Different Classes of Graphs to Represent Microstructures for CSPs

نویسندگان

  • Achref El Mouelhi
  • Philippe Jégou
  • Cyril Terrioux
چکیده

The CSP formalism has shown, for many years, its interest for the representation of numerous kinds of problems, and also often provide effective resolution methods in practice. This formalism has also provided a useful framework for the knowledge representation as well as to implement efficient methods for reasoning about knowledge. The data of a CSP are usually expressed in terms of a constraint network. This network is a (constraints) graph when the arity of the constraints is equal to two (binary constraints), or a (constraint) hypergraph in the case of constraints of arbitrary arity, which is generally the case for problems of real life. The study of the structural properties of these networks has made it possible to highlight certain properties, which led to the definition of new tractable classes, but in most cases, they have been defined for the restricted case of binary constraints. So, several representations by graphs have been proposed for the study of constraint hypergraphs to extend the known results to the binary case. Another approach, finer, is interested in the study of the microstructure of CSP, which is defined by graphs. This helped, offering a new theoretical framework to propose other tractable classes. In this paper, we propose to extend the notion of microstructure to any type of CSP. For this, we propose three kinds of graphs that can take into account the constraints of arbitrary arity. We show how these new theoretical tools can already provide a framework for developing new tractable classes for CSPs. We think that these new representations should be of interest for the community, firstly for the generalization of existing results, but also to obtain original results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Microstructures for CSPs with Constraints of Arbitrary Arity

Many works have studied the properties of CSPs which are based on the structures of constraint networks, or based on the features of compatibility relations. Studies on structures rely generally on properties of graphs for binary CSPs and on properties of hypergraphs for the general case, that is CSPs with constraints of arbitrary arity. In the second case, using the dual representation of hype...

متن کامل

ON NEW CLASSES OF MULTICONE GRAPHS DETERMINED BY THEIR SPECTRUMS

A multicone graph is defined to be join of a clique and a regular graph. A graph $ G $ is cospectral with graph $ H $ if their adjacency matrices have the same eigenvalues. A graph $ G $ is said to be determined by its spectrum or DS for short, if for any graph $ H $ with $ Spec(G)=Spec(H)$, we conclude that $ G $ is isomorphic to $ H $. In this paper, we present new classes of multicone graphs...

متن کامل

An Integer Programming Model and a Tabu Search Algorithm to Generate α-labeling of Special Classes of Quadratic Graphs

First, an integer programming model is proposed to find an α-labeling for quadratic graphs. Then, a Tabu search algorithm is developed to solve large scale problems. The proposed approach can generate α-labeling for special classes of quadratic graphs, not previously reported in the literature. Then, the main theorem of the paper is presented. We show how a problem in graph theory c...

متن کامل

Characterizing Arithmetic Circuit Classes by Constraint Satisfaction Problems

We explore the expressivity of constraint satisfaction problems (CSPs) in the arithmetic circuit model. While CSPs are known to yield VNP-complete polynomials in the general case, we show that for different restrictions of the structure of the CSPs we get characterizations of different arithmetic circuit classes. In particular we give the first natural non-circuit characterization of VP, the cl...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013