Bounded Treewidth in Knowledge Representation and Reasoning 1
|
|
|
- Pamela Garrett
- 10 years ago
- Views:
Transcription
1 Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October Joint work with G. Gottlob, M. Jakl, S. Rümmele, F. Wei, and S. Woltran
2 Outline 1. Motivation 2. Treewidth of Finite Structures 3. Tractable Reasoning via Courcelle s Theorem 5. Conclusion
3 1. Motivation Outline 1. Motivation 2. Treewidth of Finite Structures 3. Tractable Reasoning via Courcelle s Theorem 5. Conclusion
4 1. Motivation Motivation Complexity in non-monotonic reasoning Most forms of non-monotonic reasoning are intractable (even on the second or third level of the polynomial hierarchy) Examples: propositional abduction, closed world reasoning, answer set programming, belief revision treewidth as a key to fixed-parameter tractability: Courcelle s Theorem and extensions theoretical tractability vs. efficient computation efficient algorithms via dynamic programming
5 2. Treewidth of Finite Structures Outline 1. Motivation 2. Treewidth of Finite Structures 3. Tractable Reasoning via Courcelle s Theorem 5. Conclusion
6 2. Treewidth of Finite Structures Treewidth of Finite Structures Basic Notions and Results tree decomposition / treewidth of a graph finite structure over a signature τ tree decomposition / treewidth of a finite structure computation of a tree decomposition of width k is FPT w.r.t. k heuristic methods for efficient computation of a good tree decomposition exist
7 2. Treewidth of Finite Structures Treewidth of a Propositional Formula in CNF Represent a CNF formula as a finite structure Given a propositional formula F in CNF, represent F by a finite structure A(F ) over the signature τ with τ = {cl, var, pos, neg}, where cl(c), var(x) means that c is a clause (resp. x is a variable) in F. pos(x, c), neg(x, c) means that x occurs unnegated (resp. negated) in the clause c. Treewidth of a CNF formula We define tw(f ) := tw(a(f )). Remark. This definition corresponds to the incidence graph of F.
8 2. Treewidth of Finite Structures Treewidth of CNF Example Given a propositional formula F in CNF (x 1 x 2 x 3 ) (x 2 x 3 x 4 ), represent F by a finite structure A(F ) over τ:
9 2. Treewidth of Finite Structures Treewidth of CNF Example Given a propositional formula F in CNF (x 1 x 2 x 3 ) (x 2 x 3 x 4 ), represent F by a finite structure A(F ) over τ: A(F ) contains the following atoms: cl(c 1 ), cl(c 2 ), var(x 1 ), var(x 2 ), var(x 3 ), var(x 4 ), pos(x 1, c 1 ), pos(x 3, c 1 ), pos(x 2, c 2 ), pos(x 4, c 2 ), neg(x 2, c 1 ), neg(x 3, c 2 ).
10 2. Treewidth of Finite Structures Tree Decomposition A(F ) cl(c 1 ), cl(c 2 ), var(x 1 ), var(x 2 ), var(x 3 ), var(x 4 ), pos(x 1, c 1 ), pos(x 3, c 1 ), pos(x 2, c 2 ), pos(x 4, c 2 ), neg(x 2, c 1 ), neg(x 3, c 2 ).
11 2. Treewidth of Finite Structures Tree Decomposition A(F ) cl(c 1 ), cl(c 2 ), var(x 1 ), var(x 2 ), var(x 3 ), var(x 4 ), pos(x 1, c 1 ), pos(x 3, c 1 ), pos(x 2, c 2 ), pos(x 4, c 2 ), neg(x 2, c 1 ), neg(x 3, c 2 ). Tree Decomposition of A(F ) x 1, x 2, c 1 x 2, x 3, c 2 x 3, x 4, c 2
12 2. Treewidth of Finite Structures Tree Decomposition A(F ) cl(c 1 ), cl(c 2 ), var(x 1 ), var(x 2 ), var(x 3 ), var(x 4 ), pos(x 1, c 1 ), pos(x 3, c 1 ), pos(x 2, c 2 ), pos(x 4, c 2 ), neg(x 2, c 1 ), neg(x 3, c 2 ). Tree Decomposition of A(F ) x 1, x 2, c 1 x 2, x 3, c 2 x 3, x 4, c 2 Remark. We have tw(f ) := tw(a(f )) = 2.
13 3. Tractable Reasoning via Courcelle s Theorem Outline 1. Motivation 2. Treewidth of Finite Structures 3. Tractable Reasoning via Courcelle s Theorem 5. Conclusion
14 3. Tractable Reasoning via Courcelle s Theorem Monadic-Second Order Logic (MSO) Expressive Power of MSO MSO extends First Order logic (FO) by the use of set variables (usually denoted by upper case letters), which range over sets of domain elements. Many interesting (intractable) properties of finite structures are expressible in MSO, e.g.: SAT, propositional abduction, closed world reasoning, belief revision, answer set programming, etc.
15 3. Tractable Reasoning via Courcelle s Theorem Monadic-Second Order Logic (MSO) Expressive Power of MSO MSO extends First Order logic (FO) by the use of set variables (usually denoted by upper case letters), which range over sets of domain elements. Many interesting (intractable) properties of finite structures are expressible in MSO, e.g.: SAT, propositional abduction, closed world reasoning, belief revision, answer set programming, etc. Theorem (Courcelle, 1990) Any property of finite structures, which is definable by an MSO sentence, can be decided in time O(f (k) n), where n is the size of the structure and f (k) depends only on the treewidth k of the structure, i.e., FPT w.r.t. the treewidth.
16 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 1: SAT-Problem MSO-Encoding of the SAT-Problem (Courcelle et al. 2001) Idea. Let F be a propositional formula in CNF; an interpretation of F can be represented as a set X of variables (i.e., the variables which are true).
17 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 1: SAT-Problem MSO-Encoding of the SAT-Problem (Courcelle et al. 2001) Idea. Let F be a propositional formula in CNF; an interpretation of F can be represented as a set X of variables (i.e., the variables which are true). MSO encoding that X is a model of F : Mod(X, F ) := ( c)cl(c) ( z)[(pos(z, c) z X ) (neg(z, c) z X )]
18 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 1: SAT-Problem MSO-Encoding of the SAT-Problem (Courcelle et al. 2001) Idea. Let F be a propositional formula in CNF; an interpretation of F can be represented as a set X of variables (i.e., the variables which are true). MSO encoding that X is a model of F : Mod(X, F ) := ( c)cl(c) ( z)[(pos(z, c) z X ) (neg(z, c) z X )] MSO encoding of the SAT-Problem: ( X )Mod(X, F )
19 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction Definition A propositional abduction problem (PAP) is a quadruple P = V, H, M, C consisting of a finite set of propositional variables V, a theory C, which is a consistent set of clauses over the variables V, a set of hypotheses H V, and a set of manifestations M V.
20 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction Definition A propositional abduction problem (PAP) is a quadruple P = V, H, M, C consisting of a finite set of propositional variables V, a theory C, which is a consistent set of clauses over the variables V, a set of hypotheses H V, and a set of manifestations M V. A set S satisfying S H is a solution iff C S is consistent (i.e., satisfiable) and C S = M holds.
21 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction Abduction in System Diagnosis A diagnosis problem can be represented by a propositional abduction problem P = V, H, M, C as follows: The clausal theory C is the system description. The hypotheses H V describe the possibly faulty system components. The manifestations M V are the observed symptoms (describing some malfunction of the system). The solutions S Sol(P) are the possible explanations of the malfunction.
22 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction The main decision problems Given a PAP P we ask: Solvability. Does there exist at least one solution for P?
23 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction The main decision problems Given a PAP P we ask: Solvability. Does there exist at least one solution for P? Given a PAP P and a hypothesis h H, we ask: Relevance: Is h contained in at least one solution of P? Necessity: Is h contained in all solutions of P?
24 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction The main decision problems Given a PAP P we ask: Solvability. Does there exist at least one solution for P? Given a PAP P and a hypothesis h H, we ask: Relevance: Is h contained in at least one solution of P? Necessity: Is h contained in all solutions of P? Remark. These problems are Σ 2 P-complete (Solvability and Relevance) resp. Π 2 P-complete (Necessity).
25 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction MSO-Encoding of the main Abduction problems Let a PAP P = V, H, M, C be represented as a τ-structure with τ = {cl, var, pos, neg, H, M}, where the predicates cl, var, pos, neg represent the clause set C and the unary predicates H and M identify the hypotheses and manifestations.
26 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction MSO-Encoding of the main Abduction problems Let a PAP P = V, H, M, C be represented as a τ-structure with τ = {cl, var, pos, neg, H, M}, where the predicates cl, var, pos, neg represent the clause set C and the unary predicates H and M identify the hypotheses and manifestations. MSO encoding of Sol(S), i.e., S is a solution of P : S H ( X )[Mod(X, C) S X ] ( Y )[(Mod(Y, C) S Y ) M Y ]
27 3. Tractable Reasoning via Courcelle s Theorem MSO-Example 2: Propositional Abduction MSO-Encoding of the main Abduction problems Let a PAP P = V, H, M, C be represented as a τ-structure with τ = {cl, var, pos, neg, H, M}, where the predicates cl, var, pos, neg represent the clause set C and the unary predicates H and M identify the hypotheses and manifestations. MSO encoding of Sol(S), i.e., S is a solution of P : S H ( X )[Mod(X, C) S X ] ( Y )[(Mod(Y, C) S Y ) M Y ] MSO encoding of the main Abduction problems: Solvability: ( S)Sol(S) Relevance: ( S)[Sol(S) h S] Necessity: ( S)[Sol(S) h S]
28 3. Tractable Reasoning via Courcelle s Theorem Further Results Closed World Reasoning Closed world assumption: assume negative information if the positive information is not explicitly given by a theory T. Several forms of closed world assumption: CWA (Closed World Assumption), GCWA (Generalized CWA), EGCWA (Extended GCWA), CCWA (Careful CWA), and ECWA (Extended CWA). Crucial for MSO-encoding: define minimal models
29 3. Tractable Reasoning via Courcelle s Theorem Further Results Closed World Reasoning Closed world assumption: assume negative information if the positive information is not explicitly given by a theory T. Several forms of closed world assumption: CWA (Closed World Assumption), GCWA (Generalized CWA), EGCWA (Extended GCWA), CCWA (Careful CWA), and ECWA (Extended CWA). Crucial for MSO-encoding: define minimal models Other Forms of Reasoning Answer Set Programming Belief Revision
30 3. Tractable Reasoning via Courcelle s Theorem Extended MSO Extension of Courcelle s Theorem Extended MSO: weight functions, cardinality, sum, min, max, etc. (Arnborg/Lagergren/Seese, 1991) Linear extended MSO extremum problems over finite structures are FPT w.r.t. the treewidth. Extended MSO-Encodings in Propositional Abduction search for small explanations, express probabilities or cost of repair restriction to solutions of minimal cardinality or minimal weight
31 3. Tractable Reasoning via Courcelle s Theorem Theoretical Tractability vs. Efficient Computation Algorithms via Courcelle s Theorem In principle, Courcelle s theorem can be used to effectively generate a concrete algorithm from an MSO description, see e.g. (Arnborg/Lagergren/Seese, 1991), (Flum/Frick/Grohe, 2002). 1 Translate the MSO evaluation problem over finite structures into an equivalent MSO evaluation problem over colored binary trees. 2 Solve this problem via the correspondence between MSO over trees and finite tree automata (FTA), see (Thatcher/Wright, 1968), (Doner, 1970).
32 3. Tractable Reasoning via Courcelle s Theorem Theoretical Tractability vs. Efficient Computation Problem with this approach State explosion of the FTA even for relatively simple MSO formulae on trees. MSO formula over colored binary trees is significantly more complex than the original formula for the structure with bounded treewidth.
33 3. Tractable Reasoning via Courcelle s Theorem Theoretical Tractability vs. Efficient Computation Problem with this approach State explosion of the FTA even for relatively simple MSO formulae on trees. MSO formula over colored binary trees is significantly more complex than the original formula for the structure with bounded treewidth. Conclusion: (Grohe 1999), similarly (Niedermeier, 2006) Main benefit of Courcelle s Theorem: a simple way to recognize a property as being linear time computable. Algorithms are useless for practical applications.
34 Outline 1. Motivation 2. Treewidth of Finite Structures 3. Tractable Reasoning via Courcelle s Theorem 5. Conclusion
35 Nice Tree Decompositions A tree decomposition T is called nice if T is a rooted binary tree, nodes with 2 children have the same bags as their children, the bags of nodes with one child differ in exactly 1 element from the bag of the child.
36 Nice Tree Decompositions A tree decomposition T is called nice if T is a rooted binary tree, nodes with 2 children have the same bags as their children, the bags of nodes with one child differ in exactly 1 element from the bag of the child. x 1, x 2, c 1 x 2, x 3, c 2 x 3, x 4, c 2
37 Nice Tree Decompositions A tree decomposition T is called nice if T is a rooted binary tree, nodes with 2 children have the same bags as their children, the bags of nodes with one child differ in exactly 1 element from the bag of the child. x 2, c 1 x 2, x 3 x 1, x 2, c 1 x 2, x 3, c 2 x 3, c 2 x 1, x 2, c 1 x 2, x 3, c 2 x 3, x 4, c 2 x 3, x 4, c 2
38 Nice Tree Decompositions We distinguish: Leaf nodes. Forget nodes (variable or clause). Introduce nodes (variable or clause). Branch nodes. x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 x 3, c 2 x 3, x 4, c 2
39 Nice Tree Decompositions We distinguish: Leaf nodes. Forget nodes (variable or clause). Introduce nodes (variable or clause). Branch nodes. x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 x 3, c 2 x 3, x 4, c 2
40 Nice Tree Decompositions We distinguish: Leaf nodes. Forget nodes (variable or clause). Introduce nodes (variable or clause). Branch nodes. x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 x 3, c 2 x 3, x 4, c 2
41 Nice Tree Decompositions We distinguish: Leaf nodes. Forget nodes (variable or clause). Introduce nodes (variable or clause). Branch nodes. x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 x 3, c 2 x 3, x 4, c 2
42 #SAT-Algorithm (Samer/Szeider, 2010) Notation F... CNF formula. (T, χ, r)... Nice tree decomposition of F. χ V, χ C... χ restricted to variables/clauses. T t... Subtree of T rooted at node t. V t, C t... Variables/Clauses in the bags of T t. Data Structure For each truth assignment α : χ V (t) {0, 1} and subset A χ C (t) let N(t, α, A) be the set of truth assignments τ : V t {0, 1}, s.t. τ(x) = α(x) for all x χ V (t). A is exactly the set of clauses in C t that are not satisfied by τ.
43 #SAT-Algorithm (Samer/Szeider, 2010) Notation F... CNF formula. (T, χ, r)... Nice tree decomposition of F. χ V, χ C... χ restricted to variables/clauses. T t... Subtree of T rooted at node t. V t, C t... Variables/Clauses in the bags of T t. Data Structure For each truth assignment α : χ V (t) {0, 1} and subset A χ C (t) let N(t, α, A) be the set of truth assignments τ : V t {0, 1}, s.t. τ(x) = α(x) for all x χ V (t). A is exactly the set of clauses in C t that are not satisfied by τ. Let n(t, α, A) = N(t, α, A).
44 Example x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 x 3, c 2 α A n x 1-1 x 2 c 1 1 x 1, x 2-1 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2
45 Example x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 α A n x 1-1 x 2 c 1 1 x 1, x 2-1 x 3, c 2 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2 α A n x 2 c 1 1 x 2-1
46 Example x 2, c 1 x 2, x 3 α A n x 2 c 1 1 x 2-1 x 1, x 2, c 1 x 2, x 3, c 2 x 3, c 2 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2 α A n x 2 c 1 1 x 2-1 x 3-2 x 2, x 3-2
47 Example x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 x 3, c 2 α A n x 3 c 2 1 x 4-1 x 3, x 4-1 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2
48 Example x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 α A n x 3 c 2 1 x 4-1 x 3, x 4-1 x 3, c 2 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2 α A n x 3 c 2 1 x 3-1
49 Example x 2, c 1 x 2, x 3 α A n x 3 c 2 1 x 3-1 x 1, x 2, c 1 x 2, x 3, c 2 x 3, c 2 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2 α A n x 2-2 x 3 c 2 1 x 3-1 x 2, x 3-2
50 Example x 2, c 1 x 2, x 3 x 1, x 2, c 1 x 2, x 3, c 2 α A n x 2-2 x 3 c 2 1 x 3-1 x 2, x 3-2 x 3, c 2 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2 α A n x 2-2 x 3-1 x 2, x 3-2
51 Example x 2, c 1 x 1, x 2, c 1 x 2, x 3 x 2, x 3, c 2 α A n x 2-2 x 3-1 x 2, x 3-2 x 3, c 2 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2 α A n x 2 c 1 2 x 3-1 x 2, x 3-2
52 Example x 2, c 1 x 2, x 3 α A n x 2 c 1 1 x 2-1 x 3-2 x 2, x 3-2 α A n x 2 c 1 2 x 3-1 x 2, x 3-2 x 1, x 2, c 1 x 2, x 3, c 2 x 3, c 2 x 3, x 4, c 2 (x 1 x 2 x 3 ) (x 2 x 3 x 4 ) } {{ } } {{ } c 1 c 2 α A n x 2 c 1 2 x 2-2 x 3-2 x 2, x 3-4
53 Leaf and Join Nodes Lemma Let t be a leaf node. Then, for each truth assignment α : χ V (t) {0, 1} and set A χ C (t), we have { 1 if A = {c χ C (t) : α does not satisfy c}; n(t, α, A) = 0 otherwise. Lemma Let t be a join node of T with children t 1, t 2. Then, for each truth assignment α : χ V (t) {0, 1} and set A χ C (t), we have n(t, α, A) = A 1,A 2 χ C (t),a 1 A 2 =A n(t 1, α, A 1 ) n(t 2, α, A 2 ).
54 Variable Introduce Nodes Lemma Let t be a variable introduce node with child t and χ(t) = χ(t ) {x} for a variable x. Then, for each truth assignment α : χ V (t) {0, 1} and set A χ C (t), we have 0 if x c for some c A; n(t, α x=0, A) = n(t, α, A B ) otherwise; B B where B = {c χ C (t) : x c}; 0 if x c for some c A; n(t, α x=1, A) = n(t, α, A B ) otherwise; B B where B = {c χ C (t) : x c}.
55 Clause Introduce Nodes Lemma Let t be a clause introduce node with child t and χ(t) = χ(t ) {c} for a clause c. Then, for each truth assignment α : χ V (t) {0, 1} and set A χ C (t), we have n(t, α, A) if c A and α satisfies c; n(t, α, A) = n(t, α, A \ {c}) if c A and α does not satisfy c; 0 otherwise.
56 Forget Nodes Lemma Let t be a variable forget node with child t and χ(t) = χ(t ) \ {x}. Then, for each truth assignment α : χ V (t) {0, 1} and set A χ C (t), we have n(t, α, A) = n(t, α x=0, A) + n(t, α x=1, A). Lemma Let t be a clause forget node with child t and χ(t) = χ(t ) \ {c}. Then, for each truth assignment α : χ V (t) {0, 1} and set A χ C (t), we have n(t, α, A) = n(t, α, A).
57 Summary Data Structure In this dynamic programming algorithm, we have to maintain the following data structure at each node t in the tree decomposition T : (α, A, n), where α : χ V (t) {0, 1}, A χ C (t), and n is an integer.
58 Summary Data Structure In this dynamic programming algorithm, we have to maintain the following data structure at each node t in the tree decomposition T : (α, A, n), where α : χ V (t) {0, 1}, A χ C (t), and n is an integer. Alternative view: represent (α, A) as a subset of χ(t). Hence, if T has width w 1, we have to store a table of size O(w2 w ) at each node.
59 Summary Data Structure In this dynamic programming algorithm, we have to maintain the following data structure at each node t in the tree decomposition T : (α, A, n), where α : χ V (t) {0, 1}, A χ C (t), and n is an integer. Alternative view: represent (α, A) as a subset of χ(t). Hence, if T has width w 1, we have to store a table of size O(w2 w ) at each node. Theorem (Samer/Szeider, 2010) The #SAT-problem can be solved in time O(w4 w N), where N denotes the number of nodes in a tree decomposition of width w 1 for an input CNF formula F (assuming unit cost for arithmetic operations).
60 Summary Lessons learned The models of a CNF-formula F can be computed by means of a single bottom-up traversal of a tree decomposition T of F : assign truth value to the variables in the bags at leaf nodes and extend the truth assignments at the variable introduce nodes.
61 Summary Lessons learned The models of a CNF-formula F can be computed by means of a single bottom-up traversal of a tree decomposition T of F : assign truth value to the variables in the bags at leaf nodes and extend the truth assignments at the variable introduce nodes. We cannot afford to store all truth assignments on V t. It suffices to store the projection of each truth assignment on V t to the variables and clauses in χ(t). The resulting data structure is single-exponential in the treewidth. Each projection may represent many truth assignments on V t : these are indistinguishable for the further bottom-up traversal.
62 Dynamic Programming in Propositional Abduction Definition A propositional abduction problem (PAP) is a quadruple P = V, H, M, C consisting of a finite set of propositional variables V, a theory C, which is a consistent set of clauses over the variables V, a set of hypotheses H V, and a set of manifestations M V.
63 Dynamic Programming in Propositional Abduction Definition A propositional abduction problem (PAP) is a quadruple P = V, H, M, C consisting of a finite set of propositional variables V, a theory C, which is a consistent set of clauses over the variables V, a set of hypotheses H V, and a set of manifestations M V. A set S satisfying S H is a solution iff C S is consistent (i.e., satisfiable) and C S = M holds.
64 Dynamic Programming in Propositional Abduction Intuition of Computing a Solution The clause set C has, in general, many models. There may exist models of C where a manifestation m M is false. Idea of constructing a solution S: adding a variable h H to S means that we discard all models of C where h is false.
65 Dynamic Programming in Propositional Abduction Intuition of Computing a Solution The clause set C has, in general, many models. There may exist models of C where a manifestation m M is false. Idea of constructing a solution S: adding a variable h H to S means that we discard all models of C where h is false. Difficulty (and reason for Σ 2 -completeness): S must be big enough so that every manifestation m M is true in the remaining models of C. S must be small enough so that at least one model of C is left.
66 Dynamic Programming in Propositional Abduction Dynamic Programming Algorithm In a bottom-up traversal of the tree decomposition T, at each node t T, consider all subsets S H t. For every such S do: Consider all possible truth assignments I for C S. Keep track if some manifestation m M is set to false in I. Read off the solutions at the root node: C S has at least one model. In all models of C S, no m M is set to false.
67 FPT-Algorithm for Propositional Abduction Data Structure and Complexity Recall from the #SAT-algorithm the idea of projecting truth assignments on V t onto the bag χ(t).
68 FPT-Algorithm for Propositional Abduction Data Structure and Complexity Recall from the #SAT-algorithm the idea of projecting truth assignments on V t onto the bag χ(t). Data structure required for Abduction at each node t T : Restriction of each set S H t to S χ(t). Set of projections of all possible truth assignments for C S. One bit for each such projection indicating if some m M t is false in the corresponding truth assignments. Formal definition of the data structure: 2 χ(t) 2 2χ(t) {0,1}. Complexity of the algorithm: double-exponential in the treewidth.
69 Extensions Other types of problems Optimization Problems: during the bottom-up traversal, keep track of the intermediate value of the target function. Counting Problems: compute the number of solutions in abduction, the number of minimal models, the number of answer sets, etc.
70 Extensions Other types of problems Optimization Problems: during the bottom-up traversal, keep track of the intermediate value of the target function. Counting Problems: compute the number of solutions in abduction, the number of minimal models, the number of answer sets, etc. Enumeration Problems: compute all solutions, all minimal models, all answer sets, etc. with fixed-parameter linear delay: during bottom-up traversal: keep track of the relationship between the data structure at the child node(s) and the parent node compute the output by one top-down traversal per solution, minimal model, answer set, etc.
71 Extensions Other types of problems Optimization Problems: during the bottom-up traversal, keep track of the intermediate value of the target function. Counting Problems: compute the number of solutions in abduction, the number of minimal models, the number of answer sets, etc. Enumeration Problems: compute all solutions, all minimal models, all answer sets, etc. with fixed-parameter linear delay: during bottom-up traversal: keep track of the relationship between the data structure at the child node(s) and the parent node compute the output by one top-down traversal per solution, minimal model, answer set, etc. (Special Case) Enumeration Problem defined by a unary predicate: For instance, compute all relevant resp. necessary hypotheses in an abduction problem. A single top-down traversal suffices.
72 Experimental Results Implementation Some of the algorithms presented here have been implemented in Datalog (SAT), C (propositional abduction), or Haskell (answer set programming). Experience Datalog: reasonable performance for instances of low treewidth, FPL-behaviour not achievable by using datalog engine as black box. C: FPL-behaviour achievable, e.g.: abduction for treewidth 3. Haskell: almost as fast as C-programme; formal description of dynamic programming algorithm is very close to programme code, e.g.: answer set programming with treewidth 7. Conclusion: Functional programming language seems to be best suited.
73 5. Conclusion Outline 1. Motivation 2. Treewidth of Finite Structures 3. Tractable Reasoning via Courcelle s Theorem 5. Conclusion
74 5. Conclusion Conclusion Main Results Application of treewidth to non-monotonic reasoning Many FPT-results via Courcelle s Theorem Efficient computation with dynamic programming algorithms
75 5. Conclusion Conclusion Main Results Application of treewidth to non-monotonic reasoning Many FPT-results via Courcelle s Theorem Efficient computation with dynamic programming algorithms Future Work Dynamic programming algorithms for further problems Other structural decomposition methods like clique-width Further extensions of Courcelle s Theorem
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
Bounded-width QBF is PSPACE-complete
Bounded-width QBF is PSPACE-complete Albert Atserias 1 and Sergi Oliva 2 1 Universitat Politècnica de Catalunya Barcelona, Spain [email protected] 2 Universitat Politècnica de Catalunya Barcelona, Spain
Discuss the size of the instance for the minimum spanning tree problem.
3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
Lecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012
276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the
1 Definitions. Supplementary Material for: Digraphs. Concept graphs
Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.
Computational Methods for Database Repair by Signed Formulae
Computational Methods for Database Repair by Signed Formulae Ofer Arieli ([email protected]) Department of Computer Science, The Academic College of Tel-Aviv, 4 Antokolski street, Tel-Aviv 61161, Israel.
Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison
Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Tomi Janhunen 1, Ilkka Niemelä 1, Johannes Oetsch 2, Jörg Pührer 2, and Hans Tompits 2 1 Aalto University, Department
6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
Handout #1: Mathematical Reasoning
Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or
Logic in general. Inference rules and theorem proving
Logical Agents Knowledge-based agents Logic in general Propositional logic Inference rules and theorem proving First order logic Knowledge-based agents Inference engine Knowledge base Domain-independent
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
CSC 373: Algorithm Design and Analysis Lecture 16
CSC 373: Algorithm Design and Analysis Lecture 16 Allan Borodin February 25, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 17 Announcements and Outline Announcements
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Repair Checking in Inconsistent Databases: Algorithms and Complexity
Repair Checking in Inconsistent Databases: Algorithms and Complexity Foto Afrati 1 Phokion G. Kolaitis 2 1 National Technical University of Athens 2 UC Santa Cruz and IBM Almaden Research Center Oxford,
A first step towards modeling semistructured data in hybrid multimodal logic
A first step towards modeling semistructured data in hybrid multimodal logic Nicole Bidoit * Serenella Cerrito ** Virginie Thion * * LRI UMR CNRS 8623, Université Paris 11, Centre d Orsay. ** LaMI UMR
CS510 Software Engineering
CS510 Software Engineering Propositional Logic Asst. Prof. Mathias Payer Department of Computer Science Purdue University TA: Scott A. Carr Slides inspired by Xiangyu Zhang http://nebelwelt.net/teaching/15-cs510-se
This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.
3. Axioms of Set theory Before presenting the axioms of set theory, we first make a few basic comments about the relevant first order logic. We will give a somewhat more detailed discussion later, but
A Working Knowledge of Computational Complexity for an Optimizer
A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
npsolver A SAT Based Solver for Optimization Problems
npsolver A SAT Based Solver for Optimization Problems Norbert Manthey and Peter Steinke Knowledge Representation and Reasoning Group Technische Universität Dresden, 01062 Dresden, Germany [email protected]
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Mathematical Sciences 2012 1 p. 43 48 ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS I nf or m at i cs L. A. HAYKAZYAN * Chair of Programming and Information
Complexity Classes P and NP
Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
School Timetabling in Theory and Practice
School Timetabling in Theory and Practice Irving van Heuven van Staereling VU University, Amsterdam Faculty of Sciences December 24, 2012 Preface At almost every secondary school and university, some
Chapter 1. NP Completeness I. 1.1. Introduction. By Sariel Har-Peled, December 30, 2014 1 Version: 1.05
Chapter 1 NP Completeness I By Sariel Har-Peled, December 30, 2014 1 Version: 1.05 "Then you must begin a reading program immediately so that you man understand the crises of our age," Ignatius said solemnly.
Introduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
Analysis of Algorithms I: Binary Search Trees
Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
Satisfiability Checking
Satisfiability Checking SAT-Solving Prof. Dr. Erika Ábrahám Theory of Hybrid Systems Informatik 2 WS 10/11 Prof. Dr. Erika Ábrahám - Satisfiability Checking 1 / 40 A basic SAT algorithm Assume the CNF
Classification - Examples
Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking
Lecture 16 : Relations and Functions DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms
CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard [email protected] CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
NP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY
DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY BARBARA F. CSIMA, JOHANNA N. Y. FRANKLIN, AND RICHARD A. SHORE Abstract. We study arithmetic and hyperarithmetic degrees of categoricity. We extend
Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.
Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas [email protected] Background One basic goal in complexity theory is to separate interesting complexity
TU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines
The problem: load balancing with bounded look-ahead Input: integer m 2: number of machines integer k 0: the look-ahead numbers t 1,..., t n : the job sizes Problem: assign jobs to machines machine to which
NP-Completeness I. Lecture 19. 19.1 Overview. 19.2 Introduction: Reduction and Expressiveness
Lecture 19 NP-Completeness I 19.1 Overview In the past few lectures we have looked at increasingly more expressive problems that we were able to solve using efficient algorithms. In this lecture we introduce
On the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Load Balancing. Load Balancing 1 / 24
Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait
arxiv:cs/0605141v1 [cs.dc] 30 May 2006
General Compact Labeling Schemes for Dynamic Trees Amos Korman arxiv:cs/0605141v1 [cs.dc] 30 May 2006 February 1, 2008 Abstract Let F be a function on pairs of vertices. An F- labeling scheme is composed
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Monitoring Metric First-order Temporal Properties
Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at
The Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
A Modular Representation of a Business Process Planner
A Modular Representation of a Business Process Planner Shahab Tasharrofi and Evgenia Ternovska School of Computing Science Simon Fraser University Canada 1st International Workshop on Knowledge-intensive
Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...
Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
Clustering. 15-381 Artificial Intelligence Henry Lin. Organizing data into clusters such that there is
Clustering 15-381 Artificial Intelligence Henry Lin Modified from excellent slides of Eamonn Keogh, Ziv Bar-Joseph, and Andrew Moore What is Clustering? Organizing data into clusters such that there is
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Introduction to Automata Theory. Reading: Chapter 1
Introduction to Automata Theory Reading: Chapter 1 1 What is Automata Theory? Study of abstract computing devices, or machines Automaton = an abstract computing device Note: A device need not even be a
Chapter. NP-Completeness. Contents
Chapter 13 NP-Completeness Contents 13.1 P and NP......................... 593 13.1.1 Defining the Complexity Classes P and NP...594 13.1.2 Some Interesting Problems in NP.......... 597 13.2 NP-Completeness....................
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany [email protected]
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Analysis of Algorithms I: Optimal Binary Search Trees
Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
Fabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees
University of Ostrava Institute for Research and Applications of Fuzzy Modeling Reasoning in Description Logic with Semantic Tableau Binary Trees Alena Lukasová Research report No. 63 2005 Submitted/to
Computability Theory
CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Computability Theory This section is partly inspired by the material in A Course in Mathematical Logic by Bell and Machover, Chap 6, sections 1-10.
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,
Degrees that are not degrees of categoricity
Degrees that are not degrees of categoricity Bernard A. Anderson Department of Mathematics and Physical Sciences Gordon State College [email protected] www.gordonstate.edu/faculty/banderson Barbara
GRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
Cyber-Security Analysis of State Estimators in Power Systems
Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
Chapter 6: Episode discovery process
Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
Mathematical Induction. Lecture 10-11
Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach
