Skip to main content

Showing 1–50 of 69 results for author: Szeider, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16149  [pdf, other

    cs.DM cs.CC cs.LO

    Small unsatisfiable $k$-CNFs with bounded literal occurrence

    Authors: Tianwei Zhang, Tomáš Peitl, Stefan Szeider

    Abstract: We obtain the smallest unsatisfiable formulas in subclasses of $k$-CNF (exactly $k$ distinct literals per clause) with bounded variable or literal occurrences. Smaller unsatisfiable formulas of this type translate into stronger inapproximability results for MaxSAT in the considered formula class. Our results cover subclasses of 3-CNF and 4-CNF; in all subclasses of 3-CNF we considered we were able… ▽ More

    Submitted 2 July, 2024; v1 submitted 25 May, 2024; originally announced May 2024.

    Comments: full version of a paper to appear in the proceedings of SAT 2024, slight revision compared to v1

  2. arXiv:2402.00542  [pdf, ps, other

    cs.CC

    Hardness of Random Reordered Encodings of Parity for Resolution and CDCL

    Authors: Leroy Chew, Alexis de Colnet, Friedrich Slivovsky, Stefan Szeider

    Abstract: Parity reasoning is challenging for Conflict-Driven Clause Learning (CDCL) SAT solvers. This has been observed even for simple formulas encoding two contradictory parity constraints with different variable orders (Chew and Heule 2020). We provide an analytical explanation for their hardness by showing that they require exponential resolution refutations with high probability when the variable orde… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  3. arXiv:2312.07628  [pdf, other

    cs.DS

    Finding a Cluster in Incomplete Data

    Authors: Eduard Eiben, Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: We study two variants of the fundamental problem of finding a cluster in incomplete data. In the problems under consideration, we are given a multiset of incomplete $d$-dimensional vectors over the binary domain and integers $k$ and $r$, and the goal is to complete the missing vector entries so that the multiset of complete vectors either contains (i) a cluster of $k$ vectors of radius at most… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Short version appeared at ESA 2022. arXiv admin note: substantial text overlap with arXiv:1911.01465

  4. arXiv:2312.07103  [pdf, ps, other

    cs.LG cs.CC cs.DS

    The Computational Complexity of Concise Hypersphere Classification

    Authors: Eduard Eiben, Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: Hypersphere classification is a classical and foundational method that can provide easy-to-process explanations for the classification of real-valued and binary data. However, obtaining an (ideally concise) explanation via hypersphere classification is much more difficult when dealing with binary data than real-valued data. In this paper, we perform the first complexity-theoretic study of the hype… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Short version appeared at ICML 2023

  5. arXiv:2306.10427  [pdf, ps, other

    quant-ph cs.AI cs.DM cs.LO

    Co-Certificate Learning with SAT Modulo Symmetries

    Authors: Markus Kirchweger, Tomáš Peitl, Stefan Szeider

    Abstract: We present a new SAT-based method for generating all graphs up to isomorphism that satisfy a given co-NP property. Our method extends the SAT Modulo Symmetry (SMS) framework with a technique that we call co-certificate learning. If SMS generates a candidate graph that violates the given co-NP property, we obtain a certificate for this violation, i.e., `co-certificate' for the co-NP property. The c… ▽ More

    Submitted 21 June, 2023; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: To appear in the Proceedings of IJCAI 2023, the 32nd International Joint Conference on Artificial Intelligence, August 19-25, 2023, Macao, S.A.R. This update fixes a formatting glitch with references

  6. Threshold Treewidth and Hypertree Width

    Authors: Andre Schidler, Robert Ganian, Manuel Sorge, Stefan Szeider

    Abstract: Treewidth and hypertree width have proven to be highly successful structural parameters in the context of the Constraint Satisfaction Problem (CSP). When either of these parameters is bounded by a constant, then CSP becomes solvable in polynomial time. However, here the order of the polynomial in the running time depends on the width, and this is known to be unavoidable; therefore, the problem is… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: 24 pages, 4 figures. An extended abstract appeared at IJCAI 2020. A full version appeared in the Journal of Artificial Intelligence Research

    Journal ref: Journal of Artificial Intelligence Research, 74:1687-1713, 2022

  7. arXiv:2206.15225  [pdf, other

    cs.AI cs.DM cs.LO

    Are Hitting Formulas Hard for Resolution?

    Authors: Tomáš Peitl, Stefan Szeider

    Abstract: Hitting formulas, introduced by Iwama, are an unusual class of propositional CNF formulas. Not only is their satisfiability decidable in polynomial time, but even their models can be counted in closed form. This stands in stark contrast with other polynomial-time decidable classes, which usually have algorithms based on backtracking and resolution and for which model counting remains hard, like 2-… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

  8. arXiv:2206.01706  [pdf, other

    cs.DS

    Weighted Model Counting with Twin-Width

    Authors: Robert Ganian, Filip Pokrývka, André Schidler, Kirill Simonov, Stefan Szeider

    Abstract: Bonnet et al. (FOCS 2020) introduced the graph invariant twin-width and showed that many NP-hard problems are tractable for graphs of bounded twin-width, generalizing similar results for other width measures, including treewidth and clique-width. In this paper, we investigate the use of twin-width for solving the propositional satisfiability problem (SAT) and propositional model counting. We parti… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  9. arXiv:2206.00752  [pdf, ps, other

    cs.DS

    Algorithmic Applications of Tree-Cut Width

    Authors: Robert Ganian, Eun Jung Kim, Stefan Szeider

    Abstract: The recently introduced graph parameter tree-cut width plays a similar role with respect to immersions as the graph parameter treewidth plays with respect to minors. In this paper, we provide the first algorithmic applications of tree-cut width to hard combinatorial problems. Tree-cut width is known to be lower-bounded by a function of treewidth, but it can be much larger and hence has the potenti… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: Full version to appear in the Siam Journal on Discrete Mathematics

  10. arXiv:2202.08326  [pdf, other

    cs.DS

    SAT Backdoors: Depth Beats Size

    Authors: Jan Dreier, Sebastian Ordyniak, Stefan Szeider

    Abstract: For several decades, much effort has been put into identifying classes of CNF formulas whose satisfiability can be decided in polynomial time. Classic results are the linear-time tractability of Horn formulas (Aspvall, Plass, and Tarjan, 1979) and Krom (i.e., 2CNF) formulas (Dowling and Gallier, 1984). Backdoors, introduced by Williams Gomes and Selman (2003), gradually extend such a tractable cla… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

  11. arXiv:2110.06146  [pdf, other

    cs.DS cs.LO math.CO

    A SAT Approach to Twin-Width

    Authors: André Schidler, Stefan Szeider

    Abstract: The graph invariant twin-width was recently introduced by Bonnet, Kim, Thomassé, and Watrigan. Problems expressible in first-order logic, which includes many prominent NP-hard problems, are tractable on graphs of bounded twin-width if a certificate for the twin-width bound is provided as an input. Computing such a certificate, however, is an intrinsic problem, for which no nontrivial algorithm is… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Comments: Preprint of a paper to appear at ALENEX'22

  12. arXiv:2106.02550  [pdf, other

    cs.LO

    Certified DQBF Solving by Definition Extraction

    Authors: Franz-Xaver Reichl, Friedrich Slivovsky, Stefan Szeider

    Abstract: We propose a new decision procedure for dependency quantified Boolean formulas (DQBF) that uses interpolation-based definition extraction to compute Skolem functions in a counter-example guided inductive synthesis (CEGIS) loop. In each iteration, a family of candidate Skolem functions is tested for correctness using a SAT solver, which either determines that a model has been found, or returns an a… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

  13. Formalizing Graph Trail Properties in Isabelle/HOL

    Authors: Laura Kovacs, Hanna Lachnitt, Stefan Szeider

    Abstract: We describe a dataset expressing and proving properties of graph trails, using Isabelle/HOL. We formalize the reasoning about strictly increasing and decreasing trails, using weights over edges, and prove lower bounds over the length of trails in weighted graphs. We do so by extending the graph theory library of Isabelle/HOL with an algorithm computing the length of a longest strictly decreasing g… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

  14. arXiv:2008.02215  [pdf, other

    cs.AI cs.AR cs.DS

    A Time Leap Challenge for SAT Solving

    Authors: Johannes K. Fichte, Markus Hecher, Stefan Szeider

    Abstract: We compare the impact of hardware advancement and algorithm advancement for SAT solving over the last two decades. In particular, we compare 20-year-old SAT-solvers on new computer hardware with modern SAT-solvers on 20-year-old hardware. Our findings show that the progress on the algorithmic side has at least as much impact as the progress on the hardware side.

    Submitted 6 July, 2023; v1 submitted 5 August, 2020; originally announced August 2020.

    Comments: Authors' version of a paper which is to appear in the proceedings of CP'2020

    ACM Class: I.1.2; B.8.2; I.2.8; I.2.3

  15. arXiv:2006.13843  [pdf, other

    cs.AI cs.LG

    Turbocharging Treewidth-Bounded Bayesian Network Structure Learning

    Authors: Vaidyanathan P. R., Stefan Szeider

    Abstract: We present a new approach for learning the structure of a treewidth-bounded Bayesian Network (BN). The key to our approach is applying an exact method (based on MaxSAT) locally, to improve the score of a heuristically computed BN. This approach allows us to scale the power of exact methods -- so far only applicable to BNs with several dozens of random variables -- to large BNs with several thousan… ▽ More

    Submitted 5 February, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: 15 pages, 4 figures, 3 tables. To be published in AAAI 2021. Updated: synced with AAAI version. Source code available at http://github.com/aditya95sriram/bn-slim

    ACM Class: I.2.6

  16. arXiv:1911.12995  [pdf, other

    cs.DS

    SAT-Encodings for Treecut Width and Treedepth

    Authors: Robert Ganian, Neha Lodha, Sebastian Ordyniak, Stefan Szeider

    Abstract: In this paper we propose, implement, and test the first practical decomposition algorithms for the width parameters treecut width and treedepth. These two parameters have recently gained a lot of attention in the theoretical research community as they offer the algorithmic advantage over treewidth by supporting so-called fixed-parameter algorithms for certain problems that are not fixed-parameter… ▽ More

    Submitted 29 November, 2019; originally announced November 2019.

    Comments: Presented at ALENEX 2019; this version corrects a minor issue in one of the tables

  17. arXiv:1911.01465  [pdf, other

    cs.DS

    The Parameterized Complexity of Clustering Incomplete Data

    Authors: Eduard Eiben, Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: We study fundamental clustering problems for incomplete data. Specifically, given a set of incomplete d-dimensional vectors (representing rows of a matrix), the goal is to complete the missing vector entries in a way that admits a partitioning of the vectors into at most $k$ clusters with radius or diameter at most r. We give tight characterizations of the parameterized complexity of these problem… ▽ More

    Submitted 7 April, 2021; v1 submitted 4 November, 2019; originally announced November 2019.

  18. arXiv:1907.12335  [pdf, ps, other

    cs.DS

    A Join-Based Hybrid Parameter for Constraint Satisfaction

    Authors: Robert Ganian, Sebastian Ordyniak, Stefan Szeider

    Abstract: We propose joinwidth, a new complexity parameter for the Constraint Satisfaction Problem (CSP). The definition of joinwidth is based on the arrangement of basic operations on relations (joins, projections, and pruning), which inherently reflects the steps required to solve the instance. We use joinwidth to obtain polynomial-time algorithms (if a corresponding decomposition is provided in the input… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Comments: Accepted at CP 2019

  19. arXiv:1804.03423  [pdf, ps, other

    cs.DS cs.CC

    Parameterized Algorithms for the Matrix Completion Problem

    Authors: Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: We consider two matrix completion problems, in which we are given a matrix with missing entries and the task is to complete the matrix in a way that (1) minimizes the rank, or (2) minimizes the number of distinct rows. We study the parameterized complexity of the two aforementioned problems with respect to several parameters of interest, including the minimum number of matrix rows, columns, and ro… ▽ More

    Submitted 13 September, 2018; v1 submitted 10 April, 2018; originally announced April 2018.

  20. arXiv:1701.04626  [pdf, other

    cs.LO

    Circuit Treewidth, Sentential Decision, and Query Compilation

    Authors: Simone Bova, Stefan Szeider

    Abstract: The evaluation of a query over a probabilistic database boils down to computing the probability of a suitable Boolean function, the lineage of the query over the database. The method of query compilation approaches the task in two stages: first, the query lineage is implemented (compiled) in a circuit form where probability computation is tractable; and second, the desired probability is computed… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

  21. arXiv:1612.05733  [pdf, ps, other

    cs.DS

    Backdoors to Tractable Valued CSP

    Authors: Robert Ganian, M. S. Ramanujan, Stefan Szeider

    Abstract: We extend the notion of a strong backdoor from the CSP setting to the Valued CSP setting (VCSP, for short). This provides a means for augmenting a class of tractable VCSP instances to instances that are outside the class but of small distance to the class, where the distance is measured in terms of the size of a smallest backdoor. We establish that VCSP is fixed-parameter tractable when parameteri… ▽ More

    Submitted 17 December, 2016; originally announced December 2016.

    Comments: Accepted to CP 2016

  22. arXiv:1610.03298  [pdf, other

    cs.DS

    Combining Treewidth and Backdoors for CSP

    Authors: Robert Ganian, M. S. Ramanujan, Stefan Szeider

    Abstract: We show that CSP is fixed-parameter tractable when parameterized by the treewidth of a backdoor into any tractable CSP problem over a finite constraint language. This result combines the two prominent approaches for achieving tractability for CSP: (i) by structural restrictions on the interaction between the variables and the constraints and (ii) by language restrictions on the relations that can… ▽ More

    Submitted 11 October, 2016; originally announced October 2016.

  23. Backdoors into Heterogeneous Classes of SAT and CSP

    Authors: Serge Gaspers, Neeldhara Misra, Sebastian Ordyniak, Stefan Szeider, Stanislav Živný

    Abstract: In this paper we extend the classical notion of strong and weak backdoor sets for SAT and CSP by allowing that different instantiations of the backdoor variables result in instances that belong to different base classes; the union of the base classes forms a heterogeneous base class. Backdoor sets to heterogeneous base classes can be much smaller than backdoor sets to homogeneous ones, hence they… ▽ More

    Submitted 25 October, 2016; v1 submitted 18 September, 2015; originally announced September 2015.

    Comments: to appear in JCSS, full version of an AAAI 2014 paper

    Journal ref: Journal of Computer and System Sciences 85 38-56 (2017)

  24. arXiv:1507.05544  [pdf, other

    cs.DS

    Meta-Kernelization using Well-Structured Modulators

    Authors: Eduard Eiben, Robert Ganian, Stefan Szeider

    Abstract: Kernelization investigates exact preprocessing algorithms with performance guarantees. The most prevalent type of parameters used in kernelization is the solution size for optimization problems; however, also structural parameters have been successfully used to obtain polynomial kernels for a wide range of problems. Many of these parameters can be defined as the size of a smallest modulator of the… ▽ More

    Submitted 20 July, 2015; originally announced July 2015.

  25. arXiv:1507.05463  [pdf, ps, other

    cs.DS

    Solving Problems on Graphs of High Rank-Width

    Authors: Eduard Eiben, Robert Ganian, Stefan Szeider

    Abstract: A modulator of a graph G to a specified graph class H is a set of vertices whose deletion puts G into H. The cardinality of a modulator to various tractable graph classes has long been used as a structural parameter which can be exploited to obtain FPT algorithms for a range of hard problems. Here we investigate what happens when a graph contains a modulator which is large but "well-structured" (i… ▽ More

    Submitted 20 July, 2015; originally announced July 2015.

    Comments: Accepted at WADS 2015

  26. arXiv:1507.02479  [pdf, other

    cs.DS

    Discovering Archipelagos of Tractability for Constraint Satisfaction and Counting

    Authors: Robert Ganian, M. S. Ramanujan, Stefan Szeider

    Abstract: The Constraint Satisfaction Problem (CSP) is a central and generic computational problem which provides a common framework for many theoretical and practical applications. A central line of research is concerned with the identification of classes of instances for which CSP can be solved in polynomial time; such classes are often called "islands of tractability." A prominent way of defining islands… ▽ More

    Submitted 20 July, 2015; v1 submitted 9 July, 2015; originally announced July 2015.

  27. arXiv:1506.09100  [pdf, ps, other

    cs.DS

    Polynomial-time Construction of Optimal Tree-structured Communication Data Layout Descriptions

    Authors: Robert Ganian, Martin Kalany, Stefan Szeider, Jesper Larsson Träff

    Abstract: We show that the problem of constructing tree-structured descriptions of data layouts that are optimal with respect to space or other criteria from given sequences of displacements, can be solved in polynomial time. The problem is relevant for efficient compiler and library support for communication of noncontiguous data, where tree-structured descriptions with low-degree nodes and small index arr… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

  28. arXiv:1409.8464  [pdf, ps, other

    cs.CC cs.DS

    Model Counting for Formulas of Bounded Clique-Width

    Authors: Friedrich Slivovsky, Stefan Szeider

    Abstract: We show that #SAT is polynomial-time tractable for classes of CNF formulas whose incidence graphs have bounded symmetric clique-width (or bounded clique-width, or bounded rank-width). This result strictly generalizes polynomial-time tractability results for classes of formulas with signed incidence graphs of bounded clique-width and classes of formulas with incidence graphs of bounded modular tree… ▽ More

    Submitted 30 September, 2014; originally announced September 2014.

    Comments: Extended version of a paper published at ISAAC 2013

    Journal ref: Proceedings of ISAAC 2013. Lecture Notes in Computer Science, vol. 8283, pp. 677-687, Springer, 2013

  29. arXiv:1408.4263  [pdf, ps, other

    cs.LO cs.DS

    Quantified Conjunctive Queries on Partially Ordered Sets

    Authors: Simone Bova, Robert Ganian, Stefan Szeider

    Abstract: We study the computational problem of checking whether a quantified conjunctive query (a first-order sentence built using only conjunction as Boolean connective) is true in a finite poset (a reflexive, antisymmetric, and transitive directed graph). We prove that the problem is already NP-hard on a certain fixed poset, and investigate structural properties of posets yielding fixed-parameter tractab… ▽ More

    Submitted 19 August, 2014; originally announced August 2014.

    Comments: Accepted at IPEC 2014

  30. arXiv:1406.3124  [pdf, ps, other

    cs.AI cs.CC cs.DS

    Guarantees and Limits of Preprocessing in Constraint Satisfaction and Reasoning

    Authors: Serge Gaspers, Stefan Szeider

    Abstract: We present a first theoretical analysis of the power of polynomial-time preprocessing for important combinatorial problems from various areas in AI. We consider problems from Constraint Satisfaction, Global Constraints, Satisfiability, Nonmonotonic and Bayesian Reasoning under structural restrictions. All these problems involve two tasks: (i) identifying the structure in the input as required by t… ▽ More

    Submitted 12 June, 2014; originally announced June 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1104.2541, arXiv:1104.5566

  31. arXiv:1405.2891  [pdf, ps, other

    cs.LO cs.DS

    Model Checking Existential Logic on Partially Ordered Sets

    Authors: Simone Bova, Robert Ganian, Stefan Szeider

    Abstract: We study the problem of checking whether an existential sentence (that is, a first-order sentence in prefix form built using existential quantifiers and all Boolean connectives) is true in a finite partially ordered set (in short, a poset). A poset is a reflexive, antisymmetric, and transitive digraph. The problem encompasses the fundamental embedding problem of finding an isomorphic copy of a pos… ▽ More

    Submitted 15 April, 2014; originally announced May 2014.

    Comments: accepted at CSL-LICS 2014

  32. arXiv:1402.6109  [pdf, ps, other

    cs.DS cs.AI

    The Complexity of Repairing, Adjusting, and Aggregating of Extensions in Abstract Argumentation

    Authors: Eun Jung Kim, Sebastian Ordyniak, Stefan Szeider

    Abstract: We study the computational complexity of problems that arise in abstract argumentation in the context of dynamic argumentation, minimal change, and aggregation. In particular, we consider the following problems where always an argumentation framework F and a small positive integer k are given. - The Repair problem asks whether a given set of arguments can be modified into an extension by at most… ▽ More

    Submitted 25 February, 2014; originally announced February 2014.

    Journal ref: Proc. TAFA 2013, pp. 158-175, Springer LNCS

  33. arXiv:1402.0558  [pdf

    cs.AI cs.LG

    Parameterized Complexity Results for Exact Bayesian Network Structure Learning

    Authors: Sebastian Ordyniak, Stefan Szeider

    Abstract: Bayesian network structure learning is the notoriously difficult problem of discovering a Bayesian network that optimally represents a given set of training data. In this paper we study the computational worst-case complexity of exact Bayesian network structure learning under graph theoretic restrictions on the (directed) super-structure. The super-structure is an undirected graph that contains… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 46, pages 263-302, 2013

  34. arXiv:1312.1672  [pdf, ps, other

    cs.CC cs.DS cs.LO

    The Parameterized Complexity of Reasoning Problems Beyond NP

    Authors: Ronald de Haan, Stefan Szeider

    Abstract: Today's propositional satisfiability (SAT) solvers are extremely powerful and can be used as an efficient back-end for solving NP-complete problems. However, many fundamental problems in knowledge representation and reasoning are located at the second level of the Polynomial Hierarchy or even higher, and hence polynomial-time transformations to SAT are not possible, unless the hierarchy collapses.… ▽ More

    Submitted 1 July, 2016; v1 submitted 5 December, 2013; originally announced December 2013.

  35. arXiv:1310.7828  [pdf, ps, other

    cs.AI cs.DS

    A Complete Parameterized Complexity Analysis of Bounded Planning

    Authors: Christer Baeckstroem, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider

    Abstract: The propositional planning problem is a notoriously difficult computational problem, which remains hard even under strong syntactical and structural restrictions. Given its difficulty it becomes natural to study planning in the context of parameterized complexity. In this paper we continue the work initiated by Downey, Fellows and Stege on the parameterized complexity of planning with respect to t… ▽ More

    Submitted 29 October, 2013; originally announced October 2013.

    Comments: The paper is a combined and extended version of the papers "The Complexity of Planning Revisited - A Parameterized Analysis" (AAAI 2012, arXiv:1208.2566) and "Parameterized Complexity and Kernel Bounds for Hard Planning Problems" (CIAC 2013, arXiv:1211.0479)

    Journal ref: Proc. AAAI'12, pp. 1735-1741, AAAI Press 2012 and Proc. CIAC'13, pp. 13-24, Springer

  36. arXiv:1307.4440  [pdf, ps, other

    cs.AI cs.CC

    Parameterized Complexity Results for Plan Reuse

    Authors: Ronald de Haan, Anna Roubíčková, Stefan Szeider

    Abstract: Planning is a notoriously difficult computational problem of high worst-case complexity. Researchers have been investing significant efforts to develop heuristics or restrictions to make planning practically feasible. Case-based planning is a heuristic approach where one tries to reuse previous experience when solving similar problems in order to avoid some of the planning effort. Plan reuse may o… ▽ More

    Submitted 16 July, 2013; originally announced July 2013.

    Comments: Proceedings of AAAI 2013, pp. 224-231, AAAI Press, 2013

  37. arXiv:1304.5961  [pdf, ps, other

    cs.AI cs.CC cs.LO

    Backdoors to Abduction

    Authors: Andreas Pfandler, Stefan Rümmele, Stefan Szeider

    Abstract: Abductive reasoning (or Abduction, for short) is among the most fundamental AI reasoning methods, with a broad range of applications, including fault diagnosis, belief revision, and automated planning. Unfortunately, Abduction is of high computational complexity; even propositional Abduction is Σ_2^P-complete and thus harder than NP and coNP. This complexity barrier rules out the existence of a po… ▽ More

    Submitted 22 April, 2013; originally announced April 2013.

    Comments: 12 pages, a short version will appear in the proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI 2013)

  38. Upper and Lower Bounds for Weak Backdoor Set Detection

    Authors: Neeldhara Misra, Sebastian Ordyniak, Venkatesh Raman, Stefan Szeider

    Abstract: We obtain upper and lower bounds for running times of exponential time algorithms for the detection of weak backdoor sets of 3CNF formulas, considering various base classes. These results include (omitting polynomial factors), (i) a 4.54^k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Horn formulas; (ii) a 2.27^k algorithm to detect whether there… ▽ More

    Submitted 3 May, 2013; v1 submitted 19 April, 2013; originally announced April 2013.

    Comments: A short version will appear in the proceedings of the 16th International Conference on Theory and Applications of Satisfiability Testing

    Journal ref: Proceedings of SAT 2013, LNCS 7962, pp. 394-402, 2013

  39. A SAT Approach to Clique-Width

    Authors: Marijn J. H. Heule, Stefan Szeider

    Abstract: Clique-width is a graph invariant that has been widely studied in combinatorics and computer science. However, computing the clique-width of a graph is an intricate problem, the exact clique-width is not known even for very small graphs. We present a new method for computing the clique-width of graphs based on an encoding to propositional satisfiability (SAT) which is then evaluated by a SAT solve… ▽ More

    Submitted 27 September, 2013; v1 submitted 19 April, 2013; originally announced April 2013.

    Comments: proofs in section 3 updated, results remain unchanged

    Journal ref: Proceedings of SAT 2013, LNCS 7962, pp. 318-334, 2013

  40. Local Backbones

    Authors: Ronald de Haan, Iyad Kanj, Stefan Szeider

    Abstract: A backbone of a propositional CNF formula is a variable whose truth value is the same in every truth assignment that satisfies the formula. The notion of backbones for CNF formulas has been studied in various contexts. In this paper, we introduce local variants of backbones, and study the computational complexity of detecting them. In particular, we consider k-backbones, which are backbones for su… ▽ More

    Submitted 18 July, 2014; v1 submitted 19 April, 2013; originally announced April 2013.

    Comments: A previous version appeared in the proceedings of the 16th International Conference on Theory and Applications of Satisfiability Testing (SAT 2013)

    Journal ref: Proceedings of SAT 2013, LNCS 7962, pp. 377-393, 2013

  41. arXiv:1304.1996  [pdf, ps, other

    cs.CC

    On the Subexponential Time Complexity of CSP

    Authors: Iyad Kanj, Stefan Szeider

    Abstract: A CSP with n variables ranging over a domain of d values can be solved by brute-force in d^n steps (omitting a polynomial factor). With a more careful approach, this trivial upper bound can be improved for certain natural restrictions of the CSP. In this paper we establish theoretical limits to such improvements, and draw a detailed landscape of the subexponential-time complexity of CSP. We firs… ▽ More

    Submitted 7 April, 2013; originally announced April 2013.

  42. arXiv:1303.1786  [pdf, ps, other

    cs.DS cs.LO

    Meta-Kernelization with Structural Parameters

    Authors: Robert Ganian, Friedrich Slivovsky, Stefan Szeider

    Abstract: Meta-kernelization theorems are general results that provide polynomial kernels for large classes of parameterized problems. The known meta-kernelization theorems, in particular the results of Bodlaender et al. (FOCS'09) and of Fomin et al. (FOCS'10), apply to optimization problems parameterized by solution size. We present the first meta-kernelization theorems that use a structural parameters of… ▽ More

    Submitted 19 April, 2013; v1 submitted 7 March, 2013; originally announced March 2013.

  43. arXiv:1301.1391  [pdf, ps, other

    cs.LO cs.AI cs.CC

    Backdoors to Normality for Disjunctive Logic Programs

    Authors: Johannes Klaus Fichte, Stefan Szeider

    Abstract: Over the last two decades, propositional satisfiability (SAT) has become one of the most successful and widely applied techniques for the solution of NP-complete problems. The aim of this paper is to investigate theoretically how Sat can be utilized for the efficient solution of problems that are harder than NP or co-NP. In particular, we consider the fundamental reasoning problems in propositiona… ▽ More

    Submitted 2 May, 2013; v1 submitted 7 January, 2013; originally announced January 2013.

    Comments: A short version will appear in the Proceedings of the Proceedings of the 27th AAAI Conference on Artificial Intelligence (AAAI'13). A preliminary version of the paper was presented on the workshop Answer Set Programming and Other Computing Paradigms (ASPOCP 2012), 5th International Workshop, September 4, 2012, Budapest, Hungary

  44. Parameterized Complexity and Kernel Bounds for Hard Planning Problems

    Authors: Christer Bäckström, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider

    Abstract: The propositional planning problem is a notoriously difficult computational problem. Downey et al. (1999) initiated the parameterized analysis of planning (with plan length as the parameter) and Bäckström et al. (2012) picked up this line of research and provided an extensive parameterized analysis under various restrictions, leaving open only one stubborn case. We continue this work and provide a… ▽ More

    Submitted 21 January, 2013; v1 submitted 2 November, 2012; originally announced November 2012.

    Comments: This is the full version of a paper that will appear in the Proc. of CIAC 2013

    Journal ref: Proceedings of CIAC 2013, LNCS 7878, pp. 13-24, 2013

  45. arXiv:1208.2566  [pdf, ps, other

    cs.AI

    The Complexity of Planning Revisited - A Parameterized Analysis

    Authors: Christer Baeckstroem, Yue Chen, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider

    Abstract: The early classifications of the computational complexity of planning under various restrictions in STRIPS (Bylander) and SAS+ (Baeckstroem and Nebel) have influenced following research in planning in many ways. We go back and reanalyse their subclasses, but this time using the more modern tool of parameterized complexity analysis. This provides new results that together with the old results give… ▽ More

    Submitted 13 August, 2012; originally announced August 2012.

    Comments: (author's self-archived copy)

    Journal ref: Proc. AAAI'12 (AAAI Press 2012) pp. 1735-1741

  46. arXiv:1208.1692  [pdf, ps, other

    cs.DS cs.AI cs.CC

    On Finding Optimal Polytrees

    Authors: Serge Gaspers, Mikko Koivisto, Mathieu Liedloff, Sebastian Ordyniak, Stefan Szeider

    Abstract: Inferring probabilistic networks from data is a notoriously difficult task. Under various goodness-of-fit measures, finding an optimal network is NP-hard, even if restricted to polytrees of bounded in-degree. Polynomial-time algorithms are known only for rare special cases, perhaps most notably for branchings, that is, polytrees in which the in-degree of every node is at most one. Here, we study t… ▽ More

    Submitted 10 August, 2012; v1 submitted 8 August, 2012; originally announced August 2012.

    Comments: (author's self-archived copy)

    Journal ref: Proc. AAAI'12, pp. 750-756 (AAAI Press 2012)

  47. arXiv:1208.1688  [pdf, ps, other

    cs.DS

    Don't Be Strict in Local Search!

    Authors: Serge Gaspers, Eun Jung Kim, Sebastian Ordyniak, Saket Saurabh, Stefan Szeider

    Abstract: Local Search is one of the fundamental approaches to combinatorial optimization and it is used throughout AI. Several local search algorithms are based on searching the k-exchange neighborhood. This is the set of solutions that can be obtained from the current solution by exchanging at most k elements. As a rule of thumb, the larger k is, the better are the chances of finding an improved solution.… ▽ More

    Submitted 17 August, 2012; v1 submitted 8 August, 2012; originally announced August 2012.

    Comments: (author's self-archived copy)

    Journal ref: Proc. AAAI'12, pp. 486-492 (AAAI Press 2012)

  48. arXiv:1204.6233  [pdf, ps, other

    cs.DS cs.AI cs.CC cs.DM math.CO

    Strong Backdoors to Bounded Treewidth SAT

    Authors: Serge Gaspers, Stefan Szeider

    Abstract: There are various approaches to exploiting "hidden structure" in instances of hard combinatorial problems to allow faster algorithms than for general unstructured or random instances. For SAT and its counting version #SAT, hidden structure has been exploited in terms of decomposability and strong backdoor sets. Decomposability can be considered in terms of the treewidth of a graph that is associat… ▽ More

    Submitted 27 April, 2012; originally announced April 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1202.4331

  49. arXiv:1204.3040  [pdf, other

    cs.LO cs.AI cs.CC

    Tractable Answer-Set Programming with Weight Constraints: Bounded Treewidth is not Enough

    Authors: Reinhard Pichler, Stefan Rümmele, Stefan Szeider, Stefan Woltran

    Abstract: Cardinality constraints or, more generally, weight constraints are well recognized as an important extension of answer-set programming. Clearly, all common algorithmic tasks related to programs with cardinality or weight constraints - like checking the consistency of a program - are intractable. Many intractable problems in the area of knowledge representation and reasoning have been shown to beco… ▽ More

    Submitted 29 May, 2012; v1 submitted 13 April, 2012; originally announced April 2012.

    Comments: To appear in Theory and Practice of Logic Programming (TPLP)

    Journal ref: Theory and Practice of Logic Programming 14 (2014) 141-164

  50. arXiv:1203.3501  [pdf

    cs.LG cs.DS stat.ML

    Algorithms and Complexity Results for Exact Bayesian Structure Learning

    Authors: Sebastian Ordyniak, Stefan Szeider

    Abstract: Bayesian structure learning is the NP-hard problem of discovering a Bayesian network that optimally represents a given set of training data. In this paper we study the computational worst-case complexity of exact Bayesian structure learning under graph theoretic restrictions on the super-structure. The super-structure (a concept introduced by Perrier, Imoto, and Miyano, JMLR 2008) is an undirected… ▽ More

    Submitted 15 March, 2012; originally announced March 2012.

    Comments: Appears in Proceedings of the Twenty-Sixth Conference on Uncertainty in Artificial Intelligence (UAI2010)

    Report number: UAI-P-2010-PG-401-408