!!" '!" Fall 2003 ICS 275A - Constraint Networks 2

Similar documents
Class2: Constraint Networks Rina Dechter

Class 2 Constraint Networks

Belief propagation in a bucket-tree. Handouts, 275B Fall Rina Dechter. November 1, 2000

AND/OR Cutset Conditioning

Topological parameters for time-space tradeoff

AND/OR Search Spaces for Graphical Models

Department of Computer Applications. MCA 312: Design and Analysis of Algorithms. [Part I : Medium Answer Type Questions] UNIT I

Acyclic Network. Tree Based Clustering. Tree Decomposition Methods

On the Space-Time Trade-off in Solving Constraint Satisfaction Problems*

Set 5: Constraint Satisfaction Problems Chapter 6 R&N

Constraint Satisfaction Problems

On the Space-Time Trade-off in Solving Constraint Satisfaction Problems*

Set 5: Constraint Satisfaction Problems

Set 5: Constraint Satisfaction Problems

7.3 Spanning trees Spanning trees [ ] 61

Umans Complexity Theory Lectures

EE512 Graphical Models Fall 2009

March 20/2003 Jayakanth Srinivasan,

Graph Algorithms Using Depth First Search

CS6702 GRAPH THEORY AND APPLICATIONS 2 MARKS QUESTIONS AND ANSWERS

1 Inference for Boolean theories

Summary. Acyclic Networks Join Tree Clustering. Tree Decomposition Methods. Acyclic Network. Tree Based Clustering. Tree Decomposition.

Searching in Graphs (cut points)

Algorithmic Aspects of Communication Networks

Introduction to Computers and Programming. Concept Question

Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected

Acyclic Network. Tree Based Clustering. Tree Decomposition Methods

Secure Combinatorial Optimization using DFS-based Variable Elimination

with Dana Richards December 1, 2017 George Mason University New Results On Routing Via Matchings Indranil Banerjee The Routing Model

Topics. Trees Vojislav Kecman. Which graphs are trees? Terminology. Terminology Trees as Models Some Tree Theorems Applications of Trees CMSC 302

Set 5: Constraint Satisfaction Problems

logn D. Θ C. Θ n 2 ( ) ( ) f n B. nlogn Ο n2 n 2 D. Ο & % ( C. Θ # ( D. Θ n ( ) Ω f ( n)

A General Scheme for Automatic Generation of Search Heuristics from Specification Dependencies. Kalev Kask and Rina Dechter

Trees. Arash Rafiey. 20 October, 2015

Introduction to Combinatorial Algorithms

Reference Sheet for CO142.2 Discrete Mathematics II

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Constraint Satisfaction Problems. Chapter 6

EE512 Graphical Models Fall 2009

Mini-Buckets: A General Scheme for Generating Approximations in Automated Reasoning

Treewidth and graph minors

4.1.2 Merge Sort Sorting Lower Bound Counting Sort Sorting in Practice Solving Problems by Sorting...

A Structure-Based Variable Ordering Heuristic for SAT. By Jinbo Huang and Adnan Darwiche Presented by Jack Pinette

The Maximum Clique Problem

Graph Theory. Connectivity, Coloring, Matching. Arjun Suresh 1. 1 GATE Overflow

P = NP; P NP. Intuition of the reduction idea:

On Structural Parameterizations of the Matching Cut Problem

Chordal graphs MPRI

Section Summary. Introduction to Trees Rooted Trees Trees as Models Properties of Trees

CS521 \ Notes for the Final Exam

Hybrid Algorithms for SAT. Irina Rish and Rina Dechter.

Computing optimal total vertex covers for trees

Bucket elimination: A unifying framework for reasoning

COMP 251 Winter 2017 Online quizzes with answers

Binary Trees. BSTs. For example: Jargon: Data Structures & Algorithms. root node. level: internal node. edge.

Direct Addressing Hash table: Collision resolution how handle collisions Hash Functions:

Search Algorithms for Solving Queries on Graphical Models & the Importance of Pseudo-trees in their Complexity.

CIS 121 Data Structures and Algorithms Midterm 3 Review Solution Sketches Fall 2018

Clustering Using Graph Connectivity

A generic framework for solving CSPs integrating decomposition methods

The ADT priority queue Orders its items by a priority value The first item removed is the one having the highest priority value

Conflict Graphs for Combinatorial Optimization Problems

Design and Analysis of Algorithms - - Assessment

UML CS Algorithms Qualifying Exam Spring, 2004 ALGORITHMS QUALIFYING EXAM

D. Θ nlogn ( ) D. Ο. ). Which of the following is not necessarily true? . Which of the following cannot be shown as an improvement? D.

Index. C cmp;l, 126. C rq;l, 127. A A sp. B BANDWIDTH, 32, 218 complexity of, 32 k-bandwidth, 32, 218

CSE 332 Autumn 2016 Final Exam (closed book, closed notes, no calculators)

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.

Solving NP-hard Problems on Special Instances

Graph and Digraph Glossary

( ) D. Θ ( ) ( ) Ο f ( n) ( ) Ω. C. T n C. Θ. B. n logn Ο

CSE 373 MAY 10 TH SPANNING TREES AND UNION FIND

Ch9: Exact Inference: Variable Elimination. Shimi Salant, Barak Sternberg

Analysis of Algorithms

(2,4) Trees. 2/22/2006 (2,4) Trees 1

Λέων-Χαράλαμπος Σταματάρης

Notation Index. Probability notation. (there exists) (such that) Fn-4 B n (Bell numbers) CL-27 s t (equivalence relation) GT-5.

Topological Parameters for Time-Space Tradeo. Rina Dechter. Yousri El Fattah.

CS161 - Final Exam Computer Science Department, Stanford University August 16, 2008

Foundations of Artificial Intelligence

Planar Point Location

CSE373: Data Structures & Algorithms Lecture 28: Final review and class wrap-up. Nicki Dell Spring 2014

Let G = (V, E) be a graph. If u, v V, then u is adjacent to v if {u, v} E. We also use the notation u v to denote that u is adjacent to v.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

10 Sum-product on factor tree graphs, MAP elimination

Reading: Chapter 6 (3 rd ed.); Chapter 5 (2 nd ed.) For next week: Thursday: Chapter 8

n 2 C. Θ n ( ) Ο f ( n) B. n 2 Ω( n logn)

COMP3121/3821/9101/ s1 Assignment 1

Graph Connectivity G G G

) $ f ( n) " %( g( n)

Data Structures and Algorithm Analysis in C++

4. (a) Draw the Petersen graph. (b) Use Kuratowski s teorem to prove that the Petersen graph is non-planar.

FINAL EXAM SOLUTIONS

Chapter Summary. Introduction to Trees Applications of Trees Tree Traversal Spanning Trees Minimum Spanning Trees

Kalev Kask and Rina Dechter

CSPs: Search and Arc Consistency

(2,4) Trees Goodrich, Tamassia (2,4) Trees 1

Kernelization Upper Bounds for Parameterized Graph Coloring Problems

Lecture 14: Lower Bounds for Tree Resolution

COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section (CLRS)

Transcription:

chapter 10 1

!"!!" # $ %&!" '!" Fall 2003 ICS 275A - Constraint Networks 2

( Complexity : O(exp(n)) Fall 2003 ICS 275A - Constraint Networks 3

* bucket i = O(exp( w )) DR time and space : O( n exp( w * )) )* Fall 2003 ICS 275A - Constraint Networks 4

{1,2} D A E {1,2} { 1,2} {1,2,3} C B {1,2} Bucket( E) : Bucket( D) : Bucket( C) : Bucket( B) : Bucket( A) : Bucket( A) : Bucket( D) : Bucket( C) : Bucket( B) : Bucket( E) : E D, D A C B B A R A A D, D E C B, B E R E E C, R DCB R ACB R AB A B R DB C E R D BE, E R C BE B + $! % % $! * Complexity : O(n exp(w (d))), * w (d) - induced width along ordering d + Fall 2003 ICS 275A - Constraint Networks 6

,-!./ 0 -!./ 0 Fall 2003 ICS 275A - Constraint Networks 7

! " #! Fall 2003 ICS 275A - Constraint Networks 8

$ % A cycle-cutset is a subset of nodes in an undirected graph whose removal results in a graph with no cycles An instantiated variable cuts the flow of information: cuts a cycle. If a cycle-cutset is instantiated the remaining problem is a tree and can be solved efficiently Fall 2003 ICS 275A - Constraint Networks 10

% Fall 2003 ICS 275A - Constraint Networks 11

"! % Theorem: Algorithm cycle-cutset decomposition has ( c+2) time complexity of O(( n c) k ) where n is the number of variables, c is the cycle-cutset size and k is the domain size. The space complexity of the algorithm is linear. Fall 2003 ICS 275A - Constraint Networks 12

% % Given a tree network, we identify a node x_1 which, when removed, generates two subtrees of size n/2 (approximately). T_n is the time to solve a binary tree starting at x_1. T_n obeys recurrence T_n = k 2 T_n/2, T_1 = k We get: T_n = n k^{logn +1} Given a tree-decomposition having induced-width w* this generalizes to recursive conditioning of tree-decompositions: T_n = n k^({w*+1} log n) because the number of values k is replaced by the number of tuples k^w* Fall 2003 ICS 275A - Constraint Networks 13

& ' % Proposition 1: Given a constraint network R= (X,D,C), having graph G, a tree-decomposition T = (X, chi,psi) that has induced-width w*, having diameter r (the longet path from cluster leaf to cluster leaf, then there exists a DFS tree dfs(t) whose depth is bounded by O(log r w*). Proposition 2: Recursive-conditioning along a treedecomposition T of a constraint problem R= (X,D,C), having induced-width w*, is identical to backjumping along the DFS ordering of its corresponding dfs(t). Proposition 3: Recursive-conditioning is a depth-first search traversal of the AND/OR search tree relative to the DFS spanning tree dfs(t). Fall 2003 ICS 275A - Constraint Networks 14

! Consider a chain graph or a k-tree. Fall 2003 ICS 275A - Constraint Networks 15

( Generalize cycle-cutset: condition of a subset that yield a bounded inference problem, not necessarily linear. b-cutset: a subset of nodes is called a b-cutset iff when the subset is removed the resulting graph has an induced-width less than or equal to b. A minimal b-cutset of a graph has a smallest size among all b-cutsets of the graph. A cycle-cutset is a 1-cutset of a graph. Adjusted induced-width: The adjusted induced-width with of G respect to V is the induced-width of G after the variable set V is removed. Fall 2003 ICS 275A - Constraint Networks 16

%)* Idea: runs backtracking search on the b-cutset variables and bucket-elimination on the remaining variables. Input: A constraint network R = (X,D,C), Y a b-cutset, d an ordering that starts with Y whose adjusted induced-width, along d, is bounded by b, Z = X-Y. Output: A consistent assignment, if there is one. 1. while {y} next partial solution of Y found by backtracking, do a) z solution found by adaptive-consistency(r_y). B) if z is not false, return solution (y,z). 2. endwhile. return: the problem has no solutions. Fall 2003 ICS 275A - Constraint Networks 17

"! %)* Theorem: Given R= (X,D,C), if elim-cond(b) is applied along ordering d when Y is a b-cutset then the space complexity of elim-cond(b) is O(n exp(b)), and its time complexity is O(n exp ( Y +b)). Fall 2003 ICS 275A - Constraint Networks 18

+ % Verifying a b-cutset can be done in polynomial time A simple greedy: use a good induced-width ordering and starting at the top add to the b- cutset any variable with more than b parents. Alternative: generate a tree-decomposition, then select a b-cutset that reduce each cluster below b. Fall 2003 ICS 275A - Constraint Networks 19

$ % % There is no guaranteed worst-case time improvement of elimcond(b) over pure bucket-elimination. The size of the smallest cycle-cutset (1-cutset), c_1 and the smallest induced width, w*, obey: c_1 >= w* - 1. Therefore, 1 +c_1 >= w*, where the left side of this inequality is the exponent that determines time complexity of elim-cond(b=1), while w* governs the complexity of bucketelimination. c_i-c_(i+1) >= 1 1+c_1 >= 2+c_2 >=... b+c_b,... >= w*+c_w* = w* We get a hybrid scheme whose time complexity decreases as its space increases until it reaches the induced-width. Fall 2003 ICS 275A - Constraint Networks 20

! & Consider the theory: (~C v E)(A v B v C v D)(~A v B v E v D)(B v C v D) Fall 2003 ICS 275A - Constraint Networks 22

Resolve if w * ( x i ) < b, condition otherwise Fall 2003 ICS 275A - Constraint Networks 23

")* Adjustable trade - off : b < 0 : pure DPLL, b w * : pure DR, 0 b w * : hybrid Time exp( b + c _ b), space exp( b) Fall 2003 ICS 275A - Constraint Networks 25

(, $ Algorithm CTE is time exponential in the cluster size and space exponential in the separator size. Trade space for time by increasing the cluster size and decreasing the separator sizes. Join clusters with fat separators. Fall 2003 ICS 275A - Constraint Networks 26

! Fall 2003 ICS 275A - Constraint Networks 27

& % Fall 2003 ICS 275A - Constraint Networks 28

% % Let T be a tree-decomposition of hypergraph H. Let be the sizes of the separators in T, listed in strictly descending order. With each separator size s i we associate a secondary tree decomposition T i, generated by combining adjacent nodes whose separator sizes are strictly greater than. Let r i the largest set of variables in any cluster of. Note that as s_i decreases, increase. Theorem: The complexity of CTE when applied to each is O( n exp(r_i)) time, and O( n exp( )) space. r i s i s j s, s 1,, 0 T i s n Fall 2003 ICS 275A - Constraint Networks 29

% + % -% % Fall 2003 ICS 275A - Constraint Networks 30

. % A connected graph G=(V,E) has a separation node v if there exist nodes a and b such that all paths connecting a and b pass through v. A graph that has a separation node is called separable, and one that has none is called nonseparable. A subgraph with no separation nodes is called a non-separable component or a biconnected component. A dfs algorithm can find all non-separable components and they have a tree structure Fall 2003 ICS 275A - Constraint Networks 31

Assume a constraint network having unary, binary and ternary constraints :R = { R_AD,R_AB, R_DC,R_BC, R_GF,D_G,D_F,R_EHI,R_CFE }. Fall 2003 ICS 275A - Constraint Networks 32

! &$" )& * Fall 2003 ICS 275A - Constraint Networks 33

"! Theorem: If R = (X,D,C) is a constraint network whose constraint graph has nonseparable components of at most size r, then the super-bucket elimination algorithm, whose buckets are the nonseparable components, is time exponential O(n exp(r)) and is linear in space. Fall 2003 ICS 275A - Constraint Networks 34

( hybrid(b_1,b_2): First, a tree-decomposition having separators bounded by b_1 is created, followed by application of the CTE algorithm, but each clique is processed by elim-cond(b_2). If c^*_{b_2} is the size of the maximum b_2-cutset in each clique of the b_1-treedecomposition, the algorithm is space exponential in b_1 but time exponential in c^*_{b_2}. Special cases: hybrid(b_1,1): Applies cycle-cutset in each clique. b_1 = b_2. For b=1, hybrid(1,1) is the non-separable components utilizing the cycle-cutset in each component. The space complexity of this algorithm is linear but its time complexity can be much better than the cycle-cutsets scheme or the non-separable component approach alone. Fall 2003 ICS 275A - Constraint Networks 35

" Problem: Given a circuit and its unexpected output, identify faulty components. The problem can be modeled as a constraint optimization problem and solved by bucket elimination. Fall 2003 ICS 275A - Constraint Networks 37

" "/01 A circuit s primal graph For every gate we connect inputs and outputs Join-tree of c432 Seperator size is 23 Fall 2003 ICS 275A - Constraint Networks 38

2% "03/4 )5657 *! 8 97 Fall 2003 ICS 275A - Constraint Networks 39

"/01 Fall 2003 ICS 275A - Constraint Networks 40

$% $: $! 8 8! 8; Fall 2003 ICS 275A - Constraint Networks 41