2014
DOI: 10.1007/978-3-319-10428-7_18
|View full text |Cite
|
Sign up to set email alerts
|

On Backdoors to Tractable Constraint Languages

Abstract: In the context of CSPs, a strong backdoor is a subset of variables such that every complete assignment yields a residual instance guaranteed to have a specified property. If the property allows efficient solving, then a small strong backdoor provides a reasonable decomposition of the original instance into easy instances. An important challenge is the design of algorithms that can find quickly a small strong backdoor if one exists. We present a systematic study of the parameterized complexity of backdoor detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 18 publications
2
6
0
Order By: Relevance
“…Recently, two papers dealing with strong backdoor set detection for the constraint satisfaction problem have appeared [7,17], which nicely supplement (however are mostly orthogonal to) the results in this paper. Carbonnel et al [7] show W [2]-hardness for strong backdoor set detection parameterized by the size of the backdoor set even for CSP-instances with only one constraint (however with unbounded domain and unbounded arity).…”
Section: Related Worksupporting
confidence: 69%
See 1 more Smart Citation
“…Recently, two papers dealing with strong backdoor set detection for the constraint satisfaction problem have appeared [7,17], which nicely supplement (however are mostly orthogonal to) the results in this paper. Carbonnel et al [7] show W [2]-hardness for strong backdoor set detection parameterized by the size of the backdoor set even for CSP-instances with only one constraint (however with unbounded domain and unbounded arity).…”
Section: Related Worksupporting
confidence: 69%
“…Recently, two papers dealing with strong backdoor set detection for the constraint satisfaction problem have appeared [7,17], which nicely supplement (however are mostly orthogonal to) the results in this paper. Carbonnel et al [7] show W [2]-hardness for strong backdoor set detection parameterized by the size of the backdoor set even for CSP-instances with only one constraint (however with unbounded domain and unbounded arity). They also give a fixed-parameter algorithm for strong backdoor set detection parameterized by the size of the backdoor set and the maximum arity of any constraint, if the base class is "h-Helly" for any fixed integer h. However, as is also mentioned in Carbonnel and Cooper [6], the "h-Helly" property is rather restrictive and orthogonal to our approach of considering the domain as an additional parameter.…”
Section: Related Worksupporting
confidence: 69%
“…Gaspers et al [15] considered heterogeneous backdoors into tractable CSP classes that are characterized by polymorphisms. A similar approach was also undertaken by Carbonnel et al [3] who also considered base classes that are "h-Helly" for a fixed integer h under the additional assumption that the domain is a finite subset of the natural numbers and comes with a fixed ordering.…”
Section: Related Workmentioning
confidence: 99%
“…A natural way of defining such a class is to consider all CSP instances whose constraints use relations from a constraint language Γ, denoted by CSP(Γ). The last couple of years have seen several new results for CSP using this backdoor-based approach (see, e.g., [12,28,29]. In particular, the general aim of research in this direction is to obtain so-called fixed-parameter algorithms, i.e., algorithms where the running time only has a polynomial dependence on the input size and the exponential blow-up is restricted exclusively to the size of the backdoor (the parameter).…”
Section: Introductionmentioning
confidence: 99%