On the complexity of trial and error for constraint satisfaction problems

被引:4
作者
Ivanyos, Gabor [1 ]
Kulkarni, Raghav [2 ]
Qiao, Youming [3 ]
Santha, Miklos [2 ,4 ]
Sundaram, Aarthi [2 ]
机构
[1] Hungarian Acad Sci, Inst Comp Sci & Control, Budapest, Hungary
[2] Natl Univ Singapore, Ctr Quantum Technol, Singapore 117543, Singapore
[3] Univ Technol Sydney, Ctr Quantum Software & Informat, Sydney, NSW, Australia
[4] Univ Paris Diderot, CNRS, IRIF, F-75205 Paris, France
基金
澳大利亚研究理事会; 新加坡国家研究基金会;
关键词
Trial and error; Constraint satisfaction problems; Computational complexity;
D O I
10.1016/j.jcss.2017.07.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2013 Bei, Chen and Zhang introduced a trial and error model of computing, and applied to some constraint satisfaction problems. In this model the input is hidden by an oracle which, for a candidate assignment, reveals some information about a violated constraint if the assignment is not satisfying. In this paper we initiate a systematic study of constraint satisfaction problems in the trial and error model, by adopting a formal framework for CSPs, and defining several types of revealing oracles. Our main contribution is to develop a transfer theorem for each type of the revealing oracle. To any hidden CSP with a specific type of revealing Oracle, the transfer theorem associates another CSP in the normal setting, such that their complexities are polynomial-time equivalent. This in principle transfers the study of a large class of hidden CSPs to the study of normal CSPs. We apply the transfer theorems to get polynomial-time algorithms or hardness results for several families of concrete problems. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 64
页数:17
相关论文
共 10 条
[1]  
[Anonymous], 2002, P THIRY 4 ANN ACM S, DOI [DOI 10.1109/CCC.2002.1004334, DOI 10.1145/509907.510017]
[2]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
[3]   Solving Linear Programming with Constraints Unknown [J].
Bei, Xiaohui ;
Chen, Ning ;
Zhang, Shengyu .
Automata, Languages, and Programming, Pt I, 2015, 9134 :129-142
[4]  
Bei XH, 2013, 19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), P1016
[5]  
Bei XH, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P31
[6]  
Bei Xiaohui, 2012, CORR
[7]  
Hell P., 1988, SIAM J DISCRETE MATH, V1, P472
[8]  
Ivanyos G, 2014, LECT NOTES COMPUT SC, V8572, P663
[9]   NONCROSSING SUBGRAPHS IN TOPOLOGICAL LAYOUTS [J].
KRATOCHVIL, J ;
LUBIW, A ;
NESETRIL, J .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 1991, 4 (02) :223-244
[10]  
Schaefer T. J., 1978, P 10 ANN ACM S THEOR, P216, DOI [DOI 10.1145/800133.804350, 10.1145/800133.804350]