• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 16
Next 10 →

2CNF Deletion [1].

by Lecturer Sanjeev, Arora Scribe:konstantin Makarychev
"... Definition 1 (Min UnCut Problem) Given a graph G =(V,E), find a cut that minimizes the number of uncut edges i.e. the number of edges within each part. Remark 1 The Min UnCut problem is a complement to the MaxCut problem: The sum of the number of cut edges and uncut edges is equal to the total numbe ..."
Abstract - Add to MetaCart
∈ S ′ : i ≥ 0}; T = {i ∈ T ′ : i ≥ 0}. Thus Min UnCut is equivalent to the following problem: Definition 2 Given a graph G =(V,E), where V = {−n,...,−1} ∪{−1,...,−n} findacut (S, T = −S) that minimizes the number of cut edges i.e. the number of edges going from the part S to T. 1.1 SDP relaxation Write

On the Hardness of Approximating Multicut and Sparsest-Cut

by Shuchi Chawla, Robert Krauthgamer, Ravi Kumar, Yuval Rabani, D. Sivakumar - In Proceedings of the 20th Annual IEEE Conference on Computational Complexity , 2005
"... We show that the MULTICUT, SPARSEST-CUT, and MIN-2CNF ≡ DELETION problems are NP-hard to approximate within every constant factor, assuming the Unique Games Conjecture of Khot [STOC, 2002]. A quantitatively stronger version of the conjecture implies inapproximability factor of Ω(log log n). 1. ..."
Abstract - Cited by 102 (5 self) - Add to MetaCart
We show that the MULTICUT, SPARSEST-CUT, and MIN-2CNF ≡ DELETION problems are NP-hard to approximate within every constant factor, assuming the Unique Games Conjecture of Khot [STOC, 2002]. A quantitatively stronger version of the conjecture implies inapproximability factor of Ω(log log n). 1.

Abstract

by Shuchi Chawla, Robert Krauthgamer, Yuval Rabani, D. Sivakumar , 2004
"... We show that the MULTICUT, SPARSEST-CUT and MIN-2CNF £ DELETION problems are hard to approximate, assuming the Unique Games Conjecture of Khot [Kho02]. In particular, we obtain an arbitrarily large constant factor hardness for these problems, and show that a quantitatively stronger version of the co ..."
Abstract - Add to MetaCart
We show that the MULTICUT, SPARSEST-CUT and MIN-2CNF £ DELETION problems are hard to approximate, assuming the Unique Games Conjecture of Khot [Kho02]. In particular, we obtain an arbitrarily large constant factor hardness for these problems, and show that a quantitatively stronger version

Almost 2-SAT is fixed-parameter tractable

by Igor Razgon - Journal of Computer and System Sciences
"... Abstract. We consider the following problem. Given a 2-CNF formula, is it possible to remove at most k clauses so that the resulting 2-CNF formula is satisfiable? This problem is known to different research communities in Theoretical Computer Science under the names ’Almost 2-SAT’, ’All-but-k 2-SAT’ ..."
Abstract - Cited by 40 (5 self) - Add to MetaCart
’, ’2-CNF deletion’, ’2-SAT deletion’. The status of fixed-parameter tractability of this problem is a long-standing open question in the area of Parameterized Complexity. We resolve this open question by proposing an algorithm which solves this problem in O(15 k ∗ k ∗ m 3) and thus we show

Efficient Algorithms Using The Multiplicative Weights Update Method

by Satyen Kale , 2006
"... Abstract Algorithms based on convex optimization, especially linear and semidefinite programming, are ubiquitous in Computer Science. While there are polynomial time algorithms known to solve such problems, quite often the running time of these algorithms is very high. Designing simpler and more eff ..."
Abstract - Cited by 28 (1 self) - Add to MetaCart
, and constraint satisfaction problems such as Min UnCut and Min 2CNF Deletion. 2. An ~O(n3) time derandomization of the Alon-Roichman construction of expanders using Cayley graphs. The algorithm yields a set of O(log n) elements which generates an expanding Cayley graph in any group of n elements. 3. An ~O(n3

Accelerated Deletion-based Extraction of Minimal Unsatisfiable Cores

by Alexander Nadel, Vadim Ryvchin, Ofer Strichman , 2014
"... Various technologies are based on the capability to find small unsatisfiable cores given an unsatisfiable CNF formula, i.e., a subset of the clauses that are unsatisfiable regardless of the rest of the formula. If that subset is irreducible, it is called a Minimal Unsatisfiable Core (MUC). In many c ..."
Abstract - Add to MetaCart
Various technologies are based on the capability to find small unsatisfiable cores given an unsatisfiable CNF formula, i.e., a subset of the clauses that are unsatisfiable regardless of the rest of the formula. If that subset is irreducible, it is called a Minimal Unsatisfiable Core (MUC). In many

Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses

by Holger Dell, Dieter van Melkebeek - ELECTRONIC COLLOQUIUM ON COMPUTATIONAL COMPLEXITY, REPORT NO. 38 (2010) , 2010
"... Consider the following two-player communication process to decide a language L: The first player holds the entire input x but is polynomially bounded; the second player is computationally unbounded but does not know any part of x; their goal is to cooperatively decide whether x belongs to L at small ..."
Abstract - Cited by 56 (2 self) - Add to MetaCart
d ≥ 2. The case d = 2 implies that no NP-hard vertex deletion problem based on a graph property that is inherited by subgraphs can have kernels consisting of O(k 2−ǫ) edges unless coNP is in NP/poly, where k denotes the size of the deletion set. Kernels consisting of O(k 2) edges are known

On Subclasses of Minimal Unsatisfiable Formulas

by Hans Kleine Büning - Discrete Applied Mathematics
"... We consider the minimal unsatisfiablity problem MU (k) for propositional formulas in conjunctive normal form (CNF) over n variables and n + k clauses, where k is fixed. It will be shown that MU (k) is in NP. Based on the non--deterministic algorithm we prove for MU(2) that after a simplification by ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
We consider the minimal unsatisfiablity problem MU (k) for propositional formulas in conjunctive normal form (CNF) over n variables and n + k clauses, where k is fixed. It will be shown that MU (k) is in NP. Based on the non--deterministic algorithm we prove for MU(2) that after a simplification

Tradeoffs in the complexity of backdoor detection

by Bistra Dilkina, Carla P. Gomes, Ashish Sabharwal - In Principles and Practice of Constraint Programming - CP 2007 , 2007
"... Abstract. There has been considerable interest in the identification of structural properties of combinatorial problems that lead to efficient algorithms for solving them. Some of these properties are “easily ” identifiable, while others are of interest because they capture key aspects of state-of-t ..."
Abstract - Cited by 23 (5 self) - Add to MetaCart
-of-the-art constraint solvers. In particular, it was recently shown that the problem of identifying a strong Horn- or 2CNF-backdoor can be solved by exploiting equivalence with deletion backdoors, and is NPcomplete. We prove that strong backdoor identification becomes harder than NP (unless NP=coNP) as soon

Simplification: tableaux response to DP and KSAT methods

by Fabio Massacci , 1997
"... f, and before applying any other rule, a simplification rule deletes all its other occurrences (at any level of nesting) and perform some suitable boolean reduction. 2 Theoretical Results A number of techniques can be shown to be restricted forms of a local simplification rule (LSR): ffl The DPLL ..."
Abstract - Add to MetaCart
f, and before applying any other rule, a simplification rule deletes all its other occurrences (at any level of nesting) and perform some suitable boolean reduction. 2 Theoretical Results A number of techniques can be shown to be restricted forms of a local simplification rule (LSR): ffl
Next 10 →
Results 1 - 10 of 16
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University