Detailed Information on Publication Record
2017
Backdoor Treewidth for SAT
GANIAN, Robert, M.S. RAMANUJAN and Stefan SZEIDERBasic information
Original name
Backdoor Treewidth for SAT
Authors
GANIAN, Robert (203 Czech Republic, guarantor, belonging to the institution), M.S. RAMANUJAN (356 India) and Stefan SZEIDER (40 Austria)
Edition
10491. vyd. Nemecko, Theory and Applications of Satisfiability Testing - SAT 2017 - 20th International Conference, Melbourne, VIC, Australia, August 28 - September 1, 2017, Proceedings, p. 20-37, 18 pp. 2017
Publisher
Springer
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10200 1.2 Computer and information sciences
Country of publisher
Germany
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
electronic version available online
References:
Impact factor
Impact factor: 0.402 in 2005
RIV identification code
RIV/00216224:14330/17:00100551
Organization unit
Faculty of Informatics
ISBN
978-3-319-66262-6
ISSN
UT WoS
000455337600002
Keywords in English
Treewidth; Parameterized Complexity; SAT; Backdoors
Tags
International impact, Reviewed
Změněno: 28/4/2020 11:43, Mgr. Michal Petr
Abstract
V originále
A strong backdoor in a CNF formula is a set of variables such that each possible instantiation of these variables moves the formula into a tractable class. The algorithmic problem of finding a strong backdoor has been the subject of intensive study, mostly within the parameterized complexity framework. Results to date focused primarily on backdoors of small size. In this paper we propose a new approach for algorithmically exploiting strong backdoors for SAT: instead of focusing on small backdoors, we focus on backdoors with certain structural properties. In particular, we consider backdoors that have a certain tree-like structure, formally captured by the notion of backdoor treewidth. First, we provide a fixed-parameter algorithm for SAT parameterized by the backdoor treewidth w.r.t. the fundamental tractable classes Horn, Anti-Horn, and 2CNF. Second, we consider the more general setting where the backdoor decomposes the instance into components belonging to different tractable classes, albeit focusing on backdoors of treewidth 1 (i.e., acyclic backdoors). We give polynomial-time algorithms for SAT and #SAT for instances that admit such an acyclic backdoor.