SlideShare a Scribd company logo
An Expressive Model for Instance
Decomposition Based Parallel SAT Solvers
Tobias Philipp
Knowledge Representation and Reasoning Group
Technische Universität Dresden
Outline
(1) The Instance Decomposition Approach
(2) Incorrect UNSAT Answers
(3) A Formal Model
(4) Unsatisfiability Proofs
1
The Instance Decomposition Approach
F
2
The Instance Decomposition Approach
F
2
The Instance Decomposition Approach
F
F0
x
F1
x
2
The Instance Decomposition Approach
F
F0
x
F1
x
2
The Instance Decomposition Approach
F
F0
x
F1
F10
y
F11
y
x
2
The Instance Decomposition Approach
Solver1
Solver2
Solver3
Solver4
Solver5
F
F0
F1
F10
F11
F
F0
x
F1
F10
y
F11
y
x
2
The Instance Decomposition Approach
Solver1
Solver2
Solver3
Solver4
Solver5
F
F0
F1
F10
F11
SAT
F
F0
x
F1
F10
y
F11
y
x
2
The Instance Decomposition Approach
Solver1
Solver2
Solver3
Solver4
Solver5
F
F0
F1
F10
F11
UNSAT
UNSAT
F
F0
x
F1
F10
y
F11
y
x
2
The Instance Decomposition Approach
Solver1
Solver2
Solver3
Solver4
Solver5
F
F0
F1
F10
F11
UNSAT
UNSAT
UNSATF
F0
x
F1
F10
y
F11
y
x
2
The Instance Decomposition Approach
Solver1
Solver2
Solver3
Solver4
Solver5
F
F0
F1
F10
F11
UNSAT
UNSAT
UNSATF
F0
x
F1
F10
y
F11
y
x
Clause Sharing
Formula Simplifications
2
Incorrect UNSAT Answers
UNSAT may be Incorrect: Sharing Partition
Constraints
F0 is satisfiable.
p(F0) = (F ∧ x), (F ∧ x)
F0 ∧ x ∧ x is
unsatisfiable.
F0 F0 ∧ x F0 ∧ x
F0 ∧ x F0 ∧ x F0 ∧ x
F0 ∧ x ∧ x F0 ∧ x F0 ∧ x
UNSAT
3
Blocked Clauses
C is blocked in F iff there is L ∈ C st
all resolvents of C with resolution candidates in F upon L are
tautologies
F = (x ∨ y) ∧ (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z)
C = (x ∨ z) is blocked in F by z
D = (y ∨ z) is blocked in F by z
4
UNSAT can be Incorrect: Applying
Clause Addition Techniques in Two Solvers
F = (x ∨ y) ∧ (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z)
C = (x ∨ z) is blocked in F by z
D = (y ∨ z) is blocked in F by z
F is satisfiable:
I = {x, y, z}
J = {x, y, z}
I |= C, J |= D
F ∧ C ∧ D is unsatisfiable
F F
F ∧ C F
F ∧ C F ∧ D
F ∧ C ∧ D F ∧ D
UNSAT
5
UNSAT can be Incorrect: Applying Clause
Elimination and Addition Techniques in One
Solver
F = (x ∨ y) ∧ (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z)
C = (x ∨ z) is blocked in F by z
D = (y ∨ z) is blocked in F by z
F is satisfiable:
I = {x, y, z}
J = {x, y, z}
F ∧ C is satisfiable:
J = {x, y, z}
F ∧ C ∧ D is unsatisfiable, since J |= D
F ∧ C F ∧ C
F F ∧ C
F ∧ D F ∧ C
F ∧ D ∧ C F ∧ C
UNSAT
6
Our Formalism
With Clause Elimination and
Label-Based Clause Sharing
Label Based Clause Sharing can Handle
Partition Constraints
Label function
C : N × Clauses → 2Labels
F : N → 2Labels
Label based clause sharing
Solveri Solverj
C
C(j, C) ⊆ F(i)
Partition constraints
C(C, i) = {unsafe}, if C is a partition constraint
C(C, i) = ∅, otherwise
F(i) = ∅
7
Consistent Label Functions Can Handle
Clause Elimination Techniques
is consistent for F0, . . . , Fn iff
Fi ≡sat Fi ∧
(j,C)⊆ (i),
C∈Fj,
0≤j≤n
C
Proposition: Position Based Tagging and Boolean Tagging are
consistent label functions.
8
Instance Decomposition Based Solvers can
be Described As State Transition Systems
Partition function pn(F0) = (F1, F2, . . . , Fn)
F0 ≡ F1 ∨ F2 ∨ . . . ∨ Fn.
Cooperation tree E E ⊆ {0, . . . , n} × {0, . . . , n}
F0 is satisfiable, if Fi is satisfiable,
Fi is unsatisfiable, if Fj is unsatisfiable for all children j of i.
Label functions:
9
The States in the
Instance Decomposition Model
States
F0 F1
. . . Fn E
Initial state initpn, ,E(F0) = (F0, . . . , Fn, , E)
pn(F0) = (F1, . . . , Fn) s.t. F0 ≡ F1 ∨ . . . ∨ Fn.
is a consistent label function for F0, . . . , Fn.
E is a cooperation tree for F0, . . . , Fn, where F0 is the root.
Terminal states SAT, UNSAT
10
SAT Termination Rule
F0 F1
. . . Fi
. . . Fn E
SAT
some Fi is satisfiable
11
UNSAT Termination Rule
F0 F1
. . . Fi
. . . Fn E
UNSAT
∅ ∈ F0
12
LOCUNSAT Rule
F0 F1
. . . Fi
. . . Fn E
F0 F1
. . . Fi ∧ ∅ . . . Fn E
all children of Fi in E contain ∅,
(i, ∅) := (i)
13
Labeled Resolution Rule
F0 F1
. . . Fi
. . . Fn E
F0 F1
. . . Fi ∧ D . . . Fn E
D = C ⊗ C ,
C, C ∈ Fi,
(i, D) := (i, C) ∪ (i, C )
14
Clause Deletion Rule
F0 F1
. . . Fi
. . . Fn E
F0 F1
. . . Fi
. . . Fn E
Fi ⊂ Fi and Fi ≡sat Fi
15
Label Based Clause Sharing Rule
F0 F1
. . . Fi
. . . Fn E
F0 F1
. . . Fi ∧ C . . . Fn E
C ∈ Fj and (j, C) ⊆ (i),
(i, C) := (j, C)
16
Properties of the
Instance Decomposition Model
Clause Elimination Techniques:
Blocked Clause Elimination
Variable Elimination
Instances: a restricted form of PCASSO
Key Invariant: If initpn,E, (F0)
∗
; (F0, . . . , Fn, , E):
F0 ≡sat F0,
is consistent for F0, . . . , Fn,
E is a cooperation tree for F0, . . . , Fn.
Theorem: The Instance Decomposition Model is sound.
We can use clause elimination techniques in PCASSO.
17
Unsatisfiability Proof
F SAT Solver
SAT, I
UNSAT, P
Checker
Checker
Execution traces correspond to unsatisfiability results
Record changes in the formulas
18
Conclusion
Contributions
A sound formalism for instance decomposition based
parallel SAT solvers
consistent label functions
A proof format
Future Work
How can we use clause elimination and addition methods in
all solver incarnations?
How can we construct clausal proofs?
19
An Expressive Model for Instance
Decomposition Based Parallel SAT Solvers
Tobias Philipp
Knowledge Representation and Reasoning Group
Technische Universität Dresden
Thank you for your attention.
Position-Based Tagging
F
F0
x
F1
F10
y
F11
y
x
Position-based label function
F( ) = { }
F(0) = { , 0} C(0, {x}) = {0}
F(1) = { , 1} C(w, {x}) = {1} for w ∈ {1, 10, 11}
F(10) = { , 1, 10} C(10, {y}) = {10}
F(11) = { , 1, 11} C(11, {y}) = {11}
20
F = ˙{{x, y}˙}
F0 = ˙{{x, y}, {x}˙}
F1 = ˙{{x, y}, {x}˙}
F10 = ˙{{x, y}, {x}, {y}˙}
F11 = ˙{{x, y}, {x}, {y}˙}
F
F0
x
F1
F10
y
F11
y
x
21
Proof Format
Position-based tagging
Labeled and extended resolution derivation of Cn in F
(Ci | 1 ≤ i ≤ n) such
Ci ∈ F,
Ci is a labeled resolvent from two previous clauses Cj and Ck
where j < i and k < n, or
Ci is the empty clause with label u and for every a ∈ Σ there
is the empty clause labeled with ua.
Proof Checking
Check correct partition constraints and labels in F
Check derivation
Contains empty clause with no labels attached
22
Solveri Solverj
23
Partition Functions
Partition function pf (F) = (F1, . . . , Fn)
F ≡ F1 ∨ . . . ∨ Fn
F = ˙{{x, y}˙}
F0 = ˙{{x, y}, {x}˙}
F1 = ˙{{x, y}, {x}˙}
F10 = ˙{{x, y}, {x}, {y}˙}
F11 = ˙{{x, y}, {x}, {y}˙}
F
F0
x
F1
F10
y
F11
y
x
24
Clause Addition Techniques can make
Formulas Unsatisfiable
F0 ≡ (F0 ∧ x) ∨ (F0 ∧ x)
Assume F0 ≡sat F0 ∧ x.
F0 ∧ x ∧ x is unsatisfiable.
Result: There is no consistent label
function that allows to share x.
F F
F F
F ∧ F F
UNSAT
25

More Related Content

Similar to An Expressive Model for Instance Decomposition Based Parallel SAT Solvers

Difrentiation 140930015134-phpapp01
Difrentiation 140930015134-phpapp01Difrentiation 140930015134-phpapp01
Difrentiation 140930015134-phpapp01
rakambantah
 
Fourier transform
Fourier transformFourier transform
Fourier transform
Solo Hermelin
 
Advance Engineering Mathematics
Advance Engineering MathematicsAdvance Engineering Mathematics
Advance Engineering Mathematics
PrasenjitRathore
 
Difrentiation
DifrentiationDifrentiation
Difrentiationlecturer
 
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
BRNSS Publication Hub
 
1_AJMS_229_19[Review].pdf
1_AJMS_229_19[Review].pdf1_AJMS_229_19[Review].pdf
1_AJMS_229_19[Review].pdf
BRNSS Publication Hub
 
Indefinite Integral
Indefinite IntegralIndefinite Integral
Indefinite IntegralJelaiAujero
 
03_AJMS_279_20_20210128_V2.pdf
03_AJMS_279_20_20210128_V2.pdf03_AJMS_279_20_20210128_V2.pdf
03_AJMS_279_20_20210128_V2.pdf
BRNSS Publication Hub
 
THE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCE
THE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCETHE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCE
THE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCE
Frank Nielsen
 
Functions
FunctionsFunctions
Functions
Dreams4school
 
DIFFERENTIATION
DIFFERENTIATIONDIFFERENTIATION
DIFFERENTIATION
Urmila Bhardwaj
 
10.1007 978 3-642-31137-6-9
10.1007 978 3-642-31137-6-910.1007 978 3-642-31137-6-9
10.1007 978 3-642-31137-6-9
proteas26
 
On Analytic Review of Hahn–Banach Extension Results with Some Generalizations
On Analytic Review of Hahn–Banach Extension Results with Some GeneralizationsOn Analytic Review of Hahn–Banach Extension Results with Some Generalizations
On Analytic Review of Hahn–Banach Extension Results with Some Generalizations
BRNSS Publication Hub
 

Similar to An Expressive Model for Instance Decomposition Based Parallel SAT Solvers (13)

Difrentiation 140930015134-phpapp01
Difrentiation 140930015134-phpapp01Difrentiation 140930015134-phpapp01
Difrentiation 140930015134-phpapp01
 
Fourier transform
Fourier transformFourier transform
Fourier transform
 
Advance Engineering Mathematics
Advance Engineering MathematicsAdvance Engineering Mathematics
Advance Engineering Mathematics
 
Difrentiation
DifrentiationDifrentiation
Difrentiation
 
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...
 
1_AJMS_229_19[Review].pdf
1_AJMS_229_19[Review].pdf1_AJMS_229_19[Review].pdf
1_AJMS_229_19[Review].pdf
 
Indefinite Integral
Indefinite IntegralIndefinite Integral
Indefinite Integral
 
03_AJMS_279_20_20210128_V2.pdf
03_AJMS_279_20_20210128_V2.pdf03_AJMS_279_20_20210128_V2.pdf
03_AJMS_279_20_20210128_V2.pdf
 
THE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCE
THE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCETHE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCE
THE CHORD GAP DIVERGENCE AND A GENERALIZATION OF THE BHATTACHARYYA DISTANCE
 
Functions
FunctionsFunctions
Functions
 
DIFFERENTIATION
DIFFERENTIATIONDIFFERENTIATION
DIFFERENTIATION
 
10.1007 978 3-642-31137-6-9
10.1007 978 3-642-31137-6-910.1007 978 3-642-31137-6-9
10.1007 978 3-642-31137-6-9
 
On Analytic Review of Hahn–Banach Extension Results with Some Generalizations
On Analytic Review of Hahn–Banach Extension Results with Some GeneralizationsOn Analytic Review of Hahn–Banach Extension Results with Some Generalizations
On Analytic Review of Hahn–Banach Extension Results with Some Generalizations
 

More from Tobias Philipp

Fuzzing and Verifying RAT Refutations with Deletion Information
Fuzzing and Verifying RAT Refutations with Deletion InformationFuzzing and Verifying RAT Refutations with Deletion Information
Fuzzing and Verifying RAT Refutations with Deletion Information
Tobias Philipp
 
A Verified Decision Procedure for Pseudo-Boolean Formulas
A Verified Decision Procedure for Pseudo-Boolean FormulasA Verified Decision Procedure for Pseudo-Boolean Formulas
A Verified Decision Procedure for Pseudo-Boolean Formulas
Tobias Philipp
 
PBLib - A Library for Encoding Pseudo-Boolean Constraints into CNF
PBLib - A Library for Encoding Pseudo-Boolean Constraints into CNFPBLib - A Library for Encoding Pseudo-Boolean Constraints into CNF
PBLib - A Library for Encoding Pseudo-Boolean Constraints into CNF
Tobias Philipp
 
The Complexity of Contextual Abduction in Human Reasoning Tasks
The Complexity of Contextual Abduction in Human Reasoning TasksThe Complexity of Contextual Abduction in Human Reasoning Tasks
The Complexity of Contextual Abduction in Human Reasoning Tasks
Tobias Philipp
 
Checking Unsatisfiability Proofs in Parallel
Checking Unsatisfiability Proofs in ParallelChecking Unsatisfiability Proofs in Parallel
Checking Unsatisfiability Proofs in Parallel
Tobias Philipp
 
Anwendungen der Logik in der IT-Sicherheit
Anwendungen der Logik in der IT-SicherheitAnwendungen der Logik in der IT-Sicherheit
Anwendungen der Logik in der IT-Sicherheit
Tobias Philipp
 
Formal Verification with Ada/SPARK
Formal Verification with Ada/SPARKFormal Verification with Ada/SPARK
Formal Verification with Ada/SPARK
Tobias Philipp
 
Formale Verifikation von Answer Set Programming
Formale Verifikation von Answer Set ProgrammingFormale Verifikation von Answer Set Programming
Formale Verifikation von Answer Set Programming
Tobias Philipp
 

More from Tobias Philipp (8)

Fuzzing and Verifying RAT Refutations with Deletion Information
Fuzzing and Verifying RAT Refutations with Deletion InformationFuzzing and Verifying RAT Refutations with Deletion Information
Fuzzing and Verifying RAT Refutations with Deletion Information
 
A Verified Decision Procedure for Pseudo-Boolean Formulas
A Verified Decision Procedure for Pseudo-Boolean FormulasA Verified Decision Procedure for Pseudo-Boolean Formulas
A Verified Decision Procedure for Pseudo-Boolean Formulas
 
PBLib - A Library for Encoding Pseudo-Boolean Constraints into CNF
PBLib - A Library for Encoding Pseudo-Boolean Constraints into CNFPBLib - A Library for Encoding Pseudo-Boolean Constraints into CNF
PBLib - A Library for Encoding Pseudo-Boolean Constraints into CNF
 
The Complexity of Contextual Abduction in Human Reasoning Tasks
The Complexity of Contextual Abduction in Human Reasoning TasksThe Complexity of Contextual Abduction in Human Reasoning Tasks
The Complexity of Contextual Abduction in Human Reasoning Tasks
 
Checking Unsatisfiability Proofs in Parallel
Checking Unsatisfiability Proofs in ParallelChecking Unsatisfiability Proofs in Parallel
Checking Unsatisfiability Proofs in Parallel
 
Anwendungen der Logik in der IT-Sicherheit
Anwendungen der Logik in der IT-SicherheitAnwendungen der Logik in der IT-Sicherheit
Anwendungen der Logik in der IT-Sicherheit
 
Formal Verification with Ada/SPARK
Formal Verification with Ada/SPARKFormal Verification with Ada/SPARK
Formal Verification with Ada/SPARK
 
Formale Verifikation von Answer Set Programming
Formale Verifikation von Answer Set ProgrammingFormale Verifikation von Answer Set Programming
Formale Verifikation von Answer Set Programming
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

An Expressive Model for Instance Decomposition Based Parallel SAT Solvers

  • 1. An Expressive Model for Instance Decomposition Based Parallel SAT Solvers Tobias Philipp Knowledge Representation and Reasoning Group Technische Universität Dresden
  • 2. Outline (1) The Instance Decomposition Approach (2) Incorrect UNSAT Answers (3) A Formal Model (4) Unsatisfiability Proofs 1
  • 5. The Instance Decomposition Approach F F0 x F1 x 2
  • 6. The Instance Decomposition Approach F F0 x F1 x 2
  • 7. The Instance Decomposition Approach F F0 x F1 F10 y F11 y x 2
  • 8. The Instance Decomposition Approach Solver1 Solver2 Solver3 Solver4 Solver5 F F0 F1 F10 F11 F F0 x F1 F10 y F11 y x 2
  • 9. The Instance Decomposition Approach Solver1 Solver2 Solver3 Solver4 Solver5 F F0 F1 F10 F11 SAT F F0 x F1 F10 y F11 y x 2
  • 10. The Instance Decomposition Approach Solver1 Solver2 Solver3 Solver4 Solver5 F F0 F1 F10 F11 UNSAT UNSAT F F0 x F1 F10 y F11 y x 2
  • 11. The Instance Decomposition Approach Solver1 Solver2 Solver3 Solver4 Solver5 F F0 F1 F10 F11 UNSAT UNSAT UNSATF F0 x F1 F10 y F11 y x 2
  • 12. The Instance Decomposition Approach Solver1 Solver2 Solver3 Solver4 Solver5 F F0 F1 F10 F11 UNSAT UNSAT UNSATF F0 x F1 F10 y F11 y x Clause Sharing Formula Simplifications 2
  • 14. UNSAT may be Incorrect: Sharing Partition Constraints F0 is satisfiable. p(F0) = (F ∧ x), (F ∧ x) F0 ∧ x ∧ x is unsatisfiable. F0 F0 ∧ x F0 ∧ x F0 ∧ x F0 ∧ x F0 ∧ x F0 ∧ x ∧ x F0 ∧ x F0 ∧ x UNSAT 3
  • 15. Blocked Clauses C is blocked in F iff there is L ∈ C st all resolvents of C with resolution candidates in F upon L are tautologies F = (x ∨ y) ∧ (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z) C = (x ∨ z) is blocked in F by z D = (y ∨ z) is blocked in F by z 4
  • 16. UNSAT can be Incorrect: Applying Clause Addition Techniques in Two Solvers F = (x ∨ y) ∧ (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z) C = (x ∨ z) is blocked in F by z D = (y ∨ z) is blocked in F by z F is satisfiable: I = {x, y, z} J = {x, y, z} I |= C, J |= D F ∧ C ∧ D is unsatisfiable F F F ∧ C F F ∧ C F ∧ D F ∧ C ∧ D F ∧ D UNSAT 5
  • 17. UNSAT can be Incorrect: Applying Clause Elimination and Addition Techniques in One Solver F = (x ∨ y) ∧ (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z) C = (x ∨ z) is blocked in F by z D = (y ∨ z) is blocked in F by z F is satisfiable: I = {x, y, z} J = {x, y, z} F ∧ C is satisfiable: J = {x, y, z} F ∧ C ∧ D is unsatisfiable, since J |= D F ∧ C F ∧ C F F ∧ C F ∧ D F ∧ C F ∧ D ∧ C F ∧ C UNSAT 6
  • 18. Our Formalism With Clause Elimination and Label-Based Clause Sharing
  • 19. Label Based Clause Sharing can Handle Partition Constraints Label function C : N × Clauses → 2Labels F : N → 2Labels Label based clause sharing Solveri Solverj C C(j, C) ⊆ F(i) Partition constraints C(C, i) = {unsafe}, if C is a partition constraint C(C, i) = ∅, otherwise F(i) = ∅ 7
  • 20. Consistent Label Functions Can Handle Clause Elimination Techniques is consistent for F0, . . . , Fn iff Fi ≡sat Fi ∧ (j,C)⊆ (i), C∈Fj, 0≤j≤n C Proposition: Position Based Tagging and Boolean Tagging are consistent label functions. 8
  • 21. Instance Decomposition Based Solvers can be Described As State Transition Systems Partition function pn(F0) = (F1, F2, . . . , Fn) F0 ≡ F1 ∨ F2 ∨ . . . ∨ Fn. Cooperation tree E E ⊆ {0, . . . , n} × {0, . . . , n} F0 is satisfiable, if Fi is satisfiable, Fi is unsatisfiable, if Fj is unsatisfiable for all children j of i. Label functions: 9
  • 22. The States in the Instance Decomposition Model States F0 F1 . . . Fn E Initial state initpn, ,E(F0) = (F0, . . . , Fn, , E) pn(F0) = (F1, . . . , Fn) s.t. F0 ≡ F1 ∨ . . . ∨ Fn. is a consistent label function for F0, . . . , Fn. E is a cooperation tree for F0, . . . , Fn, where F0 is the root. Terminal states SAT, UNSAT 10
  • 23. SAT Termination Rule F0 F1 . . . Fi . . . Fn E SAT some Fi is satisfiable 11
  • 24. UNSAT Termination Rule F0 F1 . . . Fi . . . Fn E UNSAT ∅ ∈ F0 12
  • 25. LOCUNSAT Rule F0 F1 . . . Fi . . . Fn E F0 F1 . . . Fi ∧ ∅ . . . Fn E all children of Fi in E contain ∅, (i, ∅) := (i) 13
  • 26. Labeled Resolution Rule F0 F1 . . . Fi . . . Fn E F0 F1 . . . Fi ∧ D . . . Fn E D = C ⊗ C , C, C ∈ Fi, (i, D) := (i, C) ∪ (i, C ) 14
  • 27. Clause Deletion Rule F0 F1 . . . Fi . . . Fn E F0 F1 . . . Fi . . . Fn E Fi ⊂ Fi and Fi ≡sat Fi 15
  • 28. Label Based Clause Sharing Rule F0 F1 . . . Fi . . . Fn E F0 F1 . . . Fi ∧ C . . . Fn E C ∈ Fj and (j, C) ⊆ (i), (i, C) := (j, C) 16
  • 29. Properties of the Instance Decomposition Model Clause Elimination Techniques: Blocked Clause Elimination Variable Elimination Instances: a restricted form of PCASSO Key Invariant: If initpn,E, (F0) ∗ ; (F0, . . . , Fn, , E): F0 ≡sat F0, is consistent for F0, . . . , Fn, E is a cooperation tree for F0, . . . , Fn. Theorem: The Instance Decomposition Model is sound. We can use clause elimination techniques in PCASSO. 17
  • 30. Unsatisfiability Proof F SAT Solver SAT, I UNSAT, P Checker Checker Execution traces correspond to unsatisfiability results Record changes in the formulas 18
  • 31. Conclusion Contributions A sound formalism for instance decomposition based parallel SAT solvers consistent label functions A proof format Future Work How can we use clause elimination and addition methods in all solver incarnations? How can we construct clausal proofs? 19
  • 32. An Expressive Model for Instance Decomposition Based Parallel SAT Solvers Tobias Philipp Knowledge Representation and Reasoning Group Technische Universität Dresden Thank you for your attention.
  • 33.
  • 34. Position-Based Tagging F F0 x F1 F10 y F11 y x Position-based label function F( ) = { } F(0) = { , 0} C(0, {x}) = {0} F(1) = { , 1} C(w, {x}) = {1} for w ∈ {1, 10, 11} F(10) = { , 1, 10} C(10, {y}) = {10} F(11) = { , 1, 11} C(11, {y}) = {11} 20
  • 35. F = ˙{{x, y}˙} F0 = ˙{{x, y}, {x}˙} F1 = ˙{{x, y}, {x}˙} F10 = ˙{{x, y}, {x}, {y}˙} F11 = ˙{{x, y}, {x}, {y}˙} F F0 x F1 F10 y F11 y x 21
  • 36. Proof Format Position-based tagging Labeled and extended resolution derivation of Cn in F (Ci | 1 ≤ i ≤ n) such Ci ∈ F, Ci is a labeled resolvent from two previous clauses Cj and Ck where j < i and k < n, or Ci is the empty clause with label u and for every a ∈ Σ there is the empty clause labeled with ua. Proof Checking Check correct partition constraints and labels in F Check derivation Contains empty clause with no labels attached 22
  • 38. Partition Functions Partition function pf (F) = (F1, . . . , Fn) F ≡ F1 ∨ . . . ∨ Fn F = ˙{{x, y}˙} F0 = ˙{{x, y}, {x}˙} F1 = ˙{{x, y}, {x}˙} F10 = ˙{{x, y}, {x}, {y}˙} F11 = ˙{{x, y}, {x}, {y}˙} F F0 x F1 F10 y F11 y x 24
  • 39. Clause Addition Techniques can make Formulas Unsatisfiable F0 ≡ (F0 ∧ x) ∨ (F0 ∧ x) Assume F0 ≡sat F0 ∧ x. F0 ∧ x ∧ x is unsatisfiable. Result: There is no consistent label function that allows to share x. F F F F F ∧ F F UNSAT 25