From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets

Identifying and exploiting hidden problem structures is recognized as a fundamental way to deal with the intractability of combinatorial problems. Recently, a particular structure called (strong) backdoor has been identified in the context of the satisfiability problem. Connections has been established between backdoors and problem hardness leading to a better approximation of the worst case time complexity. Strong backdoor sets can be computed for any tractable class. In [1], a method for the approximation of strong backdoor sets for the Horn-Sat fragment was proposed. This approximation is realized in two steps. First, the best Horn renaming of the original CNF formula, in term of number of clauses, is computed. Then a Horn strong backdoor set is extracted from the non Horn part of the renamed formula. in this article, we propose computing Horn strong backdoor sets using the same scheme but minimizing the number of positive literals in the non Horn part of the renamed formula instead of minimizing the number of non Horn clauses. Then we extend this method to the class of ordered formulas [2] which is an extension of the Horn class. This method insure to obtain ordered strong backdoor sets of size less or equal than the size of Horn strong backdoor sets (never greater). Experimental results show that these new methods allow to reduce the size of strong backdoor sets on several instances and that their exploitation also allow to enhance the efficiency of satisfiability solvers.

[1]  Toby Walsh,et al.  Backbones and Backdoors in Satisfiability , 2005, AAAI.

[2]  Inês Lynce,et al.  Hidden structure in unsatisfiable random 3-SAT: an empirical study , 2004, 16th IEEE International Conference on Tools with Artificial Intelligence.

[3]  Lakhdar Sais,et al.  Computing Horn Strong Backdoor Sets Thanks to Local Search , 2006, 2006 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06).

[4]  Lakhdar Sais,et al.  Tabu Search for SAT , 1997, AAAI/IAAI.

[5]  Bart Selman,et al.  An Empirical Study of Greedy Local Search for Satisfiability Testing , 1993, AAAI.

[6]  Chu Min Li,et al.  Integrating Equivalency Reasoning into Davis-Putnam Procedure , 2000, AAAI/IAAI.

[7]  Howard Williams,et al.  Key Technologies for Data Management , 2004, Lecture Notes in Computer Science.

[8]  Donald W. Loveland,et al.  A machine program for theorem-proving , 2011, CACM.

[9]  Lakhdar Sais,et al.  Automatic Extraction of Functional Dependencies , 2004, SAT.

[10]  Gilles Dequen,et al.  A backbone-search heuristic for efficient solving of hard 3-SAT formulae , 2001, IJCAI.

[11]  Bart Selman,et al.  Backdoors To Typical Case Complexity , 2003, IJCAI.

[12]  Bart Selman,et al.  On the connections between backdoors, restarts, and heavy-tailedness in combinatorial search , 2003 .

[13]  Hans van Maaren,et al.  Correlations between Horn fractions, satisfiability and solver performance for fixed density random 3-CNF instances , 2005, Annals of Mathematics and Artificial Intelligence.