Tradeoffs in Backdoors: Inconsistency Detection, Dynamic Simplification, and Preprocessing
نویسندگان
چکیده
There has been considerable interest in the identification of structural properties of combinatorial problems that lead to efficient algorithms for solving them. The notion of backdoors captures hidden structure exploited by state-of-the-art constraint solvers. We prove that strong backdoor identification with respect to the tractable classes Horn and 2CNF becomes harder than NP (unless NP=coNP) as soon as the inconsequential sounding feature of empty clause detection (present in all modern SAT solvers) is added. More interestingly, in practice such a feature as well as polynomial time constraint propagation mechanisms often lead to much smaller backdoor sets. We show experimentally that instances from real-world domains such as car configuration and logistics that have thousands of variables often have backdoors of only a few variables. We evaluate the effect of different preprocessors on the structure of the instances and hence on the backdoor size. Finally, strong backdoors have been mostly studied for unsatisfiable instances. In this work, we also look into strong backdoors of satisfiable instances and their relationship to solution counting.
منابع مشابه
Variable-Deletion Backdoors to Planning
Backdoors are a powerful tool to obtain efficient algorithms for hard problems. Recently, two new notions of backdoors to planning were introduced. However, for one of the new notions (i.e., variable-deletion) only hardness results are known so far. In this work we improve the situation by defining a new type of variabledeletion backdoors based on the extended causal graph of a planning instanc...
متن کاملTradeoffs in the Complexity of Backdoor Detection
There has been considerable interest in the identification of structural properties of combinatorial problems that lead to efficient algorithms for solving them. Some of these properties are “easily” identifiable, while others are of interest because they capture key aspects of state-of-the-art constraint solvers. In particular, it was recently shown that the problem of identifying a strong Hor...
متن کاملDetecting and Guarding against Kernel Backdoors through Packet Flow Differentials
In this paper, we present a novel technique to detect and defeat kernel backdoors which cannot be identified by conventional security solutions. We focus on the fact that since the packet flows of common network applications go up and down through the whole network subsystem but kernel backdoors utilize only the lower layers of the subsystem, we can detect kernel backdoors by employing two host...
متن کاملFrequency Domain Model Simplification of Cumulative Mass Fraction in CMSMPR Crystallizer
In this contribution, linearized dynamic model of Cumulative Mass Fraction (CMF) of Potassium Nitrate-Water Seeded Continues Mixed Suspension Mixed Product Removal (CMSMPR) crystallizer is approximated by a simplified model in frequency domain. Frequency domain model simplification is performed heuristically using the frequency response of the derived linearized models data. However, the CM...
متن کاملBackdoors to Planning
Backdoors measure the distance to tractable fragments and have become an important tool to find fixed-parameter tractable (fpt) algorithms. Despite their success, backdoors have not been used for planning, a central problem in AI that has a high computational complexity. In this work, we introduce two notions of backdoors building upon the causal graph. We analyze the complexity of finding a sm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008