SlideShare a Scribd company logo
1 of 77
Download to read offline
Discovering Archipelagos of Tractability
for Constraint Satisfaction and Counting
Robert Ganian, M. S. Ramanujan, Stefan Szeider

Vienna University of Technology
SODA 2016
Satisfiability
• SATISFIABILITY: Is a given propositional formula
satisfiable?

• First NP-Complete problem.

Satisfiability
• CSP: Is there an assignment to variables from
the domain so that every given constraint is
satisfied ?

• Generalizes SAT.
Backdoor sets
Informally, a set of variables whose instantiation results 

in a significantly simplified formula.
Introduced by 

Williams, Gomes, Selman (IJCAI 2003) 

and 

Crama, Ekin, Hammer (D. A. M. 1997)
Backdoors to SAT/CSP
• (strong) Backdoor to C
Backdoors to SAT/CSP
• (strong) Backdoor to C
All assignments lead to an

instance in the base class C.
X
F1 F2 F3 F4 F2|X|
Backdoors to SAT/CSP
2 Perspectives on backdoor sets
2 Perspectives on backdoor sets
• (a) (Williams, Gomes, Selman) the presence of small
backdoor sets provides a good explanation for the
performance of SAT solvers, the success of random
restarts etc.

2 Perspectives on backdoor sets
• (a) (Williams, Gomes, Selman) the presence of small
backdoor sets provides a good explanation for the
performance of SAT solvers, the success of random
restarts etc.

• (b) (Crama, Ekin, Hammer) backdoor sets provide an
excellent framework to extend tractability results for SAT.
2 Perspectives on backdoor sets
• (a) (Williams, Gomes, Selman) the presence of small
backdoor sets provides a good explanation for the
performance of SAT solvers, the success of random
restarts etc.

• (b) (Crama, Ekin, Hammer) backdoor sets provide an
excellent framework to extend tractability results for SAT.
eg. SAT is in P for 2-cnf formulas—> SAT is in P for 

formulas with a strong backdoor of size 10 to 2-cnf.
Islands of Tractability
Islands of Tractability
• Think of the base classes as `Islands of tractability’.

Islands of Tractability
• Think of the base classes as `Islands of tractability’.

• An instance with a `small’ backdoor to one of these
base classes is `close’ to an island of tractability.

Islands of Tractability
• Think of the base classes as `Islands of tractability’.

• An instance with a `small’ backdoor to one of these
base classes is `close’ to an island of tractability.

• Objective: The class of instances close to an island
of tractability, is also tractable.
Research Agenda
Instances with a backdoor

of size c to an island
Instances with a backdoor

of size log n to an island
Instances with a backdoor

of size log2 n to an island
How to extend tractability results?
How to extend tractability results?
• One approach: Find a strong backdoor to ONE FIXED Base
Class, explore all assignments to the backdoor variables.

How to extend tractability results?
• One approach: Find a strong backdoor to ONE FIXED Base
Class, explore all assignments to the backdoor variables.

• For each reduced formula, run the algorithm for the base
class.

How to extend tractability results?
• One approach: Find a strong backdoor to ONE FIXED Base
Class, explore all assignments to the backdoor variables.

• For each reduced formula, run the algorithm for the base
class.

• Running time is T1+2|X|
.T2 ; X is the backdoor set, T1 is the
time to detect the backdoor and T2 is the time to solve
SAT for the base class .
Finding Backdoor sets
Finding Backdoor sets
• For any reasonable island of tractability, detecting if a
formula is `close’ to this island is NP-complete.



Finding Backdoor sets
• For any reasonable island of tractability, detecting if a
formula is `close’ to this island is NP-complete.



• When can we do this detection efficiently (for a
relaxed notion of efficiency)?
FPT algorithms
FPT algorithms
• 2-dimensional analysis of algorithms.

FPT algorithms
• 2-dimensional analysis of algorithms.

• We analyse how the running time depends on the
input AND a second parameter which is also a
function of the input alone.

FPT algorithms
• 2-dimensional analysis of algorithms.

• We analyse how the running time depends on the
input AND a second parameter which is also a
function of the input alone.

• Aim for running times of the form f(k) |x|c
FPT algorithms
• 2-dimensional analysis of algorithms.

• We analyse how the running time depends on the
input AND a second parameter which is also a
function of the input alone.

• Aim for running times of the form f(k) |x|c
FPT
FPT + Backdoors + SAT
FPT + Backdoors + SAT
• Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04]
FPT + Backdoors + SAT
• Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04]
• Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13]
FPT + Backdoors + SAT
• Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04]
• Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13]
• Acyclic-SAT [Gaspers,Szeider ICALP ’12]
FPT + Backdoors + SAT
• Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04]
• Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13]
• Acyclic-SAT [Gaspers,Szeider ICALP ’12]
• Heterogenous classes [Gaspers, Misra, Ordyniak, Szeider,
Zivny AAAI 2014]
FPT + Backdoors + SAT
• Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04]
• Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13]
• Acyclic-SAT [Gaspers,Szeider ICALP ’12]
• Heterogenous classes [Gaspers, Misra, Ordyniak, Szeider,
Zivny AAAI 2014]
• Bounded tw-SAT [Gaspers,Szeider FOCS ’13, Fomin,
Lokshtanov, Misra, R., Saurabh, SODA ’15]
Composite Base Classes
Composite Base Classes
Composite Base Classes
• Natural objective when using backdoors:
Composite Base Classes
• Natural objective when using backdoors:
Composite Base Classes
• Natural objective when using backdoors:
• Make the base class as large as possible.
Composite Base Classes
• Natural objective when using backdoors:
• Make the base class as large as possible.
Composite Base Classes
• Natural objective when using backdoors:
• Make the base class as large as possible.
• Can we `compose’ several base classes to get a bigger
composite class?
Archipelagos of tractability
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
Consider F[x=0]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Horn
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
2-cnf
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Horn
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn) 2-cnf
Consider F[x=0]
Consider F[x=1]
Archipelagos of tractability
(x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)

⋀

(¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 

⋀

(x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
(¬a1 ⋁¬a2…⋁¬an) ⋀

(q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
(¬p1 ⋁¬p2…⋁¬pn) ⋀

(b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
Choose base classes C1,.. ,Cr
X is a strong backdoor into C1⊕… ⊕Cr if for every
assignment of X, every cluster of the reduced formula 

is in some Ci.
Archipelagos of tractability
Choose base classes C1,.. ,Cr
X is a strong backdoor into C1⊕… ⊕Cr if for every
assignment of X, every cluster of the reduced formula 

is in some Ci.
A minimal set of clauses which is variable-disjoint

from the remaining clauses.
Archipelagos of tractability
Islands of Tractability
Strong backdoor of size c 

to composition of

several Islands
Strong backdoor of size c to

a single Island of Tractability
Archipelagos of tractability
If H is a finite set of finite constraint languages, then there
is a Polynomial-time algorithm to check if a given instance
has a strong-backdoor of size O(log log n) into ⊕H.
Our Theorem
Archipelagos of tractability
Our Theorem
Archipelagos of tractability
If H is a finite set of finite constraint languages, then there
is a Polynomial-time algorithm to check if a given instance
has a strong-backdoor of size O(log log n) into ⊕H.
Our Theorem
Archipelagos of tractability
• Under standard complexity hypotheses, finite-ness of
the constraint languages is unavoidable.
If H is a finite set of finite constraint languages, then there
is a Polynomial-time algorithm to check if a given instance
has a strong-backdoor of size O(log log n) into ⊕H.
If H is a finite set of tractable, finite constraint languages,
then CSP can be solved in Polynomial time on instances with
a backdoor of size O(log log n) to ⊕H.
Corollary
Archipelagos of tractability
Proof Sketch
• Work with incidence graphs.

Variables
Constraints
I/p: CSP F, k
Q: Is there a s.b.d of size k into
comp(H)?
Proof Sketch
Variables
Constraints
w1 w2 w3
Approx. Solution W
I/p: CSP F, k
Q: Is there a s.b.d of size k into
comp(H)?
• Work with incidence graphs.

,|W|=k+1
Proof Sketch
Variables
Constraints
w1 w2 s1 s2 s3w3
Target Solution SApprox. Solution W
I/p: CSP F, k
Q: Is there a s.b.d of size k into
comp(H)?
• Work with incidence graphs.

,|W|=k+1
Proof Sketch
Variables
Constraints
w1 w2 s1 s2 s3w3
Target Solution S
• 2 cases depending on the interaction between them
Approx. Solution W
I/p: CSP F, k
Q: Is there a s.b.d of size k into
comp(H)?
• Work with incidence graphs.

,|W|=k+1
Proof Sketch
Variables
Constraints
w1 w2 s1 s2 s3w3
Case 1: S does not `split’ W
Target Solution SApprox. Solution W
• Work with incidence graphs.

Proof Sketch
Variables
Constraints
w1 w2 s1 s2 s3w3
• 2 cases depending on the interaction between them
Case 1: S does not `split’ W
Target Solution SApprox. Solution W
• Work with incidence graphs.

Proof Sketch
Variables
Constraints
Case 1: S does not `split’ W
Target Solution SApprox. Solution W
w1
w2 w3s1 s2 s3
Case 2: S splits W
• Work with incidence graphs.

Proof Sketch
Variables
Constraints
• Case 1 is the `base’ case.
Case 1: S does not `split’ W
Target Solution SApprox. Solution W
w1
w2 w3s1 s2 s3
Case 2: S splits W
• Work with incidence graphs.

Proof Sketch
w1 w2 s1 s2 s3w3
• Every sub formula Z of G-S
interacts with the rest of the
formula through S, and |S|<=k.

• Also, S is a strong backdoor for
F[S + Z].
Case 1: S does not `split’ W
SW
Lemma: F has a set of g(k) sub-formulas such that :

each sub formula Z interacts with the rest of F via at most k variables 

AND 

the variables on the boundary of Z already form a strong backdoor set for Z 

AND 

S intersects the boundary of one of these subformulas.
Proof Sketch
• There is a sub formula Z of G-S
that contains W1 and interacts with
the rest of the formula through S.
• Also, S is a strong backdoor for
F[S + Z].
Case 2: S splits W into W1 and W2
SW
Lemma: F has a set of g(k) sub-formulas such that :

each sub formula Z interacts with the rest of F via at most k variables 

AND 

Z contains W1

AND 

S intersects any ‘local optimal solution’ OR the boundary of one of these
subformulas.
w1
w2 w3s1 s2 s3
Summing up
Thank you for your attention!
Summing up
• Backdoors + FPT = extend tractability results for CSP
based on `distance’ to islands of tractability.
Thank you for your attention!
Summing up
• Backdoors + FPT = extend tractability results for CSP
based on `distance’ to islands of tractability.
• Composite base classes allow further generalization.
Thank you for your attention!
Summing up
• Backdoors + FPT = extend tractability results for CSP
based on `distance’ to islands of tractability.
• Composite base classes allow further generalization.
• Also works for #CSP.
Thank you for your attention!
Summing up
• Backdoors + FPT = extend tractability results for CSP
based on `distance’ to islands of tractability.
• Composite base classes allow further generalization.
• Also works for #CSP.
• Better tractability results for specific composite
classes and special non-finite cases?
Thank you for your attention!
Thank you for your attention!

More Related Content

What's hot

Kernel for Chordal Vertex Deletion
Kernel for Chordal Vertex DeletionKernel for Chordal Vertex Deletion
Kernel for Chordal Vertex DeletionAkankshaAgrawal55
 
On the Parameterized Complexity of Simultaneous Deletion Problems
On the Parameterized Complexity of Simultaneous Deletion ProblemsOn the Parameterized Complexity of Simultaneous Deletion Problems
On the Parameterized Complexity of Simultaneous Deletion ProblemsAkankshaAgrawal55
 
Split Contraction: The Untold Story
Split Contraction: The Untold StorySplit Contraction: The Untold Story
Split Contraction: The Untold StoryAkankshaAgrawal55
 
Fine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsFine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsAkankshaAgrawal55
 
Guarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized ComplexityGuarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized ComplexityAkankshaAgrawal55
 
COnflict Free Feedback Vertex Set: A Parameterized Dichotomy
COnflict Free Feedback Vertex Set: A Parameterized DichotomyCOnflict Free Feedback Vertex Set: A Parameterized Dichotomy
COnflict Free Feedback Vertex Set: A Parameterized DichotomyAkankshaAgrawal55
 
Path Contraction Faster than 2^n
Path Contraction Faster than 2^nPath Contraction Faster than 2^n
Path Contraction Faster than 2^nAkankshaAgrawal55
 
Process Algebras and Petri Nets are Discrete Dynamical Systems
Process Algebras and Petri Nets are Discrete Dynamical SystemsProcess Algebras and Petri Nets are Discrete Dynamical Systems
Process Algebras and Petri Nets are Discrete Dynamical SystemsFacultad de Informática UCM
 
Cs ps, sat, fol resolution strategies
Cs ps, sat, fol resolution strategiesCs ps, sat, fol resolution strategies
Cs ps, sat, fol resolution strategiesYasir Khan
 
Solving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear AlgebraSolving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear Algebracseiitgn
 
Theory of Automata and formal languages unit 1
Theory of Automata and formal languages unit 1Theory of Automata and formal languages unit 1
Theory of Automata and formal languages unit 1Abhimanyu Mishra
 
Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10Traian Rebedea
 
Fixed-Parameter Intractability
Fixed-Parameter IntractabilityFixed-Parameter Intractability
Fixed-Parameter IntractabilityASPAK2014
 
Theory of Automata and formal languages unit 2
Theory of Automata and formal languages unit 2Theory of Automata and formal languages unit 2
Theory of Automata and formal languages unit 2Abhimanyu Mishra
 
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationSOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationDon Sheehy
 

What's hot (20)

Kernel for Chordal Vertex Deletion
Kernel for Chordal Vertex DeletionKernel for Chordal Vertex Deletion
Kernel for Chordal Vertex Deletion
 
On the Parameterized Complexity of Simultaneous Deletion Problems
On the Parameterized Complexity of Simultaneous Deletion ProblemsOn the Parameterized Complexity of Simultaneous Deletion Problems
On the Parameterized Complexity of Simultaneous Deletion Problems
 
Split Contraction: The Untold Story
Split Contraction: The Untold StorySplit Contraction: The Untold Story
Split Contraction: The Untold Story
 
Fine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsFine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its Variants
 
Guarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized ComplexityGuarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized Complexity
 
COnflict Free Feedback Vertex Set: A Parameterized Dichotomy
COnflict Free Feedback Vertex Set: A Parameterized DichotomyCOnflict Free Feedback Vertex Set: A Parameterized Dichotomy
COnflict Free Feedback Vertex Set: A Parameterized Dichotomy
 
Lect6 csp
Lect6 cspLect6 csp
Lect6 csp
 
Path Contraction Faster than 2^n
Path Contraction Faster than 2^nPath Contraction Faster than 2^n
Path Contraction Faster than 2^n
 
Process Algebras and Petri Nets are Discrete Dynamical Systems
Process Algebras and Petri Nets are Discrete Dynamical SystemsProcess Algebras and Petri Nets are Discrete Dynamical Systems
Process Algebras and Petri Nets are Discrete Dynamical Systems
 
Cs ps, sat, fol resolution strategies
Cs ps, sat, fol resolution strategiesCs ps, sat, fol resolution strategies
Cs ps, sat, fol resolution strategies
 
Solving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear AlgebraSolving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear Algebra
 
Theory of Automata and formal languages unit 1
Theory of Automata and formal languages unit 1Theory of Automata and formal languages unit 1
Theory of Automata and formal languages unit 1
 
Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10Algorithm Design and Complexity - Course 10
Algorithm Design and Complexity - Course 10
 
Ch04n
Ch04nCh04n
Ch04n
 
Fixed-Parameter Intractability
Fixed-Parameter IntractabilityFixed-Parameter Intractability
Fixed-Parameter Intractability
 
qlp
qlpqlp
qlp
 
Reductions
ReductionsReductions
Reductions
 
Theory of Automata and formal languages unit 2
Theory of Automata and formal languages unit 2Theory of Automata and formal languages unit 2
Theory of Automata and formal languages unit 2
 
Finite automata
Finite automataFinite automata
Finite automata
 
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationSOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
SOCG: Linear-Size Approximations to the Vietoris-Rips Filtration
 

Similar to Archipelagos

An optimal and progressive algorithm for skyline queries slide
An optimal and progressive algorithm for skyline queries slideAn optimal and progressive algorithm for skyline queries slide
An optimal and progressive algorithm for skyline queries slideWooSung Choi
 
Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...
Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...
Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...IFPRI-EPTD
 
CPU and GPU parallel Kramers-Klein calculations
CPU and GPU parallel Kramers-Klein calculationsCPU and GPU parallel Kramers-Klein calculations
CPU and GPU parallel Kramers-Klein calculationsUral-PDC
 
Sampling from Massive Graph Streams: A Unifying Framework
Sampling from Massive Graph Streams: A Unifying FrameworkSampling from Massive Graph Streams: A Unifying Framework
Sampling from Massive Graph Streams: A Unifying FrameworkNesreen K. Ahmed
 
Paper Study: Transformer dissection
Paper Study: Transformer dissectionPaper Study: Transformer dissection
Paper Study: Transformer dissectionChenYiHuang5
 
2014.10.dartmouth
2014.10.dartmouth2014.10.dartmouth
2014.10.dartmouthQiqi Wang
 
Paper study: Attention, learn to solve routing problems!
Paper study: Attention, learn to solve routing problems!Paper study: Attention, learn to solve routing problems!
Paper study: Attention, learn to solve routing problems!ChenYiHuang5
 
A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...
A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...
A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...coreconferences
 
adversarial robustness lecture
adversarial robustness lectureadversarial robustness lecture
adversarial robustness lectureMuhammadAhmedShah2
 
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIATypes Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIADheeraj Kataria
 
On Sampling from Massive Graph Streams
On Sampling from Massive Graph StreamsOn Sampling from Massive Graph Streams
On Sampling from Massive Graph StreamsNesreen K. Ahmed
 
Paper Study: OptNet: Differentiable Optimization as a Layer in Neural Networks
Paper Study: OptNet: Differentiable Optimization as a Layer in Neural NetworksPaper Study: OptNet: Differentiable Optimization as a Layer in Neural Networks
Paper Study: OptNet: Differentiable Optimization as a Layer in Neural NetworksChenYiHuang5
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVictor Pillac
 
Phonons & Phonopy: Pro Tips (2014)
Phonons & Phonopy: Pro Tips (2014)Phonons & Phonopy: Pro Tips (2014)
Phonons & Phonopy: Pro Tips (2014)Jonathan Skelton
 

Similar to Archipelagos (20)

An optimal and progressive algorithm for skyline queries slide
An optimal and progressive algorithm for skyline queries slideAn optimal and progressive algorithm for skyline queries slide
An optimal and progressive algorithm for skyline queries slide
 
Abstract machines for great good
Abstract machines for great goodAbstract machines for great good
Abstract machines for great good
 
Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...
Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...
Biosight: Quantitative Methods for Policy Analysis: Stochastic Dynamic Progra...
 
MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...
MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...
MUMS: Transition & SPUQ Workshop - Gradient-Free Construction of Active Subsp...
 
CPU and GPU parallel Kramers-Klein calculations
CPU and GPU parallel Kramers-Klein calculationsCPU and GPU parallel Kramers-Klein calculations
CPU and GPU parallel Kramers-Klein calculations
 
Sampling from Massive Graph Streams: A Unifying Framework
Sampling from Massive Graph Streams: A Unifying FrameworkSampling from Massive Graph Streams: A Unifying Framework
Sampling from Massive Graph Streams: A Unifying Framework
 
9553477.ppt
9553477.ppt9553477.ppt
9553477.ppt
 
Paper Study: Transformer dissection
Paper Study: Transformer dissectionPaper Study: Transformer dissection
Paper Study: Transformer dissection
 
2014.10.dartmouth
2014.10.dartmouth2014.10.dartmouth
2014.10.dartmouth
 
Structure prediction
Structure predictionStructure prediction
Structure prediction
 
Paper study: Attention, learn to solve routing problems!
Paper study: Attention, learn to solve routing problems!Paper study: Attention, learn to solve routing problems!
Paper study: Attention, learn to solve routing problems!
 
A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...
A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...
A Mixed Integer Linear Programming (MILP) model for Advanced Earthwork Alloca...
 
15757597 (1).ppt
15757597 (1).ppt15757597 (1).ppt
15757597 (1).ppt
 
adversarial robustness lecture
adversarial robustness lectureadversarial robustness lecture
adversarial robustness lecture
 
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIATypes Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
Types Of Recursion in C++, Data Stuctures by DHEERAJ KATARIA
 
On Sampling from Massive Graph Streams
On Sampling from Massive Graph StreamsOn Sampling from Massive Graph Streams
On Sampling from Massive Graph Streams
 
Paper Study: OptNet: Differentiable Optimization as a Layer in Neural Networks
Paper Study: OptNet: Differentiable Optimization as a Layer in Neural NetworksPaper Study: OptNet: Differentiable Optimization as a Layer in Neural Networks
Paper Study: OptNet: Differentiable Optimization as a Layer in Neural Networks
 
VRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRPVRP2013 - Comp Aspects VRP
VRP2013 - Comp Aspects VRP
 
Phonons & Phonopy: Pro Tips (2014)
Phonons & Phonopy: Pro Tips (2014)Phonons & Phonopy: Pro Tips (2014)
Phonons & Phonopy: Pro Tips (2014)
 
Fine Grained Complexity
Fine Grained ComplexityFine Grained Complexity
Fine Grained Complexity
 

Recently uploaded

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 

Recently uploaded (20)

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 

Archipelagos

  • 1. Discovering Archipelagos of Tractability for Constraint Satisfaction and Counting Robert Ganian, M. S. Ramanujan, Stefan Szeider Vienna University of Technology SODA 2016
  • 2. Satisfiability • SATISFIABILITY: Is a given propositional formula satisfiable?
 • First NP-Complete problem.

  • 3. Satisfiability • CSP: Is there an assignment to variables from the domain so that every given constraint is satisfied ?
 • Generalizes SAT.
  • 4. Backdoor sets Informally, a set of variables whose instantiation results in a significantly simplified formula. Introduced by Williams, Gomes, Selman (IJCAI 2003) and Crama, Ekin, Hammer (D. A. M. 1997)
  • 6. • (strong) Backdoor to C Backdoors to SAT/CSP
  • 7. • (strong) Backdoor to C All assignments lead to an instance in the base class C. X F1 F2 F3 F4 F2|X| Backdoors to SAT/CSP
  • 8. 2 Perspectives on backdoor sets
  • 9. 2 Perspectives on backdoor sets • (a) (Williams, Gomes, Selman) the presence of small backdoor sets provides a good explanation for the performance of SAT solvers, the success of random restarts etc.

  • 10. 2 Perspectives on backdoor sets • (a) (Williams, Gomes, Selman) the presence of small backdoor sets provides a good explanation for the performance of SAT solvers, the success of random restarts etc.
 • (b) (Crama, Ekin, Hammer) backdoor sets provide an excellent framework to extend tractability results for SAT.
  • 11. 2 Perspectives on backdoor sets • (a) (Williams, Gomes, Selman) the presence of small backdoor sets provides a good explanation for the performance of SAT solvers, the success of random restarts etc.
 • (b) (Crama, Ekin, Hammer) backdoor sets provide an excellent framework to extend tractability results for SAT. eg. SAT is in P for 2-cnf formulas—> SAT is in P for formulas with a strong backdoor of size 10 to 2-cnf.
  • 13. Islands of Tractability • Think of the base classes as `Islands of tractability’.

  • 14. Islands of Tractability • Think of the base classes as `Islands of tractability’.
 • An instance with a `small’ backdoor to one of these base classes is `close’ to an island of tractability.

  • 15. Islands of Tractability • Think of the base classes as `Islands of tractability’.
 • An instance with a `small’ backdoor to one of these base classes is `close’ to an island of tractability.
 • Objective: The class of instances close to an island of tractability, is also tractable.
  • 16. Research Agenda Instances with a backdoor of size c to an island Instances with a backdoor of size log n to an island Instances with a backdoor of size log2 n to an island
  • 17. How to extend tractability results?
  • 18. How to extend tractability results? • One approach: Find a strong backdoor to ONE FIXED Base Class, explore all assignments to the backdoor variables.

  • 19. How to extend tractability results? • One approach: Find a strong backdoor to ONE FIXED Base Class, explore all assignments to the backdoor variables.
 • For each reduced formula, run the algorithm for the base class.

  • 20. How to extend tractability results? • One approach: Find a strong backdoor to ONE FIXED Base Class, explore all assignments to the backdoor variables.
 • For each reduced formula, run the algorithm for the base class.
 • Running time is T1+2|X| .T2 ; X is the backdoor set, T1 is the time to detect the backdoor and T2 is the time to solve SAT for the base class .
  • 22. Finding Backdoor sets • For any reasonable island of tractability, detecting if a formula is `close’ to this island is NP-complete.
 

  • 23. Finding Backdoor sets • For any reasonable island of tractability, detecting if a formula is `close’ to this island is NP-complete.
 
 • When can we do this detection efficiently (for a relaxed notion of efficiency)?
  • 25. FPT algorithms • 2-dimensional analysis of algorithms.

  • 26. FPT algorithms • 2-dimensional analysis of algorithms.
 • We analyse how the running time depends on the input AND a second parameter which is also a function of the input alone.

  • 27. FPT algorithms • 2-dimensional analysis of algorithms.
 • We analyse how the running time depends on the input AND a second parameter which is also a function of the input alone.
 • Aim for running times of the form f(k) |x|c
  • 28. FPT algorithms • 2-dimensional analysis of algorithms.
 • We analyse how the running time depends on the input AND a second parameter which is also a function of the input alone.
 • Aim for running times of the form f(k) |x|c FPT
  • 30. FPT + Backdoors + SAT • Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04]
  • 31. FPT + Backdoors + SAT • Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04] • Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13]
  • 32. FPT + Backdoors + SAT • Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04] • Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13] • Acyclic-SAT [Gaspers,Szeider ICALP ’12]
  • 33. FPT + Backdoors + SAT • Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04] • Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13] • Acyclic-SAT [Gaspers,Szeider ICALP ’12] • Heterogenous classes [Gaspers, Misra, Ordyniak, Szeider, Zivny AAAI 2014]
  • 34. FPT + Backdoors + SAT • Schaefer Classes [Nishimura, Ragde, Szeider SAT ’04] • Q-Horn [Gaspers,Ordyniak, R., Saurabh, Szeider STACS ’13] • Acyclic-SAT [Gaspers,Szeider ICALP ’12] • Heterogenous classes [Gaspers, Misra, Ordyniak, Szeider, Zivny AAAI 2014] • Bounded tw-SAT [Gaspers,Szeider FOCS ’13, Fomin, Lokshtanov, Misra, R., Saurabh, SODA ’15]
  • 37. Composite Base Classes • Natural objective when using backdoors:
  • 38. Composite Base Classes • Natural objective when using backdoors:
  • 39. Composite Base Classes • Natural objective when using backdoors: • Make the base class as large as possible.
  • 40. Composite Base Classes • Natural objective when using backdoors: • Make the base class as large as possible.
  • 41. Composite Base Classes • Natural objective when using backdoors: • Make the base class as large as possible. • Can we `compose’ several base classes to get a bigger composite class?
  • 43. Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn)
  • 44. Consider F[x=0] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn)
  • 45. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
  • 46. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
  • 47. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn) Horn
  • 48. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
  • 49. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn) 2-cnf
  • 50. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
  • 51. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn) Horn
  • 52. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
  • 53. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn) 2-cnf
  • 54. Consider F[x=0] Consider F[x=1] Archipelagos of tractability (x ⋁¬a1 ⋁¬a2…⋁¬an) ⋀ (¬x ⋁¬p1 ⋁¬p2…⋁¬pn)
 ⋀
 (¬x ⋁b1 ⋁ c1)⋀(¬x ⋁b2 ⋁ c2)..⋀(¬x ⋁bn ⋁ cn) 
 ⋀ (x ⋁q1 ⋁ r1)⋀(x ⋁q2 ⋁ r2)..⋀(x ⋁qn ⋁ rn) (¬a1 ⋁¬a2…⋁¬an) ⋀ (q1 ⋁ r1)⋀(q2 ⋁ r2).. ⋀ (qn ⋁ rn) (¬p1 ⋁¬p2…⋁¬pn) ⋀ (b1 ⋁ c1)⋀(b2 ⋁ c2)..⋀(bn ⋁ cn)
  • 55. Choose base classes C1,.. ,Cr X is a strong backdoor into C1⊕… ⊕Cr if for every assignment of X, every cluster of the reduced formula is in some Ci. Archipelagos of tractability
  • 56. Choose base classes C1,.. ,Cr X is a strong backdoor into C1⊕… ⊕Cr if for every assignment of X, every cluster of the reduced formula is in some Ci. A minimal set of clauses which is variable-disjoint from the remaining clauses. Archipelagos of tractability
  • 57. Islands of Tractability Strong backdoor of size c to composition of several Islands Strong backdoor of size c to a single Island of Tractability Archipelagos of tractability
  • 58. If H is a finite set of finite constraint languages, then there is a Polynomial-time algorithm to check if a given instance has a strong-backdoor of size O(log log n) into ⊕H. Our Theorem Archipelagos of tractability
  • 59. Our Theorem Archipelagos of tractability If H is a finite set of finite constraint languages, then there is a Polynomial-time algorithm to check if a given instance has a strong-backdoor of size O(log log n) into ⊕H.
  • 60. Our Theorem Archipelagos of tractability • Under standard complexity hypotheses, finite-ness of the constraint languages is unavoidable. If H is a finite set of finite constraint languages, then there is a Polynomial-time algorithm to check if a given instance has a strong-backdoor of size O(log log n) into ⊕H.
  • 61. If H is a finite set of tractable, finite constraint languages, then CSP can be solved in Polynomial time on instances with a backdoor of size O(log log n) to ⊕H. Corollary Archipelagos of tractability
  • 62. Proof Sketch • Work with incidence graphs.
 Variables Constraints I/p: CSP F, k Q: Is there a s.b.d of size k into comp(H)?
  • 63. Proof Sketch Variables Constraints w1 w2 w3 Approx. Solution W I/p: CSP F, k Q: Is there a s.b.d of size k into comp(H)? • Work with incidence graphs.
 ,|W|=k+1
  • 64. Proof Sketch Variables Constraints w1 w2 s1 s2 s3w3 Target Solution SApprox. Solution W I/p: CSP F, k Q: Is there a s.b.d of size k into comp(H)? • Work with incidence graphs.
 ,|W|=k+1
  • 65. Proof Sketch Variables Constraints w1 w2 s1 s2 s3w3 Target Solution S • 2 cases depending on the interaction between them Approx. Solution W I/p: CSP F, k Q: Is there a s.b.d of size k into comp(H)? • Work with incidence graphs.
 ,|W|=k+1
  • 66. Proof Sketch Variables Constraints w1 w2 s1 s2 s3w3 Case 1: S does not `split’ W Target Solution SApprox. Solution W • Work with incidence graphs.

  • 67. Proof Sketch Variables Constraints w1 w2 s1 s2 s3w3 • 2 cases depending on the interaction between them Case 1: S does not `split’ W Target Solution SApprox. Solution W • Work with incidence graphs.

  • 68. Proof Sketch Variables Constraints Case 1: S does not `split’ W Target Solution SApprox. Solution W w1 w2 w3s1 s2 s3 Case 2: S splits W • Work with incidence graphs.

  • 69. Proof Sketch Variables Constraints • Case 1 is the `base’ case. Case 1: S does not `split’ W Target Solution SApprox. Solution W w1 w2 w3s1 s2 s3 Case 2: S splits W • Work with incidence graphs.

  • 70. Proof Sketch w1 w2 s1 s2 s3w3 • Every sub formula Z of G-S interacts with the rest of the formula through S, and |S|<=k. • Also, S is a strong backdoor for F[S + Z]. Case 1: S does not `split’ W SW Lemma: F has a set of g(k) sub-formulas such that :
 each sub formula Z interacts with the rest of F via at most k variables 
 AND the variables on the boundary of Z already form a strong backdoor set for Z AND S intersects the boundary of one of these subformulas.
  • 71. Proof Sketch • There is a sub formula Z of G-S that contains W1 and interacts with the rest of the formula through S. • Also, S is a strong backdoor for F[S + Z]. Case 2: S splits W into W1 and W2 SW Lemma: F has a set of g(k) sub-formulas such that :
 each sub formula Z interacts with the rest of F via at most k variables 
 AND Z contains W1 AND S intersects any ‘local optimal solution’ OR the boundary of one of these subformulas. w1 w2 w3s1 s2 s3
  • 72. Summing up Thank you for your attention!
  • 73. Summing up • Backdoors + FPT = extend tractability results for CSP based on `distance’ to islands of tractability. Thank you for your attention!
  • 74. Summing up • Backdoors + FPT = extend tractability results for CSP based on `distance’ to islands of tractability. • Composite base classes allow further generalization. Thank you for your attention!
  • 75. Summing up • Backdoors + FPT = extend tractability results for CSP based on `distance’ to islands of tractability. • Composite base classes allow further generalization. • Also works for #CSP. Thank you for your attention!
  • 76. Summing up • Backdoors + FPT = extend tractability results for CSP based on `distance’ to islands of tractability. • Composite base classes allow further generalization. • Also works for #CSP. • Better tractability results for specific composite classes and special non-finite cases? Thank you for your attention!
  • 77. Thank you for your attention!