Backdoors to Acyclic SAT

被引:0
作者
Gaspers, Serge [1 ,2 ]
Szeider, Stefan [2 ]
机构
[1] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW, Australia
[2] Vienna Univ Technol, Inst Informat Syst, Vienna, Austria
来源
AUTOMATA, LANGUAGES, AND PROGRAMMING, ICALP 2012 PT I | 2012年 / 7391卷
基金
澳大利亚研究理事会; 欧洲研究理事会;
关键词
NUMBER-SAT; SATISFIABILITY; ALGORITHMS; FORMULAS; WIDTH;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Backdoor sets contain certain key variables of a CNF formula F that make it easy to solve the formula. More specifically, a weak backdoor set of F is a set X of variables such that there exits a truth assignment tau to X that reduces F to a satisfiable formula F[tau] that belongs to a polynomial-time decidable base class C. A strong backdoor set is a set X of variables such that for all assignments tau to X, the reduced formula F[tau] belongs to C. We study the problem of finding backdoor sets of size at most k with respect to the base class of CNF formulas with acyclic incidence graphs, taking k as the parameter. We show that 1. the detection of weak backdoor sets is W[2]-hard in general but fixed-parameter tractable for r-CNF formulas, for any fixed r >= 3, and 2. the detection of strong backdoor sets is fixed-parameter approximable. Result 1 is the the first positive one for a base class that does not have a characterization with obstructions of bounded size. Result 2 is the first positive one for a base class for which strong backdoor sets are more powerful than deletion backdoor sets. Not only SAT, but also #SAT can be solved in polynomial time for CNF formulas with acyclic incidence graphs. Hence Result 2 establishes a new structural parameter that makes #SAT fixed-parameter tractable and that is incomparable with known parameters such as treewidth and clique-width. We obtain the algorithms by a combination of an algorithmic version of the Erdos-Posa Theorem, Courcelle's model checking for monadic second order logic, and new combinatorial results on how disjoint cycles can interact with the backdoor set.
引用
收藏
页码:363 / 374
页数:12
相关论文
共 32 条
  • [1] Alekhnovich M, 2002, ANN IEEE SYMP FOUND, P593, DOI 10.1109/SFCS.2002.1181983
  • [2] [Anonymous], 1990, Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics
  • [3] [Anonymous], 2018, Graph theory
  • [4] [Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
  • [5] Algorithms and complexity results for #SAT and Bayesian inference
    Bacchus, F
    Dalmao, S
    Pitassi, T
    [J]. 44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 340 - 351
  • [6] Bodlaender H. L., 1994, International Journal of Foundations of Computer Science, V5, P59, DOI 10.1142/S0129054194000049
  • [7] Improved algorithms for feedback vertex set problems
    Chen, Jianer
    Fomin, Fedor V.
    Liu, Yang
    Lu, Songjian
    Villanger, Yngve
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2008, 74 (07) : 1188 - 1198
  • [8] Cook S. A., 1971, Proceedings of the 3rd annual ACM symposium on theory of computing, P151
  • [9] Dechter R., 2003, Constraint processing
  • [10] Downey R. G., 1999, MG COMP SCI