[Zurück]


Vorträge und Posterpräsentationen (mit Tagungsband-Eintrag):

S. Gaspers, St. Szeider:
"Strong Backdoors to Bounded Treewidth SAT";
Vortrag: FOCS, the Annual Symposium on Foundations of Computer Science, Berkeley, CA, USA; 27.10.2013 - 29.10.2013; in: "Proceedings FOCS 2013, The 54th Annual Symposium on Foundations of Computer Science", O. Reingold (Hrg.); IEEE, (2013), S. 489 - 498.



Kurzfassung englisch:
There are various approaches to exploiting "hidden structure" in instances of hard combinatorial problems to allow faster algorithms than for general unstructured or random instances. For SAT and its counting version #SAT, hidden structure has been exploited in terms of decomposability and strong backdoor sets. Decomposability can be considered in terms of the treewidth of a graph that is associated with the given CNF formula, for instance by considering clauses and variables as vertices of the graph, and making a variable adjacent with all the clauses it appears in. On the other hand, a strong backdoor set of a CNF formula is a set of variables such that each assignment to this set moves the formula into a fixed class for which (#)SAT can be solved in polynomial time. In this paper we combine the two above approaches. In particular, we study the algorithmic question of finding a small strong backdoor set into the class TW≤t of CNF formulas whose associated graphs have treewidth at most t. The main results are positive:
There is a cubic-time algorithm that, given a CNF formula F and two constants k,t ≥ 0, either finds a strong TW≤t-backdoor set of size at most 2k, or concludes that F has no strong TW≤t-backdoor set of size at most k.
There is a cubic-time algorithm that, given a CNF formula F, computes the number of satisfying assignments of F or concludes that sbt(F)>k, for any pair of constants k,t ≥ 0. Here, sbt(F) denotes the size of a smallest strong TW≤t-backdoor set of F.
The significance of our results lies in the fact that they allow us to exploit algorithmically a hidden structure in formulas that is not accessible by any one of the two approaches (decomposability, backdoors) alone. Already a backdoor of size 1 on top of treewidth 1 (i.e., sbt(F)=1) entails formulas of arbitrarily large treewidth and arbitrarily large cycle cutsets (variables whose deletion makes the instance acyclic).


"Offizielle" elektronische Version der Publikation (entsprechend ihrem Digital Object Identifier - DOI)
http://dx.doi.org/10.1109/FOCS.2013.59



Zugeordnete Projekte:
Projektleitung Stefan Szeider:
The Parameterized Complexity of Reasoning Problems


Erstellt aus der Publikationsdatenbank der Technischen Universität Wien.