Tradeoffs in the Complexity of Backdoor Detection for Combinatorial Problems

There has been considerable interest in the identification of structural properties of combinatorial problems that lead to efficient algorithms for solving them. Some of these properties are “easily” identifiable, while others such as backdoor sets are of interest because they capture key aspects of state-of-the-art constraint solvers as well as of many real-world problem instances. In particular, it was recently shown that the problem of identifying a strong Hornor 2CNF-backdoor can be solved by exploiting equivalence with deletion backdoors, and is NP-complete. We prove that strong backdoor identification becomes harder than NP (unless NP=coNP) as soon as the inconsequential sounding feature of empty clause detection (present in all modern SAT solvers) is added. More interestingly, in practice such a feature as well as polynomial time constraint propagation mechanisms often lead to much smaller backdoor sets. We show experimentally that instances from real-world domains that have thousands of variables often have backdoors of only a few variables. Our results suggest that structural notions explored for designing efficient algorithms for combinatorial problems should capture both statically and dynamically identifiable properties. We also evaluate the effect of different preprocessors on the structure of the instances and hence on the backdoor size. Finally, we also look into strong backdoors for satisfiable instances and their relationship to solution counting.

[1]  Ashish Sabharwal,et al.  The Impact of Network Topology on Pure Nash Equilibria in Graphical Games , 2007, AAAI.

[2]  Eugene C. Freuder A sufficient condition for backtrack-bounded search , 1985, JACM.

[3]  Thomas Stützle,et al.  SATLIB: An Online Resource for Research on SAT , 2000 .

[4]  Marko Samer,et al.  Constraint satisfaction with bounded treewidth revisited , 2006, J. Comput. Syst. Sci..

[5]  John N. Hooker,et al.  Detecting Embedded Horn Structure in Propositional Logic , 1992, Inf. Process. Lett..

[6]  Meinolf Sellmann,et al.  Streamlined Constraint Reasoning , 2004, CP.

[7]  Lakhdar Sais,et al.  Computing Horn Strong Backdoor Sets Thanks to Local Search , 2006, 2006 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06).

[8]  Naomi Nishimura,et al.  Solving #SAT Using Vertex Covers , 2006, SAT.

[9]  Jörg Hoffmann,et al.  Structure and Problem Hardness: Goal Asymmetry and DPLL Proofs in SAT-Based Planning , 2006, Log. Methods Comput. Sci..

[10]  Stefan Szeider,et al.  Backdoor Sets for DLL Subsolvers , 2005, Journal of Automated Reasoning.

[11]  Eugene C. Freuder A Sufficient Condition for Backtrack-Free Search , 1982, JACM.

[12]  Armin Biere,et al.  Effective Preprocessing in SAT Through Variable and Clause Elimination , 2005, SAT.

[13]  Rina Dechter,et al.  Constraint Processing , 1995, Lecture Notes in Computer Science.

[14]  Bart Selman,et al.  Formal Models of Heavy-Tailed Behavior in Combinatorial Search , 2001, CP.

[15]  Ashish Sabharwal,et al.  Tradeoffs in Backdoors: Inconsistency Detection, Dynamic Simplification, and Preprocessing , 2008, ISAIM.

[16]  Bart Selman,et al.  Heavy-Tailed Phenomena in Satisfiability and Constraint Satisfaction Problems , 2000, Journal of Automated Reasoning.

[17]  Ronen I. Brafman,et al.  A simplifier for propositional formulas with many binary clauses , 2001, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[18]  Bart Selman,et al.  Model Counting: A New Strategy for Obtaining Good Bounds , 2006, AAAI.

[19]  Pascal Van Hentenryck,et al.  An Efficient Arc Consistency Algorithm for a Class of CSP Problems , 1991, IJCAI.

[20]  Joseph C. Culberson,et al.  Camouflaging independent sets in quasi-random graphs , 1993, Cliques, Coloring, and Satisfiability.

[21]  Bart Selman,et al.  Boosting Combinatorial Search Through Randomization , 1998, AAAI/IAAI.

[22]  Hubie Chen,et al.  Beyond Hypertree Width: Decomposition Methods Without Decompositions , 2005, CP.

[23]  Chu Min Li,et al.  Heuristics Based on Unit Propagation for Satisfiability Problems , 1997, IJCAI.

[24]  Bart Selman,et al.  On the connections between backdoors, restarts, and heavy-tailedness in combinatorial search , 2003 .

[25]  Eugene C. Freuder Complexity of K-Tree Structured Constraint Satisfaction Problems , 1990, AAAI.

[26]  Fahiem Bacchus,et al.  Effective Preprocessing with Hyper-Resolution and Equality Reduction , 2003, SAT.

[27]  Ashish Sabharwal,et al.  Tradeoffs in the Complexity of Backdoor Detection , 2007, CP.

[28]  Wolfgang Küchlin,et al.  Formal methods for the validation of automotive product configuration data , 2003, Artificial Intelligence for Engineering Design, Analysis and Manufacturing.

[29]  Bart Selman,et al.  Backdoors To Typical Case Complexity , 2003, IJCAI.

[30]  Naomi Nishimura,et al.  Detecting Backdoor Sets with Respect to Horn and Binary Clauses , 2004, SAT.

[31]  Inês Lynce,et al.  Hidden structure in unsatisfiable random 3-SAT: an empirical study , 2004, 16th IEEE International Conference on Tools with Artificial Intelligence.

[32]  Toby Walsh,et al.  Backbones and Backdoors in Satisfiability , 2005, AAAI.

[33]  Rina Dechter,et al.  Network-based heuristics for constraint satisfaction problems , 1988 .

[34]  Peter van Beek,et al.  On the minimality and global consistency of row-convex constraint networks , 1995, JACM.