On Weakening Strategies for PB Solvers
- URL: http://arxiv.org/abs/2005.04466v1
- Date: Sat, 9 May 2020 15:40:55 GMT
- Title: On Weakening Strategies for PB Solvers
- Authors: Daniel Le Berre, Pierre Marquis, Romain Wallon
- Abstract summary: Current pseudo-Boolean solvers implement different variants of the cutting planes proof system to infer new constraints during conflict analysis.
One of these variants is generalized resolution, which allows to infer strong constraints, but suffers from the growth of coefficients it generates.
Another variant consists in using weakening and division, which is more efficient in practice but may infer weaker constraints.
- Score: 19.78156213005998
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Current pseudo-Boolean solvers implement different variants of the cutting
planes proof system to infer new constraints during conflict analysis. One of
these variants is generalized resolution, which allows to infer strong
constraints, but suffers from the growth of coefficients it generates while
combining pseudo-Boolean constraints. Another variant consists in using
weakening and division, which is more efficient in practice but may infer
weaker constraints. In both cases, weakening is mandatory to derive conflicting
constraints. However, its impact on the performance of pseudo-Boolean solvers
has not been assessed so far. In this paper, new application strategies for
this rule are studied, aiming to infer strong constraints with small
coefficients. We implemented them in Sat4j and observed that each of them
improves the runtime of the solver. While none of them performs better than the
others on all benchmarks, applying weakening on the conflict side has
surprising good performance, whereas applying partial weakening and division on
both the conflict and the reason sides provides the best results overall.
Related papers
- Temporal Elections: Welfare, Strategyproofness, and Proportionality [21.36300710262896]
We focus on two objectives-utilitarian welfare (Util) and egalitarian welfare (Egal)-and consider the computational complexity of the associated problems.
We observe that maximizing Util is easy, but the corresponding decision problem for Egal is NP-complete even in restricted cases.
arXiv Detail & Related papers (2024-08-24T17:52:26Z) - Symmetric Tensor Networks for Generative Modeling and Constrained
Combinatorial Optimization [72.41480594026815]
Constrained optimization problems abound in industry, from portfolio optimization to logistics.
One of the major roadblocks in solving these problems is the presence of non-trivial hard constraints which limit the valid search space.
In this work, we encode arbitrary integer-valued equality constraints of the form Ax=b, directly into U(1) symmetric networks (TNs) and leverage their applicability as quantum-inspired generative models.
arXiv Detail & Related papers (2022-11-16T18:59:54Z) - Interactively Learning Preference Constraints in Linear Bandits [100.78514640066565]
We study sequential decision-making with known rewards and unknown constraints.
As an application, we consider learning constraints to represent human preferences in a driving simulation.
arXiv Detail & Related papers (2022-06-10T17:52:58Z) - On Kernelized Multi-Armed Bandits with Constraints [16.102401271318012]
We study a bandit problem with a general unknown reward function and a general unknown constraint function.
We propose a general framework for both algorithm performance analysis.
We demonstrate the superior performance of our proposed algorithms via numerical experiments.
arXiv Detail & Related papers (2022-03-29T14:02:03Z) - Versatile Dueling Bandits: Best-of-both-World Analyses for Online
Learning from Preferences [28.79598714109439]
We study the problem of $K$-armed dueling bandit for both and adversarial environments.
We first propose a novel reduction from any (general) dueling bandits to multi-armed bandits.
Our algorithm is also the first to achieve an optimal $O(sum_i = 1K fraclog TDelta_i)$ regret bound against the Condorcet-winner benchmark.
arXiv Detail & Related papers (2022-02-14T13:37:23Z) - Robust Optimal Classification Trees Against Adversarial Examples [5.254093731341154]
We propose a collection of methods to train decision trees that are optimally robust against user-specified attack models.
We show that the min-max optimization problem that arises in adversarial learning can be solved using a single minimization formulation.
We also present a method that determines the upper bound on adversarial accuracy for any model using bipartite matching.
arXiv Detail & Related papers (2021-09-08T18:10:49Z) - Improved Branch and Bound for Neural Network Verification via Lagrangian
Decomposition [161.09660864941603]
We improve the scalability of Branch and Bound (BaB) algorithms for formally proving input-output properties of neural networks.
We present a novel activation-based branching strategy and a BaB framework, named Branch and Dual Network Bound (BaDNB)
BaDNB outperforms previous complete verification systems by a large margin, cutting average verification times by factors up to 50 on adversarial properties.
arXiv Detail & Related papers (2021-04-14T09:22:42Z) - Batched Neural Bandits [107.5072688105936]
BatchNeuralUCB combines neural networks with optimism to address the exploration-exploitation tradeoff.
We prove that BatchNeuralUCB achieves the same regret as the fully sequential version while reducing the number of policy updates considerably.
arXiv Detail & Related papers (2021-02-25T17:36:44Z) - On Irrelevant Literals in Pseudo-Boolean Constraint Learning [21.506382989223784]
We show that emphirrelevant literals may lead to infer constraints that are weaker than they should be.
This suggests that current implementations of PB solvers based on cutting planes should be reconsidered to prevent the generation of irrelevant literals.
arXiv Detail & Related papers (2020-12-08T13:52:09Z) - Hardness of Random Optimization Problems for Boolean Circuits,
Low-Degree Polynomials, and Langevin Dynamics [78.46689176407936]
We show that families of algorithms fail to produce nearly optimal solutions with high probability.
For the case of Boolean circuits, our results improve the state-of-the-art bounds known in circuit complexity theory.
arXiv Detail & Related papers (2020-04-25T05:45:59Z) - Improved Algorithms for Conservative Exploration in Bandits [113.55554483194832]
We study the conservative learning problem in the contextual linear bandit setting and introduce a novel algorithm, the Conservative Constrained LinUCB (CLUCB2)
We derive regret bounds for CLUCB2 that match existing results and empirically show that it outperforms state-of-the-art conservative bandit algorithms in a number of synthetic and real-world problems.
arXiv Detail & Related papers (2020-02-08T19:35:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.