77
Tsang E (1993) Foundations of constraint satisfaction. Academic Press, New York
Tutte WT (1954) A short proof of the factor theorem for finite graphs. Can J Math 6:347–352
Tutte WT (1981) Graph factors. Combinatorica 1:79–97
van Hoeve W-J (2001) The alldifferent constraint: a survey. In: Proceedings of the 6th annual workshop of the ERCIM working group on constraints, Prague, Czech Republic
Vazirani VV (1994) A theory of alternating paths and blossoms for proving correctness of the \(O(\sqrt{|V|}\cdot |E|)\) general graph maximum matching algorithm. Combinatorica 14:71–109
Acknowledgments
The author would like to thank the referees for many useful suggestions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cymer, R. Gallai-Edmonds decomposition as a pruning technique. Cent Eur J Oper Res 23, 149–185 (2015). https://doi.org/10.1007/s10100-013-0309-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10100-013-0309-4