2017
DOI: 10.1016/j.jcss.2016.10.007
|View full text |Cite
|
Sign up to set email alerts
|

Backdoors into heterogeneous classes of SAT and CSP

Abstract: In this paper we extend the classical notion of strong and weak backdoor sets for SAT and CSP by allowing that different instantiations of the backdoor variables result in instances that belong to different base classes; the union of the base classes forms a heterogeneous base class. Backdoor sets to heterogeneous base classes can be much smaller than backdoor sets to homogeneous ones, hence they are much more desirable but possibly harder to find. We draw a detailed complexity landscape for the problem of det… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

4
2

Authors

Journals

citations
Cited by 19 publications
(26 citation statements)
references
References 28 publications
0
26
0
Order By: Relevance
“…One advantage of parameterizing by the size of modulators is that it allows us to build on the vast array of research of polynomial-time algorithms on specific graph classes (see, for instance, [10,33]). In other fields of computer science, modulators are often called backdoors and have been successfully used to obtain efficient algorithms for, e.g., satisfiability and constraint satisfaction [21,22].…”
Section: A: Width Measuresmentioning
confidence: 99%
“…One advantage of parameterizing by the size of modulators is that it allows us to build on the vast array of research of polynomial-time algorithms on specific graph classes (see, for instance, [10,33]). In other fields of computer science, modulators are often called backdoors and have been successfully used to obtain efficient algorithms for, e.g., satisfiability and constraint satisfaction [21,22].…”
Section: A: Width Measuresmentioning
confidence: 99%
“…Extensions to the basic notion of a backdoor have been proposed, including backdoors with empty clause detection [6], backdoors in the context of learning [7], heterogeneous backdoors where different instantiations of the backdoor variables may result in instances that belong to different base classes [15], and backdoors into scattered classes where each connected component of an instance may belong to a different tractable class [14]. Le Bras et al [20] used backdoors to speed-up the solution of hard problems in materials discovery, using a crowd sourcing approach to find small backdoors.…”
Section: Related Workmentioning
confidence: 99%
“…The parameterized complexity of strong backdoor detection when the target class is only defined by restrictions on the constraint language is W[2]-hard for every tractable class defined by idempotent polymorphisms even if the parameter is d + k, where d is the domain size and k is the size of the strong backdoor [91]. Nonetheless, if r is the arity of the instance, the problem becomes FPT for the parameter d + k + r [91] and even k + r if the tractable class is defined by finitely many polymorphisms [37].…”
Section: Backdoorsmentioning
confidence: 99%
“…Nonetheless, if r is the arity of the instance, the problem becomes FPT for the parameter d + k + r [91] and even k + r if the tractable class is defined by finitely many polymorphisms [37]. However, the classes for which strong backdoor detection is FPT in k + r are quite small and for all tractable classes represented in Fig.…”
Section: Backdoorsmentioning
confidence: 99%
See 1 more Smart Citation