86
Introduction Backdoors General Results Conclusions Backdoors for SAT Marco Gario EMCL / TUD June 27, 2011 Marco Gario Backdoors 1 / 44

Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Backdoors for SAT

Marco Gario

EMCL / TUD

June 27, 2011

Marco Gario Backdoors 1 / 44

Page 2: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Backdoors in a nutshell

What?

Given a combinatorial problem, we call backdoor variables set(backdoors set) a set of variables that, once decided, make the restof the problem “easy” to solve.

Why?

Backdoors have been introduced by Williams et al. ([12]) to try toexplain the good performances of modern SAT solvers.

Marco Gario Backdoors 2 / 44

Page 3: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Content

1 IntroductionNotationClasses and Subsolvers

2 BackdoorsStrong, Weak, DeletionExtensions: Learning-Sensitive, Trees

3 General ResultsComplexity HighlightsExperimental results

4 Conclusions

Marco Gario Backdoors 3 / 44

Page 4: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Outline

1 IntroductionNotationClasses and Subsolvers

2 BackdoorsStrong, Weak, DeletionExtensions: Learning-Sensitive, Trees

3 General ResultsComplexity HighlightsExperimental results

4 Conclusions

Marco Gario Backdoors 4 / 44

Page 5: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Notation (1/2)

We refresh the usual notation:

F : Formula (possibly in CNF)

var(F ) : the set of variables appearing in F .

v , v : a variable v or its negation v

J : (partial) interpretation. (Partial) mapping from var(F ) tothe boolean values {>,⊥}. We represent an interpretationcompactly by listing the literals in it. Eg. J = {x1, x3}F |J : reduct of F w.r.t. the (partial) interpretation J; it isobtained by replacing each variable v in F with J(v).

Marco Gario Backdoors 5 / 44

Page 6: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Notation (2/2)

Definition

Given a CNF formula F and a set of variables V ′ ⊆ var(F ) wedenote with F − V ′ the formula obtained from F by removing allthe occurrences of the variables in V ′ from F .

Example

Given a CNF formula F and V = {e} we obtain:

F − {e} =a ∧ ¬b ∧ (d ∨ �e) ∧ (��¬e ∨ ¬d) =

=a ∧ ¬b ∧ d ∧ ¬d

Marco Gario Backdoors 6 / 44

Page 7: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Outline

1 IntroductionNotationClasses and Subsolvers

2 BackdoorsStrong, Weak, DeletionExtensions: Learning-Sensitive, Trees

3 General ResultsComplexity HighlightsExperimental results

4 Conclusions

Marco Gario Backdoors 7 / 44

Page 8: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Class

We call class a set of formulas that share some property.Well-known classes of SAT problems are:

2SAT:For F in CNF: F ∈ 2SAT iff each clause of F has atmost two literals

Horn:For F in CNF: F ∈ Horn iff each clause of F has at mostone positive literal

Renamable Horn (RHorn)

Unit Propagation and Pure Literal (UP+PL)

Marco Gario Backdoors 8 / 44

Page 9: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Class

We call class a set of formulas that share some property.Well-known classes of SAT problems are:

2SAT:For F in CNF: F ∈ 2SAT iff each clause of F has atmost two literals

Horn:For F in CNF: F ∈ Horn iff each clause of F has at mostone positive literal

Renamable Horn (RHorn)

Unit Propagation and Pure Literal (UP+PL)

Marco Gario Backdoors 8 / 44

Page 10: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Renamable Horn (RHorn)

Definition: Variable flipping

We call a variable flipping for the variable x ∈ var(F ), thesubstitution of all occurences of x in F with ¬x and, similarly, ofall ¬x with x .

For F CNF formula: F ∈ RHorn iff there exists a set ofvariables that, once flipped, make the formula in Horn.

Example

Fb = (x1 ∨ x3) ∧ (¬x2 ∨ ¬x1) ∧ (¬x3 ∨ x2)

Fb 6∈ Horn but Fb ∈ RHorn because of the flipping {x1}:

(¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2)

Marco Gario Backdoors 9 / 44

Page 11: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Unit Propagation and Pure Literal (UP+PL)

For F CNF formula: F ∈ UP + PL iff it can be solved byapplying only unit propagation and pure literal elimination toF

Example

Fc =x1 ∧ (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧ (x3 ∨ x4)

Marco Gario Backdoors 10 / 44

Page 12: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Unit Propagation and Pure Literal (UP+PL)

For F CNF formula: F ∈ UP + PL iff it can be solved byapplying only unit propagation and pure literal elimination toF

Example

Fc =x1 ∧ (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧ (x3 ∨ x4)

Fc |{x4} =x1 ∧ (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧�����(x3 ∨ x4)

Marco Gario Backdoors 10 / 44

Page 13: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Unit Propagation and Pure Literal (UP+PL)

For F CNF formula: F ∈ UP + PL iff it can be solved byapplying only unit propagation and pure literal elimination toF

Example

Fc =x1 ∧ (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧ (x3 ∨ x4)

Fc |{x4} =x1 ∧ (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧�����(x3 ∨ x4)

Fc |{x4,x1} =��x1 ∧ (��¬x1 ∨ x3) ∧�����(¬x2 ∨ x1) ∧ (¬x3 ∨ x2)

=x3 ∧ (¬x3 ∨ x2)

Marco Gario Backdoors 10 / 44

Page 14: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Unit Propagation and Pure Literal (UP+PL)

For F CNF formula: F ∈ UP + PL iff it can be solved byapplying only unit propagation and pure literal elimination toF

Example

Fc =x1 ∧ (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧ (x3 ∨ x4)

Fc |{x4} =x1 ∧ (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧�����(x3 ∨ x4)

Fc |{x4,x1} =��x1 ∧ (��¬x1 ∨ x3) ∧�����(¬x2 ∨ x1) ∧ (¬x3 ∨ x2)

=x3 ∧ (¬x3 ∨ x2)

Fc |{x4,x1,x3} =��x3 ∧ (��¬x3 ∨ x2) = x2

Fc |{x4,x1,x3,x2} =>

Marco Gario Backdoors 10 / 44

Page 15: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Class properties (1/2)

Definition: Clause Induced

A class C is said to be clause induced whenever a formula belongsto the class iff each of its clauses (viewed as a formula) belongs tothe class; i.e. F ∈ C ↔ ∀Gi ∈ F .Gi ∈ C

A weaker property is being closed under clause removal:

Definition: Closed under clause removal

A class C is closed under clause removal if for all formulas in theclass, it holds that each subset of the clauses (when treated as aformula) belongs to the class; i.e. ∀F ∈ C, ∀F ′ ⊆ F it holds thatF ′ ∈ C

Marco Gario Backdoors 11 / 44

Page 16: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Class properties (2/2)

Example

Horn and 2SAT are both closed under clause removal and clauseinduced :

Fa = (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2)

Fa ∈ Horn and ∀F ′ ⊆ F ∈ Horn.Fa ∈ 2SAT and ∀F ′ ⊆ F ∈ 2SAT .

G1 = Fa

G2 = (¬x1 ∨ ¬x3)

G = G1 ∧ G2 = (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧ (¬x1 ∨ ¬x3)

G2 ∈ Horn, G ∈ Horn. G2 ∈ 2SAT , G ∈ 2SAT .

Marco Gario Backdoors 12 / 44

Page 17: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Class properties (2/2)

Example

Horn and 2SAT are both closed under clause removal and clauseinduced :

Fa = (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2)

Fa ∈ Horn and ∀F ′ ⊆ F ∈ Horn.Fa ∈ 2SAT and ∀F ′ ⊆ F ∈ 2SAT .

G1 = Fa

G2 = (¬x1 ∨ ¬x3)

G = G1 ∧ G2 = (¬x1 ∨ x3) ∧ (¬x2 ∨ x1) ∧ (¬x3 ∨ x2) ∧ (¬x1 ∨ ¬x3)

G2 ∈ Horn, G ∈ Horn. G2 ∈ 2SAT , G ∈ 2SAT .

Marco Gario Backdoors 12 / 44

Page 18: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Class properties (2/2)

Example

RHorn is only closed under clause removal but not clause induced :

Fb = (x1 ∨ x3) ∧ (¬x2 ∨ ¬x1) ∧ (¬x3 ∨ x2)

Fb ∈ RHorn for the flipping {x1} and ∀F ′ ⊆ F ∈ RHorn for thesame flipping.

G1 = Fb

G2 = (¬x1 ∨ x3)

G = G1 ∧ G2 = (x1 ∨ x3) ∧ (¬x2 ∨ ¬x1) ∧ (¬x3 ∨ x2) ∧ (¬x1 ∨ x3)

G 6∈ RHorn.

Marco Gario Backdoors 12 / 44

Page 19: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Class properties (2/2)

Example

RHorn is only closed under clause removal but not clause induced :

Fb = (x1 ∨ x3) ∧ (¬x2 ∨ ¬x1) ∧ (¬x3 ∨ x2)

Fb ∈ RHorn for the flipping {x1} and ∀F ′ ⊆ F ∈ RHorn for thesame flipping.

G1 = Fb

G2 = (¬x1 ∨ x3)

G = G1 ∧ G2 = (x1 ∨ x3) ∧ (¬x2 ∨ ¬x1) ∧ (¬x3 ∨ x2) ∧ (¬x1 ∨ x3)

G 6∈ RHorn.

Marco Gario Backdoors 12 / 44

Page 20: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Notational Disclaimer

Disclaimer

Some authors (eg. Szeider, Nishimura, Samer and Kottler) use“clause induced” to indicate what we call “closed under clauseremoval.”

Marco Gario Backdoors 13 / 44

Page 21: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Subsolvers (1/2)

We are interested in classes for which there is a “good” solvingalgorithm:

Definition: Subsolver [12]

We call an algorithm C a subsolver if, given an input formula F :

Tricotomy: C either rejects the input F , or “determines” F correctly(as unsatisfiable or satisfiable, returning a solution ifsatisfiable),

Efficiency: C runs in polynomial time,

Trivial solvability: C can determine if F is trivially true (has noconstraints) or trivially false (has contradictory constraint),

Self-reducibility: if C determines F , then for any assignment v of thevariable x C determines F |{x 7→v}

Marco Gario Backdoors 14 / 44

Page 22: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Subsolvers (1/2)

We are interested in classes for which there is a “good” solvingalgorithm:

Definition: Subsolver [12]

We call an algorithm C a subsolver if, given an input formula F :

Tricotomy: C either rejects the input F , or “determines” F correctly(as unsatisfiable or satisfiable, returning a solution ifsatisfiable), Weakening this axiom we obtain heuristicbackdoors [9]

Efficiency: C runs in polynomial time,

Trivial solvability: C can determine if F is trivially true (has noconstraints) or trivially false (has contradictory constraint),

Self-reducibility: if C determines F , then for any assignment v of thevariable x C determines F |{x 7→v}

Marco Gario Backdoors 14 / 44

Page 23: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Subsolvers (1/2)

We are interested in classes for which there is a “good” solvingalgorithm:

Definition: Subsolver [12]

We call an algorithm C a subsolver if, given an input formula F :

Tricotomy: C either rejects the input F , or “determines” F correctly(as unsatisfiable or satisfiable, returning a solution ifsatisfiable),

Efficiency: C runs in polynomial time, Removing this axiom weobtain pseudo backdoors [9]

Trivial solvability: C can determine if F is trivially true (has noconstraints) or trivially false (has contradictory constraint),

Self-reducibility: if C determines F , then for any assignment v of thevariable x C determines F |{x 7→v}

Marco Gario Backdoors 14 / 44

Page 24: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Subsolvers (2/2)

There exists a subsolver for: 2SAT, Horn, RHorn and UP+PL

In the following we do not distinguish between subsolver C andrelated class C.

Marco Gario Backdoors 15 / 44

Page 25: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

NotationClasses and Subsolvers

Subsolvers (2/2)

There exists a subsolver for: 2SAT, Horn, RHorn and UP+PL

In the following we do not distinguish between subsolver C andrelated class C.

Marco Gario Backdoors 15 / 44

Page 26: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Outline

1 IntroductionNotationClasses and Subsolvers

2 BackdoorsStrong, Weak, DeletionExtensions: Learning-Sensitive, Trees

3 General ResultsComplexity HighlightsExperimental results

4 Conclusions

Marco Gario Backdoors 16 / 44

Page 27: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (1/3)

Definition: Strong C-Backdoor

A non-empty subset B of the variables of the formula F(B ⊆ var(F )) is a strong backdoor w.r.t. the subsolver C for F ifffor all interpretations J : B → {>,⊥}, C returns a satisfyingassignment or concludes unsatisfiability of F |J .

If a formula F is satisfiable, we can define a simpler type ofbackdoor:

Definition: Weak C-Backdoor

A non-empty subset B of the variables of the formula F(B ⊆ var(F )) is a weak backdoor w.r.t. the subsolver C for F iffthere exists a interpretation J : B → {>,⊥} such that C returnsa satisfying assignment of F |J .

Marco Gario Backdoors 17 / 44

Page 28: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (2/3)

Example

Lets consider the satisfiable formula F0:

F0 = (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x4 ∨ x1) ∧ (¬x1 ∨ x6) ∧(¬x1 ∨ ¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6 ∨ x2)

B = {x1, x2} is a strong 2SAT-backdoor and therefore, since F0 issatisfiable, it is also a weak 2SAT-backdoor:J0 = {x1, x2}, J1 = {x1, x̄2}, J2 = {x̄1, x2} and J3 = {x̄1, x̄2}.

Marco Gario Backdoors 18 / 44

Page 29: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (2/3)

Example

Lets consider the satisfiable formula F0:

F0 = (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x4 ∨ x1) ∧ (¬x1 ∨ x6) ∧(¬x1 ∨ ¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6 ∨ x2)

B = {x1, x2} is a strong 2SAT-backdoor and therefore, since F0 issatisfiable, it is also a weak 2SAT-backdoor:J0 = {x1, x2}, J1 = {x1, x̄2}, J2 = {x̄1, x2} and J3 = {x̄1, x̄2}.

Marco Gario Backdoors 18 / 44

Page 30: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (2/3)

Example

Lets consider the satisfiable formula F0:

F0 = (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x4 ∨ x1) ∧ (¬x1 ∨ x6) ∧(¬x1 ∨ ¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6 ∨ x2)

B = {x1, x2} is a strong 2SAT-backdoor and therefore, since F0 issatisfiable, it is also a weak 2SAT-backdoor:J0 = {x1, x2}, J1 = {x1, x̄2}, J2 = {x̄1, x2} and J3 = {x̄1, x̄2}.

F0|J0 = x3 ∧ x6 ∧ (¬x6 ∨ x5) ∧ (¬x5 ∨ x4)

Marco Gario Backdoors 18 / 44

Page 31: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (2/3)

Example

Lets consider the satisfiable formula F0:

F0 = (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x4 ∨ x1) ∧ (¬x1 ∨ x6) ∧(¬x1 ∨ ¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6 ∨ x2)

B = {x1, x2} is a strong 2SAT-backdoor and therefore, since F0 issatisfiable, it is also a weak 2SAT-backdoor:J0 = {x1, x2}, J1 = {x1, x̄2}, J2 = {x̄1, x2} and J3 = {x̄1, x̄2}.

F0|J1 = x6 ∧ (¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6)

Marco Gario Backdoors 18 / 44

Page 32: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (2/3)

Example

Lets consider the satisfiable formula F0:

F0 = (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x4 ∨ x1) ∧ (¬x1 ∨ x6) ∧(¬x1 ∨ ¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6 ∨ x2)

B = {x1, x2} is a strong 2SAT-backdoor and therefore, since F0 issatisfiable, it is also a weak 2SAT-backdoor:J0 = {x1, x2}, J1 = {x1, x̄2}, J2 = {x̄1, x2} and J3 = {x̄1, x̄2}.

F0|J2 = x3 ∧ (¬x3 ∨ ¬x4) ∧ (¬x5 ∨ x4)

Marco Gario Backdoors 18 / 44

Page 33: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (2/3)

Example

Lets consider the satisfiable formula F0:

F0 = (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x4 ∨ x1) ∧ (¬x1 ∨ x6) ∧(¬x1 ∨ ¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6 ∨ x2)

B = {x1, x2} is a strong 2SAT-backdoor and therefore, since F0 issatisfiable, it is also a weak 2SAT-backdoor:J0 = {x1, x2}, J1 = {x1, x̄2}, J2 = {x̄1, x2} and J3 = {x̄1, x̄2}.

F0|J3 = (¬x3 ∨ ¬x4) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6)

Marco Gario Backdoors 18 / 44

Page 34: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (3/3)

For a given formula F we define:

Definition: Minimal backdoor

A strong (resp. weak) C -backdoor B is called minimal iff there isno proper subset of B that is a strong (weak) C-backdoor, i.e.∀B ′ ⊂ B, B ′ is not a strong (weak) C-backdoor.

Eg. The set of all variables of a SAT problem is a backdoor (forany subsolver) but, most likely, it is not minimal.

Definition: Smallest backdoor

A strong (resp. weak) C -backdoor B is called smallest iff it isminimal and |B| ≤ |B ′| for any minimal C -backdoor B ′

Note: There can be more than one smallest C-backdoor for thesame formula F !

Marco Gario Backdoors 19 / 44

Page 35: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Strong/Weak Backdoors (3/3)

For a given formula F we define:

Definition: Minimal backdoor

A strong (resp. weak) C -backdoor B is called minimal iff there isno proper subset of B that is a strong (weak) C-backdoor, i.e.∀B ′ ⊂ B, B ′ is not a strong (weak) C-backdoor.

Eg. The set of all variables of a SAT problem is a backdoor (forany subsolver) but, most likely, it is not minimal.

Definition: Smallest backdoor

A strong (resp. weak) C -backdoor B is called smallest iff it isminimal and |B| ≤ |B ′| for any minimal C -backdoor B ′

Note: There can be more than one smallest C-backdoor for thesame formula F !

Marco Gario Backdoors 19 / 44

Page 36: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Deletion (1/2)

Definition: Deletion C-backdoor [6]

A non-empty subset B of the variables of the formula F(B ⊆ var(F )) is a deletion backdoor w.r.t. a class C for F iffF − B ∈ C.

Example

F0 6∈ 2SAT :

F0 = (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x4 ∨ x1) ∧ (¬x1 ∨ x6) ∧(¬x1 ∨ ¬x6 ∨ x5) ∧ (¬x5 ∨ x4) ∧ (¬x5 ∨ ¬x6 ∨ x2)

but F0 − {x1, x2} ∈ 2SAT . Recall from a previous example thatB = {x1, x2} is a strong 2SAT-backdoor for F0

Marco Gario Backdoors 20 / 44

Page 37: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Deletion (2/2)

The following properties make deletion backdoors interesting:

Property ([6])

If the class C is closed under clause removal then every deletionC -backdoor is also a strong C -backdoor (deletion → strong)

Property ([2])

If the class C is clause induced (eg. 2SAT or Horn) then strongC -backdoor and deletion C -backdoor are equivalent (deletion ↔strong).

Given F and |B| = k we need to perform only 1 test (F − B ∈ C)instead of 2k !

Marco Gario Backdoors 21 / 44

Page 38: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Outline

1 IntroductionNotationClasses and Subsolvers

2 BackdoorsStrong, Weak, DeletionExtensions: Learning-Sensitive, Trees

3 General ResultsComplexity HighlightsExperimental results

4 Conclusions

Marco Gario Backdoors 22 / 44

Page 39: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (1/4)

Definition: Search tree exploration

Given a formula F , we call search tree exploration an ordered listof literals (l1, .., ln) such that li ∈ {vi , v̄i} with vi ∈ var(F ).

Example

Lets consider the search tree exploration (x1, x2, x̄3, x̄1, x3) for thefollowing formula:

F = (¬x1 ∨ x2) ∧ (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x1)

the search algorithm traversed the search space as follows:

Marco Gario Backdoors 23 / 44

Page 40: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (1/4)

Definition: Search tree exploration

Given a formula F , we call search tree exploration an ordered listof literals (l1, .., ln) such that li ∈ {vi , v̄i} with vi ∈ var(F ).

Example

Lets consider the search tree exploration (x1, x2, x̄3, x̄1, x3) for thefollowing formula:

F = (¬x1 ∨ x2) ∧ (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x1)

the search algorithm traversed the search space as follows:

F |{x1} =x2 ∧ (¬x2 ∨ x3) ∧ ¬x3

Marco Gario Backdoors 23 / 44

Page 41: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (1/4)

Definition: Search tree exploration

Given a formula F , we call search tree exploration an ordered listof literals (l1, .., ln) such that li ∈ {vi , v̄i} with vi ∈ var(F ).

Example

Lets consider the search tree exploration (x1, x2, x̄3, x̄1, x3) for thefollowing formula:

F = (¬x1 ∨ x2) ∧ (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x1)

the search algorithm traversed the search space as follows:

F |{x1,x2} =(x3) ∧ (¬x3)

Marco Gario Backdoors 23 / 44

Page 42: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (1/4)

Definition: Search tree exploration

Given a formula F , we call search tree exploration an ordered listof literals (l1, .., ln) such that li ∈ {vi , v̄i} with vi ∈ var(F ).

Example

Lets consider the search tree exploration (x1, x2, x̄3, x̄1, x3) for thefollowing formula:

F = (¬x1 ∨ x2) ∧ (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x1)

the search algorithm traversed the search space as follows:

F |{x1,x2,x̄3} =⊥

Marco Gario Backdoors 23 / 44

Page 43: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (1/4)

Definition: Search tree exploration

Given a formula F , we call search tree exploration an ordered listof literals (l1, .., ln) such that li ∈ {vi , v̄i} with vi ∈ var(F ).

Example

Lets consider the search tree exploration (x1, x2, x̄3, x̄1, x3) for thefollowing formula:

F = (¬x1 ∨ x2) ∧ (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x1)

the search algorithm traversed the search space as follows:

F |{x̄1} =(¬x2 ∨ x3)

Marco Gario Backdoors 23 / 44

Page 44: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (1/4)

Definition: Search tree exploration

Given a formula F , we call search tree exploration an ordered listof literals (l1, .., ln) such that li ∈ {vi , v̄i} with vi ∈ var(F ).

Example

Lets consider the search tree exploration (x1, x2, x̄3, x̄1, x3) for thefollowing formula:

F = (¬x1 ∨ x2) ∧ (¬x2 ∨ x3) ∧ (¬x3 ∨ ¬x1)

the search algorithm traversed the search space as follows:

F |{x̄1,x3} =>

Marco Gario Backdoors 23 / 44

Page 45: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (2/4)

How does clause learning influence backdoors?

Definition: Learning-sensitive backdoors [3]

A non-empty subset of variables B of the formula F is alearning-sensitive C -backdoor for F iff there exists a search treeexploration such that a clause learning SAT solver branching onlyon the variables in B, in this order and with C as subsolver atevery leaf of the search tree, either finds a satisfying assignment orproves F unsatisfiable.

Marco Gario Backdoors 24 / 44

Page 46: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1 =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Claim: B = {x} is a learning-sensitive UP+PL-backdoor for F1 forthe search tree exploration (x̄ , p1, p2, q, a, b, x , q̄, r , a, b).

Marco Gario Backdoors 25 / 44

Page 47: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1 =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Claim: B = {x} is a learning-sensitive UP+PL-backdoor for F1 forthe search tree exploration (x̄ , p1, p2, q, a, b, x , q̄, r , a, b).

F1|{x̄} =p1 ∧ p2 ∧ (¬p1 ∨ ¬p2 ∨ q) ∧ (¬q ∨ a)∧(¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Marco Gario Backdoors 25 / 44

Page 48: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1 =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Claim: B = {x} is a learning-sensitive UP+PL-backdoor for F1 forthe search tree exploration (x̄ , p1, p2, q, a, b, x , q̄, r , a, b).

F1|{x̄ ,p1,p2} = q∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Marco Gario Backdoors 25 / 44

Page 49: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1 =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Claim: B = {x} is a learning-sensitive UP+PL-backdoor for F1 forthe search tree exploration (x̄ , p1, p2, q, a, b, x , q̄, r , a, b).

F1|{x̄ ,p1,p2,q,a} = b ∧ ¬b ∧ (¬r ∨ b) ∧ (¬r ∨ ¬b)

Marco Gario Backdoors 25 / 44

Page 50: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1′ =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧

(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

∧ ¬q

Claim: B = {x} is a learning-sensitive UP+PL-backdoor for F1 forthe search tree exploration (x̄ , p1, p2, q, a, b, x , q̄, r , a, b).Conflict: 1-UIP learning scheme gives us the clause ¬q

Marco Gario Backdoors 25 / 44

Page 51: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1 =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

∧ ¬q

Claim: B = {x} is a learning-sensitive UP+PL-backdoor for F1 forthe search tree exploration (x̄ , p1, p2, q, a, b, x , q̄, r , a, b).

F1|{q̄,x} =(¬p1 ∨ ¬p2) ∧ r ∧ (¬r ∨ a)∧(¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Marco Gario Backdoors 25 / 44

Page 52: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1′ =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧

(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

∧ ¬q

Claim: B = {x} is a learning-sensitive UP+PL-backdoor for F1 forthe search tree exploration (x̄ , p1, p2, q, a, b, x , q̄, r , a, b).

F1|{q̄,x ,r ,a} =(¬p1 ∨ ¬p2)∧b ∧ ¬b

Marco Gario Backdoors 25 / 44

Page 53: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1 =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

The tree search exploration is important, since B = {x} isnot a UP+PL-backdoor if we consider x before x̄ :

F1|{x} =(¬p1 ∨ ¬p2 ∨ q) ∧ (¬q ∨ a)∧(¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(∨q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

Marco Gario Backdoors 25 / 44

Page 54: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (3/4)

Example

F1 =(x ∨ p1) ∧ (x ∨ p2) ∧ (¬p1 ∨ ¬p2 ∨ q)∧(¬q ∨ a) ∧ (¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(¬x ∨ q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

F1|{x ,p̄1} =(¬q ∨ a)∧(¬q ∨ ¬a ∨ b) ∧ (¬q ∨ ¬a ∨ ¬b)∧(∨q ∨ r) ∧ (¬r ∨ a) ∧ (¬r ∨ ¬a ∨ b) ∧ (¬r ∨ ¬a ∨ ¬b)

at this point UP+PL is not enough to decide the formula.

Marco Gario Backdoors 25 / 44

Page 55: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Learning-sensitive (4/4)

Why are learning-sensitive backdoors interesting?

Property ([3])

There are SAT instances for which the smallest learning-sensitiveUP-backdoors are smaller than the smallest strong UP-backdoor(even exponentially if the instance is unsat)

Property ([3])

There are unsatisfiable SAT instances for which one value-orderingof the variables can lead to exponentially smaller learning-sensitiveUP-backdoor than a different value ordering

Marco Gario Backdoors 26 / 44

Page 56: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Trees (1/3)

Definition: Decision Tree

A binary decision tree is a rooted binary tree T , such that everynode in T is either a leaf or has exactly 2 children. The nodes ofT , except for the root, are labeled with literals s.t. the followingconditions are satisfied:

two nodes vi and vj with the same father are labeled withcomplementary literals x and x̄ ;

the labels of the node on a path from the root to a leaf donot contain the same literal twice nor a complementary pair ofliterals.

We call Jv the partial interpretation expressed by the path thatlinks the root to the node v , and var(T ) the set of variablesappearing in T .

Marco Gario Backdoors 27 / 44

Page 57: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Trees (2/3)

Definition: Backdoor Tree

A binary decision tree T (with var(T ) ⊆ var(F )) is a C-backdoortree of F if F |Jv ∈ C for every leaf v of T .

Backdoor trees are interesting because of the following property:

Property ([10])

If B is a smallest strong C-backdoor for F and T is a smallestC-backdoor tree of F , then:

|B|+ 1 ≤ |T | ≤ 2|B|

where |T | is the number of leaves of T .

Marco Gario Backdoors 28 / 44

Page 58: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Trees (3/3)

Example

F1 = (x ∨ p1) ∧ (x ∨ p2) ∧ (¬x ∨ q ∨ r) ∧ H

B1 = {x , q} is a strong Horn-backdoor for F1, but neither {x} nor{q} are. The Horn-backdoor tree for F1 looks like:

v2: x̄ v3: x

v4:q̄ v5:q

Marco Gario Backdoors 29 / 44

Page 59: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Trees (3/3)

Example

F1 = (x ∨ p1) ∧ (x ∨ p2) ∧ (¬x ∨ q ∨ r) ∧ H

B1 = {x , q} is a strong Horn-backdoor for F1, but neither {x} nor{q} are. The Horn-backdoor tree for F1 looks like:

v2: x̄ v3: x

v4:q̄ v5:q

In particular, we note that there are 3 leaf nodes (v2,v4,v5) andtherefore 3 partial interpretations that lead to a Horn formula:Jv2 = {x̄}, Jv4 = {x , q̄} and Jv5 = {x , q}.

Marco Gario Backdoors 29 / 44

Page 60: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Trees (3/3)

Example

F1 = (x ∨ p1) ∧ (x ∨ p2) ∧ (¬x ∨ q ∨ r) ∧ H

B1 = {x , q} is a strong Horn-backdoor for F1, but neither {x} nor{q} are. The Horn-backdoor tree for F1 looks like:

v2: x̄ v3: x

v4:q̄ v5:q

Without using the concept of backdoor trees, we would end uptesting more assignments, in this case 2|B| = 4.

Marco Gario Backdoors 29 / 44

Page 61: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Strong, Weak, DeletionExtensions: Learning-Sensitive, Trees

Trees (3/3)

Example

F1 = (x ∨ p1) ∧ (x ∨ p2) ∧ (¬x ∨ q ∨ r) ∧ H

B1 = {x , q} is a strong Horn-backdoor for F1, but neither {x} nor{q} are. The Horn-backdoor tree for F1 looks like:

v2: x̄ v3: x

v4:q̄ v5:q

Note that variable order is important for the size of the tree, abigger backdoor tree for F1 is obtained by considering q before xand has 4 leaf nodes.

Marco Gario Backdoors 29 / 44

Page 62: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Outline

1 IntroductionNotationClasses and Subsolvers

2 BackdoorsStrong, Weak, DeletionExtensions: Learning-Sensitive, Trees

3 General ResultsComplexity HighlightsExperimental results

4 Conclusions

Marco Gario Backdoors 30 / 44

Page 63: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Complexity Intro

We looked into classes/subsolvers that run in P,

⇒ Given a backdoor set for a formula, we can decide satisfiabilityin polynomial time

SAT is NP-complete and assuming P 6= NP ⇒ finding thebackdoor set is NP-hard

Marco Gario Backdoors 31 / 44

Page 64: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Complexity Intro

We looked into classes/subsolvers that run in P,

⇒ Given a backdoor set for a formula, we can decide satisfiabilityin polynomial time

SAT is NP-complete and assuming P 6= NP ⇒ finding thebackdoor set is NP-hard

Marco Gario Backdoors 31 / 44

Page 65: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Parameterized Complexity in one Slide

Parameterized complexity is an interesting (but not reallyknown) field in which we “cheat” when measuring complexityClassical complexity: Worst-case runtime in the size n of theinputParameterized complexity: Worst-case runtime both in thesize n of the input AND of a parameter kSAT: O(2n)p-SAT: SAT parameterized by the number of variables⇒ O(2knc), for c constantAlgorithms that are function only of the parameter k arecalled fixed parameter tractable (FPT) : O(f (k)nc)Observation: p-SAT is in P by considering classicalcomplexity!Question: Can we find a parameter for backdoor detection toobtain a polynomial (ie. FPT) running time?

Marco Gario Backdoors 32 / 44

Page 66: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Parameterized Complexity in one Slide

Parameterized complexity is an interesting (but not reallyknown) field in which we “cheat” when measuring complexityClassical complexity: Worst-case runtime in the size n of theinputParameterized complexity: Worst-case runtime both in thesize n of the input AND of a parameter kSAT: O(2n)p-SAT: SAT parameterized by the number of variables⇒ O(2knc), for c constantAlgorithms that are function only of the parameter k arecalled fixed parameter tractable (FPT) : O(f (k)nc)Observation: p-SAT is in P by considering classicalcomplexity!Question: Can we find a parameter for backdoor detection toobtain a polynomial (ie. FPT) running time?

Marco Gario Backdoors 32 / 44

Page 67: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Parameterized Complexity in one Slide

Parameterized complexity is an interesting (but not reallyknown) field in which we “cheat” when measuring complexityClassical complexity: Worst-case runtime in the size n of theinputParameterized complexity: Worst-case runtime both in thesize n of the input AND of a parameter kSAT: O(2n)p-SAT: SAT parameterized by the number of variables⇒ O(2knc), for c constantAlgorithms that are function only of the parameter k arecalled fixed parameter tractable (FPT) : O(f (k)nc)Observation: p-SAT is in P by considering classicalcomplexity!Question: Can we find a parameter for backdoor detection toobtain a polynomial (ie. FPT) running time?

Marco Gario Backdoors 32 / 44

Page 68: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Parameterized Complexity in one Slide

Parameterized complexity is an interesting (but not reallyknown) field in which we “cheat” when measuring complexityClassical complexity: Worst-case runtime in the size n of theinputParameterized complexity: Worst-case runtime both in thesize n of the input AND of a parameter kSAT: O(2n)p-SAT: SAT parameterized by the number of variables⇒ O(2knc), for c constantAlgorithms that are function only of the parameter k arecalled fixed parameter tractable (FPT) : O(f (k)nc)Observation: p-SAT is in P by considering classicalcomplexity!Question: Can we find a parameter for backdoor detection toobtain a polynomial (ie. FPT) running time?

Marco Gario Backdoors 32 / 44

Page 69: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Parameterized backdoor detection

Definition: {weak, strong, deletion, tree} C -backdoor detection

Input: A CNF formula F ;

Parameter: An integer k ≥ 0, size of the backdoor;

Question: Does F have a {weak, strong, deletion, tree}C -backdoor of size at most k?

This problem can be solved in O(nk) for k << n, can we dobetter?

Class Weak Strong Deletion Tree2SAT,Horn W[2]-complete1 FPT1 FPT1 FPT2

RHorn W[1]-hard3 FPT4

UP,PL,UP+PL W[P]-complete5 W[P]-complete5

1 = [7],2 = [10],3 = [1], 4 = [8],5 = [11]Marco Gario Backdoors 33 / 44

Page 70: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Parameterized backdoor detection

Definition: {weak, strong, deletion, tree} C -backdoor detection

Input: A CNF formula F ;

Parameter: An integer k ≥ 0, size of the backdoor;

Question: Does F have a {weak, strong, deletion, tree}C -backdoor of size at most k?

This problem can be solved in O(nk) for k << n, can we dobetter?

Class Weak Strong Deletion Tree2SAT,Horn W[2]-complete1 FPT1 FPT1 FPT2

RHorn W[1]-hard3 FPT4

UP,PL,UP+PL W[P]-complete5 W[P]-complete5

1 = [7],2 = [10],3 = [1], 4 = [8],5 = [11]Marco Gario Backdoors 33 / 44

Page 71: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

What does this mean?

The problems that are FPT, can be solved efficiently if theformula has a (small) backdoor of that size.

Eg. For Horn and 2SAT we have agorithms for strong/deletionthat run in O(2kn) and O(3kn) respectively([7])

There are several techniques that have been developed forFPT problems, that might allow us to improve the aboveresult: kernelization, iterative compression etc.

Marco Gario Backdoors 34 / 44

Page 72: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

What does this mean?

The problems that are FPT, can be solved efficiently if theformula has a (small) backdoor of that size.

Eg. For Horn and 2SAT we have agorithms for strong/deletionthat run in O(2kn) and O(3kn) respectively([7])

There are several techniques that have been developed forFPT problems, that might allow us to improve the aboveresult: kernelization, iterative compression etc.

Marco Gario Backdoors 34 / 44

Page 73: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Outline

1 IntroductionNotationClasses and Subsolvers

2 BackdoorsStrong, Weak, DeletionExtensions: Learning-Sensitive, Trees

3 General ResultsComplexity HighlightsExperimental results

4 Conclusions

Marco Gario Backdoors 35 / 44

Page 74: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Problems in experimental data

Most of the experimental work done on backdoors does notconsider the FPT complexity. Mainly two approaches are used:

Local Search: Get a variable set, “shuffle” it until it is abackdoor, remove unneeded elements (minimize) ⇒ cannotguarantee to find smallest backdoors, provides only an idea onthe upperbound of the backdoor size.

Complete: test every nk subset of k variables ⇒ easy to findsmallest backdoor, unfeasible for almost any value of k

Most of the experimental work considers different classes C: use aSAT solver as subsolver (eg. Satz) study Satz-backdoors ⇒ hardto put results together

Marco Gario Backdoors 36 / 44

Page 75: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Problems in experimental data

Most of the experimental work done on backdoors does notconsider the FPT complexity. Mainly two approaches are used:

Local Search: Get a variable set, “shuffle” it until it is abackdoor, remove unneeded elements (minimize) ⇒ cannotguarantee to find smallest backdoors, provides only an idea onthe upperbound of the backdoor size.

Complete: test every nk subset of k variables ⇒ easy to findsmallest backdoor, unfeasible for almost any value of k

Most of the experimental work considers different classes C: use aSAT solver as subsolver (eg. Satz) study Satz-backdoors ⇒ hardto put results together

Marco Gario Backdoors 36 / 44

Page 76: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Problems in experimental data

Most of the experimental work done on backdoors does notconsider the FPT complexity. Mainly two approaches are used:

Local Search: Get a variable set, “shuffle” it until it is abackdoor, remove unneeded elements (minimize) ⇒ cannotguarantee to find smallest backdoors, provides only an idea onthe upperbound of the backdoor size.

Complete: test every nk subset of k variables ⇒ easy to findsmallest backdoor, unfeasible for almost any value of k

Most of the experimental work considers different classes C: use aSAT solver as subsolver (eg. Satz) study Satz-backdoors ⇒ hardto put results together

Marco Gario Backdoors 36 / 44

Page 77: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Problems in experimental data

Most of the experimental work done on backdoors does notconsider the FPT complexity. Mainly two approaches are used:

Local Search: Get a variable set, “shuffle” it until it is abackdoor, remove unneeded elements (minimize) ⇒ cannotguarantee to find smallest backdoors, provides only an idea onthe upperbound of the backdoor size.

Complete: test every nk subset of k variables ⇒ easy to findsmallest backdoor, unfeasible for almost any value of k

Most of the experimental work considers different classes C: use aSAT solver as subsolver (eg. Satz) study Satz-backdoors ⇒ hardto put results together

Marco Gario Backdoors 36 / 44

Page 78: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Experimental overview

Nevertheless we can try to answer the question: Are backdoor setssmall w.r.t. the number of variables?

Dilkina et al. ([4]) provide a nice comparison among differentclasses of backdoors establishing the following “order”: Horn(9− 67%), del RHorn (2− 66%),UP (0.15− 12%), UP+PL(0.13− 1.4%) and Satz (0− 0.6%);

Samer and Szeider ([10]) confirm that backdoor trees aresmaller than strong backdoors (for Horn and RHorn)

Marco Gario Backdoors 37 / 44

Page 79: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Complexity HighlightsExperimental results

Experimental overview

? Random instances: Gregory et al. ([5]) show how weakUP+PL-backdoors are usually bigger in random instances( 10%) than in structured SAT (2− 5%). No information isavailable for other classes.

? Preprocessing: The results form Dilkina et al. ([4]) aresomehow inconclusive. In some cases pre-processing is “bad”,in other is not relevant. Moreover they are not consideringsmallest backdoor but upperbounds.

Marco Gario Backdoors 37 / 44

Page 80: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

Conclusions

Backdoors allow to solve efficiently a SAT problem

There are different types and classes of backdoors

Finding backdoors is hard, but not-that-hard for someclasses/types (FPT)

Experimental results are hard generalize and compare.Moreover, they require an awful amount of time to berepeated.

Marco Gario Backdoors 38 / 44

Page 81: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

What is next?

Define more polynomial time classes, and study theirdetection complexity

Study the concept of backdoor by removing the “efficiency”constraint

? Apply FPT techniques to FPT detection problems to speed-upthe search (eg. kernelization, parallelization and iterativecompression)

? Try to identify domains or properties of SAT instances forwhich C-backdoors are small, and C-backdoor detection canbe solved in FPT.

Devise heuristics that “guess” backdoors incredible well!

Apply the backdoor idea to other domains: eg. QBF, ASP,#SAT have been covered by Szeider.

Marco Gario Backdoors 39 / 44

Page 82: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

References I

A. Biere, M. Heule, H. van Maaren, and T. Walsh.Handbook of Satisfiability.IOS Press, 2009.

Y. Crama, O. Ekin, and P.L. Hammer.Variable and term removal from Boolean formulae.Discrete Applied Mathematics, 75(3):217–230, 1997.

Bistra Dilkina, C. Gomes, and Ashish Sabharwal.Backdoors in the Context of Learning.Theory and Applications of Satisfiability Testing-SAT 2009,pages 73–79, 2009.

Marco Gario Backdoors 40 / 44

Page 83: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

References II

Bistra Dilkina, C.P. Gomes, and Ashish Sabharwal.Tradeoffs in backdoors: Inconsistency detection, dynamicsimplification, and preprocessing.In ISAIM-08: 10th International Symposium on ArtificialIntelligence and Mathematics, 2007.

Peter Gregory, Maria Fox, and Derek Long.A new empirical study of weak backdoors.In Principles and Practice of Constraint Programming, pages618–623. Springer, 2008.

Naomi Nishimura and Prabhakar Ragde.Solving #SAT using vertex covers.Acta Informatica, 44(7):509–523, 2007.

Marco Gario Backdoors 41 / 44

Page 84: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

References III

Naomi Nishimura, Prabhakar Ragde, and Stefan Szeider.Detecting backdoor sets with respect to Horn and binaryclauses.Seventh International Conference on Theory and Applicationsof Satisfiability Testing (SAT 2004), 2004.

Igor Razgon and B. O’Sullivan.Almost 2-SAT is fixed-parameter tractable.Journal of Computer and System Sciences, 75(8):435–450,2009.

Marco Gario Backdoors 42 / 44

Page 85: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

References IV

Roberto Rossi, Steven Prestwich, S.A. Tarim, and BrahimHnich.Generalizing Backdoors.In Proceedings of the 5th International Workshop on LocalSearch Techniques in Constraint Satisfaction (LSCS 2008),number 03, 2008.

Marko Samer.Backdoor trees.Proceedings of the 23rd Conference on Artificial, pages363–368, 2008.

Stefan Szeider.Backdoor sets for DLL subsolvers.SAT 2005, pages 73–88, 2006.

Marco Gario Backdoors 43 / 44

Page 86: Backdoors for SAT - University Of Marylandgasarch/TOPICS/sat/satbackdoors.pdf · 2013-08-13 · Backdoors have been introduced by Williams et al. ([12]) to try to explain the good

IntroductionBackdoors

General ResultsConclusions

References V

Ryan Williams, C.P. Gomes, and Bart Selman.Backdoors to typical case complexity.In Proceeding of IJCAI-03, volume 18, pages 1173–1178, 2003.

Marco Gario Backdoors 44 / 44