72
— Tutorial — Backdoors to Satisfaction Barry O’Sullivan [email protected] Cork Constraint Computation Centre University College Cork, Ireland http://osullivan.ucc.ie CP 2010 Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 1 / 56

Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

— Tutorial —Backdoors to Satisfaction

Barry O’[email protected]

Cork Constraint Computation CentreUniversity College Cork, Irelandhttp://osullivan.ucc.ie

CP 2010

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 1 / 56

Page 2: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

— Tutorial —Back“?” Galactica

Barry O’[email protected]

Cork Constraint Computation CentreUniversity College Cork, Irelandhttp://osullivan.ucc.ie

CP 2010

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 2 / 56

Page 3: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Supported by:Science Foundation Ireland Grant 05/IN/I886.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 3 / 56

Page 4: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Main Technical Sections of the Tutorial1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05]

Polynomial-time Sub-SolversWeak and Strong BackdoorsBackdoors in Realworld ProblemsComputing Weak and Strong Backdoors

2 Exploiting Backdoors – [Williams et al., IJCAI-03]Deterministic StrategyRandomized strategyHeuristic strategy

3 Backdoors and Problem Hardness – [Ruan et al., AAAI-04]Backdoor Size and HardnessBackdoor Keys and Key Fraction

4 Some Directions of StudyBackdoors and Parameterised ComplexityBackdoors and Machine Learning

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 4 / 56

Page 5: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

About this Tutorial

MotivationUnderstanding the importance of structure in solving real worldconstraint satisfaction problems is both interesting and important. Thediscovery and exploitation of sets of backdoor variables is of particularinterest.

The PromiseThis tutorial will give you an introduction to the key concepts in relationto backdoor variables and some interesting directions for future work.

ScopeI will focus on a small number of key papers by Williams et al. (IJCAI2003), Ruan et al. (AAAI 2004), and Kilby et al. (AAAI 2005), alongwith some of my own work.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 5 / 56

Page 6: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

About this Tutorial

MotivationUnderstanding the importance of structure in solving real worldconstraint satisfaction problems is both interesting and important. Thediscovery and exploitation of sets of backdoor variables is of particularinterest.

The PromiseThis tutorial will give you an introduction to the key concepts in relationto backdoor variables and some interesting directions for future work.

ScopeI will focus on a small number of key papers by Williams et al. (IJCAI2003), Ruan et al. (AAAI 2004), and Kilby et al. (AAAI 2005), alongwith some of my own work.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 5 / 56

Page 7: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

About this Tutorial

MotivationUnderstanding the importance of structure in solving real worldconstraint satisfaction problems is both interesting and important. Thediscovery and exploitation of sets of backdoor variables is of particularinterest.

The PromiseThis tutorial will give you an introduction to the key concepts in relationto backdoor variables and some interesting directions for future work.

ScopeI will focus on a small number of key papers by Williams et al. (IJCAI2003), Ruan et al. (AAAI 2004), and Kilby et al. (AAAI 2005), alongwith some of my own work.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 5 / 56

Page 8: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Predictive versus Descriptive - My Terminology

Predictive BackdoorsExplain precisely the structural conditions under which a problem canbecome tractable, e.g. tree-structured CSPs (Freuder), and cyclecutsets (Dechter).

Descriptive BackdoorsExplain why we observe short runs in practice when we are not(necessarily) in a tractable class.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 6 / 56

Page 9: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Predictive versus Descriptive - My Terminology

Predictive BackdoorsExplain precisely the structural conditions under which a problem canbecome tractable, e.g. tree-structured CSPs (Freuder), and cyclecutsets (Dechter).

Descriptive BackdoorsExplain why we observe short runs in practice when we are not(necessarily) in a tractable class.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 6 / 56

Page 10: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

A Real-world Problem: RLFAP-11

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 7 / 56

Page 11: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

MAC Search Tree for RLFAP-11

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 8 / 56

Page 12: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Why is RLFAP-11 hard for some solvers?

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 9 / 56

Page 13: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

What about unsatisfiable problems?

(Optimal) Refutations in uniform random problems.Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 10 / 56

Page 14: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

What about unsatisfiable problems?

(Optimal) Refutations in real-world problems.Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 11 / 56

Page 15: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Erratic Sample Means in Backtrack Search

Figure: Gomes et al. discovered heavy-tailed runtime distributions [JAR, ’01].

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 12 / 56

Page 16: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Key Papers by Others

[Williams et al., IJCAI-03]Ryan Williams, Carla P. Gomes, Bart Selman: Backdoors To TypicalCase Complexity. IJCAI 2003: 1173-1178.

[Ruan et al., AAAI-04]Yongshao Ruan, Henry A. Kautz, Eric Horvitz: The Backdoor Key: APath to Understanding Problem Hardness. AAAI 2004: 124-130.

[Kilby et al., AAAI-05]Philip Kilby, John K. Slaney, Sylvie Thiébaux, Toby Walsh: Backbonesand Backdoors in Satisfiability. AAAI 2005: 1368-1373.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 13 / 56

Page 17: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Outline1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05]

Polynomial-time Sub-SolversWeak and Strong BackdoorsBackdoors in Realworld ProblemsComputing Weak and Strong Backdoors

2 Exploiting Backdoors – [Williams et al., IJCAI-03]Deterministic StrategyRandomized strategyHeuristic strategy

3 Backdoors and Problem Hardness – [Ruan et al., AAAI-04]Backdoor Size and HardnessBackdoor Keys and Key Fraction

4 Some Directions of StudyBackdoors and Parameterised ComplexityBackdoors and Machine Learning

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 14 / 56

Page 18: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

The Constraint Satisfaction Problem

A CSP, C, is characterized by a set V = {x1, . . . , xn} of variables,with domains D1, . . . ,Dn, respectively, which list the possiblevalues for each variable.A constraint is defined over a subset of the variables Si ⊆ V ,called its scope.The set of tuples satisfying the constraint Si is a relation definedas a subset of the Cartesian product of the domains of thevariables in its scope.We assume variables have the same domain, and say thatd = |D|.An assignment a is a function from variables to D. A partialassignment assigns a subset of V .A solution is an assignment to all variables that satisfies all theconstraints.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 15 / 56

Page 19: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Simplifying a CSP

C[x 7→ v ] denotes the simplified CSP we get by setting variable xto value v .Let aS :: (S ⊆ V ) 7→ D be a partial assignment. We use thenotation C[aS] to denote the simplified CSP we get when makingeach assignment in aS.We have said little about how the simplification is performed at thispoint – we’ll come back to this shortly.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 16 / 56

Page 20: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

The Method of Simplification: A Polynomial Sub-Solver

Sub-solverA sub-solver A given as input a CSP C satisfies the following:

Trichotomy: A either rejects the input C, or “decides” C correctlyas either satisfiable or unsatisfiable.Efficiency: In runs in polynomial timeTrivial Solvability: A can determine if C is trivially true or triviallyfalse.Self-reducibility: If A determines C, then for any variable x andvalue v , then A determines C[x 7→ v ].

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 17 / 56

Page 21: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

What is a Backdoor?

Definition (Weak Backdoor – for satisfiable instances!)A non-empty subset S of the variables is a weak backdoor in C withrespect to sub-solver A if there exists an aS :: (S ⊆ V ) 7→ D, A returnsa satisfying assignment of C[aS].

IntuitionA (weak) backdoor is a set of variables that when assigned correctlysimply the problem to an extent that the sub-solver than solve theremaining problem.

ExampleFor binary CSP, if A is an arc-consistency propagator, a cycle cutsetdefines a backdoor.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 18 / 56

Page 22: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

What is a Backdoor?

Definition (Weak Backdoor – for satisfiable instances!)A non-empty subset S of the variables is a weak backdoor in C withrespect to sub-solver A if there exists an aS :: (S ⊆ V ) 7→ D, A returnsa satisfying assignment of C[aS].

IntuitionA (weak) backdoor is a set of variables that when assigned correctlysimply the problem to an extent that the sub-solver than solve theremaining problem.

ExampleFor binary CSP, if A is an arc-consistency propagator, a cycle cutsetdefines a backdoor.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 18 / 56

Page 23: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

What is a Backdoor?

Definition (Weak Backdoor – for satisfiable instances!)A non-empty subset S of the variables is a weak backdoor in C withrespect to sub-solver A if there exists an aS :: (S ⊆ V ) 7→ D, A returnsa satisfying assignment of C[aS].

IntuitionA (weak) backdoor is a set of variables that when assigned correctlysimply the problem to an extent that the sub-solver than solve theremaining problem.

ExampleFor binary CSP, if A is an arc-consistency propagator, a cycle cutsetdefines a backdoor.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 18 / 56

Page 24: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

What is a Strong Backdoor?

Definition (Strong Backdoor – for (un)satisfiable instances)A non-empty subset S of the variables is a strong backdoor in C withrespect to sub-solver A if for all aS :: (S ⊆ V ) 7→ D, A returns asatisfying assignment or decides the unsatisfiability of C[aS].

ExampleFor an unsatisfiable problem the variables in an unsatisfiable coredefines a strong backdoor.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 19 / 56

Page 25: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

What is a Strong Backdoor?

Definition (Strong Backdoor – for (un)satisfiable instances)A non-empty subset S of the variables is a strong backdoor in C withrespect to sub-solver A if for all aS :: (S ⊆ V ) 7→ D, A returns asatisfying assignment or decides the unsatisfiability of C[aS].

ExampleFor an unsatisfiable problem the variables in an unsatisfiable coredefines a strong backdoor.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 19 / 56

Page 26: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backbones & their relationship to (Strong) Backdoors

Backbone — it gets a little like “Back? Gallatica”S is a backbone of C if there is a unique partial assignmentaS :: (S ⊆ V ) 7→ D such that C[aS] is satisfiable.

ComparisonBackbone variables are frozen in all solutions: if there are no solutions,the backbone is empty; if there is one solution, that solution defines thebackdoor.A (strong) backdoor is sufficient to decide the problem instance.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 20 / 56

Page 27: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backbones & their relationship to (Strong) Backdoors

Backbone — it gets a little like “Back? Gallatica”S is a backbone of C if there is a unique partial assignmentaS :: (S ⊆ V ) 7→ D such that C[aS] is satisfiable.

ComparisonBackbone variables are frozen in all solutions: if there are no solutions,the backbone is empty; if there is one solution, that solution defines thebackdoor.A (strong) backdoor is sufficient to decide the problem instance.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 20 / 56

Page 28: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Independent Variables define a Backdoor

Necessarily a BackdoorProblems are often modelled such that a subset of the variablesdetermine the remainder. We refer to these

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 21 / 56

Page 29: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoors in Realworld Problems

Figure: Examples of small backdoors in real-world instances [Williams et al.,IJCAI-03]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 22 / 56

Page 30: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Computing Weak Backdoors

[Kilby et al., AAAI-05]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 23 / 56

Page 31: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Computing Weak Backdoors

[Kilby et al., AAAI-05]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 24 / 56

Page 32: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Computing Strong Backdoors

[Kilby et al., AAAI-05]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 25 / 56

Page 33: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Outline1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05]

Polynomial-time Sub-SolversWeak and Strong BackdoorsBackdoors in Realworld ProblemsComputing Weak and Strong Backdoors

2 Exploiting Backdoors – [Williams et al., IJCAI-03]Deterministic StrategyRandomized strategyHeuristic strategy

3 Backdoors and Problem Hardness – [Ruan et al., AAAI-04]Backdoor Size and HardnessBackdoor Keys and Key Fraction

4 Some Directions of StudyBackdoors and Parameterised ComplexityBackdoors and Machine Learning

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 26 / 56

Page 34: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Can exploiting backdoors help improve search?

The Key QuestionCan it pay off to search and exploit backdoors? We, of course, don’tassume we know the backdoor ahead of time.

Yes!We’ll discuss three strategies...

1 Deterministic strategy2 Randomized strategy3 Heuristic strategy

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 27 / 56

Page 35: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Can exploiting backdoors help improve search?

The Key QuestionCan it pay off to search and exploit backdoors? We, of course, don’tassume we know the backdoor ahead of time.

Yes!We’ll discuss three strategies...

1 Deterministic strategy2 Randomized strategy3 Heuristic strategy

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 27 / 56

Page 36: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Deterministic Strategy

When does this strategy work?For any CSP where the instance has a small fraction of backdoorvariables with respect to the sub-solver, e.g. a backdoor of constantsize.

A Deterministic AlgorithmGiven a CSP C with n variables:For i = 1, . . . ,n, for all subsets S of the variables with |S| = i , performa backtrack search over the variables in S for an assignment thatresults in C being solved by sub-solver A.

For a constant sized backdoor this algorithm runs in polynomial time!

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 28 / 56

Page 37: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Deterministic Strategy

When does this strategy work?For any CSP where the instance has a small fraction of backdoorvariables with respect to the sub-solver, e.g. a backdoor of constantsize.

A Deterministic AlgorithmGiven a CSP C with n variables:For i = 1, . . . ,n, for all subsets S of the variables with |S| = i , performa backtrack search over the variables in S for an assignment thatresults in C being solved by sub-solver A.

For a constant sized backdoor this algorithm runs in polynomial time!

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 28 / 56

Page 38: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Deterministic Strategy

When does this strategy work?For any CSP where the instance has a small fraction of backdoorvariables with respect to the sub-solver, e.g. a backdoor of constantsize.

A Deterministic AlgorithmGiven a CSP C with n variables:For i = 1, . . . ,n, for all subsets S of the variables with |S| = i , performa backtrack search over the variables in S for an assignment thatresults in C being solved by sub-solver A.

For a constant sized backdoor this algorithm runs in polynomial time!

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 28 / 56

Page 39: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Deterministic Strategy – The Complexity Result

Theorem (Running Time of the Deterministic Algorithm)If C has a variable domain size d and a backdoor of at most B(n), thenthe deterministic algorithm runs in:

O(p(n) · ( d · n√B(n)

)B(n)),

for some polynomial p(n).

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 29 / 56

Page 40: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Deterministic Strategy – The Complexity Result

Proof.Given a sub-solver running in T (n) the running time is bounded by:

T (n) ·B(n)∑i=1

(ni

)d i ≤ T (n) · q(n) ·

(n

B(n)

)· dB(n)

≤ T (n) · q(n) · (d · n)B(n)

B(n)!

≤ p(n) · (d · n)B(n)

B(n)B(n)/2

= p(n) · ( d · n√B(n)

)B(n)

for p(n) = T (n) · q(n).

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 30 / 56

Page 41: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Deterministic Strategy – A Special Case

CorollaryIf C has a backdoor of size B(n) = O(log n), then C can be solved in

(n√

log n)O(log n)

time – representing a huge saving in effort.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 31 / 56

Page 42: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Randomized strategy

The IdeaRepeatedly choose random subsets of variables that are larger thanB(n), an upper bound on backdoor size, searching these subsets for abackdoor.

AlgorithmGiven a CSP C over n variables, repeat the following

max(n · ( n(b − 1) · B(n − 1)

)B(n),1)

times:

Randomly choose a subset S of the n variables of size b · B(n).Perform a backtrack search search over the variables in S. Return asatisfying assignment if found.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 32 / 56

Page 43: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Randomized strategy

The IdeaRepeatedly choose random subsets of variables that are larger thanB(n), an upper bound on backdoor size, searching these subsets for abackdoor.

AlgorithmGiven a CSP C over n variables, repeat the following

max(n · ( n(b − 1) · B(n − 1)

)B(n),1)

times:

Randomly choose a subset S of the n variables of size b · B(n).Perform a backtrack search search over the variables in S. Return asatisfying assignment if found.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 32 / 56

Page 44: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Randomized strategy

Where does B(n) come from?

Guess by using a progression 1, α, α2, . . . , until we decide C.

Property of the AlgorithmIf C has a backdoor of size B(n), the randomized algorithm finds asolution with a probability approaching 1.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 33 / 56

Page 45: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Randomized strategy

Where does B(n) come from?

Guess by using a progression 1, α, α2, . . . , until we decide C.

Property of the AlgorithmIf C has a backdoor of size B(n), the randomized algorithm finds asolution with a probability approaching 1.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 33 / 56

Page 46: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Randomized strategy

Why repeat max(n · ( n(b−1)·B(n−1)

)B(n), 1) times?

Probablity a random S contains the entire backdoor of sizen > j ≥ B(n) is at least:(

n − B(n)

j − B(n)

)/

(nj

)≥ (

(j − B(n))

(n − B(n))))B(n)

= ((b − 1)

(b − 1) · (B(n)− 1)))B(n)

setting j = b · B(n). Therefore, repeating n times, the algorithmsucceeds with probability at least

1− 1n.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 34 / 56

Page 47: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Heuristic strategy

SettingA DFS algorithm using a heuristic H to select variables. H has aprobability of 1/h of selecting a backdoor variable. A polynomial timerestart strategy can exist.

Theorem (Polynomial Restart Strategy)If the size of a backdoor of a CSP C is

B ≤ c log nlog h + log d

for some constant c, then (DFS,H,A) has a restart strategy thatsolves C in polynomial time.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 35 / 56

Page 48: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Summary: Time bounds for CSPs with Backdoors

[Williams et al., IJCAI-03]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 36 / 56

Page 49: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Outline1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05]

Polynomial-time Sub-SolversWeak and Strong BackdoorsBackdoors in Realworld ProblemsComputing Weak and Strong Backdoors

2 Exploiting Backdoors – [Williams et al., IJCAI-03]Deterministic StrategyRandomized strategyHeuristic strategy

3 Backdoors and Problem Hardness – [Ruan et al., AAAI-04]Backdoor Size and HardnessBackdoor Keys and Key Fraction

4 Some Directions of StudyBackdoors and Parameterised ComplexityBackdoors and Machine Learning

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 37 / 56

Page 50: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Hardness versus Backdoor Size – Ensemble Level

Comparison using two benchmark suites: Morphed Graph Colouringand Quasigroups with Holes. [Ruan et al., AAAI-04]

(a) Morphed GC (b) QWH

No correlation between hardness and backdoor size.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 38 / 56

Page 51: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Hardness versus Backdoor Size – Ensemble Level

Comparison using two benchmark suites: Morphed Graph Colouringand Quasigroups with Holes. [Ruan et al., AAAI-04]

(c) Morphed GC (d) QWH

No correlation between hardness and backdoor size.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 38 / 56

Page 52: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Hardness versus Backdoor Size – Instance Level

(e) Morphed GC (f) QWH

[Ruan et al., AAAI-04]– 100 instances per plot.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 39 / 56

Page 53: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoors don’t capture dependencies

IntuitionBackdoor size alone does not capture dependencies amongstbackdoor variables. The fewer dependent variables, the smaller theprobability that some of the backdoors will be set to wrong values.

Dependencies must be capturedWe need a notion that captures such dependencies – this is thebackdoor key.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 40 / 56

Page 54: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoors don’t capture dependencies

IntuitionBackdoor size alone does not capture dependencies amongstbackdoor variables. The fewer dependent variables, the smaller theprobability that some of the backdoors will be set to wrong values.

Dependencies must be capturedWe need a notion that captures such dependencies – this is thebackdoor key.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 40 / 56

Page 55: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoor Keys and Key Fractions

Definition (Dependent Variable)A variable v ∈ V is a dependent variable of formula φ with respect to apartial truth assignment AB if φ[AB] determines v , i.e. there is a uniquevalue assignment v 7→ x such that φ[AB ∪ {v 7→ x}] is satisfiable.

Definition (Backdoor Key)A backdoor variable v is in the backdoor key set of B with respect to abackdoor truth assignment AB if and only if v is a dependent variablein φ with respect to the partial truth assignment AB−{v}.

Definition (Backdoor Key Fraction)A backdoor key fraction is the ratio if the size of the backdoor key set tothe size of the corresponding backdoor set.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 41 / 56

Page 56: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoor Keys and Key Fractions

Definition (Dependent Variable)A variable v ∈ V is a dependent variable of formula φ with respect to apartial truth assignment AB if φ[AB] determines v , i.e. there is a uniquevalue assignment v 7→ x such that φ[AB ∪ {v 7→ x}] is satisfiable.

Definition (Backdoor Key)A backdoor variable v is in the backdoor key set of B with respect to abackdoor truth assignment AB if and only if v is a dependent variablein φ with respect to the partial truth assignment AB−{v}.

Definition (Backdoor Key Fraction)A backdoor key fraction is the ratio if the size of the backdoor key set tothe size of the corresponding backdoor set.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 41 / 56

Page 57: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoor Keys and Key Fractions

Definition (Dependent Variable)A variable v ∈ V is a dependent variable of formula φ with respect to apartial truth assignment AB if φ[AB] determines v , i.e. there is a uniquevalue assignment v 7→ x such that φ[AB ∪ {v 7→ x}] is satisfiable.

Definition (Backdoor Key)A backdoor variable v is in the backdoor key set of B with respect to abackdoor truth assignment AB if and only if v is a dependent variablein φ with respect to the partial truth assignment AB−{v}.

Definition (Backdoor Key Fraction)A backdoor key fraction is the ratio if the size of the backdoor key set tothe size of the corresponding backdoor set.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 41 / 56

Page 58: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Hardness vs Backdoor Key Fraction – Ensemble Level

(g) Morphed GC (h) QWH

[Ruan et al., AAAI-04]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 42 / 56

Page 59: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Hardness vs Backdoor Key Fraction – Instance Level

(i) Morphed GC (j) QWH

[Ruan et al., AAAI-04]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 43 / 56

Page 60: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Correlation between Hardness and Backdoor Keys

Figure: Linear regression results for instance hardness: F is key fraction, K iskey size, and B is backdoor size [Ruan et al., AAAI-04]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 44 / 56

Page 61: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoors and Backbone variables are different

[Kilby et al., AAAI-05]Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 45 / 56

Page 62: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Outline1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05]

Polynomial-time Sub-SolversWeak and Strong BackdoorsBackdoors in Realworld ProblemsComputing Weak and Strong Backdoors

2 Exploiting Backdoors – [Williams et al., IJCAI-03]Deterministic StrategyRandomized strategyHeuristic strategy

3 Backdoors and Problem Hardness – [Ruan et al., AAAI-04]Backdoor Size and HardnessBackdoor Keys and Key Fraction

4 Some Directions of StudyBackdoors and Parameterised ComplexityBackdoors and Machine Learning

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 46 / 56

Page 63: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Fixed Parameter Algorithms

Traditional complexity theoryThe running time of an algorithm that solves an NP-Hard problem isexponential in the input size n, e.g. SAT is O(2n), unless P=NP.

The fixed parameter algorithm view (informal)Downey & Fellows, 1997Running time of an algorithm is exponential in a parameter kindependent of n;Only polynomially dependent on n;

Example

For vertex cover O(1.3k + n), where k is the maximum number ofvertices incident to all edges in the given graph of n vertices.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 47 / 56

Page 64: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Cyclic cutset (Feedback Vertex Set)Problem statement

Input: A CSP Z over n variablesParameter: The cycle-cutset size, k .Question: Is it possible to remove at most k variables

from Z so that the resulting CSP is acylic.

What do we know?The problem is FPT and can be solved in time

O(5kk2 + poly(n))

.

Importance?A cycle cutset is a backdoor in a binary CSP [Dechter].

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 48 / 56

Page 65: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Generic Backdoor Computation

Problem statementInput: An instance Z of CSP of SAT, a polynomially

solvable class P of the given problem.Parameter: The size of the backdoor, kQuestion: Is it possible to remove at most k variables from Z

so that the resulting instance belongs to P?

What do we know?Some classes of this problem are FPT.

[ Razgon and O’Sullivan, Journal of Computer and System Sciences, 2009. ]

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 49 / 56

Page 66: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Discovery of Backdoors using Machine Learning?

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 50 / 56

Page 67: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Looks like a backdoor

MethodologyWe classified 28,000 solutions and 90,000 non-solutions uniformlydistributed throughout the solution space.Very small trees, very high classification accuracy (99.9%).Tree size is tiny (largest can be stored in a 23kb file) compare with6.6Mb file to represent the problem, or 3.4Mb if we represent is asan automaton!

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 51 / 56

Page 68: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Classification of CSP/SAT

Figure: Features from [Xu, Hutter, Hoos, Leyton-Brown, CP 2007].

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 52 / 56

Page 69: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Classification of CSP/SAT

Figure: Classification accuracy for SAT, even industrial problems, can be veryhigh.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 53 / 56

Page 70: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Backdoor Features

You’ve heard it here first....Learning methods seem to be identifying important structure inthe problem, not just specific variables.Ongoing work: analyzing the features that give rise to strongclassification accuracy.I term these backdoor features.

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 54 / 56

Page 71: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

Wrap-up1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05]

Polynomial-time Sub-SolversWeak and Strong BackdoorsBackdoors in Realworld ProblemsComputing Weak and Strong Backdoors

2 Exploiting Backdoors – [Williams et al., IJCAI-03]Deterministic StrategyRandomized strategyHeuristic strategy

3 Backdoors and Problem Hardness – [Ruan et al., AAAI-04]Backdoor Size and HardnessBackdoor Keys and Key Fraction

4 Some Directions of StudyBackdoors and Parameterised ComplexityBackdoors and Machine Learning

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 55 / 56

Page 72: Tutorial — Backdoors to Satisfactionosullb/CP_2010_Backdoors.pdf · 1 Backdoors – [Williams et al., IJCAI-03] and [Kilby et al., AAAI-05] Polynomial-time Sub-Solvers Weak and

— Tutorial —Backdoors to Satisfaction

Barry O’[email protected]

Cork Constraint Computation CentreUniversity College Cork, Irelandhttp://osullivan.ucc.ie

CP 2010

Barry O’Sullivan (UCC, Ireland) Backdoors to Satisfaction CP 2010 Tutorial 56 / 56