2018
DOI: 10.1007/s00453-018-0515-5
|View full text |Cite
|
Sign up to set email alerts
|

Backdoors for Linear Temporal Logic

Abstract: In the present paper, we introduce the backdoor set approach into the field of temporal logic for the global fragment of linear temporal logic. We study the parameterized complexity of the satisfiability problem parameterized by the size of the backdoor. We distinguish between backdoor detection and evaluation of backdoors into the fragments of Horn and Krom formulas. Here we classify the operator fragments of globally-operators for past/future/always, and the combination of them. Detection is shown to be fixe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…When it was firstly introduced, the concept was defined with respect to CNF formulas of propositional logic. Yet, it has been transferred to different kind of logics and other areas as well: abduction [42], answer set programming [21,22], argumentation [17], default logic [20], temporal logic [40], planning [35], and constraint satisfaction [25]. For dependence logic, such a formalism does not exist so far.…”
Section: Resultsmentioning
confidence: 99%
“…When it was firstly introduced, the concept was defined with respect to CNF formulas of propositional logic. Yet, it has been transferred to different kind of logics and other areas as well: abduction [42], answer set programming [21,22], argumentation [17], default logic [20], temporal logic [40], planning [35], and constraint satisfaction [25]. For dependence logic, such a formalism does not exist so far.…”
Section: Resultsmentioning
confidence: 99%
“…This definition was first introduced by Golmes, Williams and Selman [18] to model short distances to efficient subclasses. Until today, backdoors gained copious attention in many different areas: abduction [33], answer set programming [34,35], argumentation [36], default logic [37], temporal logic [38], planning [39] and constraint satisfaction [40,41].…”
Section: Backdoorsmentioning
confidence: 99%
“…This approach has been highly successful: applications can be found in e.g. (quantified) propositional satisfiability (Samer & Szeider, 2009a, 2009b, abductive reasoning (Pfandler, Rümmele, & Szeider, 2013), argumentation (Dvorák, Ordyniak, & Szeider, 2012), planning (Kronegger, Ordyniak, & Pfandler, 2019), logic (Meier, Ordyniak, Ramanujan, & Schindler, 2019), and answer set programming (Fichte & Szeider, 2015). Williams et al (2003) argue that backdoors may explain why SAT solvers occasionally fail to solve randomly generated instances with only a handful of variables but succeed in solving real-world instances containing thousands of variables.…”
Section: Introductionmentioning
confidence: 99%
“…This approach has been highly successful: applications can be found in e.g. (quantified) propositional satisfiability [49,50], abductive reasoning [46], argumentation [12], planning [37], logic [41], and answer set programming [15]. Williams et al (2003) argue that backdoors may explain why SAT solvers occasionally fail to solve randomly generated instances with only a handful of variables but succeed in solving real-world instances containing thousands of variables.…”
Section: Introductionmentioning
confidence: 99%