Provably Pointless Propagator Calls
نویسندگان
چکیده
CSP instances are commonly solved by backtracking search combined with constraint propagation. In any search state, constraint solvers aim to remove any literal (variable-value pair) that can be shown not to be part of any solution. This literal removal, called propagation, is the beating heart of modern constraint solvers. A significant proportion of the runtime of propagating constraint solvers is spent running propagation algorithms. Therefore any mechanism for reducing how frequently propagators are called leads directly to significant performance improvements. One family of popular techniques is dynamic triggering – this avoids invoking a propagator when it would perform no useful work. While this technique has been successful in practice, it has not yet been studied theoretically. This paper provides a theoretical framework for understanding when we can prove a literal deletion does not require a propagator to be executed. To achieve this, we describe supports: a support for a constraint is a set of literals whose presence in a search state ensures that propagating the constraint will not remove any literals. Therefore running the propagator when a literal outside the support is deleted is a waste of time. By characterising supports and giving a definition of dynamic and static supports for the CSP, we provide the framework for a proper analysis. We show how the number of triggers required for different constraints differs widely, and how, for many constraints, dynamic triggering allows much smaller supports. We also show the theoretical complexity of verifying the correctness of supports.
منابع مشابه
Artemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملGenerating Special-Purpose Stateless Propagators for Arbitrary Constraints
Given an arbitrary constraint c on n variables with domain size d, we show how to generate a custom propagator that establishes GAC in time O(nd) by precomputing the propagation that would be performed on every reachable subdomain of scope(c). Our propagators are stateless: they store no state between calls, and so incur no overhead in storing and backtracking state during search. The preproces...
متن کاملPOINTLESS CURVES OF GENUS THREE AND FOUR by
— A curve over a field k is pointless if it has no k-rational points. We show that there exist pointless genus-3 hyperelliptic curves over a finite field Fq if and only if q 6 25, that there exist pointless smooth plane quartics over Fq if and only if either q 6 23 or q = 29 or q = 32, and that there exist pointless genus-4 curves over Fq if and only if q 6 49. Résumé (Courbes de genre 3 et4 sa...
متن کاملA New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography
The Session Initiation Protocol (SIP) protocol is commonly used to establish Voice over IP (VoIP) calls. IETF SIP standards do not specify a secure authentication process thus allowing malicious parties to impersonate other parties or to charge calls to other parties. This paper proposes an extension to the SIP protocol that uses an identity-based authentication mechanism and key agreement prot...
متن کاملEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
We propose a nonce-based MAC construction called EWCDM (Encrypted Wegman-Carter with Davies-Meyer), based on an almost xoruniversal hash function and a block cipher, with the following properties: (i) it is simple and efficient, requiring only two calls to the block cipher, one of which can be carried out in parallel to the hash function computation; (ii) it is provably secure beyond the birthd...
متن کامل