Symmetry Breaking Ordering Constraints

Size: px
Start display at page:

Download "Symmetry Breaking Ordering Constraints"

Transcription

1 Symmetry Breaking Ordering Constraints PhD dissertation Uppsala University, Sweden, March 2004 Zeynep KIZILTAN Università di Bologna, Italy URL:

2 Overview Brief Background Thesis Motivation Goals Vector Orderings Global Ordering Constraints Experimental Results Conclusions Ongoing Research 2

3 Improving Search Efficiency in CP Use Global Constraints: More powerful inference (GAC) Constraint semantics allows to perform local consistency more efficiently Alldifferent, global cardinality, cumulative etc Exploit Problem Symmetries 3

4 Symmetry in CSPs Symmetry: permutation in variables/values that preserves satisfiability Symmetry Θ : If A is a solution, Θ(A) is also a solution If A is not a solution, neither is Θ(A) Symmetry exploitation: If subspace S searched, avoid subspace Θ(S) Subspace Θ(S): symmetric states to S Symmetry breaking 4

5 How to Break Symmetry? 1. Symmetry Breaking Constraints: Add extra constraints, imposing an ordering on the symmetric objects (e.g. variables) Only assignments satisfying the order are considered 2. Modification of the Search Algorithm: SBDS: each explored subtree generates a new constraint to rule out symmetric equivalents in the future SBDD: each node is checked for dominance by subtrees explored in the past 5

6 Thesis Row and column symmetry is common in constraint programming. Ordering constraints can effectively break this symmetry. Efficient global constraints can be designed for propagating such ordering constraints. 6

7 Motivations An important class of symmetries in CP matrices of decision variables rows/columns represent indistinguishable objects, hence symmetric Rows and columns can be permuted without affecting satisfiability Encountered frequently 7

8 Example: Sports Scheduling Schedule games between n teams over n-1 weeks Each week is divided into n/2 periods Each period has 2 slots: home and away Find a schedule such that 1. every team plays exactly once a week 2. every team plays against every other team 3. every team plays at most twice in the same period over the tournament 8

9 Example: Sport Scheduling We need a table of meetings! Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Period 1 0 vs 1 0 vs 2 4 vs 7 3 vs 6 3 vs 7 1 vs 5 2 vs 4 Period 2 2 vs 3 1 vs 7 0 vs 3 5 vs 7 1 vs 4 0 vs 6 5 vs 6 Period 3 4 vs 5 3 vs 5 1 vs 6 0 vs 4 2 vs 6 2 vs 7 0 vs 7 Period 4 6 vs 7 4 vs 6 2 vs 5 1 vs 2 0 vs 5 3 vs 4 1 vs 3 Weeks are indistinguishable Periods are indistinguishable 9

10 Example: Sport Scheduling Weeks are indistinguishable Periods are indistinguishable Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Period 1 0 vs 1 0 vs 2 4 vs 7 3 vs 6 3 vs 7 1 vs 5 2 vs 4 Period 2 2 vs 3 1 vs 7 0 vs 3 5 vs 7 1 vs 4 0 vs 6 5 vs 6 Period 3 4 vs 5 3 vs 5 1 vs 6 0 vs 4 2 vs 6 2 vs 7 0 vs 7 Period 4 6 vs 7 4 vs 6 2 vs 5 1 vs 2 0 vs 5 3 vs 4 1 vs 3 10

11 Example: Sport Scheduling Weeks are indistinguishable Periods are indistinguishable Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Period 1 0 vs 1 0 vs 2 4 vs 7 3 vs 6 3 vs 7 1 vs 5 2 vs 4 Period 2 2 vs 3 1 vs 7 0 vs 3 5 vs 7 1 vs 4 0 vs 6 5 vs 6 Period 3 4 vs 5 3 vs 5 1 vs 6 0 vs 4 2 vs 6 2 vs 7 0 vs 7 Period 4 6 vs 7 4 vs 6 2 vs 5 1 vs 2 0 vs 5 3 vs 4 1 vs 3 11

12 Example: Sport Scheduling Weeks are indistinguishable Periods are indistinguishable Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Period 1 0 vs 1 3 vs 7 4 vs 7 3 vs 6 0 vs 2 1 vs 5 2 vs 4 Period 2 2 vs 3 1 vs 4 0 vs 3 5 vs 7 1 vs 7 0 vs 6 5 vs 6 Period 3 4 vs 5 2 vs 6 1 vs 6 0 vs 4 3 vs 5 2 vs 7 0 vs 7 Period 4 6 vs 7 0 vs 5 2 vs 5 1 vs 2 4 vs 6 3 vs 4 1 vs 3 12

13 Example: Sport Scheduling Weeks are indistinguishable Periods are indistinguishable Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Period 1 0 vs 1 3 vs 7 4 vs 7 3 vs 6 0 vs 2 1 vs 5 2 vs 4 Period 2 2 vs 3 1 vs 4 0 vs 3 5 vs 7 1 vs 7 0 vs 6 5 vs 6 Period 3 4 vs 5 2 vs 6 1 vs 6 0 vs 4 3 vs 5 2 vs 7 0 vs 7 Period 4 6 vs 7 0 vs 5 2 vs 5 1 vs 2 4 vs 6 3 vs 4 1 vs 3 13

14 Many more examples Combinatorics BIBD generation, ternary Steiner problem Design Steel mill slab design Configuration Rack configuration Scheduling Social golfers, sport scheduling Timetabling Progressive party problem Bioinformatics Word design 14

15 Motivations (cont d) An n X m matrix with row and column symmetry has n! X m! symmetries grows super-exponentially Too many symmetric search states It can be very expensive to visit all the symmetric branches of the search tree first solution all solutions (e.g. proving optimality) Breaking symmetries could be very beneficial 15

16 Motivations (cont d) SBDS and SBDD do not explore the parts of the search tree symmetric to those already visited SBDS treat each symmetry individually many duplicate symmetry constraints impractical when #symmetries is large using a subset of the symmetries requires problem-specific search methods SBDD dominance checks can be expensive in the presence of many symmetries dominance checks are problem-specific 16

17 Objective and Approach Eliminate row and column symmetries easily effectively efficiently How?: Posting ordering constraints on the rows and columns (symmetry breaking ordering constraints) 17

18 Goals Investigate the types of ordering constraints that can be posted on a matrix to break row and column symmetries Devise global constraints to post and propagate the ordering constraints effectively and efficiently Show the effectiveness of the ordering constraints in breaking row and column symmetries 18

19 Lexicographic Ordering GOAL 1 X = [x 1,.,x n ] Y = [y 1,.,y n ] X < lex Y iff 0 k < n x 1,.,x k-1,x k,.,x n = < [1, 2, 5, 3] [1, 3, 1, 5] <lex y 1,.,y k-1, y k,.,y n X lex Y iff X < lex Y or X =Y Constraint posting: on rows on columns Simultaneously? ( lex RC) (Total ordering on vectors) lex lex 19

20 Lexicographic Ordering Attention with anti-lexicographic ordering! lex lex lex lex lex R lex C lex R lex C lexrc and lex RC effectively remove many symmetries, but not every symmetry 20

21 Multiset Ordering GOAL 1 Lex is focused on positions Multiset: set with repetitions {{ 1, 2, 1, 1, 2 }} X, Y multisets, X < m Y: X = {{ }} and Y {{ }} or max(x) < max(y) or max(x) = max(y) and X - max(x) < m Y - max(y) {{1, 2, 5, 3}} >m {{1, 3, 1, 5}} X m Y iff X < m Y or X = Y Treat each row/column as a multiset 21

22 Multiset Ordering Constraint posting: on rows on columns Simultaneously! ( m RC) m m Total ordering on multisets but preordering on vectors: not antisymmetric X = [1,2,3] Y = [2,3,1] We have {{X}} m {{Y}} and {{Y}} m {{X}} but not X = Y 22

23 Multiset Ordering Multiset and anti-multiset ordering m m m m m m m R m C m R m C m R m C m RC, m RC, m R m C, m R m C effectively remove many symmetries, but not every symmetry 23

24 Lex vs Multiset Ordering GOAL 1 Incomparable: example, matrix with row symmetry lex, not multi not lex, multi lex RC m R m C m R m C m RC m RC 24

25 Lex vs Multiset Ordering Incomparable: example, matrix with row symmetry lex, not multi not lex, multi lex RC m R m C m R m C m RC m RC 25

26 Combining Lex and Multiset Non-compatible on the same dimension Compatible on different dimensions: m R lex C lex m lex R m C m lex m R lex C m R lex C m R lex C m R lex C lex R m C lex R m C lex R m C lex R m C 26

27 Combining Lex and Multiset Incomparability: lex RC lex R m C m R lex C m RC Many symmetries are broken, but not every symmetry 27

28 Immediate Questions How much symmetry is broken? size of an equivalence class? #assignments satisfying the ordering constraints? How effective are the ordering constraints? no reduction in the size of the search space variable order is important when looking for 1 solution problem constraints imply the orderig constraints (e.g. Permutation -> multiset) increase in the size of the search space bad variable ordering Are the incomparable constraints incomparable also in practice? 28

29 Lex Ordering Constraint GOAL 2 Global constraint: LexLeq(X,Y), LexLess(X,Y) Filtering algorithm: GAC in O(n), amortised constant Optimal complexity! Alternatives: Arithmetic constraints (n, d small): equivalent to LexLeq AND decomposition, OR decomp., AND OR decomp. strictly weaker than LexLeq to LexLeq too many constraints to propagate: extra overhead equivalent Experimental results: LexLeq is generally faster than alternatives Warning: interaction with dynamic variable ordering 29

30 How LexLeq Works Consider the following example where we have two vectors of variables: 30

31 How LexLeq Works Consider the following example where we have two vectors of variables: X {2} {1,3,4} {1,2,3,4,5} {1,2} {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} 31

32 How LexLeq Works Consider the following example where we have two vectors of variables: X {2} {1,3,4} {1,2,3,4,5} {1,2} {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} We want to enforce GAC on X lex Y 32

33 A Tale of Two Pointers We use two pointers, α and β, to avoid repeatedly traversing the vectors. 33

34 A Tale of Two Pointers We use two pointers, α and β, to avoid repeatedly traversing the vectors We index the vectors as follows: X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} 34

35 A Tale of Two Pointers We use two pointers, α and β, to avoid repeatedly traversing the vectors We index the vectors as follows: X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} Most Significant Index 35

36 A Tale of Two Pointers We use two pointers, α and β, to avoid repeatedly traversing the vectors X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} α: index such that all variables at more significant indices are ground and equal 36

37 A Tale of Two Pointers We use two pointers, α and β, to avoid repeatedly traversing the vectors X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 37

38 A Tale of Two Pointers We use two pointers, α and β, to avoid repeatedly traversing the vectors X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} α: index such that all variables at more significant indices are ground and equal β: If tails never violate the constraint: 38

39 Pointer Initialisation Needs one traversal of the vectors (linear) α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 39

40 Pointer Initialisation Needs one traversal of the vectors (linear) X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 40

41 Pointer Initialisation Needs one traversal of the vectors (linear). X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} α β α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 41

42 Failure Inconsistent if β α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 42

43 How LexLeq Works We maintain α and β as assignments made α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 43

44 How LexLeq Works We maintain α and β as assignments made. When β = α + 1 we enforce bounds consistency on X α < Y α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 44

45 How LexLeq Works We maintain α and β as assignments made When β = α + 1 we enforce bounds consistency on X α < Y α When β > α + 1 we enforce bounds consistency on X α Y α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 45

46 How LexLeq Works We maintain α and β as assignments made Key: we reduce GAC on vectors to BC on binary constraints α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint 46

47 How LexLeq Works BC on X α Y α removes 0 and 1 from Y α X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {0,1,2} {1} {0,1,2,3,4} {0,1} {0,1,2} α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint β 47

48 Update α How LexLeq Works X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {2} {1} {0,1,2,3,4} {0,1} {0,1,2} α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint β 48

49 Update α How LexLeq Works X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {2} {1} {0,1,2,3,4} {0,1} {0,1,2} α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint β 49

50 How LexLeq Works BC on X α Y α removes 3 and 4 from X α X 0 {2} 1 {1,3,4} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {2} {1} {0,1,2,3,4} {0,1} {0,1,2} α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint β 50

51 Update α How LexLeq Works X 0 {2} 1 {1} 2 {1,2,3,4,5} 3 {1,2} 4 {3,4,5} Y {2} {1} {0,1,2,3,4} {0,1} {0,1,2} α α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint β 51

52 How LexLeq Works BC on X α < Y α removes 4 and 5 from X α and 0, 1 from from Y α X Y 0 {2} {2} 1 {1} {1} 2 {1,2,3,4,5} {0,1,2,3,4} 3 {1,2} {0,1} 4 {3,4,5} {0,1,2} α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint α β 52

53 How LexLeq Works The constraint is now GAC X 0 {2} 1 {1} 2 {1,2,3} 3 {1,2} 4 {3,4,5} Y {2} {1} {2,3,4} {0,1} {0,1,2} α: index such that all variables at more significant indices are ground and equal β: most significant index from which the two vectors tails necessarily violate the constraint α β 53

54 LexLeq with Repeated Variables We have assumed that all the variables in the vectors are distinct What if some variables are shared? Crawford et al symmetry breaking constraint: [X 1, X 2, X 3, X 4, X 5 ] lex [X 2, X 1, X 5, X 4, X 3 ] LexLeq algorithm may not maintain GAC: The fact that X α = Y α is a consistent assignmment when β > α + 1 may not be valid anymore 54

55 LexLeq with Repeated Variables: Example Let s assume Y 0 = Y 1 X 0 {0} 1 {0} {1} 2 Y {0,1} {0,1} {0} α β 55

56 LexLeq with Repeated Variables: Example Seeking support for X α = Y α = 0 X 0 {0} 1 {0} {1} 2 Y {0,1} {0,1} {0} α β Need to enforce AC(X α < Y α ) even if β > α

57 LexLeq with Repeated Variables LexLeq(X,Y) can be modified to take into account such cases without increasing the worst case complexity When max(x α ) = max(y α ), we need to propagate the support of X α = Y α = max(y α ) over the shared variables to check the support is still valid. If not, post X α < max(x α ) Similarly, when min(x α ) = min(y α ), we propagate the support of X α = Y α = min(y α ) over the shared variables If support is not valid, post Y α > min(y α ) 57

58 Lex with Sum Constraint GOAL 2 For a 0/1 matrix: LexLessAndSum(X,Y, Sx, Sy) = X < lex Y, Σ x i = Sx, Σ y i = Sy LexEqAndSum (X,Y, Sx, Sy) = X lex Y, Σ x i = Sx, Σ y i = Sy Often appear in demand, capacity or partitioning problems. Global constraints: LexEqAndSum(X,Y, Sx, Sy) LexLessAndSum(X,Y, Sx, Sy) Filtering algorithm: GAC in O(n) Optimal complexity Experimental results: Comparing with 58

59 Multiset Ordering Constraint Global constraints: MsetLeq(X,Y), MsetLess(X,Y) Filtering: if d <<n, GAC in O(n) if d >>n, GAC in O(n log(n)) Optimal comlexity when d << n Alternatives: Arithmetic: equivalent to MsetLeq Decomposition using gcc or sorted weaker than sorted GOAL 2 weaker than MsetLeq Experimental results: MsetLeq produces smaller trees than alternatives MsetLeq is faster than alternatives 59

60 How MsetLeq Works Algorithm exploits: Multiset order = Lex order on occurrence vectors {{1,1,1,2,4,4}} >m {{1,1,1,1,2,3,4}} as > [2, 0, 1, 3] >lex [1, 1, 1, 4] two 4s one 4 60

61 How MsetLeq Works Algorithm exploits transitivity of ordering [X 1,..,X i,..,x n ] <m [Y 1,..,Y j,..,y n ] To find support for values for X i : Just need support for max(x i ) Best support comes from [min(x 1 ),..,max(x i ),..,min(x n )] [max(y 1,..,max(Y j ),..,max(y n )] 61

62 Experimental Results GOAL 3 Ordering constraints are often no redundant and bring additional pruning Ordering constraints are often very effective in breaking row and column symmetry: significantly smaller search trees substantial decrease in solving time orders of magnitude gain (few seconds vs timeout) Ordering constraints that are incomparable in theory are also incomparable in practice 62

63 Example: BIBDs BIBD Lexicographic Ordering Constraints Basic Symmetry Breaking 1000 Time (sec.) ,1 0, BIBD Lexicographic Ordering Constraints Basic Symmetry Breaking Fails

64 More Experimental Results GOAL 3 Social Golfers: 4 models ordering constraints: improve in 75% cases best results: anti-lex ordering Progressive Party: 8 models ordering constraints: improve in (5,13,29),(6,13,29) best results: lex on rows, multiset on columns Rack Configuration: 3 models ordering constraints: improve in the 6 instances tested best results: lex on rows 64

65 More Experimental Results (II) GOAL 3 Hamming Code Generation: 8 models ordering constraints: improve in (10,15,9),(10,10,5) best results: multiset on rows, lex on columns (1) strict lex on rows, lex on columns (2) Word Design: 3 models, 3 static variable orders ordering constraints: improve in 1 case, get worse in 8 systematic clash with the static variable ordering heuristic 65

66 Conclusions Row and column symmetry is common in constraint programming. Ordering constraints can effectively break this symmetry. Efficient global constraints can be designed for propagating such ordering constraints. 66

67 Ongoing Research Some of the first work on dealing with row and column symmetry effectively and efficiently Row and column symmetry is now an active research area recognised as being critical in many applications GAP-SBDS, GAP-SBDD, STAB,... Ordering constraints gained attention constraint encodings of lex, lex_chain, all-perms See CP conferences and the Symmetry Workshops (SymCon) since

68 And finally... The ordering constraints and the propagators proposed here are central to some of the mechanisms proposed for dealing with row and column symmetries e.g. Puget CP 02 (SBDD) and CP 03 (STAB) Dissertation available via my web page: 68

Combining Symmetry Breaking with Other Constraints: lexicographic ordering with sums

Combining Symmetry Breaking with Other Constraints: lexicographic ordering with sums Combining Symmetry Breaking with Other Constraints: lexicographic ordering with sums Brahim Hnich 1, Zeynep Kiziltan 2, and Toby Walsh 1 1 Cork Constraint Computation Center, University College Cork, Ireland.

More information

Symmetry Breaking using Value Precedence

Symmetry Breaking using Value Precedence Symmetry Breaking using Value Precedence Toby Walsh 1 Abstract. We present a comprehensive study of the use of value precedence constraints to break value symmetry. We first give a simple encoding of value

More information

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Christian Bessiere 1, Emmanuel Hebrard 2, Brahim Hnich 2, and Toby Walsh 2 1 LIRMM, Montpelier, France. bessiere@lirmm.fr

More information

Solving the Kirkman s Schoolgirl Problem in a Few Seconds

Solving the Kirkman s Schoolgirl Problem in a Few Seconds Solving the Kirkman s Schoolgirl Problem in a Few Seconds Nicolas Barnier & Pascal Brisset CENA/ENAC, Toulouse, France September 9th, 2002 Solving the Kirkman s Schoolgirl Problem in a Few Seconds Nicolas

More information

Propagation Algorithms for Lexicographic Ordering Constraints

Propagation Algorithms for Lexicographic Ordering Constraints Propagation Algorithms for Lexicographic Ordering Constraints Alan M. Frisch Brahim Hnich Zeynep Kiziltan Ian Miguel Toby Walsh Abstract Finite-domain constraint programming has been used with great success

More information

Symmetry Breaking in Graceful Graphs

Symmetry Breaking in Graceful Graphs Symmetry Breaking in Graceful Graphs Karen E. Petrie and Barbara M. Smith University of Huddersfield, Huddersfield HD1 3DH, U.K. [k.e.petrie,b.m.smith]@hud.ac.uk Abstract. Symmetry in a Constraint Satisfaction

More information

The core of solving constraint problems using Constraint Programming (CP), with emphasis on:

The core of solving constraint problems using Constraint Programming (CP), with emphasis on: What is it about? l Theory The core of solving constraint problems using Constraint Programming (CP), with emphasis on: l Modeling l Solving: Local consistency and propagation; Backtracking search + heuristics.

More information

Propagation algorithms for lexicographic ordering constraints

Propagation algorithms for lexicographic ordering constraints Artificial Intelligence 170 (2006) 803 834 wwwelseviercom/locate/artint Propagation algorithms for lexicographic ordering constraints Alan M Frisch a,, Brahim Hnich b, Zeynep Kiziltan c, Ian Miguel d,

More information

On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry

On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry George Katsirelos 1, Nina Narodytska 2, and Toby Walsh 2 1 CRIL-CNRS, Lens, France, email: gkatsi@gmailcom

More information

A Framework for Combining Set Variable Representations

A Framework for Combining Set Variable Representations A Framework for Combining Set Variable Representations Christian Bessiere CNRS University of Montpellier, France bessiere@lirmm.fr Zeynep Kiziltan, Andrea Rappini Toby Walsh DISI NICTA and University of

More information

Dynamic Symmetry Breaking Constraints

Dynamic Symmetry Breaking Constraints Dynamic Symmetry Breaking Constraints George Katsirelos 1 and Toby Walsh 2 Abstract. We present a general method for dynamically posting symmetry breaking constraints during search. The basic idea is very

More information

Symmetry. Pierre Flener. ACP Summer School Aussois (France), 5 and 6 May ASTRA Research Group on CP Uppsala University Sweden

Symmetry. Pierre Flener. ACP Summer School Aussois (France), 5 and 6 May ASTRA Research Group on CP Uppsala University Sweden Pierre Flener ASTRA Research Group on CP Uppsala University Sweden ACP Summer School Aussois (France), 5 and 6 May 2010 Outline Dynamic Static Static Dynamic 1 2 Dynamic Static 3 Static Dynamic 4 5 6 May

More information

Static and Dynamic Structural Symmetry Breaking

Static and Dynamic Structural Symmetry Breaking Static and Dynamic Structural Symmetry Breaking Pierre Flener 1, Justin Pearson 1, Meinolf Sellmann 2, and Pascal Van Hentenryck 2 1 Dept of Information Technology, Uppsala University, Box 337, 751 05

More information

Constraint Technology for Solving Combinatorial Problems

Constraint Technology for Solving Combinatorial Problems First Exam for Course 1DL023: Constraint Technology for Solving Combinatorial Problems Autumn 2009, Uppsala University, Sweden Prepared by Pierre Flener Wednesday 21 October 2009, from 08:00 to 13:00,

More information

Modelling for Constraint Programming

Modelling for Constraint Programming Modelling for Constraint Programming Barbara Smith 3. Symmetry, Viewpoints Symmetry in CSPs A symmetry transforms any solution into another Sometimes symmetry is inherent in the problem (e.g. chessboard

More information

Boosting Set Constraint Propagation for Network Design

Boosting Set Constraint Propagation for Network Design Boosting Set Constraint Propagation for Network Design Justin Yip 1, Pascal Van Hentenryck 1, and Carmen Gervet 2 1 Brown University, Box 1910, Providence, RI 02912, USA 2 German University in Cairo, New

More information

Symmetries of Symmetry Breaking Constraints

Symmetries of Symmetry Breaking Constraints Symmetries of Symmetry Breaking Constraints George Katsirelos 1 and Toby Walsh 2 Abstract. Symmetry is an important feature of many constraint programs. We show that any problem symmetry acting on a set

More information

Symmetries of Symmetry Breaking Constraints

Symmetries of Symmetry Breaking Constraints Symmetries of Symmetry Breaking Constraints George Katsirelos NICTA, Sydney, Australia george.katsirelos@nicta.com.au Toby Walsh NICTA and UNSW, Sydney, Australia toby.walsh@nicta.com.au Abstract Symmetry

More information

Breaking Value Symmetries in Matrix Models using Channeling Constraints

Breaking Value Symmetries in Matrix Models using Channeling Constraints Breaking Value Symmetries in Matrix Models using Channeling Constraints Y.C. Law Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong yclaw@cse.cuhk.edu.hk

More information

Breaking Symmetry with Different Orderings

Breaking Symmetry with Different Orderings Breaking Symmetry with Different Orderings Nina Narodytska and Toby Walsh NICTA and UNSW, Sydney, Australia email: {nina.narodytska,toby.walsh}@nicta.com.au Abstract. We can break symmetry by eliminating

More information

Decision Diagrams for Discrete Optimization

Decision Diagrams for Discrete Optimization Decision Diagrams for Discrete Optimization Willem Jan van Hoeve Tepper School of Business Carnegie Mellon University www.andrew.cmu.edu/user/vanhoeve/mdd/ Acknowledgments: David Bergman, Andre Cire, Samid

More information

Global constraints and decompositions

Global constraints and decompositions Global constraints and decompositions Christian Bessiere Univ Montpellier, CNRS (joined work with E. Hebrard, B. Hnich, G. Katsirelos, Z. Kiziltan, N. Narodytska C.G. Quimper, T. Walsh) Outline Background

More information

Multiset variable representations and constraint propagation

Multiset variable representations and constraint propagation DOI 10.1007/s10601-012-9138-7 Multiset variable representations and constraint propagation Y. C. Law J. H. M. Lee T. Walsh M. H. C. Woo Springer Science+Business Media New York 2013 Abstract Multisets

More information

Introduction to Arti Intelligence

Introduction to Arti Intelligence Introduction to Arti Intelligence cial Lecture 4: Constraint satisfaction problems 1 / 48 Constraint satisfaction problems: Today Exploiting the representation of a state to accelerate search. Backtracking.

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

Symmetry Breaking Ordering Constraints

Symmetry Breaking Ordering Constraints Symmetry Breaking Ordering Constraints by ZEYNEP KIZILTAN Adissertation presented at Uppsala University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science

More information

A Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling

A Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling A Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling 1 Introduction Michael Marte 1 Institut für Informatik, Universität München Oettingenstr. 67, 80538 München,

More information

CS360 Homework 12 Solution

CS360 Homework 12 Solution CS360 Homework 12 Solution Constraint Satisfaction 1) Consider the following constraint satisfaction problem with variables x, y and z, each with domain {1, 2, 3}, and constraints C 1 and C 2, defined

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

Breaking variable symmetry in almost injective problems

Breaking variable symmetry in almost injective problems Breaking variable symmetry in almost injective problems Philippe Vismara 1,2 and Remi Coletta 1 1 LIRMM, UMR5506 Université Montpellier II - CNRS, Montpellier, France {coletta,vismara}@lirmm.fr 2 MISTEA,

More information

Transposition Tables for Constraint Satisfaction

Transposition Tables for Constraint Satisfaction Transposition Tables for Constraint Satisfaction Christophe Lecoutre and Lakhdar Sais and Sébastien Tabary and Vincent Vidal CRIL CNRS FRE 2499 Université d Artois Lens, France {lecoutre, sais, tabary,

More information

3. Symmetries and Symmetry Breaking

3. Symmetries and Symmetry Breaking Symmetries and Symmetry Breaking 1. Introduction, Logical Background 2. Constraint Solving François Fages INRIA Rocquencourt, Francois.Fages@inria.fr 3. Symmetries and Symmetry Breaking 4. Constraint Logic

More information

arxiv: v1 [cs.ai] 16 Apr 2012

arxiv: v1 [cs.ai] 16 Apr 2012 Symmetry Breaking Constraints: Recent Results Toby Walsh NICTA and UNSW Sydney, Australia toby.walsh@nicta.com.au arxiv:1204.3348v1 [cs.ai] 16 Apr 2012 Abstract Symmetry is an important problem in many

More information

Integer Programming, Constraint Programming, and their Combination

Integer Programming, Constraint Programming, and their Combination Integer Programming, Constraint Programming, and their Combination Alexander Bockmayr Freie Universität Berlin & DFG Research Center Matheon Eindhoven, 27 January 2006 Discrete Optimization General framework

More information

COMP Analysis of Algorithms & Data Structures

COMP Analysis of Algorithms & Data Structures COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

Variety Reasoning for Multiset Constraint Propagation

Variety Reasoning for Multiset Constraint Propagation Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI-09) Variety Reasoning for Multiset Constraint Propagation Y.C. Law, J.H.M. Lee, and M.H.C. Woo Department

More information

Symmetries in CSP. Symmetries in CSP. Elena Sherman UNL, CSE. April 18, 2009

Symmetries in CSP. Symmetries in CSP. Elena Sherman UNL, CSE. April 18, 2009 Symmetries in CSP Elena Sherman UNL, CSE April 18, 2009 Table of contents Why Symmetry? Symmetry Examples Adding symmetry-breaking global contraints Search space modification Heuristics modification Historical

More information

Orbital Conflict. Jeff Linderoth. Jim Ostrowski. Fabrizio Rossi Stefano Smriglio. When Worlds Collide. Univ. of Wisconsin-Madison

Orbital Conflict. Jeff Linderoth. Jim Ostrowski. Fabrizio Rossi Stefano Smriglio. When Worlds Collide. Univ. of Wisconsin-Madison Orbital Conflict When Worlds Collide Jeff Linderoth Univ. of Wisconsin-Madison Jim Ostrowski University of Tennessee Fabrizio Rossi Stefano Smriglio Univ. of L Aquila MIP 2014 Columbus, OH July 23, 2014

More information

Alternative Methods for Obtaining. Optimization Bounds. AFOSR Program Review, April Carnegie Mellon University. Grant FA

Alternative Methods for Obtaining. Optimization Bounds. AFOSR Program Review, April Carnegie Mellon University. Grant FA Alternative Methods for Obtaining Optimization Bounds J. N. Hooker Carnegie Mellon University AFOSR Program Review, April 2012 Grant FA9550-11-1-0180 Integrating OR and CP/AI Early support by AFOSR First

More information

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches

Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Interleaved Alldifferent Constraints: CSP vs. SAT Approaches Frédéric Lardeux 3, Eric Monfroy 1,2, and Frédéric Saubion 3 1 Universidad Técnica Federico Santa María, Valparaíso, Chile 2 LINA, Université

More information

Stochastic Constraint Programming: a seamless modeling framework for decision making under uncertainty

Stochastic Constraint Programming: a seamless modeling framework for decision making under uncertainty Stochastic Constraint Programming: a seamless modeling framework for decision making under uncertainty Dr Roberto Rossi 1 1 LDI, Wageningen UR, the Netherlands Mansholt Lecture Research A Complete Overview

More information

SOLVING FINITE-DOMAIN LINEAR CONSTRAINTS IN PRESENCE OF THE ALLDIFFERENT

SOLVING FINITE-DOMAIN LINEAR CONSTRAINTS IN PRESENCE OF THE ALLDIFFERENT Logical Methods in Computer Science Vol. 12(3:5)2016, pp. 1 28 www.lmcs-online.org Submitted Jul. 31, 2015 Published Sep. 5, 2016 SOLVING FINITE-DOMAIN LINEAR CONSTRAINTS IN PRESENCE OF THE ALLDIFFERENT

More information

Constraint Programming and Graph Algorithms

Constraint Programming and Graph Algorithms Constraint Programming and Graph Algorithms Kurt Mehlhorn Max-Planck-Institute for Computer Science (with significant help from Sven Thiel) I am not an expert on the subject (four publications), but I

More information

Global Matrix Constraints

Global Matrix Constraints Global Matrix Constraints George Katsirelos 1, Nina Narodytska 2, Claude-Guy Quimper 3, and Toby Walsh 2 1 LRI, Université Paris Sud 11, Paris, France, email: gkatsi@gmail.com 2 NICTA and University of

More information

Strong Bounds Consistencies and Their Application to Linear Constraints

Strong Bounds Consistencies and Their Application to Linear Constraints Strong Bounds Consistencies and Their Application to Linear Constraints Christian Bessiere CNRS, University of Montpellier Montpellier, France bessiere@lirmm.fr Anastasia Paparrizou CNRS, University of

More information

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION EE229B PROJECT REPORT STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION Zhengya Zhang SID: 16827455 zyzhang@eecs.berkeley.edu 1 MOTIVATION Permutation matrices refer to the square matrices with

More information

x y = x + y. For example, the tropical sum 4 9 = 4, and the tropical product 4 9 = 13.

x y = x + y. For example, the tropical sum 4 9 = 4, and the tropical product 4 9 = 13. Comment: Version 0.1 1 Introduction Tropical geometry is a relatively new area in mathematics. Loosely described, it is a piece-wise linear version of algebraic geometry, over a particular structure known

More information

Final. Introduction to Artificial Intelligence. CS 188 Spring You have approximately 2 hours and 50 minutes.

Final. Introduction to Artificial Intelligence. CS 188 Spring You have approximately 2 hours and 50 minutes. CS 188 Spring 2014 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed notes except your two-page crib sheet. Mark your answers

More information

Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems

Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems Yongjia Song James R. Luedtke August 9, 2012 Abstract We study solution approaches for the design of reliably

More information

Propagating Knapsack Constraints in Sublinear Time

Propagating Knapsack Constraints in Sublinear Time Propagating Knapsack Constraints in Sublinear Time Irit Katriel, Meinolf Sellmann, Eli Upfal, and Pascal Van Hentenryck Brown University, PO Box 191, Providence, RI 2912 {irit,sello,eli,pvh}@cs.brown.edu

More information

Cardinality Networks: a Theoretical and Empirical Study

Cardinality Networks: a Theoretical and Empirical Study Constraints manuscript No. (will be inserted by the editor) Cardinality Networks: a Theoretical and Empirical Study Roberto Asín, Robert Nieuwenhuis, Albert Oliveras, Enric Rodríguez-Carbonell Received:

More information

An Optimization-Based Heuristic for the Split Delivery Vehicle Routing Problem

An Optimization-Based Heuristic for the Split Delivery Vehicle Routing Problem An Optimization-Based Heuristic for the Split Delivery Vehicle Routing Problem Claudia Archetti (1) Martin W.P. Savelsbergh (2) M. Grazia Speranza (1) (1) University of Brescia, Department of Quantitative

More information

CSE 202 Homework 4 Matthias Springer, A

CSE 202 Homework 4 Matthias Springer, A CSE 202 Homework 4 Matthias Springer, A99500782 1 Problem 2 Basic Idea PERFECT ASSEMBLY N P: a permutation P of s i S is a certificate that can be checked in polynomial time by ensuring that P = S, and

More information

Lecture 1 : Data Compression and Entropy

Lecture 1 : Data Compression and Entropy CPS290: Algorithmic Foundations of Data Science January 8, 207 Lecture : Data Compression and Entropy Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will study a simple model for

More information

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

The Monoids of Order Eight and Nine

The Monoids of Order Eight and Nine The Monoids of Order Eight and Nine Andreas Distler 1 and Tom Kelsey 2 1 School of Mathematics and Statistics, Mathematical Institute, North Haugh, St Andrews, KY16 9SS, UK andreas@mcs.st-and.ac.uk 2 School

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms CSE 101, Winter 2018 Design and Analysis of Algorithms Lecture 5: Divide and Conquer (Part 2) Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ A Lower Bound on Convex Hull Lecture 4 Task: sort the

More information

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr.

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Quiz 1 Appendix Appendix Contents 1 Induction 2 2 Relations

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

Lifted Inference: Exact Search Based Algorithms

Lifted Inference: Exact Search Based Algorithms Lifted Inference: Exact Search Based Algorithms Vibhav Gogate The University of Texas at Dallas Overview Background and Notation Probabilistic Knowledge Bases Exact Inference in Propositional Models First-order

More information

Frequent Itemset Mining

Frequent Itemset Mining ì 1 Frequent Itemset Mining Nadjib LAZAAR LIRMM- UM COCONUT Team (PART I) IMAGINA 17/18 Webpage: http://www.lirmm.fr/~lazaar/teaching.html Email: lazaar@lirmm.fr 2 Data Mining ì Data Mining (DM) or Knowledge

More information

Foundations of Artificial Intelligence

Foundations of Artificial Intelligence Foundations of Artificial Intelligence 31. Propositional Logic: DPLL Algorithm Malte Helmert and Gabriele Röger University of Basel April 24, 2017 Propositional Logic: Overview Chapter overview: propositional

More information

Physical Mapping. Restriction Mapping. Lecture 12. A physical map of a DNA tells the location of precisely defined sequences along the molecule.

Physical Mapping. Restriction Mapping. Lecture 12. A physical map of a DNA tells the location of precisely defined sequences along the molecule. Computat onal iology Lecture 12 Physical Mapping physical map of a DN tells the location of precisely defined sequences along the molecule. Restriction mapping: mapping of restriction sites of a cutting

More information

Decision Diagrams for Sequencing and Scheduling

Decision Diagrams for Sequencing and Scheduling Decision Diagrams for Sequencing and Scheduling Willem-Jan van Hoeve Tepper School of Business Carnegie Mellon University www.andrew.cmu.edu/user/vanhoeve/mdd/ Plan What can MDDs do for Combinatorial Optimization?

More information

Combinatorial optimization problems

Combinatorial optimization problems Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:

More information

CS 4100 // artificial intelligence. Recap/midterm review!

CS 4100 // artificial intelligence. Recap/midterm review! CS 4100 // artificial intelligence instructor: byron wallace Recap/midterm review! Attribution: many of these slides are modified versions of those distributed with the UC Berkeley CS188 materials Thanks

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Scientific Computing with Case Studies SIAM Press, Lecture Notes for Unit VII Sparse Matrix

Scientific Computing with Case Studies SIAM Press, Lecture Notes for Unit VII Sparse Matrix Scientific Computing with Case Studies SIAM Press, 2009 http://www.cs.umd.edu/users/oleary/sccswebpage Lecture Notes for Unit VII Sparse Matrix Computations Part 1: Direct Methods Dianne P. O Leary c 2008

More information

A Note on Symmetry Reduction for Circular Traveling Tournament Problems

A Note on Symmetry Reduction for Circular Traveling Tournament Problems Mainz School of Management and Economics Discussion Paper Series A Note on Symmetry Reduction for Circular Traveling Tournament Problems Timo Gschwind and Stefan Irnich April 2010 Discussion paper number

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

BATCH PROCESSING WITH SEQUENCE DEPENDENT SETUP TIMES: NEW RESULTS

BATCH PROCESSING WITH SEQUENCE DEPENDENT SETUP TIMES: NEW RESULTS BATCH PROCESSING WITH SEQUENCE DEPENDENT SETUP TIMES: NEW RESULTS PETR VILÍM Charles University, Faculty of Mathematics and Physics, Malostranské náměstí 2/25, Praha 1, Czech Republic, e-mail: vilim@kti.mff.cuni.cz

More information

Constraint Satisfaction 101

Constraint Satisfaction 101 Constraint Satisfaction 101 Berthe Y. Choueiry (Shu-we-ri) Nov 14, 2006 Constraint Satisfaction 101 1 Constraint Processing Constraint Satisfaction Computational problem Constraint Satisfaction Problem

More information

Adapting Boyer-Moore-Like Algorithms for Searching Huffman Encoded Texts

Adapting Boyer-Moore-Like Algorithms for Searching Huffman Encoded Texts Adapting Boyer-Moore-Like Algorithms for Searching Huffman Encoded Texts Domenico Cantone Simone Faro Emanuele Giaquinta Department of Mathematics and Computer Science, University of Catania, Italy 1 /

More information

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University Algorithms NP -Complete Problems Dong Kyue Kim Hanyang University dqkim@hanyang.ac.kr The Class P Definition 13.2 Polynomially bounded An algorithm is said to be polynomially bounded if its worst-case

More information

Decomposition of the NVALUE constraint

Decomposition of the NVALUE constraint Decomposition of the NVALUE constraint Christian Bessiere 1, George Katsirelos 2, Nina Narodytska 3, Claude-Guy Quimper 4, and Toby Walsh 3 1 LIRMM, CNRS, Montpellier, email: bessiere@lirmm.fr 2 CRIL-CNRS,

More information

DESIGN THEORY FOR RELATIONAL DATABASES. csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018

DESIGN THEORY FOR RELATIONAL DATABASES. csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018 DESIGN THEORY FOR RELATIONAL DATABASES csc343, Introduction to Databases Renée J. Miller and Fatemeh Nargesian and Sina Meraji Winter 2018 1 Introduction There are always many different schemas for a given

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

Propagation in CSP and SAT

Propagation in CSP and SAT Propagation in CSP and SAT Yannis Dimopoulos 1 and Kostas Stergiou 2 1 Department of Computer Science University of Cyprus, Nicosia, Cyprus yannis@cs.ucy.ac.cy 2 Department of Information and Communication

More information

Description Logics: an Introductory Course on a Nice Family of Logics. Day 2: Tableau Algorithms. Uli Sattler

Description Logics: an Introductory Course on a Nice Family of Logics. Day 2: Tableau Algorithms. Uli Sattler Description Logics: an Introductory Course on a Nice Family of Logics Day 2: Tableau Algorithms Uli Sattler 1 Warm up Which of the following subsumptions hold? r some (A and B) is subsumed by r some A

More information

Introduction to Mathematical Programming IE406. Lecture 21. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 21. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 21 Dr. Ted Ralphs IE406 Lecture 21 1 Reading for This Lecture Bertsimas Sections 10.2, 10.3, 11.1, 11.2 IE406 Lecture 21 2 Branch and Bound Branch

More information

Algorithms Re-Exam TIN093/DIT600

Algorithms Re-Exam TIN093/DIT600 Algorithms Re-Exam TIN093/DIT600 Course: Algorithms Course code: TIN 093 (CTH), DIT 600 (GU) Date, time: 7th January 2016, 8:30 12:30 Building: M Responsible teacher: Peter Damaschke, Tel. 5405. Examiner:

More information

2.5.2 Basic CNF/DNF Transformation

2.5.2 Basic CNF/DNF Transformation 2.5. NORMAL FORMS 39 On the other hand, checking the unsatisfiability of CNF formulas or the validity of DNF formulas is conp-complete. For any propositional formula φ there is an equivalent formula in

More information

Introduction. An Introduction to Algorithms and Data Structures

Introduction. An Introduction to Algorithms and Data Structures Introduction An Introduction to Algorithms and Data Structures Overview Aims This course is an introduction to the design, analysis and wide variety of algorithms (a topic often called Algorithmics ).

More information

arxiv: v1 [cs.cc] 9 Oct 2014

arxiv: v1 [cs.cc] 9 Oct 2014 Satisfying ternary permutation constraints by multiple linear orders or phylogenetic trees Leo van Iersel, Steven Kelk, Nela Lekić, Simone Linz May 7, 08 arxiv:40.7v [cs.cc] 9 Oct 04 Abstract A ternary

More information

#A32 INTEGERS 10 (2010), TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18)

#A32 INTEGERS 10 (2010), TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18) #A32 INTEGERS 10 (2010), 369-377 TWO NEW VAN DER WAERDEN NUMBERS: w(2; 3, 17) AND w(2; 3, 18) Tanbir Ahmed ConCoCO Research Laboratory, Department of Computer Science and Software Engineering, Concordia

More information

An Smodels System with Limited Lookahead Computation

An Smodels System with Limited Lookahead Computation An Smodels System with Limited Lookahead Computation Gayathri Namasivayam and Miros law Truszczyński Department of Computer Science, University of Kentucky, Lexington, KY 40506-0046, USA Abstract. We describe

More information

Introduction to Algorithms

Introduction to Algorithms Lecture 1 Introduction to Algorithms 1.1 Overview The purpose of this lecture is to give a brief overview of the topic of Algorithms and the kind of thinking it involves: why we focus on the subjects that

More information

Global Constraints for the Mean Aboslute Deviation and the Variance: Application to the Vertical Line Balancing

Global Constraints for the Mean Aboslute Deviation and the Variance: Application to the Vertical Line Balancing 1/51 Global Constraints for the Mean Aboslute Deviation and the Variance: Application to the Vertical Line Balancing Pierre Schaus and Yves Deville, Jean-Charles Régin also collaborated Belgian Constraints

More information

The Challenge of Generating Spatially Balanced Scientific Experiment Designs?

The Challenge of Generating Spatially Balanced Scientific Experiment Designs? The Challenge of Generating Spatially Balanced Scientific Experiment Designs? Carla Gomes, Meinolf Sellmann, Cindy van Es, and Harold van Es Cornell University {gomes,sello}@cs.cornell.edu {clv1,hmv1}@cornell.edu

More information

Model Checking for Propositions CS477 Formal Software Dev Methods

Model Checking for Propositions CS477 Formal Software Dev Methods S477 Formal Software Dev Methods Elsa L Gunter 2112 S, UIU egunter@illinois.edu http://courses.engr.illinois.edu/cs477 Slides based in part on previous lectures by Mahesh Vishwanathan, and by Gul gha January

More information

A CP Approach to the Balanced Academic Curriculum Problem

A CP Approach to the Balanced Academic Curriculum Problem A CP Approach to the Balanced Academic Curriculum Problem Jean-Noël Monette, Pierre Schaus, Stéphane Zampelli, Yves Deville and Pierre Dupont Department of Computing Sciences and Engineering Université

More information

Time Complexity (1) CSCI Spring Original Slides were written by Dr. Frederick W Maier. CSCI 2670 Time Complexity (1)

Time Complexity (1) CSCI Spring Original Slides were written by Dr. Frederick W Maier. CSCI 2670 Time Complexity (1) Time Complexity (1) CSCI 2670 Original Slides were written by Dr. Frederick W Maier Spring 2014 Time Complexity So far we ve dealt with determining whether or not a problem is decidable. But even if it

More information

Solving Strategies for Highly Symmetric CSPs *

Solving Strategies for Highly Symmetric CSPs * Solving Strategies for Highly Symmetric CSPs * Pedro Meseguer Inst. Invest. Intel.ligencia Artificial CSIC Campus UAB, 08193 Bellaterra Spain Carme Torras Inst. Robotica i Informatica Industrial CSIC-UPC

More information

Network Design and Game Theory Spring 2008 Lecture 6

Network Design and Game Theory Spring 2008 Lecture 6 Network Design and Game Theory Spring 2008 Lecture 6 Guest Lecturer: Aaron Archer Instructor: Mohammad T. Hajiaghayi Scribe: Fengming Wang March 3, 2008 1 Overview We study the Primal-dual, Lagrangian

More information

A Quadratic Propagator for the Inter-Distance Constraint

A Quadratic Propagator for the Inter-Distance Constraint A Quadratic Propagator for the Inter-Distance Constraint Claude-Guy Quimper University of Waterloo School of Computer Science cquimper@uwaterloo.ca Alejandro López-Ortiz University of Waterloo School of

More information

Alpha-Beta Pruning: Algorithm and Analysis

Alpha-Beta Pruning: Algorithm and Analysis Alpha-Beta Pruning: Algorithm and Analysis Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction Alpha-beta pruning is the standard searching procedure used for solving

More information

Introduction to Bin Packing Problems

Introduction to Bin Packing Problems Introduction to Bin Packing Problems Fabio Furini March 13, 2015 Outline Origins and applications Applications: Definition: Bin Packing Problem (BPP) Solution techniques for the BPP Heuristic Algorithms

More information

Introduction. Chapter Context

Introduction. Chapter Context Chapter 1 Introduction As soon as an Analytical Engine exists, it will necessarily guide the future course of the science. Whenever any result is sought by its aid, the question will then arise But what

More information