Skip to main content

Exploiting Fixable, Removable, and Implied Values in Constraint Satisfaction Problems

  • Conference paper
Logic for Programming, Artificial Intelligence, and Reasoning (LPAR 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3452))

Abstract

Complete algorithms for constraint solving typically exploit properties like (in)consistency or interchangeability, which they detect by means of incomplete yet effective algorithms and use to reduce the search space. In this paper, we study a wide range of properties which includes most of the ones used by existing CSP algorithms as well as some which have not yet been considered in the literature, and we investigate their use in CSP solving. We clarify the relationships between these notions and characterise the complexity of the problem of checking them. Following the CSP approach, we then determine a number of relaxations (for instance local versions) which provide sufficient conditions whose detection is tractable. This work is a first step towards a comprehensive framework for CSP properties, and it also shows that new notions still remain to be exploited.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cadoli, M., Mancini, T.: Exploiting functional dependencies in declarative problem specifications. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 628–640. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Cadoli, M., Mancini, T.: Using a theorem prover for reasoning on constraint problems. In: 3rd Int. CP Workshop on Modelling and Reformulating CSPs (2004)

    Google Scholar 

  3. Choueiry, B., Lal, A., Freuder, E.C.: Interchangeability and dynamic bundling for non-binary finite CSPs. In: Int. Workshop on Constraint Solving and Constraint Logic Programming (CSCLP), Springer, Heidelberg (2004) (page to appear)

    Google Scholar 

  4. Choueiry, B., Noubir, G.: On the computation of local interchangeability in discrete constraint satisfaction problems. In: Nat (US) Conf. on Artificial Intelligence (AAAI), pp. 326–333. AAAI, Menlo Park (1998)

    Google Scholar 

  5. Crawford, J.M.: A theoretical analysis of reasoning by symmetry in first-order logic (extended abstract). In: AAAI Workshop on Tractable Reasoning (1992)

    Google Scholar 

  6. Crawford, J.M., Ginsberg, M.L., Luks, E.M., Roy, A.: Symmetry-breaking predicates for search problems. In: Int. Conf. on Principles of Knowledge Representation and Reasoning (KR), pp. 148–159. Morgan Kaufmann, San Francisco (1996)

    Google Scholar 

  7. Davis, M., Putnam, H.: A computing procedure for quantification theory. J. of the ACM 7(3), 201–215 (1960)

    Article  MathSciNet  MATH  Google Scholar 

  8. Dechter, R.: Constraint networks (survey). In: Encyclopedia of Artificial Intelligence, 2nd edn., pp. 276–285 (1992)

    Google Scholar 

  9. Even, S., Selman, A., Yacobi, Y.: The complexity of promise problems with applications to public-key cryptography. Information and Control 61(2), 159–173 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  10. Freuder, E.C.: Synthesizing constraint expressions. Comm. of the ACM 21(11), 958–966 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  11. Freuder, E.C.: Eliminating interchangeable values in constraint satisfaction problems. In: Nat (US) Conf. on Artificial Intelligence (AAAI), pp. 227–233. AAAI Press, Menlo Park (1991)

    Google Scholar 

  12. Gent, I.P., Smith, B.M.: Symmetry breaking in constraint programming. In: Euro. Conf. on Artificial Intelligence (ECAI), pp. 599–603. IOS Press, Amsterdam (2000)

    Google Scholar 

  13. Giunchiglia, E., Massarotto, A., Sebastiani, R.: Act, and the rest will follow: Exploiting determinism in planning as satisfiability. In: Nat (US) Conf. on Artificial Intelligence (AAAI), pp. 948–953. AAAI Press, Menlo Park (1998)

    Google Scholar 

  14. Jeavons, P., Cohen, D.A., Cooper, M.C.: A substitution operation for constraints. In: Int. Conf. on Principles and Practice of Constraint Programming (CP), pp. 1–9. Springer, Heidelberg (1994)

    Google Scholar 

  15. Jonsson, P., Krokhin, A.: Recognizing frozen variables in constraint satisfaction problems. Theoretical Computer Science (TCS) 329(1-3), 93–113 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  16. Köbler, J., Schöning, U., Torán, J.: The graph isomorphism problem: its computational complexitypp. Birkhäuser, Basel (1993)

    Google Scholar 

  17. Lenstra, A., Lenstra, H.W.: Algorithms in number theory. In: van Leeuwen, J. (ed.) The Handbook of Theoretical Computer Science. Algorithms and Complexity, vol. 1, MIT Press, Cambridge (1990)

    Google Scholar 

  18. Li, C.M.: Integrating equivalency reasoning into Davis-Putnam procedure. In: Nat (US) Conf. on Artificial Intelligence (AAAI), pp. 291–296. AAAI press, Menlo Park (2000)

    Google Scholar 

  19. Mackworth, A.K.: Consistency in networks of relations. Artificial Intelligence 8, 99–118 (1977)

    Article  MATH  Google Scholar 

  20. Monasson, R., Zecchina, R., Kirkpatrick, S., Selman, B., Troyansky, L.: Determining computational complexity from characteristic ‘phase transitions’. Nature 400, 133–137 (1999)

    Article  MathSciNet  Google Scholar 

  21. Montanari, U.: Networks of constraints: Fundamental properties and applications to picture processing. Information Science 7(2), 85–132 (1974)

    MathSciNet  Google Scholar 

  22. Papadimitriou, C.H.: Computational Complexity. Addison-Wesley, Reading (1994)

    MATH  Google Scholar 

  23. Pyhälä, T.: Factoring benchmarks for SAT solvers. Technical report, Helsinki university of technology (2004)

    Google Scholar 

  24. Schaefer, T.J.: The complexity of satisfiability problems. In: ACM Symp. on Theory of Computing (STOC), pp. 216–226. ACM, New York (1978)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bordeaux, L., Cadoli, M., Mancini, T. (2005). Exploiting Fixable, Removable, and Implied Values in Constraint Satisfaction Problems. In: Baader, F., Voronkov, A. (eds) Logic for Programming, Artificial Intelligence, and Reasoning. LPAR 2005. Lecture Notes in Computer Science(), vol 3452. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32275-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32275-7_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25236-8

  • Online ISBN: 978-3-540-32275-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics