Skip to main content

Showing 1–50 of 79 results for author: Szeider, S

.
  1. arXiv:2503.03576  [pdf, other

    cs.LG

    Optimal Decision Tree Pruning Revisited: Algorithms and Complexity

    Authors: Juha Harviainen, Frank Sommer, Manuel Sorge, Stefan Szeider

    Abstract: We present a comprehensive classical and parameterized complexity analysis of decision tree pruning operations, extending recent research on the complexity of learning small decision trees. Thereby, we offer new insights into the computational challenges of decision tree simplification, a crucial aspect of developing interpretable and efficient machine learning models. We focus on fundamental prun… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

  2. arXiv:2502.15078  [pdf, ps, other

    cs.LO

    Breaking Symmetries in Quantified Graph Search: A Comparative Study

    Authors: Mikoláš Janota, Markus Kirchweger, Tomáš Peitl, Stefan Szeider

    Abstract: Graph generation and enumeration problems often require handling equivalent graphs -- those that differ only in vertex labeling. We study how to extend SAT Modulo Symmetries (SMS), a framework for eliminating such redundant graphs, to handle more complex constraints. While SMS was originally designed for constraints in propositional logic (in NP), we now extend it to handle quantified Boolean form… ▽ More

    Submitted 20 February, 2025; originally announced February 2025.

  3. arXiv:2502.00434  [pdf, other

    cs.CC cs.AI cs.LO

    Compilation and Fast Model Counting beyond CNF

    Authors: Alexis de Colnet, Stefan Szeider, Tianwei Zhang

    Abstract: Circuits in deterministic decomposable negation normal form (d-DNNF) are representations of Boolean functions that enable linear-time model counting. This paper strengthens our theoretical knowledge of what classes of functions can be efficiently transformed, or compiled, into d-DNNF. Our main contribution is the fixed-parameter tractable (FPT) compilation of conjunctions of specific constraints p… ▽ More

    Submitted 1 February, 2025; originally announced February 2025.

  4. arXiv:2501.17201  [pdf, other

    cs.AI

    Smart Cubing for Graph Search: A Comparative Study

    Authors: Markus Kirchweger, Hai Xia, Tomáš Peitl, Stefan Szeider

    Abstract: Parallel solving via cube-and-conquer is a key method for scaling SAT solvers to hard instances. While cube-and-conquer has proven successful for pure SAT problems, notably the Pythagorean triples conjecture, its application to SAT solvers extended with propagators presents unique challenges, as these propagators learn constraints dynamically during the search. We study this problem using SAT Mo… ▽ More

    Submitted 27 January, 2025; originally announced January 2025.

  5. arXiv:2501.14630  [pdf, other

    cs.AI

    Extracting Problem Structure with LLMs for Optimized SAT Local Search

    Authors: André Schidler, Stefan Szeider

    Abstract: Local search preprocessing makes Conflict-Driven Clause Learning (CDCL) solvers faster by providing high-quality starting points and modern SAT solvers have incorporated this technique into their preprocessing steps. However, these tools rely on basic strategies that miss the structural patterns in problems. We present a method that applies Large Language Models (LLMs) to analyze Python-based enco… ▽ More

    Submitted 4 February, 2025; v1 submitted 24 January, 2025; originally announced January 2025.

  6. arXiv:2501.00539  [pdf, other

    cs.AI cs.CL cs.LG cs.SE

    MCP-Solver: Integrating Language Models with Constraint Programming Systems

    Authors: Stefan Szeider

    Abstract: The MCP Solver bridges Large Language Models (LLMs) with symbolic solvers through the Model Context Protocol (MCP), an open-source standard for AI system integration. Providing LLMs access to formal solving and reasoning capabilities addresses their key deficiency while leveraging their strengths. Our implementation offers interfaces for constraint programming (Minizinc), propositional satisfiabil… ▽ More

    Submitted 6 April, 2025; v1 submitted 31 December, 2024; originally announced January 2025.

  7. arXiv:2408.10268  [pdf, other

    cs.SE cs.AI cs.LG

    Generating Streamlining Constraints with Large Language Models

    Authors: Florentina Voboril, Vaidyanathan Peruvemba Ramaswamy, Stefan Szeider

    Abstract: Streamlining constraints (or streamliners, for short) narrow the search space, enhancing the speed and feasibility of solving complex constraint satisfaction problems. Traditionally, streamliners were crafted manually or generated through systematically combined atomic constraints with high-effort offline testing. Our approach utilizes the creativity of Large Language Models (LLMs) to propose effe… ▽ More

    Submitted 28 January, 2025; v1 submitted 16 August, 2024; originally announced August 2024.

  8. arXiv:2407.15780  [pdf, ps, other

    cs.AI cs.CC

    Explaining Decisions in ML Models: a Parameterized Complexity Analysis

    Authors: Sebastian Ordyniak, Giacomo Paesani, Mateusz Rychlicki, Stefan Szeider

    Abstract: This paper presents a comprehensive theoretical investigation into the parameterized complexity of explanation problems in various machine learning (ML) models. Contrary to the prevalent black-box perception, our study focuses on models with transparent internal mechanisms. We address two principal types of explanation problems: abductive and contrastive, both in their local and global variants. O… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

    Comments: A short version of the paper has been accepted at the 21st International Conference on Principles of Knowledge Representation and Reasoning (KR 2024)

  9. arXiv:2407.10699  [pdf, other

    cs.DS

    From Data Completion to Problems on Hypercubes: A Parameterized Analysis of the Independent Set Problem

    Authors: Eduard Eiben, Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: Several works have recently investigated the parameterized complexity of data completion problems, motivated by their applications in machine learning, and clustering in particular. Interestingly, these problems can be equivalently formulated as classical graph problems on induced subgraphs of powers of partially-defined hypercubes. In this paper, we follow up on this recent direction by investi… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

    Comments: A preliminary version of this article appeared in the proceedings of IPEC 2023. arXiv admin note: substantial text overlap with arXiv:1911.01465

  10. arXiv:2405.16149  [pdf, other

    cs.DM cs.CC cs.LO

    Small unsatisfiable $k$-CNFs with bounded literal occurrence

    Authors: Tianwei Zhang, Tomáš Peitl, Stefan Szeider

    Abstract: We obtain the smallest unsatisfiable formulas in subclasses of $k$-CNF (exactly $k$ distinct literals per clause) with bounded variable or literal occurrences. Smaller unsatisfiable formulas of this type translate into stronger inapproximability results for MaxSAT in the considered formula class. Our results cover subclasses of 3-CNF and 4-CNF; in all subclasses of 3-CNF we considered we were able… ▽ More

    Submitted 19 July, 2024; v1 submitted 25 May, 2024; originally announced May 2024.

    Comments: full version of a paper to appear in the proceedings of SAT 2024, slight revision compared to v1

  11. arXiv:2402.00542  [pdf, ps, other

    cs.CC

    Hardness of Random Reordered Encodings of Parity for Resolution and CDCL

    Authors: Leroy Chew, Alexis de Colnet, Friedrich Slivovsky, Stefan Szeider

    Abstract: Parity reasoning is challenging for Conflict-Driven Clause Learning (CDCL) SAT solvers. This has been observed even for simple formulas encoding two contradictory parity constraints with different variable orders (Chew and Heule 2020). We provide an analytical explanation for their hardness by showing that they require exponential resolution refutations with high probability when the variable orde… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  12. arXiv:2312.07628  [pdf, other

    cs.DS

    Finding a Cluster in Incomplete Data

    Authors: Eduard Eiben, Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: We study two variants of the fundamental problem of finding a cluster in incomplete data. In the problems under consideration, we are given a multiset of incomplete $d$-dimensional vectors over the binary domain and integers $k$ and $r$, and the goal is to complete the missing vector entries so that the multiset of complete vectors either contains (i) a cluster of $k$ vectors of radius at most… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Short version appeared at ESA 2022. arXiv admin note: substantial text overlap with arXiv:1911.01465

  13. arXiv:2312.07103  [pdf, ps, other

    cs.LG cs.CC cs.DS

    The Computational Complexity of Concise Hypersphere Classification

    Authors: Eduard Eiben, Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: Hypersphere classification is a classical and foundational method that can provide easy-to-process explanations for the classification of real-valued and binary data. However, obtaining an (ideally concise) explanation via hypersphere classification is much more difficult when dealing with binary data than real-valued data. In this paper, we perform the first complexity-theoretic study of the hype… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Short version appeared at ICML 2023

  14. arXiv:2306.10427  [pdf, ps, other

    quant-ph cs.AI cs.DM cs.LO

    Co-Certificate Learning with SAT Modulo Symmetries

    Authors: Markus Kirchweger, Tomáš Peitl, Stefan Szeider

    Abstract: We present a new SAT-based method for generating all graphs up to isomorphism that satisfy a given co-NP property. Our method extends the SAT Modulo Symmetry (SMS) framework with a technique that we call co-certificate learning. If SMS generates a candidate graph that violates the given co-NP property, we obtain a certificate for this violation, i.e., `co-certificate' for the co-NP property. The c… ▽ More

    Submitted 21 June, 2023; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: To appear in the Proceedings of IJCAI 2023, the 32nd International Joint Conference on Artificial Intelligence, August 19-25, 2023, Macao, S.A.R. This update fixes a formatting glitch with references

  15. Threshold Treewidth and Hypertree Width

    Authors: Andre Schidler, Robert Ganian, Manuel Sorge, Stefan Szeider

    Abstract: Treewidth and hypertree width have proven to be highly successful structural parameters in the context of the Constraint Satisfaction Problem (CSP). When either of these parameters is bounded by a constant, then CSP becomes solvable in polynomial time. However, here the order of the polynomial in the running time depends on the width, and this is known to be unavoidable; therefore, the problem is… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: 24 pages, 4 figures. An extended abstract appeared at IJCAI 2020. A full version appeared in the Journal of Artificial Intelligence Research

    Journal ref: Journal of Artificial Intelligence Research, 74:1687-1713, 2022

  16. arXiv:2206.15225  [pdf, other

    cs.AI cs.DM cs.LO

    Are Hitting Formulas Hard for Resolution?

    Authors: Tomáš Peitl, Stefan Szeider

    Abstract: Hitting formulas, introduced by Iwama, are an unusual class of propositional CNF formulas. Not only is their satisfiability decidable in polynomial time, but even their models can be counted in closed form. This stands in stark contrast with other polynomial-time decidable classes, which usually have algorithms based on backtracking and resolution and for which model counting remains hard, like 2-… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

  17. arXiv:2206.01706  [pdf, other

    cs.DS

    Weighted Model Counting with Twin-Width

    Authors: Robert Ganian, Filip Pokrývka, André Schidler, Kirill Simonov, Stefan Szeider

    Abstract: Bonnet et al. (FOCS 2020) introduced the graph invariant twin-width and showed that many NP-hard problems are tractable for graphs of bounded twin-width, generalizing similar results for other width measures, including treewidth and clique-width. In this paper, we investigate the use of twin-width for solving the propositional satisfiability problem (SAT) and propositional model counting. We parti… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  18. arXiv:2206.00752  [pdf, ps, other

    cs.DS

    Algorithmic Applications of Tree-Cut Width

    Authors: Robert Ganian, Eun Jung Kim, Stefan Szeider

    Abstract: The recently introduced graph parameter tree-cut width plays a similar role with respect to immersions as the graph parameter treewidth plays with respect to minors. In this paper, we provide the first algorithmic applications of tree-cut width to hard combinatorial problems. Tree-cut width is known to be lower-bounded by a function of treewidth, but it can be much larger and hence has the potenti… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: Full version to appear in the Siam Journal on Discrete Mathematics

  19. arXiv:2202.08326  [pdf, other

    cs.DS

    SAT Backdoors: Depth Beats Size

    Authors: Jan Dreier, Sebastian Ordyniak, Stefan Szeider

    Abstract: For several decades, much effort has been put into identifying classes of CNF formulas whose satisfiability can be decided in polynomial time. Classic results are the linear-time tractability of Horn formulas (Aspvall, Plass, and Tarjan, 1979) and Krom (i.e., 2CNF) formulas (Dowling and Gallier, 1984). Backdoors, introduced by Williams Gomes and Selman (2003), gradually extend such a tractable cla… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

  20. arXiv:2110.06146  [pdf, other

    cs.DS cs.LO math.CO

    A SAT Approach to Twin-Width

    Authors: André Schidler, Stefan Szeider

    Abstract: The graph invariant twin-width was recently introduced by Bonnet, Kim, Thomassé, and Watrigan. Problems expressible in first-order logic, which includes many prominent NP-hard problems, are tractable on graphs of bounded twin-width if a certificate for the twin-width bound is provided as an input. Computing such a certificate, however, is an intrinsic problem, for which no nontrivial algorithm is… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Comments: Preprint of a paper to appear at ALENEX'22

  21. arXiv:2106.02550  [pdf, other

    cs.LO

    Certified DQBF Solving by Definition Extraction

    Authors: Franz-Xaver Reichl, Friedrich Slivovsky, Stefan Szeider

    Abstract: We propose a new decision procedure for dependency quantified Boolean formulas (DQBF) that uses interpolation-based definition extraction to compute Skolem functions in a counter-example guided inductive synthesis (CEGIS) loop. In each iteration, a family of candidate Skolem functions is tested for correctness using a SAT solver, which either determines that a model has been found, or returns an a… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

  22. Formalizing Graph Trail Properties in Isabelle/HOL

    Authors: Laura Kovacs, Hanna Lachnitt, Stefan Szeider

    Abstract: We describe a dataset expressing and proving properties of graph trails, using Isabelle/HOL. We formalize the reasoning about strictly increasing and decreasing trails, using weights over edges, and prove lower bounds over the length of trails in weighted graphs. We do so by extending the graph theory library of Isabelle/HOL with an algorithm computing the length of a longest strictly decreasing g… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

  23. arXiv:2008.02215  [pdf, other

    cs.AI cs.AR cs.DS

    A Time Leap Challenge for SAT Solving

    Authors: Johannes K. Fichte, Markus Hecher, Stefan Szeider

    Abstract: We compare the impact of hardware advancement and algorithm advancement for SAT solving over the last two decades. In particular, we compare 20-year-old SAT-solvers on new computer hardware with modern SAT-solvers on 20-year-old hardware. Our findings show that the progress on the algorithmic side has at least as much impact as the progress on the hardware side.

    Submitted 6 July, 2023; v1 submitted 5 August, 2020; originally announced August 2020.

    Comments: Authors' version of a paper which is to appear in the proceedings of CP'2020

    ACM Class: I.1.2; B.8.2; I.2.8; I.2.3

  24. arXiv:2006.13843  [pdf, other

    cs.AI cs.LG

    Turbocharging Treewidth-Bounded Bayesian Network Structure Learning

    Authors: Vaidyanathan P. R., Stefan Szeider

    Abstract: We present a new approach for learning the structure of a treewidth-bounded Bayesian Network (BN). The key to our approach is applying an exact method (based on MaxSAT) locally, to improve the score of a heuristically computed BN. This approach allows us to scale the power of exact methods -- so far only applicable to BNs with several dozens of random variables -- to large BNs with several thousan… ▽ More

    Submitted 5 February, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: 15 pages, 4 figures, 3 tables. To be published in AAAI 2021. Updated: synced with AAAI version. Source code available at http://github.com/aditya95sriram/bn-slim

    ACM Class: I.2.6

  25. arXiv:1911.12995  [pdf, other

    cs.DS

    SAT-Encodings for Treecut Width and Treedepth

    Authors: Robert Ganian, Neha Lodha, Sebastian Ordyniak, Stefan Szeider

    Abstract: In this paper we propose, implement, and test the first practical decomposition algorithms for the width parameters treecut width and treedepth. These two parameters have recently gained a lot of attention in the theoretical research community as they offer the algorithmic advantage over treewidth by supporting so-called fixed-parameter algorithms for certain problems that are not fixed-parameter… ▽ More

    Submitted 29 November, 2019; originally announced November 2019.

    Comments: Presented at ALENEX 2019; this version corrects a minor issue in one of the tables

  26. arXiv:1911.01465  [pdf, other

    cs.DS

    The Parameterized Complexity of Clustering Incomplete Data

    Authors: Eduard Eiben, Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: We study fundamental clustering problems for incomplete data. Specifically, given a set of incomplete d-dimensional vectors (representing rows of a matrix), the goal is to complete the missing vector entries in a way that admits a partitioning of the vectors into at most $k$ clusters with radius or diameter at most r. We give tight characterizations of the parameterized complexity of these problem… ▽ More

    Submitted 7 April, 2021; v1 submitted 4 November, 2019; originally announced November 2019.

  27. arXiv:1907.12335  [pdf, ps, other

    cs.DS

    A Join-Based Hybrid Parameter for Constraint Satisfaction

    Authors: Robert Ganian, Sebastian Ordyniak, Stefan Szeider

    Abstract: We propose joinwidth, a new complexity parameter for the Constraint Satisfaction Problem (CSP). The definition of joinwidth is based on the arrangement of basic operations on relations (joins, projections, and pruning), which inherently reflects the steps required to solve the instance. We use joinwidth to obtain polynomial-time algorithms (if a corresponding decomposition is provided in the input… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Comments: Accepted at CP 2019

  28. arXiv:1804.03423  [pdf, ps, other

    cs.DS cs.CC

    Parameterized Algorithms for the Matrix Completion Problem

    Authors: Robert Ganian, Iyad Kanj, Sebastian Ordyniak, Stefan Szeider

    Abstract: We consider two matrix completion problems, in which we are given a matrix with missing entries and the task is to complete the matrix in a way that (1) minimizes the rank, or (2) minimizes the number of distinct rows. We study the parameterized complexity of the two aforementioned problems with respect to several parameters of interest, including the minimum number of matrix rows, columns, and ro… ▽ More

    Submitted 13 September, 2018; v1 submitted 10 April, 2018; originally announced April 2018.

  29. arXiv:1701.04626  [pdf, other

    cs.LO

    Circuit Treewidth, Sentential Decision, and Query Compilation

    Authors: Simone Bova, Stefan Szeider

    Abstract: The evaluation of a query over a probabilistic database boils down to computing the probability of a suitable Boolean function, the lineage of the query over the database. The method of query compilation approaches the task in two stages: first, the query lineage is implemented (compiled) in a circuit form where probability computation is tractable; and second, the desired probability is computed… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

  30. arXiv:1612.05733  [pdf, ps, other

    cs.DS

    Backdoors to Tractable Valued CSP

    Authors: Robert Ganian, M. S. Ramanujan, Stefan Szeider

    Abstract: We extend the notion of a strong backdoor from the CSP setting to the Valued CSP setting (VCSP, for short). This provides a means for augmenting a class of tractable VCSP instances to instances that are outside the class but of small distance to the class, where the distance is measured in terms of the size of a smallest backdoor. We establish that VCSP is fixed-parameter tractable when parameteri… ▽ More

    Submitted 17 December, 2016; originally announced December 2016.

    Comments: Accepted to CP 2016

  31. arXiv:1610.03298  [pdf, other

    cs.DS

    Combining Treewidth and Backdoors for CSP

    Authors: Robert Ganian, M. S. Ramanujan, Stefan Szeider

    Abstract: We show that CSP is fixed-parameter tractable when parameterized by the treewidth of a backdoor into any tractable CSP problem over a finite constraint language. This result combines the two prominent approaches for achieving tractability for CSP: (i) by structural restrictions on the interaction between the variables and the constraints and (ii) by language restrictions on the relations that can… ▽ More

    Submitted 11 October, 2016; originally announced October 2016.

  32. Backdoors into Heterogeneous Classes of SAT and CSP

    Authors: Serge Gaspers, Neeldhara Misra, Sebastian Ordyniak, Stefan Szeider, Stanislav Živný

    Abstract: In this paper we extend the classical notion of strong and weak backdoor sets for SAT and CSP by allowing that different instantiations of the backdoor variables result in instances that belong to different base classes; the union of the base classes forms a heterogeneous base class. Backdoor sets to heterogeneous base classes can be much smaller than backdoor sets to homogeneous ones, hence they… ▽ More

    Submitted 25 October, 2016; v1 submitted 18 September, 2015; originally announced September 2015.

    Comments: to appear in JCSS, full version of an AAAI 2014 paper

    Journal ref: Journal of Computer and System Sciences 85 38-56 (2017)

  33. arXiv:1507.05544  [pdf, other

    cs.DS

    Meta-Kernelization using Well-Structured Modulators

    Authors: Eduard Eiben, Robert Ganian, Stefan Szeider

    Abstract: Kernelization investigates exact preprocessing algorithms with performance guarantees. The most prevalent type of parameters used in kernelization is the solution size for optimization problems; however, also structural parameters have been successfully used to obtain polynomial kernels for a wide range of problems. Many of these parameters can be defined as the size of a smallest modulator of the… ▽ More

    Submitted 20 July, 2015; originally announced July 2015.

  34. arXiv:1507.05463  [pdf, ps, other

    cs.DS

    Solving Problems on Graphs of High Rank-Width

    Authors: Eduard Eiben, Robert Ganian, Stefan Szeider

    Abstract: A modulator of a graph G to a specified graph class H is a set of vertices whose deletion puts G into H. The cardinality of a modulator to various tractable graph classes has long been used as a structural parameter which can be exploited to obtain FPT algorithms for a range of hard problems. Here we investigate what happens when a graph contains a modulator which is large but "well-structured" (i… ▽ More

    Submitted 20 July, 2015; originally announced July 2015.

    Comments: Accepted at WADS 2015

  35. arXiv:1507.02479  [pdf, other

    cs.DS

    Discovering Archipelagos of Tractability for Constraint Satisfaction and Counting

    Authors: Robert Ganian, M. S. Ramanujan, Stefan Szeider

    Abstract: The Constraint Satisfaction Problem (CSP) is a central and generic computational problem which provides a common framework for many theoretical and practical applications. A central line of research is concerned with the identification of classes of instances for which CSP can be solved in polynomial time; such classes are often called "islands of tractability." A prominent way of defining islands… ▽ More

    Submitted 20 July, 2015; v1 submitted 9 July, 2015; originally announced July 2015.

  36. arXiv:1506.09100  [pdf, ps, other

    cs.DS

    Polynomial-time Construction of Optimal Tree-structured Communication Data Layout Descriptions

    Authors: Robert Ganian, Martin Kalany, Stefan Szeider, Jesper Larsson Träff

    Abstract: We show that the problem of constructing tree-structured descriptions of data layouts that are optimal with respect to space or other criteria from given sequences of displacements, can be solved in polynomial time. The problem is relevant for efficient compiler and library support for communication of noncontiguous data, where tree-structured descriptions with low-degree nodes and small index arr… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

  37. arXiv:1409.8464  [pdf, ps, other

    cs.CC cs.DS

    Model Counting for Formulas of Bounded Clique-Width

    Authors: Friedrich Slivovsky, Stefan Szeider

    Abstract: We show that #SAT is polynomial-time tractable for classes of CNF formulas whose incidence graphs have bounded symmetric clique-width (or bounded clique-width, or bounded rank-width). This result strictly generalizes polynomial-time tractability results for classes of formulas with signed incidence graphs of bounded clique-width and classes of formulas with incidence graphs of bounded modular tree… ▽ More

    Submitted 30 September, 2014; originally announced September 2014.

    Comments: Extended version of a paper published at ISAAC 2013

    Journal ref: Proceedings of ISAAC 2013. Lecture Notes in Computer Science, vol. 8283, pp. 677-687, Springer, 2013

  38. arXiv:1408.4263  [pdf, ps, other

    cs.LO cs.DS

    Quantified Conjunctive Queries on Partially Ordered Sets

    Authors: Simone Bova, Robert Ganian, Stefan Szeider

    Abstract: We study the computational problem of checking whether a quantified conjunctive query (a first-order sentence built using only conjunction as Boolean connective) is true in a finite poset (a reflexive, antisymmetric, and transitive directed graph). We prove that the problem is already NP-hard on a certain fixed poset, and investigate structural properties of posets yielding fixed-parameter tractab… ▽ More

    Submitted 19 August, 2014; originally announced August 2014.

    Comments: Accepted at IPEC 2014

  39. arXiv:1406.3124  [pdf, ps, other

    cs.AI cs.CC cs.DS

    Guarantees and Limits of Preprocessing in Constraint Satisfaction and Reasoning

    Authors: Serge Gaspers, Stefan Szeider

    Abstract: We present a first theoretical analysis of the power of polynomial-time preprocessing for important combinatorial problems from various areas in AI. We consider problems from Constraint Satisfaction, Global Constraints, Satisfiability, Nonmonotonic and Bayesian Reasoning under structural restrictions. All these problems involve two tasks: (i) identifying the structure in the input as required by t… ▽ More

    Submitted 12 June, 2014; originally announced June 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1104.2541, arXiv:1104.5566

  40. arXiv:1405.2891  [pdf, ps, other

    cs.LO cs.DS

    Model Checking Existential Logic on Partially Ordered Sets

    Authors: Simone Bova, Robert Ganian, Stefan Szeider

    Abstract: We study the problem of checking whether an existential sentence (that is, a first-order sentence in prefix form built using existential quantifiers and all Boolean connectives) is true in a finite partially ordered set (in short, a poset). A poset is a reflexive, antisymmetric, and transitive digraph. The problem encompasses the fundamental embedding problem of finding an isomorphic copy of a pos… ▽ More

    Submitted 15 April, 2014; originally announced May 2014.

    Comments: accepted at CSL-LICS 2014

  41. arXiv:1402.6109  [pdf, ps, other

    cs.DS cs.AI

    The Complexity of Repairing, Adjusting, and Aggregating of Extensions in Abstract Argumentation

    Authors: Eun Jung Kim, Sebastian Ordyniak, Stefan Szeider

    Abstract: We study the computational complexity of problems that arise in abstract argumentation in the context of dynamic argumentation, minimal change, and aggregation. In particular, we consider the following problems where always an argumentation framework F and a small positive integer k are given. - The Repair problem asks whether a given set of arguments can be modified into an extension by at most… ▽ More

    Submitted 25 February, 2014; originally announced February 2014.

    Journal ref: Proc. TAFA 2013, pp. 158-175, Springer LNCS

  42. arXiv:1402.0558  [pdf

    cs.AI cs.LG

    Parameterized Complexity Results for Exact Bayesian Network Structure Learning

    Authors: Sebastian Ordyniak, Stefan Szeider

    Abstract: Bayesian network structure learning is the notoriously difficult problem of discovering a Bayesian network that optimally represents a given set of training data. In this paper we study the computational worst-case complexity of exact Bayesian network structure learning under graph theoretic restrictions on the (directed) super-structure. The super-structure is an undirected graph that contains… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 46, pages 263-302, 2013

  43. arXiv:1312.1672  [pdf, ps, other

    cs.CC cs.DS cs.LO

    The Parameterized Complexity of Reasoning Problems Beyond NP

    Authors: Ronald de Haan, Stefan Szeider

    Abstract: Today's propositional satisfiability (SAT) solvers are extremely powerful and can be used as an efficient back-end for solving NP-complete problems. However, many fundamental problems in knowledge representation and reasoning are located at the second level of the Polynomial Hierarchy or even higher, and hence polynomial-time transformations to SAT are not possible, unless the hierarchy collapses.… ▽ More

    Submitted 1 July, 2016; v1 submitted 5 December, 2013; originally announced December 2013.

  44. arXiv:1310.7828  [pdf, ps, other

    cs.AI cs.DS

    A Complete Parameterized Complexity Analysis of Bounded Planning

    Authors: Christer Baeckstroem, Peter Jonsson, Sebastian Ordyniak, Stefan Szeider

    Abstract: The propositional planning problem is a notoriously difficult computational problem, which remains hard even under strong syntactical and structural restrictions. Given its difficulty it becomes natural to study planning in the context of parameterized complexity. In this paper we continue the work initiated by Downey, Fellows and Stege on the parameterized complexity of planning with respect to t… ▽ More

    Submitted 29 October, 2013; originally announced October 2013.

    Comments: The paper is a combined and extended version of the papers "The Complexity of Planning Revisited - A Parameterized Analysis" (AAAI 2012, arXiv:1208.2566) and "Parameterized Complexity and Kernel Bounds for Hard Planning Problems" (CIAC 2013, arXiv:1211.0479)

    Journal ref: Proc. AAAI'12, pp. 1735-1741, AAAI Press 2012 and Proc. CIAC'13, pp. 13-24, Springer

  45. arXiv:1307.4440  [pdf, ps, other

    cs.AI cs.CC

    Parameterized Complexity Results for Plan Reuse

    Authors: Ronald de Haan, Anna Roubíčková, Stefan Szeider

    Abstract: Planning is a notoriously difficult computational problem of high worst-case complexity. Researchers have been investing significant efforts to develop heuristics or restrictions to make planning practically feasible. Case-based planning is a heuristic approach where one tries to reuse previous experience when solving similar problems in order to avoid some of the planning effort. Plan reuse may o… ▽ More

    Submitted 16 July, 2013; originally announced July 2013.

    Comments: Proceedings of AAAI 2013, pp. 224-231, AAAI Press, 2013

  46. arXiv:1304.5961  [pdf, ps, other

    cs.AI cs.CC cs.LO

    Backdoors to Abduction

    Authors: Andreas Pfandler, Stefan Rümmele, Stefan Szeider

    Abstract: Abductive reasoning (or Abduction, for short) is among the most fundamental AI reasoning methods, with a broad range of applications, including fault diagnosis, belief revision, and automated planning. Unfortunately, Abduction is of high computational complexity; even propositional Abduction is Σ_2^P-complete and thus harder than NP and coNP. This complexity barrier rules out the existence of a po… ▽ More

    Submitted 22 April, 2013; originally announced April 2013.

    Comments: 12 pages, a short version will appear in the proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI 2013)

  47. Upper and Lower Bounds for Weak Backdoor Set Detection

    Authors: Neeldhara Misra, Sebastian Ordyniak, Venkatesh Raman, Stefan Szeider

    Abstract: We obtain upper and lower bounds for running times of exponential time algorithms for the detection of weak backdoor sets of 3CNF formulas, considering various base classes. These results include (omitting polynomial factors), (i) a 4.54^k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Horn formulas; (ii) a 2.27^k algorithm to detect whether there… ▽ More

    Submitted 3 May, 2013; v1 submitted 19 April, 2013; originally announced April 2013.

    Comments: A short version will appear in the proceedings of the 16th International Conference on Theory and Applications of Satisfiability Testing

    Journal ref: Proceedings of SAT 2013, LNCS 7962, pp. 394-402, 2013

  48. A SAT Approach to Clique-Width

    Authors: Marijn J. H. Heule, Stefan Szeider

    Abstract: Clique-width is a graph invariant that has been widely studied in combinatorics and computer science. However, computing the clique-width of a graph is an intricate problem, the exact clique-width is not known even for very small graphs. We present a new method for computing the clique-width of graphs based on an encoding to propositional satisfiability (SAT) which is then evaluated by a SAT solve… ▽ More

    Submitted 27 September, 2013; v1 submitted 19 April, 2013; originally announced April 2013.

    Comments: proofs in section 3 updated, results remain unchanged

    Journal ref: Proceedings of SAT 2013, LNCS 7962, pp. 318-334, 2013

  49. Local Backbones

    Authors: Ronald de Haan, Iyad Kanj, Stefan Szeider

    Abstract: A backbone of a propositional CNF formula is a variable whose truth value is the same in every truth assignment that satisfies the formula. The notion of backbones for CNF formulas has been studied in various contexts. In this paper, we introduce local variants of backbones, and study the computational complexity of detecting them. In particular, we consider k-backbones, which are backbones for su… ▽ More

    Submitted 18 July, 2014; v1 submitted 19 April, 2013; originally announced April 2013.

    Comments: A previous version appeared in the proceedings of the 16th International Conference on Theory and Applications of Satisfiability Testing (SAT 2013)

    Journal ref: Proceedings of SAT 2013, LNCS 7962, pp. 377-393, 2013

  50. arXiv:1304.1996  [pdf, ps, other

    cs.CC

    On the Subexponential Time Complexity of CSP

    Authors: Iyad Kanj, Stefan Szeider

    Abstract: A CSP with n variables ranging over a domain of d values can be solved by brute-force in d^n steps (omitting a polynomial factor). With a more careful approach, this trivial upper bound can be improved for certain natural restrictions of the CSP. In this paper we establish theoretical limits to such improvements, and draw a detailed landscape of the subexponential-time complexity of CSP. We firs… ▽ More

    Submitted 7 April, 2013; originally announced April 2013.