-
Representing fitness landscapes by valued constraints to understand the complexity of local search
Authors:
Artem Kaznatcheev,
David A. Cohen,
Peter G. Jeavons
Abstract:
Local search is widely used to solve combinatorial optimisation problems and to model biological evolution, but the performance of local search algorithms on different kinds of fitness landscapes is poorly understood. Here we consider how fitness landscapes can be represented using valued constraints, and investigate what the structure of such representations reveals about the complexity of local…
▽ More
Local search is widely used to solve combinatorial optimisation problems and to model biological evolution, but the performance of local search algorithms on different kinds of fitness landscapes is poorly understood. Here we consider how fitness landscapes can be represented using valued constraints, and investigate what the structure of such representations reveals about the complexity of local search.
First, we show that for fitness landscapes representable by binary Boolean valued constraints there is a minimal necessary constraint graph that can be easily computed. Second, we consider landscapes as equivalent if they allow the same (improving) local search moves; we show that a minimal constraint graph still exists, but is NP-hard to compute.
We then develop several techniques to bound the length of any sequence of local search moves. We show that such a bound can be obtained from the numerical values of the constraints in the representation, and show how this bound may be tightened by considering equivalent representations. In the binary Boolean case, we prove that a degree 2 or tree-structured constraint graph gives a quadratic bound on the number of improving moves made by any local search; hence, any landscape that can be represented by such a model will be tractable for any form of local search.
Finally, we build two families of examples to show that the conditions in our tractability results are essential. With domain size three, even just a path of binary constraints can model a landscape with an exponentially long sequence of improving moves. With a treewidth-two constraint graph, even with a maximum degree of three, binary Boolean constraints can model a landscape with an exponentially long sequence of improving moves.
△ Less
Submitted 11 November, 2020; v1 submitted 2 July, 2019;
originally announced July 2019.
-
Deep Learning Classification of 3.5 GHz Band Spectrograms with Applications to Spectrum Sensing
Authors:
W. Max Lees,
Adam Wunderlich,
Peter Jeavons,
Paul D. Hale,
Michael R. Souryal
Abstract:
In the United States, the Federal Communications Commission has adopted rules permitting commercial wireless networks to share spectrum with federal incumbents in the 3.5~GHz Citizens Broadband Radio Service band. These rules require commercial systems to vacate the band when sensors detect radars operated by the U.S. military; a key example being the SPN-43 air traffic control radar. Such sensors…
▽ More
In the United States, the Federal Communications Commission has adopted rules permitting commercial wireless networks to share spectrum with federal incumbents in the 3.5~GHz Citizens Broadband Radio Service band. These rules require commercial systems to vacate the band when sensors detect radars operated by the U.S. military; a key example being the SPN-43 air traffic control radar. Such sensors require highly-accurate detection algorithms to meet their operating requirements. In this paper, using a library of over 14,000 3.5~GHz band spectrograms collected by a recent measurement campaign, we investigate the performance of thirteen methods for SPN-43 radar detection. Namely, we compare classical methods from signal detection theory and machine learning to several deep learning architectures. We demonstrate that machine learning algorithms appreciably outperform classical signal detection methods. Specifically, we find that a three-layer convolutional neural network offers a superior tradeoff between accuracy and computational complexity. Last, we apply this three-layer network to generate descriptive statistics for the full 3.5~GHz spectrogram library. Our findings highlight potential weaknesses of classical methods and strengths of modern machine learning algorithms for radar detection in the 3.5~GHz band.
△ Less
Submitted 4 December, 2018; v1 submitted 18 June, 2018;
originally announced June 2018.
-
Binary Constraint Satisfaction Problems Defined by Excluded Topological Minors
Authors:
David A. Cohen,
Martin C. Cooper,
Peter G. Jeavons,
Stanislav Zivny
Abstract:
The binary Constraint Satisfaction Problem (CSP) is to decide whether there exists an assignment to a set of variables which satisfies specified constraints between pairs of variables. A binary CSP instance can be presented as a labelled graph encoding both the forms of the constraints and where they are imposed. We consider subproblems defined by restricting the allowed form of this graph. One ty…
▽ More
The binary Constraint Satisfaction Problem (CSP) is to decide whether there exists an assignment to a set of variables which satisfies specified constraints between pairs of variables. A binary CSP instance can be presented as a labelled graph encoding both the forms of the constraints and where they are imposed. We consider subproblems defined by restricting the allowed form of this graph. One type of restriction that has previously been considered is to forbid certain specified substructures (patterns). This captures some tractable classes of the CSP, but does not capture classes defined by language restrictions, or the well-known structural property of acyclicity.
In this paper we extend the notion of pattern and introduce the notion of a topological minor of a binary CSP instance. By forbidding a finite set of patterns from occurring as topological minors we obtain a compact mechanism for expressing novel tractable subproblems of the binary CSP, including new generalisations of the class of acyclic instances. Forbidding a finite set of patterns as topological minors also captures all other tractable structural restrictions of the binary CSP. Moreover, we show that several patterns give rise to tractable subproblems if forbidden as topological minors but not if forbidden as sub-patterns. Finally, we introduce the idea of augmented patterns that allows for the identification of more tractable classes, including all language restrictions of the binary CSP.
△ Less
Submitted 22 September, 2018; v1 submitted 18 August, 2016;
originally announced August 2016.
-
Binarisation for Valued Constraint Satisfaction Problems
Authors:
David A. Cohen,
Martin C. Cooper,
Peter G. Jeavons,
Andrei Krokhin,
Robert Powell,
Stanislav Zivny
Abstract:
We study methods for transforming valued constraint satisfaction problems (VCSPs) to binary VCSPs. First, we show that the standard dual encoding preserves many aspects of the algebraic properties that capture the computational complexity of VCSPs. Second, we extend the reduction of CSPs to binary CSPs described by Bulin et al. [LMCS'15] to VCSPs. This reduction establishes that VCSPs over a fixed…
▽ More
We study methods for transforming valued constraint satisfaction problems (VCSPs) to binary VCSPs. First, we show that the standard dual encoding preserves many aspects of the algebraic properties that capture the computational complexity of VCSPs. Second, we extend the reduction of CSPs to binary CSPs described by Bulin et al. [LMCS'15] to VCSPs. This reduction establishes that VCSPs over a fixed valued constraint language are polynomial-time equivalent to Minimum-Cost Homomorphism Problems over a fixed digraph.
△ Less
Submitted 27 July, 2017; v1 submitted 4 August, 2016;
originally announced August 2016.
-
Feedback from Nature: Simple Randomised Distributed Algorithms for Maximal Independent Set Selection and Greedy Colouring
Authors:
Peter Jeavons,
Alex Scott,
Lei Xu
Abstract:
We propose distributed algorithms for two well-established problems that operate efficiently under extremely harsh conditions. Our algorithms achieve state-of-the-art performance in a simple and novel way.
Our algorithm for maximal independent set selection operates on a network of identical anonymous processors. The processor at each node has no prior information about the network. At each time…
▽ More
We propose distributed algorithms for two well-established problems that operate efficiently under extremely harsh conditions. Our algorithms achieve state-of-the-art performance in a simple and novel way.
Our algorithm for maximal independent set selection operates on a network of identical anonymous processors. The processor at each node has no prior information about the network. At each time step, each node can only broadcast a single bit to all its neighbours, or remain silent. Each node can detect whether one or more neighbours have broadcast, but cannot tell how many of its neighbours have broadcast, or which ones. We build on recent work of Afek et al. which was inspired by studying the development of a network of cells in the fruit fly~\cite{Afek2011a}. However we incorporate for the first time another important feature of the biological system: varying the probability value used at each node based on local feedback from neighbouring nodes. Given any $n$-node network, our algorithm achieves the optimal expected time complexity of $O(\log n)$ rounds and the optimal expected message complexity of $O(1)$ single-bit messages broadcast by each node.We also show that the previous approach, without feedback, cannot achieve better than $Ω(\log^2 n)$ expected time complexity, whatever global scheme is used to choose the probabilities.
Our algorithm for distributed greedy colouring works under similar harsh conditions: each identical node has no prior information about the network, can only broadcast a single message to all neighbours at each time step representing a desired colour, and can only detect whether at least one neighbour has broadcast each colour value. We show that our algorithm has an expected time complexity of $O(Δ+\log n)$, where $Δ$ is the maximum degree of the network, and expected message complexity of $O(1)$ messages broadcast by each node.
△ Less
Submitted 17 January, 2016;
originally announced January 2016.
-
Local Consistency and SAT-Solvers
Authors:
Peter Jeavons,
Justyna Petke
Abstract:
Local consistency techniques such as k-consistency are a key component of specialised solvers for constraint satisfaction problems. In this paper we show that the power of using k-consistency techniques on a constraint satisfaction problem is precisely captured by using a particular inference rule, which we call negative-hyper-resolution, on the standard direct encoding of the problem into Boolea…
▽ More
Local consistency techniques such as k-consistency are a key component of specialised solvers for constraint satisfaction problems. In this paper we show that the power of using k-consistency techniques on a constraint satisfaction problem is precisely captured by using a particular inference rule, which we call negative-hyper-resolution, on the standard direct encoding of the problem into Boolean clauses. We also show that current clause-learning SAT-solvers will discover in expected polynomial time any inconsistency that can be deduced from a given set of clauses using negative-hyper-resolvents of a fixed size. We combine these two results to show that, without being explicitly designed to do so, current clause-learning SAT-solvers efficiently simulate k-consistency techniques, for all fixed values of k. We then give some experimental results to show that this feature allows clause-learning SAT-solvers to efficiently solve certain families of constraint problems which are challenging for conventional constraint-programming solvers.
△ Less
Submitted 18 January, 2014;
originally announced January 2014.
-
Tractable Combinations of Global Constraints
Authors:
David A. Cohen,
Peter G. Jeavons,
Evgenij Thorstensen,
Stanislav Živný
Abstract:
We study the complexity of constraint satisfaction problems involving global constraints, i.e., special-purpose constraints provided by a solver and represented implicitly by a parametrised algorithm. Such constraints are widely used; indeed, they are one of the key reasons for the success of constraint programming in solving real-world problems.
Previous work has focused on the development of e…
▽ More
We study the complexity of constraint satisfaction problems involving global constraints, i.e., special-purpose constraints provided by a solver and represented implicitly by a parametrised algorithm. Such constraints are widely used; indeed, they are one of the key reasons for the success of constraint programming in solving real-world problems.
Previous work has focused on the development of efficient propagators for individual constraints. In this paper, we identify a new tractable class of constraint problems involving global constraints of unbounded arity. To do so, we combine structural restrictions with the observation that some important types of global constraint do not distinguish between large classes of equivalent solutions.
△ Less
Submitted 10 July, 2013;
originally announced July 2013.
-
Feedback from nature: an optimal distributed algorithm for maximal independent set selection
Authors:
Alex Scott,
Peter Jeavons,
Lei Xu
Abstract:
Maximal Independent Set selection is a fundamental problem in distributed computing. A novel probabilistic algorithm for this problem has recently been proposed by Afek et al, inspired by the study of the way that developing cells in the fly become specialised. The algorithm they propose is simple and robust, but not as efficient as previous approaches: the expected time complexity is O(log^2 n).…
▽ More
Maximal Independent Set selection is a fundamental problem in distributed computing. A novel probabilistic algorithm for this problem has recently been proposed by Afek et al, inspired by the study of the way that developing cells in the fly become specialised. The algorithm they propose is simple and robust, but not as efficient as previous approaches: the expected time complexity is O(log^2 n). Here we first show that the approach of Afek et al cannot achieve better efficiency than this across all networks, no matter how the probability values are chosen. However, we then propose a new algorithm that incorporates another important feature of the biological system: adapting the probabilities used at each node based on local feedback from neighbouring nodes. Our new algorithm retains all the advantages of simplicity and robustness, but also achieves the optimal efficiency of O(log n) expected time.
△ Less
Submitted 1 November, 2012;
originally announced November 2012.
-
An Algebraic Theory of Complexity for Discrete Optimisation
Authors:
David A. Cohen,
Martin C. Cooper,
Paidi Creed,
Peter G. Jeavons,
Stanislav Zivny
Abstract:
Discrete optimisation problems arise in many different areas and are studied under many different names. In many such problems the quantity to be optimised can be expressed as a sum of functions of a restricted form. Here we present a unifying theory of complexity for problems of this kind. We show that the complexity of a finite-domain discrete optimisation problem is determined by certain algebr…
▽ More
Discrete optimisation problems arise in many different areas and are studied under many different names. In many such problems the quantity to be optimised can be expressed as a sum of functions of a restricted form. Here we present a unifying theory of complexity for problems of this kind. We show that the complexity of a finite-domain discrete optimisation problem is determined by certain algebraic properties of the objective function, which we call weighted polymorphisms. We define a Galois connection between sets of rational-valued functions and sets of weighted polymorphisms and show how the closed sets of this Galois connection can be characterised.
These results provide a new approach to studying the complexity of discrete optimisation. We use this approach to identify certain maximal tractable subproblems of the general problem, and hence derive a complete classification of complexity for the Boolean case.
△ Less
Submitted 28 July, 2012;
originally announced July 2012.
-
A Maximal Tractable Class of Soft Constraints
Authors:
D. Cohen,
M. Cooper,
P. Jeavons,
A. Krokhin
Abstract:
Many researchers in artificial intelligence are beginning to explore the use of soft constraints to express a set of (possibly conflicting) problem requirements. A soft constraint is a function defined on a collection of variables which associates some measure of desirability with each possible combination of values for those variables. However, the crucial question of the computational comple…
▽ More
Many researchers in artificial intelligence are beginning to explore the use of soft constraints to express a set of (possibly conflicting) problem requirements. A soft constraint is a function defined on a collection of variables which associates some measure of desirability with each possible combination of values for those variables. However, the crucial question of the computational complexity of finding the optimal solution to a collection of soft constraints has so far received very little attention. In this paper we identify a class of soft binary constraints for which the problem of finding the optimal solution is tractable. In other words, we show that for any given set of such constraints, there exists a polynomial time algorithm to determine the assignment having the best overall combined measure of desirability. This tractable class includes many commonly-occurring soft constraints, such as 'as near as possible' or 'as soon as possible after', as well as crisp constraints such as 'greater than'. Finally, we show that this tractable class is maximal, in the sense that adding any other form of soft binary constraint which is not in the class gives rise to a class of problems which is NP-hard.
△ Less
Submitted 30 June, 2011;
originally announced July 2011.
-
The Expressive Power of Binary Submodular Functions
Authors:
Stanislav Zivny,
David A. Cohen,
Peter G. Jeavons
Abstract:
It has previously been an open problem whether all Boolean submodular functions can be decomposed into a sum of binary submodular functions over a possibly larger set of variables. This problem has been considered within several different contexts in computer science, including computer vision, artificial intelligence, and pseudo-Boolean optimisation. Using a connection between the expressive po…
▽ More
It has previously been an open problem whether all Boolean submodular functions can be decomposed into a sum of binary submodular functions over a possibly larger set of variables. This problem has been considered within several different contexts in computer science, including computer vision, artificial intelligence, and pseudo-Boolean optimisation. Using a connection between the expressive power of valued constraints and certain algebraic properties of functions, we answer this question negatively.
Our results have several corollaries. First, we characterise precisely which submodular functions of arity 4 can be expressed by binary submodular functions. Next, we identify a novel class of submodular functions of arbitrary arities which can be expressed by binary submodular functions, and therefore minimised efficiently using a so-called expressibility reduction to the Min-Cut problem. More importantly, our results imply limitations on this kind of reduction and establish for the first time that it cannot be used in general to minimise arbitrary submodular functions. Finally, we refute a conjecture of Promislow and Young on the structure of the extreme rays of the cone of Boolean submodular functions.
△ Less
Submitted 12 November, 2008;
originally announced November 2008.