Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

Strong Backdoors for Default Logic

Published: 17 June 2024 Publication History

Abstract

In this article, we introduce a notion of backdoors to Reiter’s propositional default logic and study structural properties of it. Also we consider the problems of backdoor detection (parameterised by the solution size) as well as backdoor evaluation (parameterised by the size of the given backdoor) for various kinds of target classes (CNF, KROM, MONOTONE) and all SCHAEFER classes. Also, we study generalisations of HORN-formulas, namely QHORN, RHORN, as well as DUALHORN. For these classes, we also classify the computational complexity of the implication problem. We show that backdoor detection is fixed-parameter tractable for the considered target classes and prove a complete trichotomy for backdoor evaluation. The problems are either fixed-parameter tractable, para-DeltaP2-complete, or para-NP-complete, depending on the target class.

1 Introduction

In the area of non-monotonic logic, one aims to find formalisms that model human-sense reasoning. It turned out that this kind of reasoning is quite different from classical deductive reasoning as in the classical approach the addition of information always leads to an increase of derivable knowledge. Yet, intuitively, human-sense reasoning does not work in that way: The addition of further facts may violate previous assumptions and can consequently significantly decrease the amount of derivable conclusions. Consequently, in contrast to the classical process the behaviour of human-sense reasoning is non-monotonic. In the 1980s, several kinds of formalisms have been introduced, most notably, circumscription [64], default logic [83], autoepistemic logic [74], and non-monotonic logic [66]. A good overview of this field is given by Marek and Truszczynśki [63]. One might wrongly expect that these logics are rather rusted and not really focussed in recent works [1, 2, 52, 56, 82, 92, 97].
In this article, we focus on Reiter’s Default Logic (DL), which has been introduced in 1980 [83] and is one of the most fundamental formalism to model human-sense reasoning. DL extends the usual logical derivations by rules of default assumptions (default rules). Informally, default rules follow the format “in the absence of contrary information, assume....” Technically, these patterns are taken up in triples of formulas \(\frac{\alpha :\beta }{\gamma }\), which express “if prerequisite \(\alpha\) can be deduced and justification \(\beta\) is never violated then assume conclusion \(\gamma\).” Default rules can be used to enrich calculi of different kinds of logics. Here, we consider a variant of propositional formulas, namely formulas in conjunctive normal form (cnf). A key concept of DL is that an application of default rules must not lead to an inconsistency if conflicting rules are present; instead, such rules should be avoided if possible. This concept results in the notion of stable extensions, which can be seen as a maximally consistent view of an agent with respect to his knowledge base together in combination with its set of default rules. The corresponding decision problem, i.e., the extension existence problem, then asks whether a given default theory has a consistent stable extension and is the problem of our interest. The computationally hard part of this problem lies in the detection of the order and “applicability” of default rules, which is a quite challenging task as witnessed by its \({\Sigma ^ \mathrm{p}_{2}}\)-completeness. In 1992, Gottlob showed that many important decision problems, beyond the extension existence problem, of non-monotonic logics are complete for the second level of the polynomial hierarchy [46] and accordingly are of high intractability.
A prominent approach to understand the intractability of a problem is to use the framework of parameterised complexity, which was introduced by Downey and Fellows [18, 19]. The main idea is to fix a certain structural property (the parameter) of a problem instance and to consider the computational complexity of the problem in dependency of the parameter. Then ideally, the complexity drops and the problem becomes solvable in polynomial time when the parameter is fixed. Notice that there are two kinds of such a polynomial runtime depending on how the parameter is related to the input length: \(f(k)\cdot n^{O(1)}\) versus \(n^{f(k)}\). In both kinds, the runtime becomes polynomial, whenever the parameter is assumed to be constant, but the quality of these two runtimes differs dramatically. Problems allowing for runtimes of the first kind are called fixed-parameter tractable, and the corresponding parameterised complexity class that contains all fixed-parameter tractable problems is called \(\mathrm{FPT}\). Problems with runtimes of the second kind are situated in the complexity class XP, which is very large class containing also \(\mathrm{FPT}\) and another entire hierarchy, the so-called \(\mathrm{W}\)-hierarchy. For example, for the satisfiability problem (Sat) asks, given a propositional formula, whether the formula is satisfiable [27]. One (naïve) parameter for Sat is the number of variables of the formula. Then, for a given formula \(\varphi\) of size n and k variables its satisfiability can be decided in time \(O(n\cdot 2^{k})\), i.e., in polynomial runtime in n if k is assumed to be fixed.
The invention of new parameters can be quite challenging, however, Sat has so far been considered under many different parameters [11, 77, 85, 93]. A concept that provides a parameter and has been widely used in theoretical investigations of propositional satisfiability are backdoors [45, 50, 88, 89, 95]. The size of a backdoor can be seen as a parameter with which one tries to exploit a small distance of a formula from being tractable. Formally, there exist several notions of backdoors, e.g., weak, strong, and deletion backdoors. In this article, we consider strong backdoors. Specifically, given a class \(\mathcal {F}\) of formulas and a formula \(\varphi\), a subset B of the variables of \(\varphi\) is a strong \(\mathcal {F}\)-backdoor if the formula \(\varphi\) under every truth assignment over B yields a formula that belongs to the class \(\mathcal {F}\). Using backdoors usually consists of the following two phases:
(i)
finding a backdoor (backdoor detection) and
(ii)
using the backdoor to solve the problem (backdoor evaluation).
If \(\mathcal {F}\) is a class of formulas where Sat is tractable and the backdoor detection problem is in FPT when parameterised by the size of the backdoor, then we can find such a backdoor in polynomial time in the input size and exponential in the size of the backdoor. For example, this is the case for the class that contains all Horn formulas or the class that contains all Krom formulas. Then, we use the backdoor to solve the problem, where the evaluation problem is also parameterised in the size of the backdoor. Hence, we can immediately conclude that Sat is fixed-parameter tractable when parameterised by the size of a smallest strong \(\mathcal {F}\)-backdoor.
Related Work. Backdoors for propositional satisfiability have been introduced by Williams, Gomes, and Selman [95, 96]. The concept of backdoors has recently been lifted to some non-monotonic formalisms as abduction [81], answer set programming [37, 38], and argumentation [21]. Beyond the classification of Gottlob [46], the complexity of fragments, in the sense of Post’s lattice, has been considered by Beyersdorff et al. extensively for default logic [7] and for autoepistemic logic by Creignou et al. [16]. Also parameterised analyses of non-monotonic logics in the spirit of Courcelle’s Theorem [12, 13] have recently been considered by Meier et al. [72]. Furthermore, Gottlob et al. studied treewidth as a parameter for various non-monotonic logics [48] and also considered a more CSP focused non-monotonic context within the parameterised complexity setting [49]. Gaspers, Ordyniak, and Szeider [44] surveyed results on CSP and backdoors. Gaspers et al. [42] investigated on heterogeneous target classes, which are formed by taking the union of existing target classes. Ganian, Ramanujan, and Szeider [41] established a parameter that combines treewidth and backdoors for SAT. Recently, Meier et al. [71] considered the concept of backdoors in linear temporal logic. Fichte, Hecher, and Schindler [33] considered treewidth for default logic, which is an orthogonal parameter to backdoors. There exists several recent research directions into the parameterised complexity of nonmonotonic formalisms [29, 30, 35, 60]. Default logic for propositional logic, as studied in this article, has been of interest not only in the recent years [3, 4, 5, 58, 59].
Contribution. In this article, we introduce a notion of backdoors to propositional default logic and study structural properties therein. Then we investigate the parameterised complexity of the problems of backdoor detection (parameterised by the size of the expected backdoor) and evaluation (parameterised by the size of the given backdoor), with respect to the most important classes of CNF-formulas, e.g., cnf, krom, horn, monotone, and positive-unit. Informally, given a formula \(\varphi\) and an integer k, the detection problem asks whether there exists a backdoor of size k for \(\varphi\). Backdoor evaluation then exploits the distance k for a target formula class to solve the problem for the starting formula class with a “simpler” complexity. Our classification shows that detection is fixed-parameter tractable for all considered target classes. However, for backdoor evaluation starting at cnf the parameterised complexity depends, as expected, on the target class: The parameterised complexity then varies among \(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\) (monotone), \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\) (krom, horn), and \(\mathrm{FPT}\) (positive-unit).
Prior Work. A preliminary version of this article appeared in the proceedings of the 19th International Conference on Theory and Applications of Satisfiability Testing [36]. The present article provides a higher level of detail, in particular full proofs and more examples. The new material includes additional results on the target classes horn and lower bounds. Furthermore, we present a full classification of the implication problem regarding generalisations of horn-classes, namely qhorn, rhorn, as well as dualhorn (see Section 2.2). These results are used in turn to provide a complete study of these classes with respect to our backdoor problems (detection as well as evaluation). Finally, we classify all schaefer-cases.

2 Preliminaries

We assume familiarity with standard notions in computational complexity, the complexity classes \(\mathrm{P}\) and \(\mathrm{NP}\), as well as the polynomial hierarchy. For more detailed information, we refer to other standard sources [19, 40, 78].
Parameterised Complexity. We follow the notion by Flum and Grohe [39]. A parameterised (decision) problem L is a subset of \(\Sigma ^*\times \operatorname{\mathbb {N}}\) for some finite alphabet \(\Sigma\).
Definition 2.1 (Precomputation on the Parameter).
Let C be a classical complexity class, then \(\mathrm{para}\hbox{-}\hspace{0.0pt}C\) consists of all parameterised problems \(L\subseteq \Sigma ^* \times \operatorname{\mathbb {N}}\), for which there exists an alphabet \(\Sigma ^{\prime }\), a computable function \(f:\operatorname{\mathbb {N}}\rightarrow \Sigma ^{\prime *}\), and a (classical) problem \(L^{\prime }\subseteq \Sigma ^*\times \Sigma ^{\prime *}\) such that
(i)
\(L^{\prime }\in C\), and
(ii)
for all instances \((x,k)\in \Sigma ^*\times \operatorname{\mathbb {N}}\) of L we have \((x,k)\in L\) if and only if \((x,f(k))\in L^{\prime }\).
For the complexity class \(\mathrm{P}\), we write \(\mathrm{FPT}\) instead of \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{P}\). We call a problem in \(\mathrm{FPT}\) fixed-parameter tractable and the runtime \(f(k)\cdot |x|^{O(1)}\) also fpt-time. Additionally, the parameterised counterparts of \(\mathrm{NP}\) and \({{\Delta }^ \mathrm{p}_{2}}= \mathrm{P}^ \mathrm{NP}\), which are denoted by \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\) and \(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\), are relevant in this article.
Example 2.2.
Let us consider the parameter “number of variables” for the satisfiability problem Sat. Then, Sat is in \(\mathrm{FPT}\), by the obvious brute-force algorithm that runs in time \(2^{k}\cdot |\varphi |\), for a given formula \(\varphi\) with k variables.
Now, we will briefly introduce the concept of fpt-approximability, which is a generalisation of the notion of approximation algorithms to the parameterised setting. As this concept is only relevant for Corollary 5.2 and only implicitly, we will not go into much detail here. Let \(r:\mathbb {N} \rightarrow \mathbb {R}_{\ge 1}\) be a function, called approximation ratio. An fpt-approximation algorithm is an fpt-algorithm that, given an instance \((x,k)\), either determines that there is no solution of size at most k or computes a solution of size at most \(k\cdot r(k)\) [20]. Intuitively, if k is small, then \(k \cdot r(k)\) can be still considered small. We say that a problem is fpt-approximable if it has an fpt-approximation algorithm for some function r. By abuse of notation, we use fpt-approximable also for decision problems, where we are simply interested in deciding whether a solution of size at most \(k \cdot r(k)\) exists.
Propositional Logic. Next, we provide some notions from propositional logic. We consider a finite set of propositional variables and use the symbols \(\top\) (true) and \(\bot\) (false). A literal is a variable x (positive literal) or its negation \(\lnot x\) (negative literal). A clause is a finite set of literals, interpreted as the disjunction of these literals. A propositional formula in conjunctive normal form (CNF) is a finite set of clauses, interpreted as the conjunction of its clauses. We denote the class of all CNF-formulas by cnf. Notice that constants per se do not appear in clauses, but constants can be seen as either atomic tautological/contradictory CNFs, i.e., \(\top\) and \(\bot\), respectively. For a given formula \(\varphi\), we denote by \(\mathrm{Vars}(\varphi)\) the set of its variables. If X is a set of variables, then \(\mathrm{Lits}(X)\) is the set of all literals of X, that is, it containts \(x,\lnot x\) for every \(x\in X\). A clause is (Dual)Horn [53] if it contains at most one positive (negative) literal, Krom if it contains two literals, monotone if it contains only positive literals, and positive-unit if it contains exactly one positive literal. Furthermore, a clause is c-valid, for \(c\in \lbrace 0,1\rbrace\), if it contains at least one negative (positive) literal if \(c=0\) (if \(c=1\)). We also consider generalisations of Horn-formulas, namely QHorn [8] and RHorn [10], that are defined as follows. A CNF-formula \(\varphi =\bigwedge _{i=1}^n\bigvee _{j=1}^m \ell _{ij}\) is QHorn if there exists a certifiying function \(\beta : \mathrm{Lits}( \mathrm{Vars}(\varphi))\rightarrow \lbrace 0,\frac{1}{2}, 1\rbrace\) with \(\beta (x)=1-\beta (\lnot x)\) for every \(x\in \mathrm{Vars}(\varphi)\) such that for every clause \(C\in \varphi\), we have that \(\sum _{\ell \in C}\beta (\ell)\le 1\). (Notice that this function definition does not introduce any kind of three valued logic.)
Example 2.3 (QHorn).
The formula \(\varphi =\lbrace \lbrace x, y, \lnot z\rbrace ,\lbrace y,\lnot z\rbrace \rbrace\) is QHorn, as we can choose \(\beta (y)=\beta (z)=\frac{1}{2}\) and \(\beta (x)=1\). Note that \(\varphi\) is not Horn, as the first clause contains two positive literals.
Given a CNF-formula \(\varphi\) and a subset of its variables \(X\subseteq \mathrm{Vars}(\varphi)\), we say a renaming \(\varphi _X\) is the formula \(\varphi\), where every literal \(\ell\) in \(\varphi\) of a variable in X is flipped, that is, if \(\ell =x\) (respectively, \(\ell =\lnot x\)), then the flipped version is \(\lnot x\) (respectively, x). We say that \(\varphi\) is RHorn (renamable Horn) if there exists a set \(X\subseteq \mathrm{Vars}(\varphi)\) such that \(\varphi _X\) is Horn.
Example 2.4 (RHorn).
The formula \(\varphi =\lbrace \lbrace x,y\rbrace ,\lbrace \lnot x,\lnot y\rbrace \rbrace\) is RHor, as we can choose \(X=\lbrace x\rbrace\) and then \(\varphi _X=\lbrace \lbrace \lnot x,y\rbrace ,\lbrace x,\lnot y\rbrace \rbrace\) is Horn. Note that \(\varphi\) is not Horn, as it contains a clause with two positive literals.
Formally, a formula is (Dual)Horn, Krom, monotone, positive-unit, Qhorn, RHorn, 0-valid, and 1-valid if all its clauses have the respective property. Furthermore, we denote by horn, dualhorn, krom, monotone, positive-unit, qhorn, rhorn, 0valid, and 1valid the classes of all formulas that are (Dual)Horn, Krom, monotone, positive-unit, QHorn, RHorn, 0valid, and 1valid, respectively.
From the previous definitions the following containment structure follows:
\begin{equation*} \scriptsize \text{HORN}\subsetneq \scriptsize \text{RHORN}\subsetneq \scriptsize \text{QHORN}\supsetneq \scriptsize \text{KROM}. \end{equation*}
A formula is in \(\oplus\)-CNF if it can be written in the form \(\bigwedge _{i=1}^m\bigoplus _{j=1}^{i_m}\ell _{i,j}\), that is, the clauses of the CNF are not disjunctions but exclusive-ors. By this, we define the class affine-formulas as those that can be expressed in \(\oplus\)-CNF. We say that a CNF-formula has a certain property if all its clauses have the property. Finally, we say that a formula is schaefer if it is 0valid, 1valid, horn, dualhorn, krom, or affine (in honor of Thomas J. Schaefer [86]). Table 1 gives an overview on these classes and defines clause forms for some of these classes.
Table 1.
Table 1. Considered Normal Forms
A formula \(\varphi ^{\prime }\) is a subformula of a cnf-formula \(\varphi\) (in symbols \(\varphi ^{\prime } \subseteq \varphi\)) if for each clause \(C^{\prime } \in \varphi ^{\prime }\) there is some clause \(C \in \varphi\) such that \(C^{\prime } \subseteq C\). We call a class \(\mathcal {F}\) of cnf-formulas clause induced if, whenever \(F\in \mathcal {F}\), all subformulas \(F^{\prime }\subseteq F\) belong to \(\mathcal {F}\). Note that all considered target classes in this article are clause induced.
Given a formula \(\varphi \in\) cnf, and a subset \(X\subseteq \mathrm{Vars}(\varphi)\), then a (truth) assignment is a mapping \(\theta :X\rightarrow \lbrace 0,1\rbrace\). The truth (evaluation) of propositional formulas is defined in the standard way, in particular, \(\theta (\bot) = 0\) and \(\theta (\top)=1\). We extend \(\theta\) to literals by setting \(\theta (\lnot x) = 1 - \theta (x)\) for \(x \in X\). By \(\mathbb {A}(X)\) we denote the set of all assignments \(\theta :X \rightarrow \lbrace 0,1\rbrace\). For simplicity of presentation, we sometimes identify the set of all assignments by its corresponding literals, i.e., \(\mathbb {A}(X)=\lbrace \,\lbrace \ell _1,\dots ,\ell _{|X|}\rbrace \mid x\in X, \ell _i\in \lbrace x,\lnot x\rbrace \,\rbrace\). We write \(\varphi [\theta ]\) for the reduct of \(\varphi\), where for every literal \(\ell \in X\), all clauses that contain \(\ell\) with \(\theta (\ell) = 1\) are removed and from the remaining clauses all literals \(\ell ^{\prime }\) with \(\theta (\ell ^{\prime })=0\) are removed; whenever a clause becomes empty in that case, the whole formula is replaced by \(\bot\). We say \(\theta\) satisfies \(\varphi\) if \(\varphi [\theta ]\equiv \top\), \(\varphi\) is satisfiable if there exists an assignment that satisfies \(\varphi\), and \(\varphi\) is tautological if all assignments \(\theta \in \mathbb {A}(X)\) satisfy \(\varphi\). Let \(\varphi ,\psi \in\) cnf, and \(X = \mathrm{Vars}(\varphi) \cup \mathrm{Vars}(\psi)\). We write \(\varphi \models \psi\) if and only if for all assignments \(\theta \in \mathbb {A}(X)\) we have that \(\theta\) satisfying \(\varphi\) implies \(\theta\) satisfying \(\psi\). Furthermore, we define the deductive closure of \(\varphi\) as \(\mathrm{Th}(\varphi)\mathrel {\mathop :}=\lbrace \,\psi \in \scriptsize \text{CNF} \mid \varphi \models \psi \,\rbrace\).
Note that any assignment \(\theta : \mathrm{Vars}(\varphi)\rightarrow \lbrace 0,1\rbrace\) can also be represented by the CNF-formula \(\bigwedge _{\theta (x)=1}x\wedge \bigwedge _{\theta (x)=0}\lnot x\). Consequently, we often write \(\theta \models \varphi\) if \(\varphi [\theta ]\equiv \top\) is true.
If \(\Phi\) is a set of formulas and \(\psi\) is a formula, then \(\Phi \models \psi\) is defined as \(\bigwedge _{\varphi \in \Phi }\varphi \models \psi\).
We denote with Sat \((\mathcal {F})\) the problem, given a propositional formula \(\varphi \in \mathcal {F}\) asking whether \(\varphi\) is satisfiable. The problem Taut \((\mathcal {F})\) is defined over a given formula \(\varphi \in \mathcal {F}\) asking whether \(\varphi\) tautological.

2.1 Default Logic

We follow notions by Reiter [83] and define a default rule \(\delta\) as a triple \(\frac{\alpha :\beta }{\gamma }\); \(\alpha\) is called the prerequisite, \(\beta\) is called the justification, and \(\gamma\) is called the conclusion; and we set \({\it prereq}(\delta)\mathrel {\mathop :}=\alpha\), \({\it just}(\delta)\mathrel {\mathop :}=\beta\), and \({\it concl}(\delta)\mathrel {\mathop :}=\gamma\). If \(\mathcal {F}\) is a class of formulas, then \(\frac{\alpha :\beta }{\gamma }\) is an \(\mathcal {F}\)-default rule if \(\alpha ,\beta ,\gamma \in \mathcal {F}\). An \(\mathcal {F}\)-default theory \(\langle W,D\rangle\) consists of a set of propositional formulas \(W\subseteq \mathcal {F}\) and a set D of \(\mathcal {F}\)-default rules. We sometimes call W the knowledge base of \(\langle W,D\rangle\). Whenever we do not explicitly state the class \(\mathcal {F}\), we assume it to be cnf.
Definition 2.5 (Fixed Point Semantics, [83]).
Let \(\langle W,D\rangle\) be a default theory and E be a set of formulas. Then \(\Gamma (E)\) is the smallest set of formulas such that
(1)
\(W\subseteq \Gamma (E)\),
(2)
\(\Gamma (E)=\mathrm{Th}(\Gamma (E))\), and
(3)
for each \(\frac{\alpha :\beta }{\gamma }\in D\) with \(\alpha \in \Gamma (E)\) and \(\lnot \beta \notin E\), we have that \(\gamma \in \Gamma (E)\).
E is a stable extension of \(\langle W,D\rangle\) if \(E=\Gamma (E)\). An extension is inconsistent if it contains \(\bot\); otherwise, it is called consistent.
A definition of stable extensions beyond fixed point semantics, which has been introduced by Reiter [83] as well, uses the principle of a stage construction.
Proposition 2.6 (Stage Construction, [83]).
Let \(\langle W,D\rangle\) be a default theory and E be a set of formulas. Then define \(E_0\mathrel {\mathop :}=W\) and
\begin{equation*} E_{i+1} \mathrel {\mathop :}=\mathrm{Th}(E_i)\cup \left\lbrace \,\gamma \;\Bigg |\; \frac{\alpha :\beta }{\gamma }\in D,\alpha \in E_i\ and\ \lnot \beta \notin E\,\right\rbrace . \end{equation*}
E is a stable extension of \(\langle W,D\rangle\) if and only if \(E=\bigcup _{i\in \operatorname{\mathbb {N}}}E_i\). The set
\begin{equation*} G=\left\lbrace \,\frac{\alpha :\beta }{\gamma }\in D\;\Bigg |\; \alpha \in E\wedge \lnot \beta \notin E\,\right\rbrace \end{equation*}
is called the set of generating defaults. If E is a stable extension of \(\langle W,D\rangle\), then \(E=\mathrm{Th}(W\cup \lbrace \,{\it concl}(\delta)\mid \delta \in G\,\rbrace)\).
Example 2.7.
Let \(W=\emptyset\), \(W^{\prime }=\lbrace x\rbrace\), \(D_1=\lbrace \frac{x:y}{\lnot y},\frac{\lnot x:y}{\lnot y}\rbrace\), and \(D_2=\lbrace \frac{x:z}{\lnot y},\frac{x:y}{\lnot z}\rbrace\). The default theory \(\langle W,D_1\rangle\) has only the stable extension \(\mathrm{Th}(W)\). The default theory \(\langle W^{\prime },D_1\rangle\) has no stable extension. The default theory \(\langle W^{\prime },D_2\rangle\) has the stable extensions \(\mathrm{Th}(\lbrace x,\lnot y\rbrace)\) and \(\mathrm{Th}(\lbrace x,\lnot z\rbrace)\).
The following example illustrates that a default theory might contain “contradicting” default rules that cannot be avoided in the process of determining extension existence. Informally, such default rules prohibit stable extensions. Note that there are also less obvious situations where “chains” of such default rules interact with each other.
Example 2.8.
Consider \(W^{\prime }\) and \(D_2\) from Example 2.7 and let \(D_2^{\prime }=D_2 \cup \lbrace \frac{ \top :\beta }{\lnot \beta }\rbrace\) for some formula \(\beta\). The default theory \(\langle W^{\prime },D_2^{\prime }\rangle\) has no stable extension unless \(W^{\prime }\cup \lbrace \lnot y\rbrace \models \lnot \beta\) or \(W^{\prime }\cup \lbrace \lnot z\rbrace \models \lnot \beta\).
Technically, the definition of stable extensions allows inconsistent stable extensions. However, Marek and Truszczyński showed that inconsistent extensions only occur if the set W is already inconsistent where \(\langle W,D\rangle\) is the theory of interest [63, Corollary 3.60]. An immediate consequence of this result explains why the interplay between consistency and stability of extensions is more subtle:
(i)
if W is consistent, then every stable extension of \(\langle W,D\rangle\) is consistent, and
(ii)
if W is inconsistent, then \(\langle W,D\rangle\) has a stable extension.
In Case (ii) the stable extension consists of the set \(\mathcal {L}\) of all formulas. Consequently, it makes sense to consider only consistent stable extensions as the relevant ones. Moreover, we refer by \(\mathrm{SE}_{}( \langle W,D\rangle)\) to the set of all consistent stable extensions of \(\langle W,D\rangle\).
A main computational problem for DL is the extension existence problem, defined as follows where \(\mathcal {F}\) is a class of propositional formulas:
Problem:  Ext(\(\mathcal {F}\)), also called Extension Existence.
Input:  An \(\mathcal {F}\)-default theory \(\langle W, D \rangle\).
Question:  Does \(\langle W, D \rangle\) have a consistent stable extension?
The following proposition summarises relevant results for the extension existence problem for certain classes of formulas.
Proposition 2.9.
(1)
Ext(cnf) is \({\Sigma ^ \mathrm{p}_{2}}\)-complete [46].
(2)
Ext(horn) is \(\mathrm{NP}\)-complete [90, 91].
(3)
Ext(positive-unit) \(\in \mathrm{P}\) [7].

2.2 The Implication Problem for Horn Variants

The implication problem is an important (sub-)problem when reasoning with default theories. In the following, we first formally introduce the implication problem for classes of propositional formulas and then state its (classical) computational complexity for the the classes horn, krom, as well as the generalisations dualhorn qhorn rhorn.
Problem:  Imp \((\mathcal {F})\),also called Implication.
Input:  A set \(\Phi\) of \(\mathcal {F}\)-formulas and a formula \(\psi \in \mathcal {F}\).
Question:  Does \(\Phi \models \psi\) hold?
Beyersdorff et al. [7] have considered all Boolean fragments of Imp \((\mathcal {F})\) and completely classified its computational complexity concerning the framework of Post’s lattice. To make this concept a bit clearer to the reader, we give some intuition. Post’s lattice refers to so-called clones. Intuitively, a clone is a set of Boolean functions with some properties. For example, the clone of all monotone Boolean functions is the set of all Boolean functions that are monotone. On that level, Beyersdorff et al. have considered restrictions of default theories to certain clones. As a result, such restrictions are on the level of allowed Boolean functions. That is, no particular normal forms of functions are enforced. Accordingly, these results are not fully applicable to our setting. However, since several subclasses of cnf, like horn or krom, use the Boolean functions “\(\wedge\)”, “\(\lnot\)”, and “\(\vee\)”, such classes are unrestricted from the perspective of Post’s lattice. Still, efficient algorithms are known for such classes from propositional satisfiability. The next results state a similar behaviour for the implication problem. Intuitively, we are able to reduce the implication question to separate non-tautology questions that, in turn, can be reduced to satisfiability questions.
The following results will yield several \(\mathrm{P}\) results for fragments of the implication problem that will be used in the sequel. Beyond the obvious use in our setting, these results are also interesting from a theoretical perspective and might find applications in other contexts that are relevant to the implication problem.
Lemma 2.10.
Imp(qhorn) \(\in \mathrm{P}\).
Proof.
Given a set \(\Phi\) of qhorn-formulas and a formula \(\psi \in\) qhorn. Without loss of generality assume that \(\bigwedge _{\varphi \in \Phi }\varphi = \bigwedge _{i=1}^m C_i\) and \(\psi = \bigwedge _{i=1}^n C^{\prime }_i\). Then we have that
\begin{align} \left\langle \Phi ,\psi \right\rangle \in \rm{I}\rm\small{MP}(\scriptsize \text{QHORN}) &\Leftrightarrow \left(\bigwedge _{i=1}^m C_i, \bigwedge _{i=1}^n C^{\prime }_i\right)\in \rm{I}\rm\small{MP}(\scriptsize \text{QHORN}),[1] \end{align}
(1)
\begin{align} &\Leftrightarrow \left(\bigwedge _{i=1}^m C_i\right)\rightarrow \left(\bigwedge _{i=1}^n C^{\prime }_i\right)\in \rm {T}\rm\small{AUT},[1] \end{align}
(2)
\begin{align} &\Leftrightarrow \bigwedge _{i=1}^n \left(\bigwedge _{j=1}^m C_j\rightarrow C^{\prime }_i\right)\in \rm {T}\rm\small{AUT},[1] \end{align}
(3)
\begin{align} &\Leftrightarrow \forall \; 1\le i\le n \left(\bigwedge _{j=1}^m C_j\rightarrow C^{\prime }_i\right)\in \rm {T}\rm\small{AUT},[1] \end{align}
(4)
\begin{align} &\Leftrightarrow \lnot \exists \;1\le i\le n \left(\bigwedge _{j=1}^m C_j\rightarrow C^{\prime }_i\right)\not\in \rm {T}\rm\small{AUT}, \end{align}
(5)
(1)
definition of the implication problem.
(2)
expressing implication through the propositional function \(\rightarrow\).
(3)
\(\alpha \rightarrow \beta \wedge \gamma\) is a tautology if and only if \((\alpha \rightarrow \beta)\wedge (\alpha \rightarrow \gamma)\) is a tautology.
(4)
separated to parallel tautology questions.
(5)
\(\alpha \wedge \beta\) is a tautology iff neither \(\alpha\) nor \(\beta\) is not a tautology.
Now, we can check the last n problems separately by
\begin{align*} \left(\bigwedge _{j=1}^m C_j\rightarrow (\underbrace{\ell _{i,1}\vee \cdots \vee \ell _{i,k_i}}_{C_i^{\prime }})\right)\not\in \rm {T}\rm\small{AUT}&\Leftrightarrow \left(\bigwedge _{j=1}^m C_j\right)[\theta _0]\in \rm{S}\rm\small{AT} (\scriptsize \text{QHORN}), \end{align*}
where \(\theta _0\) is the assignment such that \(\theta _0(\ell)\mathrel {\mathop :}=0\) for all \(\ell \in \lbrace \ell _{i,1},\dots ,\ell _{i,k_1}\rbrace\). Observe that if \(\ell _{i,\mu }\equiv \sim \!\!\ell _{i,\nu }\) for some \(1\le \mu \ne \nu \le k_i\), then the implication on the left part of the equivalence is always a tautology. Further note that applying an assignment to a qhorn-formula, that is, considering the reduct of the formula under an assignment, maintains the qhorn-property. As satisfiability of qhorn-formulas is in \(\mathrm{P}\) [8, 9], the claimed result follows. □
The previous proof also works for krom- and rhorn-formulas.
Corollary 2.11.
Imp \((\mathcal {C})\in \mathrm{P}\) for \(\mathcal {C}\in \lbrace\) krom, rhorn, horn}.
Proof.
Use the same reduction as in the proof of Lemma 2.10. Furthermore, it is known that satisfiability for krom- [55], for rhorn- [10] as well as for horn-formulas [53] is in \(\mathrm{P}\). □
Also the dualhorn-variant exhibits membership in \(\mathrm{P}\).
Lemma 2.12.
Imp (dualhorn) \(\in \mathrm{P}\).
Proof.
W.l.o.g., we can assume, given two dualhorn-formulas \(\varphi ,\psi\), that \(\mathrm{Vars}(\varphi)= \mathrm{Vars}(\psi)\) (otherwise, extend both formulas with tautological clauses of the kind \((x\wedge \lnot x)\), which are both, horn and dualhorn). Now note that the classical reduction for the satisfiability problem from dualhorn- to horn-formulas works here as well, as it provides a one-to-one correspondence between assignments. That means we have
\begin{equation*} \langle \Phi ,\Psi \rangle \in \rm{I}\rm\small{MP}(\scriptsize\text{DUALHORN}) \Leftrightarrow \langle \overline{\Phi },\overline{\Psi }\rangle \in \rm{I}\rm\small{MP}(\scriptsize \text{HORN}), \end{equation*}
where \(\overline{\Phi }\) for a set of formulas \(\Phi\) is defined as \(\lbrace \,\varphi (\lnot x_1,\dots ,\lnot x_n)\mid \varphi (x_1,\dots ,x_n)\in \Phi \,\rbrace .\) This reduction is computable in constant space. As Imp (horn) \(\in \mathrm{P}\) (see Corollary 2.11), this shows the desired result. □
The following corollary shows that the consideration of backdoor evaluation for the extension existence problem starting from all the above-investigated horn-variants for default theories is worth studying.
Corollary 2.13.
Ext \((\mathcal {C})\) is \(\mathrm{NP}\)-complete for \(\mathcal {C}\in \lbrace\) krom, horn, qhorn, rhorn}.
Proof.
As Corollary 2.11 shows that Imp (krom) \(\in \mathrm{P}\), we get that the extension checking problem for krom default theories is in \(\mathrm{P}\) with the help of Proposition 4.3. To show the \(\mathrm{NP}\) upper bound on input \(\langle W,D\rangle\), the algorithm just guesses the set of generating defaults \(G\subseteq D\) and then verifies if \(W\wedge \bigwedge _{\frac{\alpha :\beta }{\gamma }\in G}\gamma\) is an extension with respect to \(\langle W,D\rangle\).
For the lower bound observe that the default theory constructed by Beyersdorff et al. (Lemma 5.6 in Reference [7]) consists only of literal-formulas (so being utilisable by all four classes) settling the lower bound by a reduction from 3Sat. □

3 Strong Backdoors

In this section, we lift the concept of backdoors to the world of default logic. First, we review backdoors from the propositional setting [95, 96], where a backdoor is a subset of the variables of a given formula. Formally, for a class \(\mathcal {F}\) of formulas and a formula \(\varphi\), a strong \(\mathcal {F}\)-backdoor is a set B of variables such that for all assignments \(\theta \in \mathbb {A}(B)\), we have that \(\varphi [\theta ]\in \mathcal {F}\).
Backdoors in propositional satisfiability have proven themselves useful for deciding propositional satisfiability [45]: We can brute-force all assignments to the variables in the strong \(\mathcal {F}\) backdoor and solve the remaining formula when \(\mathcal {F}\) is a tractable class. These backdoors follow the binary character of truth assignments. Each variable of a given formula is considered to be either true or false. We need an analogue in default-logic for brute-forcing all assignments to the variables in the backdoor, as reasoning in default logic has a ternary character. When we consider consistent stable extensions of a given default theory, then one of the following three cases is true for some formula \(\varphi\) with respect to an extension E:
(i)
\(\varphi\) is contained in E,
(ii)
the negation \(\lnot \varphi\) is contained in E, or
(iii)
neither \(\varphi\) nor \(\lnot \varphi\) is contained in E (e.g., for the theory \(\langle \lbrace x\rbrace ,D_2\rangle\), from Example 2.7, neither b nor \(\lnot b\) is contained in any of the two stable extensions, and b is a variable).
Since we need to weave this trichotomous point of view into a backdoor definition for default logic, the original definition of backdoors cannot immediately be transferred (from the SAT setting) to the scene of default logic. The first step is a notion of extended literals and reducts. The next step can be seen as a generalisation of assignment functions to our setting.
Definition 3.1 (Extended Literals and Reducts).
An extended literal is a literal or a fresh variable \(x_\varepsilon\). For convenience, we further define \(\sim \!\!\ell =x\) if \(\ell =\lnot x\) and \(\sim \!\!\ell =\lnot x\) if \(\ell =x\). Given a formula \(\varphi\) and an extended literal \(\ell\), the reduct \(\rho _{\ell }(\varphi)\) is obtained from \(\varphi\) such that the following is true:
(1)
If \(\ell\) is a literal, then all clauses of \(\varphi\) that contain \(\ell\) are deleted and all literals \(\sim \!\!\ell\) are deleted from all clauses of \(\varphi\). Note that an empty clause corresponds to false.
(2)
If \(\ell =x_\varepsilon\), then all occurrences of literals \(\lnot x, x\) are deleted from all clauses of \(\varphi\).
Let \(\langle W,D\rangle\) be a default theory, with \(D=\lbrace \delta _1,\dots ,\delta _n\rbrace\) for some \(n\in \mathbb {N}\) and \(\ell\) be an extended literal. Then, we define the reduct of \(\langle W,D\rangle\) with respect to \(\ell\) as
\begin{equation*} \rho _{\ell }(W,D):=\left(\rho _{\ell }(W),\left\lbrace \frac{\rho _{\ell }(\alpha):\rho _{\ell }(\beta)}{\rho _{\ell }(\gamma)\wedge y_i}\;\left|\;\delta _i=\frac{\alpha :\beta }{\gamma }\in D\right.\right\rbrace \right), \end{equation*}
where \(y_i\) is a fresh proposition and \(\rho _{\ell }(W)\) is \(\bigcup _{w\in W}\rho _{\ell }(w)\).
Let \(\delta =\frac{\alpha :\beta }{\gamma }\) be a default rule. Let \(\mathcal {C}\) be a CNF-property such that \(\gamma \in \mathcal {C}\). Then it can happen that the reduct of gamme is not anymore in \(\mathcal {C}\). While at first sight this might seem to be a problem, it is not. The reason is that the conclusions are used to derive new formulas via deduction. For deduction, \(\varphi \models \gamma ^{\prime }\wedge y_i\) is equivalent to \(\varphi \models \gamma ^{\prime }\) and \(\varphi \models y_i\). For convenience, we will still call such default theories then \(\mathcal {C}\)-default theories. Although, as explained before, formally for the conclusions \(\gamma ^{\prime }\wedge y_i\) this might not be the case, but \(\gamma ^{\prime }\) has still to be in \(\mathcal {C}\).
Later (in the proof of Lemma 3.9), we need the \(y_i\)s for technical reasons, namely we use them keep track of which defaults are applied when constructing a stable extension.
Example 3.2.
Given the default theory
\begin{equation*} \left\langle W,D \right\rangle =\left(\lbrace x\rbrace ,\left\lbrace \frac{x:y}{\lnot y\vee x}\right\rbrace \right), \end{equation*}
we will exemplify the notion of reductions for x, \(\lnot x\), and \(x_\varepsilon\).
An application of Definition 3.1 leads to
\begin{equation*} \rho _{x}(W,D) =\left\langle \lbrace \top \rbrace , \left\lbrace \frac{\top :y}{y_1}\right\rbrace \right\rangle ,\quad \rho _{\lnot x}(W,D)=\left\langle \lbrace \bot \rbrace ,\left\lbrace \frac{\bot :y}{\lnot y\wedge y_1}\right\rbrace \right\rangle =\rho _{x_{\varepsilon }}(W,D). \end{equation*}
In the next step, we incorporate the notion of reducts into sets of assignments. Accordingly, we introduce ternary assignment sets. Let X be a set of variables; then we define
\begin{equation*} \mathbb {T}(X):=\lbrace \lbrace a_1,\dots ,a_{|X|}\rbrace \mid x\in X \text{ and} a_i\in \lbrace x, \lnot x,x_\varepsilon \rbrace \rbrace . \end{equation*}
Technically, \(\mathbb {A}(X)\subsetneq \mathbb {T}(X)\) is true. That is justified by \(\mathbb {T}(X)\) additionally containing variables \(x_\varepsilon\) that will behave as “do not care” variables encompassing the trichotomous reasoning approach explained above. For \(Y\in \mathbb {T}(X)\) the reduct \(\rho _{Y}(W,D)\) is the consecutive application of all \(\rho _{y}(\cdot)\) for \(y\in Y\) to \(\langle W,D\rangle\). Observe that the order in which we apply the reducts to \(\langle W,D\rangle\) is not important.
The following proposition ensures that the addition of the \(y_i\)s from Definition 3.1 does not influence negatively our reasoning process, i.e., implication of formulas is invariant under adding conjuncts of fresh variables to the premise.
Proposition 3.3.
Let \(\varphi ,\psi \in\) cnf be two formulas and \(y\notin \mathrm{Vars}(\varphi)\cup \mathrm{Vars}(\psi)\). Then, \(\varphi \models \psi\) if and only if \(\varphi \wedge y\models \psi\).
Now we show that implication for cnf-formulas that do not contain tautological clauses is invariant under the application of “deletion reducts” \(\rho _{x_\varepsilon }(\cdot)\). This will allow us, together with another property (shown in Lemma 3.5) to lift implication questions of formulas to implication questions of their reducts (Corollary 3.7). This will be a central property for applying backdoors.
Lemma 3.4.
Let \(\psi ,\varphi \in\) cnf be two formulas that do not contain tautological clauses. If \(\psi \models \varphi\), then \(\rho _{x_\varepsilon }(\psi)\models \rho _{x_\varepsilon }(\varphi)\) for every variable \(x\in \mathrm{Vars}(\varphi)\cup \mathrm{Vars}(\psi)\).
Proof.
Assume for contradiction that \(\rho _{x_\varepsilon }(\psi)\not\models \rho _{x_\varepsilon }(\varphi)\). Then there exists an assignment \(\theta , \mathrm{Vars}(\rho _{x_\varepsilon }(\psi))\cup \mathrm{Vars}(\rho _{x_\varepsilon }(\varphi))\rightarrow \lbrace 0,1\rbrace\), such that \(\theta \models \rho _{x_\varepsilon }(\psi)\) but \(\theta \not\models \rho _{x_\varepsilon }(\varphi)\). As \(\theta \models \rho _{x_\varepsilon }(\psi)\), every arbitrary extension of \(\theta\) satisfies \(\psi\), in particular, any extension on \(\lbrace x\rbrace \cup \mathrm{Vars}(\rho _{x_\varepsilon }(\psi))\cup \mathrm{Vars}(\rho _{x_\varepsilon }(\varphi))\). Denote such an extension by \(\theta _x\). Yet, by \(\psi \models \varphi\) we get \(\theta _x\models \varphi\). As this is true for any arbitrary such \(\theta _x\), the satisfiability of \(\varphi\) is independent of setting x wherefore \(\theta _x\models \rho _{x_\varepsilon }(\varphi)\) as well. (Note that here it is crucial that we require \(\varphi\) to contain no tautological clauses.) As \(x\notin \mathrm{Vars}(\rho _{x_\varepsilon }(\varphi))\) is true, we get \(\theta \models \rho _{x_\varepsilon }(\varphi)\), which is a contradiction. As a result, \(\rho _{x_\varepsilon }(\psi)\models \rho _{x_\varepsilon }(\varphi)\). □
The following lemma shows that implication for cnf-formulas is invariant under the application of reducts over \(\mathbb {A}\), i.e., the usual assignments. Note that an assignment \(\theta\) can be interpreted as a set of literals that are set to true.
Lemma 3.5.
Let \(\psi ,\varphi\) be two cnf-formulas, and \(X\subseteq \mathrm{Vars}(\psi)\cup \mathrm{Vars}(\varphi)\). If \(\psi \models \varphi\) is true, then \(\rho _{Y}(\psi)\models \rho _{Y}(\varphi)\) is true for every set \(Y\in \mathbb {A}(X)\).
Proof.
Let \(\psi ,\varphi\), and X be as in the formulation of the lemma and assume that \(\psi \models \varphi\) is true. Now fix an arbitrary \(Y\in \mathbb {A}(X)\) and consider every assignment \(\tau _Y: \mathrm{Vars}(\rho _{Y}(\psi))\cup \mathrm{Vars}(\rho _{Y}(\varphi))\rightarrow \lbrace 0,1\rbrace\). Note that \(\tau _Y\) is defined on \(( \mathrm{Vars}(\psi)\cup \mathrm{Vars}(\varphi))\setminus Y\). Define \(\tau \upharpoonright Y\) as the assignment \(\tau\) extended by setting \(\tau (x)\mathrel {\mathop :}=1\) if \(x\in Y\), and \(\tau (x)\mathrel {\mathop :}=0\) if \(\lnot x\in Y\). Consequently, \(\tau \upharpoonright Y\) completely agrees with \(\tau\) on the variables in Y.
Then \(\tau \upharpoonright Y \models \lnot \psi \vee \varphi\) is true by assumption as \(\psi \models \varphi\). Then, by an easy induction, we get \(\tau \upharpoonright Y\models \varphi\) if and only if \(\tau \models \rho _{Y}(\varphi)\) and \(\tau \upharpoonright Y\models \psi\) if and only if \(\tau \models \rho _{Y}(\psi)\). On that account, we get
\begin{equation*} \tau \models \rho _{Y}(\psi) \Longleftrightarrow \tau \upharpoonright Y \models \psi \Longrightarrow \tau \upharpoonright Y\models \varphi \Longleftrightarrow \tau \models \rho _{Y}(\varphi), \end{equation*}
and the lemma follows. □
We denote by BD-Imp (cnf \(\rightarrow \mathcal {F})\) the parameterised version of the problem Imp (cnf) where additionally a strong \(\mathcal {F}\)-backdoor is given and the parameter is the size of the strong \(\mathcal {F}\)-backdoor.
Corollary 3.6.
BD-mp (cnf \(\rightarrow \mathcal {F}) \in \mathrm{FPT}\), for \(\mathcal {F}\in \lbrace\) positive-unit, horn, krom, qhorn rhorn, dualhorn}.
Proof.
Let \(W,\varphi ,X\) be the given input instance. Then the following \(\mathrm{FPT}\) algorithm decides the problem BD-mp (cnf \(\rightarrow \mathcal {F})\). For every assignment \(Y\in \mathbb {A}(X)\), check if \(\rho _{Y}(W)\models \rho _{Y}(\varphi)\). For the corresponding classes \(\mathcal {F}\), these implication problems are all decidable in polynomial time (see Section 2.2), and positive-unit is a special case of horn. The correctness follows from Lemma 3.5. Accordingly, the corollary is proven. □
A combination of Lemma 3.4 and Lemma 3.5 now yields a generalisation for CNF-formulas that do not contain tautological clauses. Note that the crucial difference is the use of \(\mathbb {T}\) instead of \(\mathbb {A}\) in the claim of the result.
Corollary 3.7.
Let \(\psi ,\varphi\) be two cnf-formulas that do not contain tautological clauses and \(X\subseteq \mathrm{Vars}(E)\cup \mathrm{Vars}(\varphi)\) be a set of variables. If \(\psi \models \varphi\), then for every set \(Y\in \mathbb {T}(X)\) we have that \(\rho _{Y}(\psi)\models \rho _{Y}(\varphi)\).
The following lemma states that we do not lose any stable extensions under the application of reducts. Before we can start with the lemma, we need to introduce a bit of notion. The following concept is utilised later to identify the set of stable extensions of a default theory. To some extend it can be seen as a syntactic sugar that otherwise could be algorithmically identified on a syntactic level. However, we will use it also on the algorithmic level for having simpler implication questions, as will be pointed out in the proof of Lemma 4.5.
Definition 3.8 (y Conclusions)
For a set \(D=\lbrace \delta _1,\dots ,\delta _n\rbrace\) of default rules and a set E of formulas, we define \(\mathrm{y\hbox{-}\hspace{0.0pt}concl}(D,E)\mathrel {\mathop :}=\lbrace {\it concl}(\delta _i)\mid 1\le i\le n, \delta _i\in D, E\models y_i\rbrace ,\) that is, the set of conclusions of default rules \(\delta _i\) such that \(y_i\) is implied by formulas in E.
Furthermore, for a set X of variables, we will extend the notion for \(\mathrm{SE}_{}(\cdot)\) as follows:
\begin{equation*} \mathrm{SE}_{}( \left\langle W,D \right\rangle ,X)\mathrel {\mathop :}=\bigcup _{Y\in \mathbb {T}(X)}\lbrace \,\mathrm{Th}(W\cup \mathrm{y\hbox{-}\hspace{0.0pt}concl}(D,E))\mid E\in \mathrm{SE}_{}(\rho _{Y}(W,D))\,\rbrace . \end{equation*}
Lemma 3.9.
Let \(\langle W,D\rangle\) be a cnf default theory with formulas that do not contain tautological clauses, and X be a set of variables from \(\mathrm{Vars}(W,D)\). Then, we have that \(\mathrm{SE}_{}( \langle W,D\rangle)\subseteq \mathrm{SE}_{}( \langle W,D\rangle ,X).\)
Proof.
Let \(\langle W,D\rangle\) be the given default theory, \(X\subseteq \mathrm{Vars}(W,D)\), and \(E\in \mathrm{SE}_{}( \langle W,D\rangle)\) be a consistent stable extension of \(\langle W,D\rangle\).
We will show that \(E\in \mathrm{SE}_{}( \langle W,D\rangle ,X)\). Furthermore, let G be the set of generating defaults of E by Proposition 2.6. W.l.o.g., let \(G\mathrel {\mathop :}=\lbrace \delta _1,\dots ,\delta _k\rbrace\) also denote the order in which these defaults are applied. That is, the ordering with respect to i refers to in which order the default rules are applied. We have \(E=\mathrm{Th}(W\cup \lbrace {\it concl}(\delta)\mid \delta \in G\rbrace)\). Accordingly, \(W\models {\it prereq}(\delta _1)\) is true and further fix a \(Y\in \mathbb {T}(X)\), which agrees with E on the implied literals from \(\mathrm{Vars}(W,D)\), i.e., \(x\in Y\) if \(E\models x\) for \(x\in \mathrm{Vars}(W,D)\), \(\lnot x\in Y\) if \(E\models \lnot x\), and \(x_\varepsilon \in Y\) otherwise. Then, by Corollary 3.7 we know that also \(\bigwedge _{w\in W}\rho _{Y}(w)\models \rho _{Y}({\it prereq}(\delta _1))\) is true. Eventually, we get that
\begin{equation*} \bigwedge _{w\in W}\rho _{Y}(w)\wedge \bigwedge _{1\le j\le i}\rho _{Y}({\it concl}(\delta _j))\models \rho _{Y}({\it prereq}(\delta _{i+1})) \end{equation*}
is true for \(i\lt k\). By definition of \(\rho _{Y}(W,D)\), the reducts of the knowledge base W and the derived conclusions together trivially imply the \(y_i\)s, i.e., we have
\begin{equation*} \bigwedge _{w\in W}\rho _{Y}(w)\wedge \bigwedge _{1\le i\le k}\rho _{Y}({\it concl}(\delta _i))\models \bigwedge _{1\le i\le k}y_i. \end{equation*}
As neither \(E\models {\it prereq}(\delta)\) is true for some \(\delta \in D\setminus G\), nor \(E\cup \lbrace {\it concl}(\delta)\mid \delta \in G\rbrace \models {\it prereq}(\delta ^{\prime })\) is true for some \(\delta ^{\prime }\in D\setminus G\), extension E is a consistent set, and Y agrees with E on the implied variables from \(\mathrm{Vars}(W,D)\), we get that no further default rule \(\delta\) is implied by \(\rho _{Y}(W)\) or \(\rho _{Y}(W\cup \lbrace {\it concl}(\delta)\mid \delta \in D\setminus G\rbrace)\).
Furthermore, we have that no justification is violated as \(E\models \lnot \beta\) for some \(\beta \in \bigcup _{\delta \in G}{\it just}(\delta)\) would imply that \(\rho _{Y}(E)\models \lnot \rho _{Y}(\beta)\) is true by Corollary 3.7. Eventually \(E^{\prime }=\mathrm{Th}(\rho _{Y}(W)\cup \lbrace \rho _{Y}({\it concl}(\delta))\mid \delta \in G\rbrace)\) is a stable extension with respect to \(\rho _{Y}(W,D)\). But the set of conclusions of G coincides with \(\mathrm{y\hbox{-}\hspace{0.0pt}concl}(D,E^{\prime })\) wherefore
\begin{align*} E&=\mathrm{Th}(W\cup \lbrace {\it concl}(\delta)\mid \delta \in G\rbrace)\\ &=\mathrm{Th}(W\cup \mathrm{y\hbox{-}\hspace{0.0pt}concl}(D,E^{\prime }))\in \mathrm{SE}_{}( \left\langle W,D \right\rangle ,X) \end{align*}
is true. □
We have seen that it is important to disallow tautological clauses. However, the detection of this kind of clauses is possible in polynomial time. As a consequence, we assume in the following that a given theory contains no tautological clauses. This is a very weak restriction as (i) \(\varphi \wedge C\equiv \varphi\) for any tautological clause C and (ii) \(C\equiv \top\) for any tautological clause C.
The following example illustrates how reducts maintain existence of stable extensions.
Example 3.10.
The default theory \(\langle W,D\rangle =\lbrace \lbrace x\rbrace ,\lbrace \frac{x:z}{\lnot z\vee x}\rbrace \rbrace\) has the extension \(E\mathrel {\mathop :}=\mathrm{Th}(x,\lnot z\vee x)\) and yields the following cases for the set \(B=\lbrace x\rbrace\): \(\rho _{x}(W,D) =\langle \lbrace \top \rbrace , \lbrace \frac{\top :z}{\lnot z\wedge y_1}\rbrace \rangle\), yields \(\mathrm{SE}_{}(\rho _{x}(W,D))=\lbrace \mathrm{Th}(\lnot z\wedge y_1)\rbrace ,\) and both \(\rho _{\lnot x}(W,D)\) and \(\rho _{x_{\varepsilon }}(W,D)\) yield an empty set of stable extensions. Then, with \(\mathrm{y\hbox{-}\hspace{0.0pt}concl}(D,\mathrm{Th}(\lnot z\wedge y_1))=\lbrace \lnot z\vee x\rbrace\) we get \(\mathrm{Th}(\lbrace \lnot z\vee x\rbrace \cup \lbrace x\rbrace)\), which is equivalent to the extension E of \(\langle W,D\rangle\).
As explained before, reducts of conclusions in default rules might formally not be in the class of formulas we are interested in. For that reason we introduce the following definition:
Definition 3.11 (Formula Class Membership for Reducts of Default Theories).
Let \(\mathcal {F}\) be a class of formulas. Let \(\langle W,D\rangle\) be a default theory. Let \(\ell\) be an extended literal and \(\rho _{\ell }(W,D)\) be the reduct of \(\langle W,D\rangle\) with respect to \(\ell\). We say that \(\rho _{\ell }(W,D)= \langle W^{\prime },D^{\prime }\rangle\) is an \(\mathcal {F}\)-default theory if
for all \(\varphi \in W^{\prime }\) we have that \(\varphi \in \mathcal {F}\),
for all \(\frac{\alpha :\beta }{\gamma }\in D^{\prime }\) we have that \(\alpha ,\beta \in \mathcal {F}\), and
for all \(\frac{\alpha :\beta }{\gamma }\in D^{\prime }\) such that \(\gamma =\gamma ^{\prime }\wedge y_i\) for some \(i\in \mathbb {N}\), we have that \(\gamma ^{\prime }\in \mathcal {F}\).
Now, we are in the position to present a definition of strong backdoors for default logic.
Definition 3.12 (Strong Backdoors for Default Logic).
Given a cnf default theory \(\langle W,D\rangle\), a set \(B\subseteq \mathrm{Vars}(W,D)\) of variables, and a class \(\mathcal {F}\) of formulas. We say that B is a strong \(\mathcal {F}\)-backdoor if for each \(Y\in \mathbb {T}(B)\) the reduct \(\rho _{Y}(W,D)\) is an \(\mathcal {F}\)-default theory.

4 Backdoor Evaluation

In this section, we investigate the evaluation of strong backdoors for the extension existence problem in default logic with respect to different classes of CNF-formulas. Formally, the problem of strong backdoor evaluation for extension existence is defined as follows:
Problem:  Eval Ext \((\mathcal {F}\rightarrow \mathcal {F}^{\prime })\), also called Backdoor Evaluation.
Input:  An \(\mathcal {F}\)-default theory \(\langle W,D \rangle\), and a strong \(\mathcal {F}^{\prime }\)-backdoor \(B\subseteq \mathrm{Vars}(W,D)\).
Parameter:  The size of the backdoor B.
Question:  Does \(\langle W,D \rangle\) have a stable extension?
Example 4.1 (Continuation of Example 2.7).
Notice that \(B=\lbrace u\rbrace\) is a strong horn-backdoor for the default theory \(\langle \lbrace x\vee u\rbrace ,\left\lbrace \frac{x:z}{\lnot y},\frac{x:y}{\lnot z}\right\rbrace \rangle\) as follows:
\begin{align*} \rho _{u}(W,D) &= \left\langle \lbrace x\rbrace ,\left\lbrace \frac{x:z}{\lnot y\wedge y_1},\frac{x:y}{\lnot z\wedge y_2}\right\rbrace \right\rangle ,\\ \rho _{\lnot u}(W,D) &= \left\langle \lbrace x\rbrace ,\left\lbrace \frac{x:z}{\lnot y\wedge y_1},\frac{x:y}{\lnot z\wedge y_2}\right\rbrace \right\rangle ,\\ \rho _{u_{\varepsilon }}(W,D) &= \left\langle \lbrace x\rbrace ,\left\lbrace \frac{x:z}{\lnot y\wedge y_1},\frac{x:y}{\lnot z\wedge y_2}\right\rbrace \right\rangle , \end{align*}
while before it was not Horn because of the knowledge base formula \(x\vee u\). All three reduct default theories have the stable extensions \(\mathrm{Th}(\lbrace x,\lnot y\wedge y_1\rbrace)\) and \(\mathrm{Th}(\lbrace x,\lnot z\wedge y_2\rbrace)\). Notice that either extension nicely shows via the respective \(y_i\) which default rule was applied.
First, we study the complexity of the “extension checking problem,” which is a main task we need to accomplish when using backdoors as our approach following Lemma 3.9 yields only “stable extension candidates.” The problem is defined as follows:
Problem:  EC, also called Extension Checking.
Input:  A default theory \(\langle W,D\rangle\) and a finite set \(\Phi\) of formulas.
Question:  Does \(\mathrm{Th}(\Phi)\in \mathrm{SE}_{}( \langle W,D\rangle)\) hold?
Example 4.2.
Consider the default theory \(\langle \lbrace x\rbrace ,\lbrace \tfrac{x:\top }{y}\rbrace \rangle\) and the set of formulas \(\Phi =\lbrace x,y\rbrace\). Then, \(\mathrm{Th}(\Phi)\) is a stable extension of \(\langle \lbrace x\rbrace ,\lbrace \tfrac{x:\top }{y}\rbrace \rangle\), as the only existing default rule is applicable and the corresponding conclusion is y.
Rosati [84] classified the extension checking problem as complete for the complexity class \(\Theta ^ \mathrm{P}_2={{\Delta }^ \mathrm{p}_{2}}[\log ]\), which allows only logarithmically many oracle questions to an \(\mathrm{NP}\) oracle. For further information on the complexity class \(\Theta ^ \mathrm{P}_2\), we refer the reader to the survey article of Eiter and Gottlob [23]. Later, we will see that a simpler version suffices for our complexity analysis. As a consequence, we state in Algorithm 1 an adaption of Rosati’s algorithm (Figure 1 in Reference [84]) to our notation showing containment (only) in \({{\Delta }^ \mathrm{p}_{2}}\). From an algorithmic point of view it is important to note that the input to the algorithm is, of course, a finite set of formulas. Comparing Definition 2.5 and Proposition 2.6, it is clear that the input set E to the algorithm must be finite and the extension itself \(\mathrm{Th}(E)\) contains the (infinitely large sets of) tautologies as well as the implied formulas of E. However, the sets E that serve as “extension candidates” are finitely represented by the help of generating defaults.
Observe that a justification-free default theory has exactly one extension. That is why the justifications \(\beta\) in the default rules processed in Lines 2 and 3 of Algorithm 1 are removed. Intuitively, the complexity of the extension checking problem EC heavily relies on the difficulty of the implication problem. If the complexity of the implication question drops to \(\mathrm{P}\), then the complexity of EC also drops to \(\mathrm{P}\) (as used in the proof of Corollary 2.13).
Proposition 4.3 ([84, Figure 1, Theorem 4]).
EC \(\in {{\Delta }^ \mathrm{p}_{2}}\).
In a way, extension checking can be compared to model checking in logic. In default logic the complexity of the extension existence problem Ext \(\) is twofold: Using the approach of Proposition 2.6,
(i)
one has to non-deterministically guess the set (and ordering) of the generating defaults, and
(ii)
one has to verify whether the generating defaults lead to an extension.
For (ii), one needs to answer quadratically many implication questions. As a result, the problem is in \(\mathrm{NP}^ \mathrm{NP}\). Accordingly, a straightforward approach for EC omits the non-determinism in (i) by going through the default set D and sorting out those default rules whose justifications are violated and achieves the result in \(\mathrm{P}^ \mathrm{NP}\).
The main theorem of this section is proven in the following lemmas and corollaries:
Theorem 4.4.
\(\,\)
(1)
EvalExt(cnfmonotone) is \(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\)-complete.    (Lemma 4.7)
(2)
EvalExt(cnfhorn) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete.    (Lemma 4.5)
(3)
EvalExt(cnfqhorn) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete.    (Corollary 4.6)
(4)
EvalExt(cnfrhorn) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete.    (Corollary 4.6)
(5)
EvalExt(cnfdualhorn) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete.    (Corollary 4.6)
(6)
EvalExt(cnfkrom) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete.    (Corollary 4.6)
(7)
EvalExt(cnfaffine) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete.   (Corollary 4.6)
(8)
EvalExt(cnfpositive-unit) \(\in \mathrm{FPT}\).    (Corollary 4.8)
(9)
EvalExt(cnfcvalid) \(\in \mathrm{FPT}\) for \(c\in \lbrace 0,1\rbrace\).   (Corollary 4.9)
Lemma 4.5.
EvalExt(cnfhorn) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete.
Proof.
We start with the upper bound. Let \(\langle W,D\rangle\) be a given cnf default theory and \(B\subseteq \mathrm{Vars}(W,D)\) be the given backdoor. To evaluate the backdoor, we have to consider the \(|\mathbb {T}(X)|=3^{|B|}\) many different reducts to horn default theories. For each of them we have to non-deterministically guess a possible “extension candidate” E. Then, we use Algorithm 1 to verify whether E is indeed a valid extension. Note that Imp (horn) \(\in \mathrm{P}\) by Corollary 2.11. Consequently, stable extension checking is in \(\mathrm{P}\) for horn formulas. Then, after finding an extension E with respect to the reduct default theory \(\rho _{Y}(W,D)\), we need to compute the corresponding extension \(E^{\prime }\) with respect to the original default theory. Here we just need to verify simple implication questions of the form \(E\models y_i\) for \(1\le i\le |D|\). Next, we need to verify whether \(E^{\prime }\) is a valid extension for \(\langle W,D\rangle\) using Algorithm 1. Note that Corollary 3.6 shows that the implication problem of propositional horn formulas parameterised by the size of the backdoor is in \(\mathrm{FPT}\), accordingly, we can compute the implication questions without the need for oracle calls already within the computation. As the length of the used formulas is bounded by the input size and the relevant parameter is the same as for the input this step runs in fpt-time. Together this yields a \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\) algorithm. Algorithm 2 depicts a generic algorithm in pseudocode.
For the \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\) lower bound, Ext \(\) restricted to literal-formulas only is \(\mathrm{NP}\)-complete [7, Lemma 5.6], which implies the lower bound for backdoor-size 0 already. □
Corollary 4.6.
EvalExt(cnf \(\rightarrow \mathcal {F})\) is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete for \(\mathcal {F}\in \lbrace\) krom, rhorn, dualhorn, qhorn, affine \(\rbrace\).
Proof.
The implication problem of all these formulas (except for affine) is in \(\mathrm{P}\) due to Section 2.2. Regarding sets of affine formulas (we can split the \(\oplus\)-CNF-formulas at the conjunctions) the implication problem is in \(\oplus \mathrm{L}\subseteq \mathrm{NC}^2\subseteq \mathrm{P}\) due to Beyersdorff et al. [6, Theorem 4.1 (2.)]. Eventually, under a similar argumentation as in the proof of Lemma 4.5, we can construct a \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\) algorithm.
Regarding the \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\) lower bound, Ext \(\) restricted to literal-formulas only is \(\mathrm{NP}\)-complete [7, Lemma 5.6] and literals can be expressed by all these classes of formulas. This implies the lower bound for backdoor-size 0 already. □
Lemma 4.7.
EvalExt(cnfmonotone) is \(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\)-complete.
Proof.
Start with the upper bound. For a monotone formula \(\varphi\), its negation is not any longer monotone unless \(\varphi \in \lbrace \top ,\bot \rbrace\). This observation is important for such \(\varphi\) occurring as justifications. If \(\varphi \notin \lbrace \top ,\bot \rbrace\), then the justification can be deleted, because its negation cannot be derived, so the default rule applies whenever its prerequisite is met. If \(\varphi \in \lbrace \top ,\bot \rbrace\), then either it is only applicable in an inconsistent case or always. Accordingly, we can distinguish between these cases in polynomial time. Note that from the previous argument we can conclude that there is a unique stable extension if there is one at all. Furthermore, the construction of the set of generating defaults and also the extension itself is achievable in \(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\) as follows: We have to do quadratically many implication questions, and the implication problem for monotone formulas has the same upper bound as the unrestricted one, that is, \(\mathrm{co} \mathrm{NP}\). Step (5) of Algorithm 2 just checks for implications, which is solved via the \(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\) algorithm.
With respect to the lower bound, note that Beyersdorff et al. [7, Lemma 5.5] have shown \({{\Delta }^ \mathrm{p}_{2}}\)-completeness for Ext \(\) restricted to monotone-formulas, which are formulas containing only \(\vee ,\wedge ,1,0\) as connectors. However, in their proof [7, Lemma 5.5], the authors construct a default theory consisting of a knowledge base with pure CNF-formulas (they reduce from sequentially nested SAT, SNSAT for short, which can be restricted to CNF-formulas) and default rules of the following form:
\begin{align*} D&:= \left\lbrace \frac{\bigvee _{j=1}^{m_i} (z_{ij} \wedge z^{\prime }_{ij}) \vee \bigvee _{j=1}^{i-1} (x_j \wedge x^{\prime }_j) : \top }{x_i^{\prime }} \,\middle |\, 1 \le i \lt n \right\rbrace \; \cup \\ &\left\lbrace \frac{\bigvee _{j=1}^{m_n} (z_{nj} \wedge z^{\prime }_{nj}) \vee \bigvee _{j=1}^{n-1} (x_j \wedge x^{\prime }_j) : \top }{ \bot } \right\rbrace . \end{align*}
Clearly, the formulas in the prerequisites of the default rules are not in CNF but in DNF. In our reduction, we need CNF-default rules though. A naive translation of the DNF formulas from the default rule prerequisites in D to an equivalent CNF-formula is not possible, as it would go beyond the runtime requirement. Yet, it is possible to “split” each prerequisite into new default rules having only CNFs as component formulas by declaring auxiliary variables. To achieve this translation, the default rules from above are replaced in two steps. First, we substitute each rule from above for each \(1\le i\le n\) by
\begin{equation*} D^{\prime }:= \left\lbrace \frac{d_i : \top }{x_i^{\prime }} \,\middle |\, 1 \le i \lt n \right\rbrace \; \cup \; \left\lbrace \frac{d_n : \top }{ \bot } \right\rbrace . \end{equation*}
Then, the still not considered prerequisites from the rules in D are mimicked by sets of default rules from the set \(D^{\prime \prime }\) giving the possibility that one of the DNF terms is implied and by this triggering the rules from \(D^{\prime }\),
\begin{equation*} D^{\prime \prime }:=\left\lbrace \, \frac{z_{ij}\wedge z^{\prime }_{ij}: \top }{d_i}, \frac{x_j\wedge x_j^{\prime }: \top }{d_i} \;\middle |\; 1\le j\le m_i, 1\le i\le n \, \right\rbrace . \end{equation*}
So, for each previous default rule we split the DNF of the prerequisite into a bunch of default rules that trigger the previous DNF-default (now mimicked via a fresh proposition \(d_i\)) whenever one of the DNF-terms is implied.
By construction, we then observe that
\begin{equation*} \left\lbrace \frac{\bigvee _{j=1}^{m_i} (z_{ij} \wedge z^{\prime }_{ij}) \vee \bigvee _{j=1}^{i-1} (x_j \wedge x^{\prime }_j) : \top }{x_i^{\prime }} \,\middle |\, 1 \le i \lt n \right\rbrace \end{equation*}
is applicable if and only if the prerequisite \(\bigvee _{j=1}^{m_i} (z_{ij} \wedge z^{\prime }_{ij}) \vee \bigvee _{j=1}^{i-1} (x_j \wedge x^{\prime }_j)\) is implied if and only if one of the DNF-terms \((z_{ij} \wedge z^{\prime }_{ij})\) or \((x_j \wedge x^{\prime }_j)\) is implied if and only if one element from \(D^{\prime \prime }\) is applicable if and only if the corresponding rule in \(D^{\prime }\) is applicable. This establishes the lower bound. □
Corollary 4.8.
EvalExt(cnfpositive-unit) \(\in \mathrm{FPT}\).
Proof.
The implication problem for positive-unit formulas is in \(\mathrm{AC}^{0}\) by Beyersdorff et al., who showed this result for formulas using only conjunctions [6, Theorem 4.1(4)]. That being so, Algorithm 1 runs in polynomial time. Accordingly, we achieve the \(\mathrm{FPT}\) upper bound by a similar argumentation as in the proof of Lemma 4.5. □
Corollary 4.9.
EvalExt(cnfc valid) \(\in \mathrm{FPT}\) for \(c\in \lbrace 0,1\rbrace\).
Proof.
Let \(\varphi\) be a c valid formula for a fixed \(c\in \lbrace 0,1\rbrace\). Then the formula \(\lnot \varphi\) is no longer c valid. As a result, justifications in default rules are irrelevant, since they cannot be inferred. Accordingly, there is always a unique extension. □

5 Backdoor Detection

In this section, we study the problem of finding backdoors, formalised in terms of the following parameterised problem. In the previous section, we considered all classes of formulas as defined by Schaefer for evaluation. Here, we restrict ourselves to CNF as input, meaning, that we disregard affine formulas:
Problem:  BdDetect (cnf \(\rightarrow \mathcal {F})\) also called Backdoor Detection
Input:  A cnf default theory T and an integer k.
Parameter:  The integer k.
Question:  Does T have a strong \(\mathcal {F}\)-backdoor of size at most k?
The following statement allows us to lift interesting target classes from propositional satisfiability to default logic and thereby determine backdoors also for default logic in fpt-time. Therefore, we consider deletion backdoors of formulas. Here, \(F - X\) denotes the formula obtained from F by removing all literals x, \(\lnot x\) for \(x \in X\) from the clauses of F. Then, a set X of atoms is a deletion \(\mathcal {F}\)-backdoor of F if \(F - X \in \mathcal {F}\).
Before we proceed, we need to introduce a requirement for target classes that can be directly used. In fact, the requirement is quite weak as all useful target classes for satisfiability on cnf-formulas fulfil it. We say that a class \(\mathcal {F}\subseteq\) cnf of formulas is clause restricting if it restricts each clause to a certain form but does not impose any restrictions between two clauses. Note that all target classes considered in this work are clause restricting, i.e., horn, dualhorn, qhorn, rhorn, krom, monotone, and positive-unit.
Intuitively, the following lemma states that we can use deletion backdoors of a specific formula instead of strong backdoors for a default theory and vice versa.
Lemma 5.1.
Let \(\langle W,D\rangle\) be a cnf-default theory, \(B\subseteq \mathrm{Vars}(W,D)\) be a set of variables, and \(\mathcal {F}\subseteq\) cnf be a clause-induced and clause-restricting class of formulas. The set B is a strong \(\mathcal {F}\)-backdoor of \(\langle W,D\rangle\) if and only if B is a deletion \(\mathcal {F}\)-backdoor of the formula
\begin{equation*} F = \bigwedge _{\kappa \in W} \kappa \wedge \bigwedge _{\delta \in D} \left(\bigwedge _{\alpha \in {\it prereq}(\delta)} \alpha \wedge \bigwedge _{\beta \in {\it just}(\delta)} \beta \wedge \bigwedge _{\gamma \in {\it concl}(\delta)} (\gamma \wedge y_\gamma) \right). \end{equation*}
Proof.
Given a cnf-default theory \(\langle W,D\rangle\), a set \(B\subseteq \mathrm{Vars}(W,D)\) of variables and a class \(\mathcal {F}\subseteq\) cnf of clause-induced formulas. Furthermore, let X consist of the variables occurring in \(\langle W,D\rangle\).
\(\Rightarrow\)”: Assume that the set B is a strong \(\mathcal {F}\)-backdoor of the default theory \(\langle W,D\rangle\), i.e., for each \(Y\in \mathbb {T}(B)\) the reduct \(\rho _{Y}(W,D)\) is an \(\mathcal {F}\)-default theory. Since \(\mathbb {A}(X)\subsetneq \mathbb {T}(X)\) holds, we have in particular, for every \(Y \in \mathbb {A}(B)\), that \(\rho _{Y}(w) \in \mathcal {F}\) for each \(w \in W\) and \(\rho _{Y}(\alpha) \in \mathcal {F}\), \(\rho _{Y}(\beta) \in \mathcal {F}\), and \(\rho _{Y}(\gamma \wedge y_\gamma) \in \mathcal {F}\) for each \(\delta \in D\) with \(\delta = \frac{\alpha \,:\,\beta }{\gamma }\) and the fresh propositionals \(y_\gamma\). Since the class \(\mathcal {F}\) is clause restricting, each class requires only restrictions on the clauses and hence the set B is a strong \(\mathcal {F}\)-backdoor of a conjunction of these formulas. Since the class \(\mathcal {F}\) is clause induced, the set B is also a deletion \(\mathcal {F}\)-backdoor of F [45].
\(\Leftarrow\)”: Conversely, assume that the set B is a deletion \(\mathcal {F}\)-backdoor of the formula F as defined above. Hence, we have that \(\bigwedge _{\kappa \in W} \kappa \wedge \bigwedge _{\delta \in D} \big (\bigwedge _{\alpha \in {\it prereq}(\delta)} \alpha \wedge \bigwedge _{\beta \in {\it just}(\delta)} \beta \wedge \bigwedge _{\gamma \in {\it concl}(\delta)} (\gamma \wedge y_\gamma)\big) - B \in \mathcal {F}\). Since \(\mathcal {F}\) is clause restricting, for every \(w \in W\) it is true that \(w - B \in \mathcal {F}\) and for every \(\delta \in D\) it holds that \({\it prereq}(\delta)- B \in \mathcal {F}\), \({\it just}(\delta) - B \in \mathcal {F}\), and \(({\it concl}(\delta) \wedge y_\delta) - B \in \mathcal {F}\). Next, we show that B is also a strong \(\mathcal {F}\)-backdoor of \(\langle W,D\rangle\) according to Definitions 3.1 and 3.12, i.e., for every assignment \(Y \in \mathbb {T}(B)\) it holds that \(\rho _{Y}(W,D)\) is an \(\mathcal {F}\)-default theory. By assumption, we know that for every \(\kappa \in W\), \(\kappa - B \in \mathcal {F}\), and \({\it prereq}(\delta) - B \in \mathcal {F}\), \(\beta (\delta) - B \in \mathcal {F}\), and \(\gamma (\delta) - B \in \mathcal {F}\) for every \(\delta \in D\). Assume that CNF-formulas are represented as sets of clauses in the context of the \(\subseteq\)-relation. We show that \(\rho _{B}(G) \subseteq G - B\) for some formula \(G \subseteq F\), which is sufficient to combine with the assumption that B is a deletion \(\mathcal {F}\)-backdoor of G, and \(\mathcal {F}\) is clause induced, meaning that whenever \(F \in \mathcal {F}\), all subformulas \(F^{\prime }\subseteq F\) belong to \(\mathcal {F}\). Let \(c \in G\) be an arbitrary clause of the form \(c = \lbrace \ell _1, \ldots , \ell _k\rbrace\) of G. We distinguish the three following cases for \(\ell _i \in Y\):
(ia)
\(\ell _k \in \mathbb {A}(B)\) and \(\ell\) is a positive literal,
(ib)
\(\ell _k \in \mathbb {A}(B)\) and \(\ell\) is a negative literal, and
(ii)
\(\ell _k \in \mathbb {T}(B) \setminus \mathbb {A}(B)\).
If Case (ia) holds and \(\ell\) occurs positively in Y, then c is removed when constructing \(\rho _{B}(G)\), whereas \(\ell\) is just removed from c when constructing \(G - B\). If Case (ib) is true and \(\ell\) occurs negatively, then \(\ell\) is removed in both constructions. If Case (ii) holds, then \(\ell\) is removed in both constructions from c. From applying the three cases to all literals and clauses, we obtain \(\rho _{B}(G) \subseteq G - B\). By the above statement, we conclude that \(\rho _{B}(\kappa) \subseteq \kappa - B\), and \({\it prereq}(\delta) - B \subseteq {\it prereq}(\delta)\), \(\beta (\delta) - B \in \mathcal {F}\), and \(\gamma (\delta) - B \in \mathcal {F}\) for every \(\delta \in D\). This establishes the if-direction. □
Lemma 5.1 establishes the connection between deletion backdoors for SAT and strong backdoors for default logic. In a way, it also tells us that notions differ in default logic and explains why we do not provide the concept of deletion backdoors for default logic. Following Definition 3.1 of extended literals and reducts, the intuition is easy. Case (ii) already includes a “deletion case” for the literals that have to be evaluated as undecided. In the following statement and proof, we lift results from the SAT case to default logic applying the lemma above.
Corollary 5.2.
BdDetect (cnf \(\rightarrow \mathcal {C}) \in \mathrm{FPT}\), for \(\mathcal {C} \in \lbrace\) horn, positive-unit, krom, monotone, qhorn, dualhorn, positive-unit, 0valid, 1valid\(\rbrace\) and BdDetect (cnf \(\rightarrow \mathcal {C})\) is fpt-approximable if \(\mathcal {C} =\) rhorn.
Proof.
Using Lemma 5.1 above, we obtain the result directly from known results and constructions in the propositional setting. Case \(\mathcal {C} =\) monotone: A cnf-formula \(\varphi\) is monotone if every literal appears only positively in any clause \(C \in \varphi\) where \(\varphi \in \mathcal {C}\). We can trivially construct a smallest strong monotone-backdoor by taking all negative literals of clauses in formulas of \(\mathcal {C}\) in linear time. Consequently, the claim is true. We apply results from the propositional setting as follows: \(\mathcal {C} \in \lbrace\) horn, positive-unit, krom} [85], \(\mathcal {C} =\) rhorn [45], \(\mathcal {C} = \lbrace \rm\) dualhorn, 0valid, 1valid } [76], and for \(\mathcal {C} =\) qhorn [43]. □
If the target class \(\mathcal {F}^{\prime }\) is clause induced, then we can use a decision algorithm for BdDetect \((\mathcal {F}\rightarrow \mathcal {F}^{\prime })\) to find the backdoor using self-reduction [19, 87].
Lemma 5.3.
Let \(\mathcal {F}\) be a clause-induced class of cnf-formulas. If the problem BdDetect (cnf \(\rightarrow \mathcal {F})\) is fixed-parameter tractable, then also computing a strong \(\mathcal {F}\)-backdoor of size at most k of a given default theory T is fixed-parameter tractable (for parameter k).
Proof.
Let \(T = \langle W,D\rangle\) be a default theory. We proceed by induction on k. If \(k=0\), then the statement is clearly true. Let \(k\gt 0\). Given \((T,k)\) we check for all \(v \in \mathrm{Vars}(W) \cup \mathrm{Vars}(D)\) whether \(\rho _{Y}(W,D)\), \(\rho _{Y^{\prime }}(W,D)\), and \(\rho _{Y^{\prime \prime }}(W,D)\) have a strong \(\mathcal {F}\)-backdoor of size at most \(k-1\) where \(Y=\lbrace v\rbrace\), \(Y^{\prime }=\lbrace \lnot v\rbrace\), and \(Y^{\prime \prime }=\lbrace v_\varepsilon \rbrace\). If the answer is No for all v, then T has no strong \(\mathcal {F}\)-backdoor of size k. If the answer is Yes for v, then by induction hypothesis we can compute a strong \(\mathcal {F}\)-backdoor B of size at most \(k-1\) of \(\rho _{Y}(W,D)\), \(\rho _{Y^{\prime }}(W,D)\), and \(\rho _{Y^{\prime \prime }}(W,D)\) and \(B \cup \lbrace v\rbrace\) is a strong \(\mathcal {F}\)-backdoor of T. □
Now, we can use Corollary 5.2 to strengthen the results of Theorem 4.5 and Corollary 4.6 and Lemma 4.7 by dropping the assumption that the backdoor is given.
Theorem 5.4.
The problem EvalExt(cnf \(\rightarrow \mathcal {C})\) parameterised by the size of a smallest strong \(\mathcal {C}\)-backdoor of the given theory is
(1)
\(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\)-complete if \(\mathcal {C} =\) monotone,
(2)
\(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-complete if \(\mathcal {C} \in \lbrace\) horn, krom, qhorn, rhorn, dualhorn}, and
(3)
in \(\mathrm{FPT}\) if \(\mathcal {C} =\lbrace\) positive-unit, 0valid, 1valid}.

6 Conclusion

We layed our the foundations of backdoors for propositional default logic. Then, we used this concept to study the parameterised complexity of backdoor set evaluation and detection for all central cnf-based classes of propositional formulas. We established that backdoor detection for the classes cnf, horn, qhorn, dualhorn, krom, monotone, 0valid, 1valid, and positive-unit are fixed-parameter tractable, whereas for rhorn we achieved only fpt-approxomation status.
Regarding the evaluation problem the classification is more complex. For monotone default theories, we achieved \(\mathrm{para}\hbox{-}\hspace{0.0pt}{{\Delta }^ \mathrm{p}_{2}}\)-completeness (improving from \(\mathrm{NP}^{ \mathrm{NP}}\)-completeness in the classical setting). For horn, krom, qhorn, rhorn, and dualhorn, we showed that the problem is \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\)-completeness. Finally, for positive-unit, 0valid, and 1valid, we showed that the problem is fixed-parameter tractable. Consequently, this problem can be solved by an fpt-algorithm that can query a SAT-solver multiple times [17]. Notice that this strengthening of Theorem 5.4 does not apply to affine default theories due to its lack of clause-inducedness (here, it would be interesting to find a corresponding result). As a result, if one consideres solely the schaefer-classes, then this would yield a dichotomy theorem for the evaluation problem distinguishing between \(\mathrm{FPT}\) and \(\mathrm{para}\hbox{-}\hspace{0.0pt} \mathrm{NP}\) cases.
Furthermore, we mention that fruitful combinations of backdoors and the well-established parameter treewidth have been pointed out [34]. Also recent reduction techniques, so-called DP reductions, and structural investigations could be of interest [25, 26, 51].
Immediate future work includes other nonmonotonic logics such as autoepistemic logic [75], abduction [79, 80], and circumscription [65]. Particularly, there exists the concept of direct translations [24, 47, 54, 57, 62, 67, 68, 94], and it would be interesting to investigate whether our results and concepts can be transferred to these logics. Furthermore, as there exist recent parameterised complexity investigations of nonmonotonic formalisms [61, 73], the combination of these results with backdoors might yield new insights.
Moreover, a systematic study of the (parameterised) enumeration complexity [14, 15, 69, 70] in this setting is planned for future work. In addition, quantitative aspects for understanding solutions [28] or more precise reasoning [31, 32] might be interesting topics for future research. Finally, a direct application of quantified Boolean formulas in the context of propositional default logic, for instance, via the work of Egly et al. [22] or exploiting backdoors similar to results by Fichte and Szeider [37], might yield new insights.

Acknowledgments

The authors thank Jonni Virtema for pointing out ideas of proving Lemma 2.10 and Sebastian Ordyniak for discussions on Lemma 3.4. The authors also thank the anonymous reviewers for their valuable comments and suggestions.

References

[1]
Mario Alviano. 2017. Model enumeration in propositional circumscription via unsatisfiable core analysis. Theory Pract. Log. Program. 17, 5-6 (2017), 708–725.
[2]
Mario Alviano. 2018. Query answering in propositional circumscription. In Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI’18), Jérôme Lang (Ed.). 1669–1675.
[3]
Robert Baumgartner and Georg Gottlob. 2002. Propositional default logics made easier: Computational complexity of model checking. Theor. Comput. Sci. 289, 1 (2002), 591–627.
[4]
Dritan Berzati, Bernhard Anrig, and Jürg Kohlas. 2002. Embedding default logic in propositional argumentation systems. In Proceedings of the 9th International Workshop on Non-Monotonic Reasoning (NMR’02), Salem Benferhat and Enrico Giunchiglia (Eds.). 302–310.
[5]
Olaf Beyersdorff, Arne Meier, Sebastian Müller, Michael Thomas, and Heribert Vollmer. 2011. Proof complexity of propositional default logic. Arch. Math. Log. 50, 7-8 (2011), 727–742.
[6]
Olaf Beyersdorff, Arne Meier, Michael Thomas, and Heribert Vollmer. 2009. The complexity of propositional implication. Inform. Process. Lett. 109, 18 (2009), 1071–1077.
[7]
Olaf Beyersdorff, Arne Meier, Michael Thomas, and Heribert Vollmer. 2012. The complexity of reasoning for fragments of default logic. J. Logic Comput. 22, 3 (2012), 587–604. DOI:
[8]
Endre Boros, Yves Crama, and Peter L. Hammer. 1990. Polynomial-time inference of all valid implications for horn and related formulae. Ann. Math. Artif. Intell. 1 (1990), 21–32.
[9]
Endre Boros, Peter L. Hammer, and Xiaorong Sun. 1994. Recognition of q-Horn formulae in linear time. Discr. Appl. Math. 55, 1 (1994), 1–13.
[10]
V. Chandru, Collette R. Coullard, Peter L. Hammer, M. Montanuz, and Xiaorong Sun. 1990. On renamable horn and generalized horn functions. Ann. Math. Artif. Intell. 1 (1990), 33–47.
[11]
Jianer Chen, Benny Chor, Michael R. Fellows, Xiuzhen Huang, David W. Juedes, Iyad A. Kanji, and Ge Xia. 2005. Tight lower bounds for certain parameterized NP-hard problems. Inf. Comput. 201, 2 (2005), 216–231.
[12]
Bruno Courcelle. 1990. Graph rewriting: An algebraic and logic approach. In Handbook of Theoretical Computer Science, Jan van Leeuwen (Ed.). Vol. Formal Models and Semantics. MIT Press, Cambridge, MA, 193–242.
[13]
Bruno Courcelle and Joost Engelfriet. 2012. Graph Structure and Monadic Second-order Logic, a Language Theoretic Approach. Cambridge University Press, Cambridge, UK.
[14]
Nadia Creignou, Raïda Ktari, Arne Meier, Julian-Steffen Müller, Frédéric Olive, and Heribert Vollmer. 2019. Parameterised enumeration for modification problems. Algorithms 12, 9 (2019), 189. DOI:
[15]
Nadia Creignou, Arne Meier, Julian-Steffen Müller, Johannes Schmidt, and Heribert Vollmer. 2017. Paradigms for parameterized enumeration. Theory Comput. Syst. 60, 4 (2017), 737–758. DOI:
[16]
Nadia Creignou, Arne Meier, Michael Thomas, and Heribert Vollmer. 2012. The complexity of reasoning for fragments of autoepistemic logic. ACM Trans. Comput. Log. 13, 2 (Apr.2012), 1–22. DOI:
[17]
Ronald DeHaan and Stefan Szeider. 2014. Fixed-parameter tractable reductions to SAT. In Proceedings of the 17th International Conference on Theory and Applications of Satisfiability Testing (SAT’14),Lecture Notes in Computer Science, Vol. 8561, Carsten Sinz and Uwe Egly (Eds.). Springer Verlag, Vienna, Austria, 85–102. DOI:
[18]
Rodney G. Downey and Michael R. Fellows. 1999. Parameterized Complexity. Springer Verlag, New York, NY. DOI:
[19]
Rodney G. Downey and Michael R. Fellows. 2013. Fundamentals of Parameterized Complexity. Springer Verlag, London, UK. DOI:
[20]
Rodney G. Downey, Michael R. Fellows, and Catherine McCartin. 2006. Parameterized approximation problems. In Proceedings of the 2nd International Workshop on Parameterized and Exact Computation (IWPEC’06), Hans L. Bodlaender and Michael A. Langston (Eds.). Springer Verlag, 121–129. DOI:
[21]
Wolfgang Dvořák, Sebastian Ordyniak, and Stefan Szeider. 2012. Augmenting tractable fragments of abstract argumentation. Artif. Intell. 186 (2012), 157–173. DOI:
[22]
Uwe Egly, Thomas Eiter, Hans Tompits, and Stefan Woltran. 2000. Solving advanced reasoning tasks using quantified boolean formulas. In Proceedings of the 17th Conference on Artificial Intelligence (AAAI’00), Henry Kautz and Bruce Porter (Eds.). The AAAI Press, Austin, TX, 417–422.
[23]
Thomas Eiter and Georg Gottlob. 1997. The complexity class \(\Theta ^ \mathrm{P}_2\): Recent results and applications in AI and modal logic. In Proceedings of the 11th International Symposium on Fundamentals of Computation Theory (FCT’97),Lecture Notes in Computer Science, Vol. 1279, Bogdan S. Chlebus and Ludwik Czaja (Eds.). Springer Verlag, 1–18. DOI:
[24]
David W. Etherington. 1987. Relating default logic and circumscription. In Proceedings of the 10th International Joint Conference on Artificial Intelligence (IJCAI’87), John McDermott (Ed.). Morgan Kaufmann, Milan, Italy, 489–494.
[25]
Jorge Fandinno and Markus Hecher. 2021. Treewidth-aware complexity in ASP: Not all positive cycles are equally hard. In Proceedings of the 35th AAAI Conference on Artificial Intelligence (AAAI’21), Kevin Leyton-Brown and Mausam (Eds.), Vol. 35. 6312–6320. DOI:
[26]
Johannes Fichte, Markus Hecher, Yasir Mahmood, and Arne Meier. 2021. Decomposition-guided reductions for argumentation and treewidth. In Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI’21), Zhi-Hua Zhou (Ed.). International Joint Conferences on Artificial Intelligence Organization, 1880–1886. DOI:
[27]
Johannes K. Fichte, Daniel Le Berre, Markus Hecher, and Stefan Szeider. 2023. The silent (R)evolution of SAT. Commun. ACM 66, 6 (May2023), 64–72. DOI:
[28]
Johannes Klaus Fichte, Sarah Alice Gaggl, and Dominik Rusovac. 2022. Rushing and strolling among answer sets – navigation made easy. In Proceedings of the 36th AAAI Conference on Artificial Intelligence (AAAI’22), 5651–5659. DOI:
[29]
Johannes Klaus Fichte and Markus Hecher. 2019. Treewidth and counting projected answer sets. In Proceedings of the 15th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR’19),Lecture Notes in Computer Science, Vol. 11481, Marcello Balduccini, Yuliya Lierler, and Stefan Woltran (Eds.). Springer Verlag, 105–119. DOI:
[30]
Johannes Klaus Fichte, Markus Hecher, and Arne Meier. 2019. Counting complexity for reasoning in abstract argumentation. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI’19). The AAAI Press, 2827–2834. DOI:
[31]
Johannes K. Fichte, Markus Hecher, and Arne Meier. 2021. Knowledge-base degrees of inconsistency: Complexity and counting. Proceedings of the 35th AAAI Conference on Artificial Intelligence (AAAI’21), 6349–6357. DOI:
[32]
Johannes K. Fichte, Markus Hecher, and Mohamed A. Nadeem. 2022. Plausibility reasoning via projected answer set counting—A hybrid approach. In Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI’22), Lud De Raedt (Ed.). International Joint Conferences on Artificial Intelligence Organization, 2620–2626. DOI:
[33]
Johannes K. Fichte, Markus Hecher, and Irina Schindler. 2018. Default logic and bounded treewidth. In Proceedings of the 12th International Conference on Language and Automata Theory and Applications (LATA’18),Lecture Notes in Computer Science, Shmuel Tomi Klein and Carlos Martín-Vide (Eds.). Springer Verlag.
[34]
Johannes Klaus Fichte, Markus Hecher, and Irina Schindler. 2022. Default logic and bounded treewidth. Inf. Comput. 283 (2022), 104675. DOI:
[35]
Johannes Klaus Fichte, Martin Kronegger, and Stefan Woltran. 2019. A multiparametric view on answer set programming. Ann. Math. Artif. Intell. 86, 1-3 (2019), 121–147. DOI:
[36]
Johannes Klaus Fichte, Arne Meier, and Irina Schindler. 2016. Strong backdoors for default logic. In Proceedings of the 19th International Conference on Theory and Applications of Satisfiability Testing (SAT’16),Lecture Notes in Computer Science, Vol. 9710, Nadia Creignou and Daniel Le Berre (Eds.). Springer Verlag, 45–59. DOI:
[37]
Johannes K. Fichte and Stefan Szeider. 2015. Backdoors to normality for disjunctive logic programs. ACM Trans. Comput. Log. 17, 1 (2015), 7.
[38]
Johannes K. Fichte and Stefan Szeider. 2015. Backdoors to tractable answer-set programming. Artif. Intell. 220 (2015), 64–103. DOI:
[39]
Jörg Flum and Martin Grohe. 2003. Describing parameterized complexity classes. Inf. Comput. 187, 2 (2003), 291–319.
[40]
Jörg Flum and Martin Grohe. 2006. Parameterized Complexity Theory. Theoretical Computer Science, Vol. XIV. Springer Verlag, Berlin. DOI:
[41]
Robert Ganian, M. S. Ramanujan, and Stefan Szeider. 2017. Backdoor treewidth for SAT. In Proceedings of the 20th International Conference on Theory and Applications of Satisfiability Testing (SAT’17),Lecture Notes in Computer Science, Vol. 10491, Serge Gaspers and Toby Walsh (Eds.). Springer Verlag, 20–37. DOI:
[42]
Serge Gaspers, Neeldhara Misra, Sebastian Ordyniak, Stefan Szeider, and Stanislav Zivný. 2017. Backdoors into heterogeneous classes of SAT and CSP. J. Comput. Syst. Sci. 85 (2017), 38–56. DOI:
[43]
Serge Gaspers, Sebastian Ordyniak, M. S. Ramanujan, Saket Saurabh, and Stefan Szeider. 2016. Backdoors to q-Horn. Algorithmica 74, 1 (2016), 540–557. DOI:
[44]
Serge Gaspers, Sebastian Ordyniak, and Stefan Szeider. 2017. Backdoor sets for CSP. In The Constraint Satisfaction Problem: Complexity and Approximability, Andrei Krokhin and Stanislav Zivny (Eds.). Dagstuhl Follow-Ups, Vol. 7. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 137–157. DOI:
[45]
Serge Gaspers and Stefan Szeider. 2012. Backdoors to satisfaction. In The Multivariate Algorithmic Revolution and Beyond—Essays Dedicated to Michael R. Fellows on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, Vol. 7370, Hans L. Bodlaender, Rod Downey, Fedor V. Fomin, and Dániel Marx (Eds.). Springer Verlag, 287–317.
[46]
Georg Gottlob. 1992. Complexity results for nonmonotonic logics. J. Logic Comput. 2, 3 (1992), 397–425. DOI:
[47]
Georg Gottlob. 1995. Translating default logic into standard autoepistemic logic. J. ACM 42, 4 (1995), 711–740.
[48]
Georg Gottlob, Reinhard Pichler, and Fang Wei. 2010. Bounded treewidth as a key to tractability of knowledge representation and reasoning. Artif, Intell, 174, 1 (2010), 105–132. DOI:
[49]
Georg Gottlob, Francesco Scarcello, and Martha Sideri. 2002. Fixed-parameter complexity in AI and nonmonotonic reasoning. Artif, Intell, 138, 1-2 (2002), 55–86. DOI:
[50]
Georg Gottlob and Stefan Szeider. 2006. Fixed-parameter algorithms for artificial intelligence, constraint satisfaction, and database problems. Comput. J. 51, 3 (2006), 303–325. Survey paper.
[51]
Markus Hecher. 2022. Treewidth-aware reductions of normal ASP to SAT – Is normal ASP harder than SAT after all? Artif, Intell, 304 (2022), 103651. DOI:
[52]
Pieter Van Hertum, Marcos Cramer, Bart Bogaerts, and Marc Denecker. 2016. Distributed autoepistemic logic and its application to access control. In Proceedings of the 25h International Joint Conference on Artificial Intelligence (IJCAI’16), Gerhard Brewka (Ed.). IJCAI/AAAI Press, New York, NY, 1286–1292.
[53]
Alfred Horn. 1951. On sentences which are true of direct unions of algebras. J. Symb. Log. 16, 1 (1951), 14–21.
[54]
Tomi Janhunen. 1999. On the intertranslatability of non-monotonic logics. Ann. Math. Artif. Intell. 27, 1-4 (1999), 79–128.
[55]
Neil D. Jones, Y. Edmund Lien, and William T. Laaser. 1976. New problems complete for nondeterministic loc space. Math. Syst. Theory 10 (1976), 1–17.
[56]
Rafael Kiesel, Erman Acar, and Stefan Schlobach. 2018. Preferential default reasoning on the semantic web. In Description Logics(CEUR Workshop Proceedings, Vol. 2211). CEUR-WS.org.
[57]
Kurt Konolige. 1988. On the relation between default and autoepistemic logic. Artif, Intell, 35, 3 (1988), 343–382.
[58]
Wei Li, Yuefei Sui, and Yuhui Wang. 2017. The propositional normal default logic and the finite/infinite injury priority method. Sci. China Inf. Sci. 60, 9 (2017), 092107:1–092107:10.
[59]
Paolo Liberatore and Marco Schaerf. 2005. The complexity of model checking for propositional default logics. Data Knowl. Eng. 55, 2 (2005), 189–202.
[60]
Yasir Mahmood, Arne Meier, and Johannes Schmidt. 2020. Parameterised complexity of abduction in schaefer’s framework. In Proceedings of the International Symposium on Logical Foundations of Computer Science (LFCS’20),Lecture Notes in Computer Science, Vol. 11972, Sergei N. Artëmov and Anil Nerode (Eds.). Springer, 195–213. DOI:
[61]
Yasir Mahmood, Arne Meier, and Johannes Schmidt. 2021. Parameterized complexity of abduction in Schaefer’s framework. J. Logic Comput. 31, 1 (2021), 266–296. DOI:
[62]
V. Wiktor Marek and Miroslaw Truszczynski. 1989. Relating autoepistemic and default logics. In Proceedings of the 1st International Conference on Principles of Knowledge Representation and Reasoning (KR’89). Morgan Kaufmann, 276–288.
[63]
Victor W. Marek and Mirosław Truszczyński. 1993. Nonmonotonic Logic: Context-dependent Reasoning. Springer Verlag, Berlin. DOI:
[64]
John McCarthy. 1980. Circumscription—A form of non-monotonic reasoning. Artif. Intell. 13 (Apr.1980), 27–39. Issue 1-2. DOI:
[65]
J. McCarthy. 1980. Circumscription—A form of non-monotonic reasoning. Artif. Intell. 13, 1-2 (1980), 27–39.
[66]
Drew McDermott and Jon Doyle. 1980. Non-montonic logic I. Artif. Intell. 13, 41-72 (1980). DOI:
[67]
Drew V. McDermott. 1982. Nonmonotonic logic II: Nonmonotonic modal theories. J. ACM 29, 1 (1982), 33–57.
[68]
Drew V. McDermott and Jon Doyle. 1980. Non-monotonic logic I. Artif. Intell. 13, 1-2 (1980), 41–72.
[69]
Arne Meier. 2020. Incremental FPT delay. Algorithms 13, 5 (2020), 122. DOI:
[70]
Arne Meier. 2020. Parametrised Enumeration. Habilitation thesis, Leibniz Universität Hannover.
[71]
Arne Meier, Sebastian Ordyniak, M. S. Ramanujan, and Irena Schindler. 2018. Backdoors for linear temporal logic. Algorithmica (18 Sep.2018). DOI:
[72]
Arne Meier, Irina Schindler, Johannes Schmidt, Michael Thomas, and Heribert Vollmer. 2015. On the parameterized complexity of non-monotonic logics. Arch. Math. Logic 54, 5-6 (2015), 685–710. DOI:
[73]
Arne Meier, Irina Schindler, Johannes Schmidt, Michael Thomas, and Heribert Vollmer. 2015. On the parameterized complexity of non-monotonic logics. Arch. Math. Logic 54, 5-6 (2015), 685–710. DOI:
[74]
Robert C. Moore. 1985. Semantical considerations on modal logic. Artif. Intell. 25, 1 (Jan.1985), 75–94.
[75]
Robert C. Moore. 1985. Semantical considerations on nonmonotonic logic. Artif. Intell. 25, 1 (1985), 75–94. DOI:
[76]
Naomi Nishimura, Prabhakar Ragde, and Stefan Szeider. 2004. Detecting backdoor sets with respect to horn and binary clauses. In Proceedings of the 7th International Conference on Theory and Applications of Satisfiability Testing (SAT’04),Lecture Notes in Computer Science, Vol. 3542, Holger H. Hoos and David G. Mitchell (Eds.). Springer Verlag, Vancouver, BC, Canada, 96–103.
[77]
Sebastian Ordyniak, Daniel Paulusma, and Stefan Szeider. 2013. Satisfiability of acyclic and almost acyclic CNF formulas. Theor. Comput. Sci. 481 (2013), 85–99. DOI:
[78]
Christos H. Papadimitriou. 1994. Computational Complexity. Addison-Wesley.
[79]
Charles Sanders Peirce. 1958. Collected Papers of Charles Sanders Peirce. Oxford University Press.
[80]
C. S. Peirce, C. Hartshorne, and P. Weiss. 1932. The Collected Papers of Charles Sanders Peirce. Cambridge University Press, Cambridge.
[81]
Andreas Pfandler, Stefan Rümmele, and Stefan Szeider. 2013. Backdoors to abduction. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI’13), Francesca Rossi (Ed.). The AAAI Press, 1046–1052.
[82]
Sopo Pkhakadze and Hans Tompits. 2020. Sequent-type calculi for three-valued and disjunctive default logic. Axioms 9, 3 (2020), 84.
[83]
Raymond Reiter. 1980. A logic for default reasoning. Artif. Intell. 13, 1 (Apr.1980), 81–132. DOI:
[84]
Riccardo Rosati. 1999. Model checking for nonmonotonic logics: Algorithms and complexity. In Proceedings of the 16th International Joint Conference on Artificial Intelligence (ICJAI’99), Thomas Dean (Ed.). The AAAI Press.
[85]
Marko Samer and Stefan Szeider. 2009. Fixed-parameter tractability. In Handbook of Satisfiability, Armin Biere, Marijn Heule, Hans van Maaren, and Toby Walsh (Eds.). IOS Press, 425–454.
[86]
Thomas J. Schaefer. 1978. The complexity of satisfiability problems. In Proceedings of the 10th Annual ACM Symposium on Theory of Computing (STOC’78), Richard J. Lipton, Walter A. Burkhard, Walter J. Savitch, Emily P. Friedman, and Alfred V. Aho (Eds.). Association for Computing Machinery, New York, NY, 216–226. DOI:
[87]
Claus-Peter Schnorr. 1981. On self-transformable combinatorial problems. In Mathematical Programming at Oberwolfach, H. König, B. Korte, and K. Ritter (Eds.). Mathematical Programming Studies, Vol. 14. Springer Verlag, 225–243. DOI:
[88]
Alexander Semenov, Daniil Chivilikhin, Stepan Kochemazov, and Ibragim Dzhiblavi. 2023. Probabilistic generalization of backdoor trees with application to SAT. In Proceedings of the 37th AAAI Conference on Artificial Intelligence (AAAI’23). The AAAI Press, Article 456, 9 pages. DOI:
[89]
Alexander Semenov, Artem Pavlenko, Daniil Chivilikhin, and Stepan Kochemazov. 2022. On probabilistic generalization of backdoors in boolean satisfiability. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’22), Vasant Honavar and Matthijs Spaan (Eds.), Vol. 36. The AAAI Press, 10353–10361. DOI:
[90]
Jonathan P. Stillman. 1990. It’s not my default: The complexity of membership problems in restricted propositional default logics. In Proceedings of the 8th National Conference on Artificial Intelligence (AAAI’90), Thomas Dietterich and William Swartout (Eds.), Vol. 1. The AAAI Press, 571–578.
[91]
Jonathan P. Stillman. 1990. The complexity of horn theories with normal unary defaults. In Proceedings of the 8th Canadian Artificial Intelligence Conference (AI’90).
[92]
Ezgi Iraz Su. 2020. A unifying approach for nonmonotonic S4F, (Reflexive) autoepistemic logic, and answer set programming. Fundam. Inf. 176, 3-4 (2020), 205–234.
[93]
Stefan Szeider. 2004. On fixed-parameter tractable parameterizations of SAT. In Proceedings of the 6th International Conference Theory and Applications of Satisfiability (SAT’03),Lecture Notes in Computer Science, Vol. 2919, Enrico Giunchiglia and Armando Tacchella (Eds.). Springer Verlag, 188–202.
[94]
Michael Thomas. 2010. On the Complexity of Fragments of Nonmonotonic Logics. Ph. D. Dissertation. University of Hanover.
[95]
Ryan Williams, Carla Gomes, and Bart Selman. 2003. Backdoors to typical case complexity. In Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI’03), Georg Gottlob and Toby Walsh (Eds.). Morgan Kaufmann, 1173–1178.
[96]
Ryan Williams, Carla Gomes, and Bart Selman. 2003. On the connections between backdoors, restarts, and heavy-tailedness in combinatorial search. In Informal Proceedings of the 6th International Conference on Theory and Applications of Satisfiability Testing (SAT’03). 222–230.
[97]
Anthony P. Young, Sanjay Modgil, and Odinaldo Rodrigues. 2016. Prioritised default logic as rational argumentation. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems (AAMAS’16), John Thangarajah, Karl Tuyls, Catholijn M. Jonker, and Stacy C. Marsella (Eds.). Association for Computing Machinery, New York, 626–634.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Computational Logic
ACM Transactions on Computational Logic  Volume 25, Issue 3
July 2024
36 pages
EISSN:1557-945X
DOI:10.1145/3613691
  • Editor:
  • Anuj Dawar
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 June 2024
Online AM: 30 March 2024
Accepted: 11 March 2024
Revised: 02 February 2024
Received: 11 October 2023
Published in TOCL Volume 25, Issue 3

Check for updates

Author Tags

  1. Parameterised complexity
  2. default logic
  3. backdoors

Qualifiers

  • Research-article

Funding Sources

  • German Research Foundation (DFG)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 678
    Total Downloads
  • Downloads (Last 12 months)678
  • Downloads (Last 6 weeks)91
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media