Abstract
The class \(\text {q-Horn}\), introduced by Boros, Crama and Hammer in 1990, is one of the largest known classes of propositional CNF formulas for which satisfiability can be decided in polynomial time. This class properly contains the fundamental classes of Horn and 2-CNF formulas as well as the class of renamable (or disguised) Horn formulas. In this paper we extend this class so that its favorable algorithmic properties can be made accessible to formulas that are outside but “close” to this class. We show that deciding satisfiability is fixed-parameter tractable parameterized by the distance of the given formula from \(\text {q-Horn}\). The distance is measured by the smallest number of variables that we need to delete from the formula in order to get a \(\text {q-Horn}\) formula, i.e., the size of a smallest deletion backdoor set into the class \(\text {q-Horn}\). This result generalizes known fixed-parameter tractability results for satisfiability decision with respect to the parameters distance from Horn, 2-CNF, and renamable Horn.
Similar content being viewed by others
References
Alekhnovich, M., Razborov, A.A.: Satisfiability, branch-width and Tseitin tautologies. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS’02), pp. 593–603 (2002)
Aspvall, B., Plass, M.F., Tarjan, R.E.: A linear-time algorithm for testing the truth of certain quantified Boolean formulas. Inf. Process. Lett. 8(3), 121–123 (1979)
Biere, A.: Bounded model checking. In: Biere, A., Heule, M., van Maaren, H., Walsh, T. (eds.) Handbook of Satisfiability, volume 185 of Frontiers in Artificial Intelligence and Applications, pp. 457–481. IOS Press (2009)
Biere, A., Heule, M., van Maaren, H., Walsh, T. (eds.): Handbook of Satisfiability, volume 185 of Frontiers in Artificial Intelligence and Applications. IOS Press (2009)
Bjesse, P., Leonard, T., Mokkedem, A.: Finding bugs in an alpha microprocessor using satisfiability solvers. In: Berry, G., Comon, H., Finkel, A. (eds.) Computer Aided Verification: 13th International Conference, CAV 2001, Paris, France, July 18–22, 2001, Proceedings, pp. 454–464 (2001)
Boros, E., Crama, Y., Hammer, P.L.: Polynomial-time inference of all valid implications for horn and related formulae. Ann. Math. Artif. Intell. 1, 21–32 (1990)
Boros, E., Hammer, P.L., Sun, X.: Recognition of \(q\)-Horn formulae in linear time. Discret. Appl. Math. 55(1), 1–13 (1994)
Cook, S.A.: The complexity of theorem-proving procedures. In: Proceedings of the 3rd Annual Symposium on Theory of Computing, pp. 151–158. Shaker Heights, Ohio (1971)
Crama, Y., Ekin, O., Hammer, P.L.: Variable and term removal from Boolean formulae. Discret. Appl. Math. 75(3), 217–230 (1997)
Downey, R.G., Fellows, M.R.: Parameterized Complexity. Monographs in Computer Science. Springer, New York (1999)
Downey, R.G., Fellows, M.R., McCartin, C.: Parameterized approximation problems. In: Parameterized and Exact Computation, Second International Workshop, IWPEC 2006, volume 4169 of Lecture Notes in Computer Science, pp. 121–129. Springer, Berlin (2006)
Fischer, E., Makowsky, J.A., Ravve, E.R.: Counting truth assignments of formulas of bounded tree-width or clique-width. Discret. Appl. Math. 156(4), 511–529 (2008)
Flum, J., Grohe, M.: Parameterized Complexity Theory, volume XIV of Texts in Theoretical Computer Science. An EATCS Series. Springer, Berlin (2006)
Ford Jr, L.R., Fulkerson, D.R.: Maximal flow through a network. Can. J. Math. 8, 399–404 (1956)
Ganian, R., Hlinený, P., Obdrzálek, J.: Better algorithms for satisfiability problems for formulas of bounded rank-width. In: IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2010, December 15–18, 2010, Chennai, India, volume 8 of LIPIcs, pp. 73–83 (2010)
Gaspers, S., Szeider, S.: Backdoors to satisfaction. In: Bodlaender, H.L., Downey, R., Fomin, F.V., Marx, D. (eds.) The Multivariate Algorithmic Revolution and Beyond—Essays Dedicated to Michael R. Fellows on the Occasion of His 60th Birthday volume 7370 of Lecture Notes in Computer Science, pp. 287–317. Springer, Berlin (2012)
Gomes, C.P., Kautz, H., Sabharwal, A., Selman, B.: Satisfiability solvers. In: Handbook of Knowledge Representation, volume 3 of Foundations of Artificial Intelligence, pp. 89–134. Elsevier, Amsterdam (2008)
Kautz, H.A., Selman, B.: Planning as satisfiability. In: Proceedings ECAI, pp. 359–363 (1992)
Lewis, H.R.: Renaming a set of clauses as a Horn set. J. ACM 25(1), 134–135 (1978)
Prasad, A.G.M., Biere, A.: A survey of recent advances in SAT-based formal verification. Softw. Tools Technol. Transf. 7(2), 156–173 (2005)
Marx, D.: Can you beat treewidth? Theory Comput. 6, 85–112 (2010)
Nishimura, N., Ragde, P., Szeider, S.: Detecting backdoor sets with respect to Horn and binary clauses. In: Proceedings of SAT 2004 (Seventh International Conference on Theory and Applications of Satisfiability Testing, 10–13 May, 2004, Vancouver, BC, Canada), pp. 96–103 (2004)
Ramanujan, M.S., Saurabh, S.: Linear time parameterized algorithms via skew-symmetric multicuts. In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5–7, 2014, pp. 1739–1748 (2014)
Razgon, I., O’Sullivan, B.: Almost 2-SAT is fixed parameter tractable. J. Comput. Syst. Sci. 75(8), 435–450 (2009)
Samer, M., Szeider, S.: Algorithms for propositional model counting. J. Discret. Algorithms 8(1), 50–64 (2010)
Schaefer, T.J.: The complexity of satisfiability problems. In: Conference Record of the Tenth Annual ACM Symposium on Theory of Computing (San Diego, Calif., 1978), pp. 216–226. ACM (1978)
Velev, M.N., Bryant, R.E.: Effective use of Boolean satisfiability procedures in the formal verification of superscalar and VLIW microprocessors. J. Symb. Comput. 35(2), 73–106 (2003)
Williams, R., Gomes, C., Selman, B.: Backdoors to typical case complexity. In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence, IJCAI, 2003, pp. 1173–1178 (2003)
Acknowledgments
The authors acknowledge support from the OeAD (Austrian Indian collaboration grant, IN13/2011). Serge Gaspers, Sebastian Ordyniak, and Stefan Szeider acknowledge support from the European Research Council (COMPLEX REASON, 239962) and Serge Gaspers acknowledges support from the Australian Research Council (DE120101761).
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of this paper appeared in the proceedings of STACS 2013.
Rights and permissions
About this article
Cite this article
Gaspers, S., Ordyniak, S., Ramanujan, M.S. et al. Backdoors to q-Horn. Algorithmica 74, 540–557 (2016). https://doi.org/10.1007/s00453-014-9958-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00453-014-9958-5