首页 > 最新文献

Handbook of Satisfiability最新文献

英文 中文
Symmetry and Satisfiability 对称性和可满足性
Pub Date : 2021-02-02 DOI: 10.3233/978-1-58603-929-5-289
K. Sakallah
Symmetry is at once a familiar concept (we recognize it when we see it!) and a profoundly deep mathematical subject. At its most basic, a symmetry is some transformation of an object that leaves the object (or some aspect of the object) unchanged. For example, a square can be transformed in eight different ways that leave it looking exactly the same: the identity “do-nothing” transformation, 3 rotations, and 4 mirror images (or reflections). In the context of decision problems, the presence of symmetries in a problem’s search space can frustrate the hunt for a solution by forcing a search algorithm to fruitlessly explore symmetric subspaces that do not contain solutions. Recognizing that such symmetries exist, we can direct a search algorithm to look for solutions only in non-symmetric parts of the search space. In many cases, this can lead to significant pruning of the search space and yield solutions to problems which are otherwise intractable. This chapter explores the symmetries of Boolean functions, particularly the symmetries of their conjunctive normal form (CNF) representations. Specifically, it examines what those symmetries are, how to model them using the mathematical language of group theory, how to derive them from a CNF formula, and how to utilize them to speed up CNF SAT solvers.
对称既是一个熟悉的概念(当我们看到它时,我们就会认出它!),又是一个深刻的数学主题。从最基本的角度来说,对称是物体的某种变换,使物体(或物体的某些方面)保持不变。例如,一个正方形可以用八种不同的方式进行变换,使其看起来完全相同:恒等“什么都不做”变换、3次旋转和4次镜像(或反射)。在决策问题的上下文中,问题搜索空间中对称性的存在会迫使搜索算法无果地探索不包含解决方案的对称子空间,从而阻碍对解决方案的搜索。认识到这种对称性的存在,我们可以指导搜索算法只在搜索空间的非对称部分寻找解。在许多情况下,这可能会导致搜索空间的显著缩减,并产生难以解决的问题的解决方案。本章探讨布尔函数的对称性,特别是其合取范式(CNF)表示的对称性。具体来说,它检查了这些对称性是什么,如何使用群论的数学语言对它们进行建模,如何从CNF公式中推导它们,以及如何利用它们来加速CNF SAT求解器。
{"title":"Symmetry and Satisfiability","authors":"K. Sakallah","doi":"10.3233/978-1-58603-929-5-289","DOIUrl":"https://doi.org/10.3233/978-1-58603-929-5-289","url":null,"abstract":"Symmetry is at once a familiar concept (we recognize it when we see it!) and a profoundly deep mathematical subject. At its most basic, a symmetry is some transformation of an object that leaves the object (or some aspect of the object) unchanged. For example, a square can be transformed in eight different ways that leave it looking exactly the same: the identity “do-nothing” transformation, 3 rotations, and 4 mirror images (or reflections). In the context of decision problems, the presence of symmetries in a problem’s search space can frustrate the hunt for a solution by forcing a search algorithm to fruitlessly explore symmetric subspaces that do not contain solutions. Recognizing that such symmetries exist, we can direct a search algorithm to look for solutions only in non-symmetric parts of the search space. In many cases, this can lead to significant pruning of the search space and yield solutions to problems which are otherwise intractable. This chapter explores the symmetries of Boolean functions, particularly the symmetries of their conjunctive normal form (CNF) representations. Specifically, it examines what those symmetries are, how to model them using the mathematical language of group theory, how to derive them from a CNF formula, and how to utilize them to speed up CNF SAT solvers.","PeriodicalId":250589,"journal":{"name":"Handbook of Satisfiability","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Connections to Statistical Physics 与统计物理的联系
Pub Date : 2021-02-02 DOI: 10.3233/978-1-58603-929-5-569
Fabrizio Altarelli, R. Monasson, G. Semerjian, F. Zamponi
This chapter surveys a part of the intense research activity that has been devoted by theoretical physicists to the study of randomly generated k-SAT instances. It can be at first sight surprising that there is a connection between physics and computer science. However low-temperature statistical mechanics concerns precisely the behaviour of the low-lying configurations of an energy landscape, in other words the optimization of a cost function. Moreover the ensemble of random k-SAT instances exhibit phase transitions, a phenomenon mostly studied in physics (think for instance at the transition between liquid and gaseous water). Besides the introduction of general concepts of statistical mechanics and their translations in computer science language, the chapter presents results on the location of the satisfiability transition, the detailed picture of the satisfiable regime and the various phase transitions it undergoes, and algorithmic issues for random k-SAT instances.
本章调查了理论物理学家致力于研究随机生成的k-SAT实例的激烈研究活动的一部分。乍一看,物理学和计算机科学之间的联系可能令人惊讶。然而,低温统计力学所关注的恰恰是能量景观中低洼构造的行为,换句话说就是成本函数的优化。此外,随机k-SAT实例的集合表现出相变,这是一种主要在物理学中研究的现象(例如在液态和气态水之间的转变)。除了介绍统计力学的一般概念及其在计算机科学语言中的翻译外,本章还介绍了可满足性转变的位置,可满足状态的详细图片和它所经历的各种相变,以及随机k-SAT实例的算法问题。
{"title":"Connections to Statistical Physics","authors":"Fabrizio Altarelli, R. Monasson, G. Semerjian, F. Zamponi","doi":"10.3233/978-1-58603-929-5-569","DOIUrl":"https://doi.org/10.3233/978-1-58603-929-5-569","url":null,"abstract":"This chapter surveys a part of the intense research activity that has been devoted by theoretical physicists to the study of randomly generated k-SAT instances. It can be at first sight surprising that there is a connection between physics and computer science. However low-temperature statistical mechanics concerns precisely the behaviour of the low-lying configurations of an energy landscape, in other words the optimization of a cost function. Moreover the ensemble of random k-SAT instances exhibit phase transitions, a phenomenon mostly studied in physics (think for instance at the transition between liquid and gaseous water). Besides the introduction of general concepts of statistical mechanics and their translations in computer science language, the chapter presents results on the location of the satisfiability transition, the detailed picture of the satisfiable regime and the various phase transitions it undergoes, and algorithmic issues for random k-SAT instances.","PeriodicalId":250589,"journal":{"name":"Handbook of Satisfiability","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121383567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A History of Satisfiability 满足感的历史
Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-929-5-3
J. Franco, J. Martin
A secure server in a secure distributed information system isolates interaction from terminals to specific personal vaults including and to only those personal vaults, creating a "virtual logon". The secure server includes a secure connection server coupled to the system and to a vault deposit server having personal vaults in which user specific vault processes execute on dedicated encrypted data, after authentication of the user by a vault supervisor. The supervisor forwards vault process results to the user through the browser.
安全分布式信息系统中的安全服务器将终端与特定个人保险库的交互隔离,包括并仅与这些个人保险库进行交互,从而创建“虚拟登录”。安全服务器包括与系统耦合的安全连接服务器和具有个人保险库的保险库存储服务器,在保险库主管对用户进行身份验证后,用户特定的保险库进程在专用加密数据上执行。管理员通过浏览器将保管库处理结果转发给用户。
{"title":"A History of Satisfiability","authors":"J. Franco, J. Martin","doi":"10.3233/978-1-58603-929-5-3","DOIUrl":"https://doi.org/10.3233/978-1-58603-929-5-3","url":null,"abstract":"A secure server in a secure distributed information system isolates interaction from terminals to specific personal vaults including and to only those personal vaults, creating a \"virtual logon\". The secure server includes a secure connection server coupled to the system and to a vault deposit server having personal vaults in which user specific vault processes execute on dedicated encrypted data, after authentication of the user by a vault supervisor. The supervisor forwards vault process results to the user through the browser.","PeriodicalId":250589,"journal":{"name":"Handbook of Satisfiability","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115943817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Worst-Case Upper Bounds 最坏上界
Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-929-5-403
E. Dantsin, E. Hirsch
There are many algorithms for testing satisfiability — how to evaluate and compare them? It is common (but still disputable) to identify the efficiency of an algorithm with its worst-case complexity. From this point of view, asymptotic upper bounds on the worst-case running time and space is a criterion for evaluation and comparison of algorithms. In this chapter we survey ideas and techniques behind satisfiability algorithms with the currently best upper bounds. We also discuss some related questions: “easy” and “hard” cases of SAT, reducibility between various restricted cases of SAT, the possibility of solving SAT in subexponential time, etc. In Section 12.1 we define terminology and notation used throughout the chapter. Section 12.2 addresses the question of which special cases of SAT are polynomial-time tractable and which ones remain NP-complete. The first nontrivial upper bounds for testing satisfiability were obtained for algorithms that solve k-SAT; such algorithms also form the core of general SAT algorithms. Section 12.3 surveys the currently fastest algorithms for k-SAT. Section 12.4 shows how to use bounds for k-SAT to obtain the currently best bounds for SAT. Section 12.5 addresses structural questions like “what else happens if k-SAT is solvable in time 〈. . .〉?”. Finally, Section 12.6 summarizes the currently best bounds for the main cases of the satisfiability problem.
有许多测试满意度的算法-如何评估和比较它们?用最坏情况下的复杂度来确定算法的效率是很常见的(但仍有争议)。从这个角度来看,最坏情况运行时间和空间的渐近上界是评价和比较算法的标准。在本章中,我们概述了具有当前最佳上界的可满足性算法背后的思想和技术。我们还讨论了一些相关问题:SAT的“易”和“难”情况,SAT的各种限制情况之间的可约性,以及在次指数时间内求解SAT的可能性等。在第12.1节中,我们定义了本章中使用的术语和符号。第12.2节讨论了SAT的哪些特殊情况是多项式时间可处理的,哪些是np完全的。对于求解k-SAT的算法,得到了检验可满足性的第一个非平凡上界;这些算法也构成了一般SAT算法的核心。第12.3节调查了目前k-SAT最快的算法。第12.4节展示了如何使用k-SAT的边界来获得当前最好的SAT边界。第12.5节解决了一些结构性问题,比如“如果k-SAT在时间上<…>是可解的,还会发生什么?”最后,第12.6节总结了目前可满足性问题主要情况的最佳界。
{"title":"Worst-Case Upper Bounds","authors":"E. Dantsin, E. Hirsch","doi":"10.3233/978-1-58603-929-5-403","DOIUrl":"https://doi.org/10.3233/978-1-58603-929-5-403","url":null,"abstract":"There are many algorithms for testing satisfiability — how to evaluate and compare them? It is common (but still disputable) to identify the efficiency of an algorithm with its worst-case complexity. From this point of view, asymptotic upper bounds on the worst-case running time and space is a criterion for evaluation and comparison of algorithms. In this chapter we survey ideas and techniques behind satisfiability algorithms with the currently best upper bounds. We also discuss some related questions: “easy” and “hard” cases of SAT, reducibility between various restricted cases of SAT, the possibility of solving SAT in subexponential time, etc. In Section 12.1 we define terminology and notation used throughout the chapter. Section 12.2 addresses the question of which special cases of SAT are polynomial-time tractable and which ones remain NP-complete. The first nontrivial upper bounds for testing satisfiability were obtained for algorithms that solve k-SAT; such algorithms also form the core of general SAT algorithms. Section 12.3 surveys the currently fastest algorithms for k-SAT. Section 12.4 shows how to use bounds for k-SAT to obtain the currently best bounds for SAT. Section 12.5 addresses structural questions like “what else happens if k-SAT is solvable in time 〈. . .〉?”. Finally, Section 12.6 summarizes the currently best bounds for the main cases of the satisfiability problem.","PeriodicalId":250589,"journal":{"name":"Handbook of Satisfiability","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116430468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Software Verification 软件验证
Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-929-5-505
Daniel Kroening
ion of the Concrete Semantics: Intuition Concrete Semantics 〈 (P(X→ R),⊆),F ,Q,qin,qout ,X,→, f , ı 〉 Galois connection (P(X→ R),⊆) −−→ ←−− α γ (L,v) L is a set of machine-representable “properties” of the variables. Example L = {x is even, y is odd or negative, x≥y ⇒ x = 2i} γ(ψ) is the meaning of an abstract “property” ψ. α(φ) encodes a sound approximation of φ, the most precise one. v corresponds to entailment between “properties”, and abstracts ⊆. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 28 / 100 Abstraction of the Concrete Semantics: Intuition Concrete Semantics 〈 (P(X→ R),⊆),F ,Q,qin,qout ,X,→, f , ı 〉 Galois connection (P(X→ R),⊆) −−→ ←−− α γ (L,v) L is a set of machine-representable “properties” of the variables. Example L = {x is even, y is odd or negative, x≥y ⇒ x = 2i} γ(ψ) is the meaning of an abstract “property” ψ. α(φ) encodes a sound approximation of φ, the most precise one. v corresponds to entailment between “properties”, and abstracts ⊆. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 28 / 100ion of the Concrete Semantics: Intuition Concrete Semantics 〈 (P(X→ R),⊆),F ,Q,qin,qout ,X,→, f , ı 〉 Galois connection (P(X→ R),⊆) −−→ ←−− α γ (L,v) L is a set of machine-representable “properties” of the variables. Example L = {x is even, y is odd or negative, x≥y ⇒ x = 2i} γ(ψ) is the meaning of an abstract “property” ψ. α(φ) encodes a sound approximation of φ, the most precise one. v corresponds to entailment between “properties”, and abstracts ⊆. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 28 / 100 Abstract Semantics Induced by a Galois Connection Consider a data flow instance A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 and a Galois connection (L,v) −−→ ←−− α γ (L,v). Definition The abstract data flow instance A induced by A and (L,v) −−→ ←−− α γ (L,v) is A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 where: F = L mon −−→ L f = λop . f ] op ı = α(ı)Semantics Induced by a Galois Connection Consider a data flow instance A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 and a Galois connection (L,v) −−→ ←−− α γ (L,v). Definition The abstract data flow instance A induced by A and (L,v) −−→ ←−− α γ (L,v) is A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 where: F = L mon −−→ L f = λop . f ] op ı = α(ı) Recall that f ] op = α ◦ fop ◦ γ is the best abstraction of fop. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 29 / 100 Correctness of Induced Abstract Data Flow Analysis Extension of Galois Connections to Functions For any set Q and Galois connection (L,v) −−→ ←−− α γ (L,v), we have (Q → L,v) −−→ ←−− α γ (Q → L,v) where: α(a) = λq . α(a(q)) γ(b) = λq . γ(b(q)) Theorem (Correctness of Induced Abstract Forward Analysis) For any data flow instance A and Galois connection (L,v) −−→ ←−− α γ (L,v), the induced abstract data flow instance A satisfies: −−→ MFP (A) v γ (−−→ MFP ( A )) α (−−→ MFP (A) ) v −−→ MFP ( A ) −−−→ MOP (A) v γ (−−−→ MOP ( A )) α (−−−→ MOP (A) ) v −−−→
具体语义< (P(X→R),任任),F,Q,qin,qout,X,→,F, y>伽罗瓦连接(P(X→R),任任)−−→←−α γ (L,v) L是变量的一组机器可表示的“性质”。例题L = {x是偶数,y是奇数或负数,x≥y⇒x = 2i} γ(ψ)是抽象的"性质" ψ的含义。α(φ)编码的是最精确的φ的近似。V对应于“属性”之间的蕴涵,抽象出了大哉。具体语义的抽象:直观具体语义< (P(X→R),,F,Q,qin,qout,X,→,F, >伽罗瓦连接(P(X→R),)−−→←−α γ (L,v) L是一组机器可表示的变量的“属性”。例题L = {x是偶数,y是奇数或负数,x≥y⇒x = 2i} γ(ψ)是抽象的"性质" ψ的含义。α(φ)编码的是最精确的φ的近似。V对应于“属性”之间的蕴涵,抽象出了大哉。关于具体语义的解释INF555 ' 09 28 / 100ion:直观具体语义< (P(X→R),,F,Q,qin,qout,X,→,F, >伽罗瓦连接(P(X→R),)−−→←−α γ (L,v) L是一组机器可表示的“属性”变量。例题L = {x是偶数,y是奇数或负数,x≥y⇒x = 2i} γ(ψ)是抽象的"性质" ψ的含义。α(φ)编码的是最精确的φ的近似。V对应于“属性”之间的蕴涵,抽象出了大哉。考虑一个数据流实例a = < (L,v),F,Q,qin,qout,X,→,F, y>和一个伽罗瓦连接(L,v)−−→←−α γ (L,v)。定义由A和(L,v)−−→←−α γ (L,v)诱导的抽象数据流实例A为A = < (L,v),F,Q,qin,qout,X,→,F, y>,其中:F = L mon−−→L F = λop。考虑一个数据流实例a = < (L,v), f,Q,qin,qout,X,→,f, y>和一个伽罗瓦连接(L,v)−−→←−−α γ (L,v)。定义由A和(L,v)−−→←−α γ (L,v)诱导的抽象数据流实例A为A = < (L,v),F,Q,qin,qout,X,→,F, y>,其中:F = L mon−−→L F = λop。回想一下,f] op = α◦top◦γ是top的最佳抽象。对于任意集Q和伽罗瓦连接(L,v)−−→←−−α γ (L,v),我们有(Q→L,v)−−→←−α γ (Q→L,v),其中:α(a) = λq。α(a(q)) γ(b) = λq。对于任意数据流实例A与伽罗瓦连接(L,v)−−→←−α γ(L,v),则导出的抽象数据流实例A满足:−−→MFP (A) vγ(−−→MFP (A))α(−−→MFP (A)) v−−→MFP (A)−−−→拖把(A) vγ(−−−→拖把(A))α(−−−→拖把(A)) v−−−→拖把(A)格雷戈勒Sutre软件验证抽象解释INF555 09年30/100的正确性诱导伽罗瓦连接的抽象数据流分析扩展为任何一组函数Q和伽罗瓦连接(L, v)−−→←−−αγ(L, v),我们(Q→L, v)−−→←−−αγ(Q→L, v)地点:α(A) =λQ。α(a(q)) γ(b) = λq。γ(b (q))定理(诱导文摘逆向分析的正确性)任何数据流实例和伽罗瓦连接(L, v)−−→←−−αγ(L, v)诱导抽象数据流实例满足:←−−MFP (A) vγ(←−−MFP (A))α(←−−MFP (A)) v←−−MFP (A)←−−−拖把(A) vγ(←−−−拖把(A))α(←−−−拖把(A)) v←−−−拖把(A)格雷戈勒Sutre软件验证抽象解释INF555 09年30/100回来签署分析:伽罗瓦连接
{"title":"Software Verification","authors":"Daniel Kroening","doi":"10.3233/978-1-58603-929-5-505","DOIUrl":"https://doi.org/10.3233/978-1-58603-929-5-505","url":null,"abstract":"ion of the Concrete Semantics: Intuition Concrete Semantics 〈 (P(X→ R),⊆),F ,Q,qin,qout ,X,→, f , ı 〉 Galois connection (P(X→ R),⊆) −−→ ←−− α γ (L,v) L is a set of machine-representable “properties” of the variables. Example L = {x is even, y is odd or negative, x≥y ⇒ x = 2i} γ(ψ) is the meaning of an abstract “property” ψ. α(φ) encodes a sound approximation of φ, the most precise one. v corresponds to entailment between “properties”, and abstracts ⊆. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 28 / 100 Abstraction of the Concrete Semantics: Intuition Concrete Semantics 〈 (P(X→ R),⊆),F ,Q,qin,qout ,X,→, f , ı 〉 Galois connection (P(X→ R),⊆) −−→ ←−− α γ (L,v) L is a set of machine-representable “properties” of the variables. Example L = {x is even, y is odd or negative, x≥y ⇒ x = 2i} γ(ψ) is the meaning of an abstract “property” ψ. α(φ) encodes a sound approximation of φ, the most precise one. v corresponds to entailment between “properties”, and abstracts ⊆. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 28 / 100ion of the Concrete Semantics: Intuition Concrete Semantics 〈 (P(X→ R),⊆),F ,Q,qin,qout ,X,→, f , ı 〉 Galois connection (P(X→ R),⊆) −−→ ←−− α γ (L,v) L is a set of machine-representable “properties” of the variables. Example L = {x is even, y is odd or negative, x≥y ⇒ x = 2i} γ(ψ) is the meaning of an abstract “property” ψ. α(φ) encodes a sound approximation of φ, the most precise one. v corresponds to entailment between “properties”, and abstracts ⊆. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 28 / 100 Abstract Semantics Induced by a Galois Connection Consider a data flow instance A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 and a Galois connection (L,v) −−→ ←−− α γ (L,v). Definition The abstract data flow instance A induced by A and (L,v) −−→ ←−− α γ (L,v) is A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 where: F = L mon −−→ L f = λop . f ] op ı = α(ı)Semantics Induced by a Galois Connection Consider a data flow instance A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 and a Galois connection (L,v) −−→ ←−− α γ (L,v). Definition The abstract data flow instance A induced by A and (L,v) −−→ ←−− α γ (L,v) is A = 〈 (L,v),F ,Q,qin,qout ,X,→, f , ı 〉 where: F = L mon −−→ L f = λop . f ] op ı = α(ı) Recall that f ] op = α ◦ fop ◦ γ is the best abstraction of fop. Grégoire Sutre Software Verification Abstract Interpretation INF555’09 29 / 100 Correctness of Induced Abstract Data Flow Analysis Extension of Galois Connections to Functions For any set Q and Galois connection (L,v) −−→ ←−− α γ (L,v), we have (Q → L,v) −−→ ←−− α γ (Q → L,v) where: α(a) = λq . α(a(q)) γ(b) = λq . γ(b(q)) Theorem (Correctness of Induced Abstract Forward Analysis) For any data flow instance A and Galois connection (L,v) −−→ ←−− α γ (L,v), the induced abstract data flow instance A satisfies: −−→ MFP (A) v γ (−−→ MFP ( A )) α (−−→ MFP (A) ) v −−→ MFP ( A ) −−−→ MOP (A) v γ (−−−→ MOP ( A )) α (−−−→ MOP (A) ) v −−−→ ","PeriodicalId":250589,"journal":{"name":"Handbook of Satisfiability","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134581847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Random Satisfiability 随机可满足性
Pub Date : 1900-01-01 DOI: 10.3233/978-1-58603-929-5-245
D. Achlioptas
Satisfiability has received a great deal of study as the canonical NP-complete problem. In the last twenty years a significant amount of this effort has been devoted to the study of randomly generated satisfiability instances and the performance of different algorithms on them. Historically, the motivation for studying random instances has been the desire to understand the hardness of “typical” instances. In fact, some early results suggested that deciding satisfiability is “easy on average”. Unfortunately, while “easy” is easy to interpret, “on average” is not. One of the earliest and most often quoted results for satisfiability being easy on average is due to Goldberg [Gol79]. In [FP83], though, Franco and Paull pointed out that the distribution of instances used in the analysis of [Gol79] is so greatly dominated by “very satisfiable” formulas that if one tries truth assignments completely at random, the expected number of trials until finding a satisfying one is O(1). Alternatively, Franco and Paull pioneered the analysis of random instances of k-SAT, i.e., asking the satisfiability question for random kCNF formulas (defined precisely below). Among other things, they showed [FP83] that for all k ≥ 3 the DPLL algorithm needs an exponential number of steps to report all cylinders of solutions of such a formula, or that no solutions exist.
可满足性作为典型的np完全问题得到了大量的研究。在过去的二十年中,这方面的大量工作被用于研究随机生成的可满足性实例以及不同算法在这些实例上的性能。从历史上看,研究随机实例的动机一直是希望了解“典型”实例的硬度。事实上,一些早期的研究结果表明,决定满意度“一般来说很容易”。不幸的是,虽然“容易”很容易理解,但“平均而言”却不是。最早和最常被引用的关于满意度平均容易的结果之一是Goldberg [Gol79]。然而,在[FP83]中,Franco和paul指出[Gol79]分析中使用的实例分布在很大程度上被“非常可满足”的公式所支配,如果一个人完全随机地尝试真值分配,那么在找到一个令人满意的值之前的预期试验次数是0(1)。另外,Franco和paul率先分析了k-SAT的随机实例,即对随机kCNF公式(精确定义如下)提出了可满足性问题。除其他外,他们表明[FP83],对于所有k≥3,DPLL算法需要指数级的步数来报告该公式的所有圆柱体解,或者不存在解。
{"title":"Random Satisfiability","authors":"D. Achlioptas","doi":"10.3233/978-1-58603-929-5-245","DOIUrl":"https://doi.org/10.3233/978-1-58603-929-5-245","url":null,"abstract":"Satisfiability has received a great deal of study as the canonical NP-complete problem. In the last twenty years a significant amount of this effort has been devoted to the study of randomly generated satisfiability instances and the performance of different algorithms on them. Historically, the motivation for studying random instances has been the desire to understand the hardness of “typical” instances. In fact, some early results suggested that deciding satisfiability is “easy on average”. Unfortunately, while “easy” is easy to interpret, “on average” is not. One of the earliest and most often quoted results for satisfiability being easy on average is due to Goldberg [Gol79]. In [FP83], though, Franco and Paull pointed out that the distribution of instances used in the analysis of [Gol79] is so greatly dominated by “very satisfiable” formulas that if one tries truth assignments completely at random, the expected number of trials until finding a satisfying one is O(1). Alternatively, Franco and Paull pioneered the analysis of random instances of k-SAT, i.e., asking the satisfiability question for random kCNF formulas (defined precisely below). Among other things, they showed [FP83] that for all k ≥ 3 the DPLL algorithm needs an exponential number of steps to report all cylinders of solutions of such a formula, or that no solutions exist.","PeriodicalId":250589,"journal":{"name":"Handbook of Satisfiability","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
期刊
Handbook of Satisfiability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1