<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Backdoor Trees for Answer Set Programming?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Johannes K. Fichte</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>TU Wien</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vienna</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Austria</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>We translate the concept of backdoor trees from SAT to propositional Answer Set Programming (ASP). By means of backdoor trees we can reduce a reasoning task for a general ASP instance to reasoning tasks on several tractable ASP instances. We demonstrate that the number of tractable ASP instances can be drastically reduced in comparison to a related approach based on strong backdoors.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Answer Set Programming (ASP) is a popular framework for declarative modelling
and problem solving [
        <xref ref-type="bibr" rid="ref25 ref33 ref35">25,33,35</xref>
        ]. It has successfully been used to solve a wide
variety of problems in arti cial intelligence and reasoning, e.g., match making [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ],
optimization of packaging of Linux distributions [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], reasoning in robots [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and
shift design [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In ASP, problems are usually modelled by means of rules and
constraints that form a disjunctive logic program. The solutions to the program
are the so-called answer sets (or stable models). Solving a problem means to
search for answer sets of logic programs. In this paper, we are mainly interested
in computational decision problems for propositional disjunctive ASP such as
deciding whether a program has an answer set (Consistency), whether a certain
atom is contained in at least one (Brave Reasoning) or in all answer sets
(Skeptical Reasoning). Further, we consider the problems counting all answer
sets (Counting) and enumerating all answer sets (Enum).
      </p>
      <p>
        Developers of modern ASP solvers such as Clasp [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] or Wasp [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] have
demonstrated in several competitions [
        <xref ref-type="bibr" rid="ref10 ref2 ref27 ref28 ref8">2,8,10,27,28</xref>
        ] that ASP solving can be
e ciently used to solve a wide variety of instances. However from the perspective
of classical worst case complexity, many decision problems for disjunctive ASP are
\harder than NP" and have a higher worst-case complexity than CSP and Sat.
More precisely, the problems Consistency, Brave Reasoning, and Skeptical
Reasoning are complete for the second level of the Polynomial Hierarchy [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        In the literature, more ne-grained results on computational complexity of
the ASP decision problems have been established. Syntactic properties where
the input is restricted to certain fragments have been identi ed under which the
computational complexity drops and where the problems can be solved more
e ciently [
        <xref ref-type="bibr" rid="ref18 ref29 ref39 ref5 ref6">29,5,6,39,18</xref>
        ]. Parameterized complexity analyses, which take the input
size of an instance along with a parameter, indicating the presence of a certain
\hidden structure", have been carried out [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17 ref32 ref7">7,14,15,16,17,32</xref>
        ]. The central idea of
parameterized complexity is that instances originating in practical applications
are often structured in a way that facilitates obtaining a solution relatively fast.
An interesting parameter can be gained from backdoors [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Backdoors can be
used as clever reasoning shortcuts through the search space. For a backdoor
one usually xes a class C of programs, commonly called target class, where the
problem under consideration is computationally easier, e.g., the class of Horn
programs. Given an input program P , a strong backdoor into the target class C
is a preferably small set X of atoms such that for any truth assignment to
the atoms in X the program under the truth assignment (the reduct P , see
De nition 1) belongs to C. Then, for program P and a strong backdoor X into C
we have to consider 2jXj truth assignments to the atoms in the backdoor X.
Exploiting backdoors usually consists of two steps (i) nding a backdoor of
the given instance (backdoor detection) and (ii) applying the backdoor to the
instance, determining a candidate solution, and verifying its minimality (backdoor
evaluation).
      </p>
      <p>In this paper, we consider backdoor trees, which provide a more ne-grained
approach to the evaluation of strong backdoors, where we take partial assignments
in the evaluation into account. When using backdoors for a parameterized
complexity analysis one only considers the size k of a backdoor as a parameter.
Evaluating a given backdoor results in 2k (total) assignments to the atoms in
the backdoor and thus 2k programs with respect to the possible assignments.
However, a partial assignment to fewer than k atoms can already yield a program
that belongs to the xed target class. Therefore, we consider binary decision trees,
which make partial assignments to backdoor atoms in a program precise and
lead us to the notion of backdoor trees. We investigate under which conditions
(i) we need to consider signi cantly fewer than 2k assignment reducts and (ii) we
can signi cantly improve parts of the backdoor evaluation (minimality check) if
those assignments set only a small number of atoms to true.</p>
      <p>Our main contributions are as follows:
1. We de ne backdoor trees for Answer Set Programming, extend the concept of
backdoors from sets to trees (with similar steps detection and evaluation), and
establish that the reducts that we obtain from a backdoor tree are su cient
to nd all answer sets.
2. We show that backdoor tree evaluation is xed-parameter tractable when
parameterized by a composed parameter, which incorporates considerations
of (i) and (ii) from above of a given backdoor tree into Horn and other
classes.
3. We establish xed-parameter tractability for backdoor tree detection for
backdoor trees into the target class Horn.</p>
      <p>
        Related Work. Backdoors were originally introduced by Williams, Gomes, and
Selman [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ] as a tool for the theoretical analysis of decision heuristics in the area
of Sat and CSP. Nishimura et al. [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] started a systematic investigation of the
parameterized complexity of backdoor detection for SAT, which triggered a lot
of follow-up work [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Samer and Szeider [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] introduced backdoor trees for Sat
as a re nement of backdoors and showed that Sat is xed parameter tractable
when parameterized by the number of leaves in a backdoor tree. The problems
of detecting backdoor trees into 2CNF and Horn formulas are xed parameter
tractable.
2
2.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <sec id="sec-2-1">
        <title>Answer Set Programming</title>
        <p>We consider a universe U of propositional atoms. A literal is an atom a 2 U
or its negation a. A disjunctive logic program (or simply a program) P
is a set of rules of the form a1 _ : : : _ al b1; : : : ; bn; c1; : : : ; cm where
a1; : : : ; al; b1; : : : ; bn; c1; : : : ; cm are atoms and l; n; m are non-negative integers.
We write H(r) = fa1; : : : ; alg (the head of r), B+(r) = fb1; : : : ; bng (the positive
body of r), and B (r) = fc1; : : : ; cmg (the negative body of r). We denote the sets
of atoms occurring in a rule r or in a program P by at(r) = H(r) [ B+(r) [ B (r)
and at(P ) = Sr2P at(r), respectively. We denote the number of rules of P
by jP j = jf r : r 2 P gj. The size kP k of a program P is de ned as
Pr2P jH(r)j + jB+(r)j + jB (r)j. A rule r is is normal if jH(r)j 1, r is
a constraint (integrity rule) if jH(r)j = 0, r is Horn if it is positive and normal
or a constraint. We say that a program has a certain property if all its rules have
the property. Horn refers to the class of all Horn programs. We denote the class
of all normal programs by Normal. Let P and P 0 be programs. We say that P 0
is a subprogram of P (in symbols P 0 P ) if for each rule r0 2 P 0 there is some
rule r 2 P with H(r0) H(r), B+(r0) B+(r), B (r0) B (r). Let C be a
class of programs. We call a class C of programs hereditary if for each P 2 C all
subprograms of P are in C as well.</p>
        <p>
          A set M of atoms satis es a rule r if (H(r) [ B (r)) \ M 6= ; or B+(r)nM 6=
;. M is a model of P if it satis es all rules of P . The Gelfond-Lifschitz (GL)
reduct of a program P under a set M of atoms is the program P M obtained
from P by rst removing all rules r with B (r) \ M 6= ; and then removing all z
where z 2 B (r) from the remaining rules r [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ]. M is an answer set (or stable
model ) of a program P if M is a minimal model of P M . We denote by AS(P ) the
set of all answer sets of P . A class C of programs is enumerable if for each P 2 C
we can compute AS(P ) in polynomial time.
        </p>
        <p>In this paper, we consider the following fundamental ASP problems for a given
program P : Consistency asks whether P has an answer set, Brave Reasoning
asks whether a belongs to some answer set of P , Skeptical Reasoning asks
whether a belongs to all answer sets of P , Counting asks to compute the
number of answer sets of P , and Enum asks to list all answer sets of P . We
denote by AspFull the family of all problems Consistency, Brave Reasoning,
Skeptical Reasoning, Counting, and Enum.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Parameterized Complexity</title>
        <p>
          We brie y give some background on parameterized complexity. For more detailed
information we refer to other sources [
          <xref ref-type="bibr" rid="ref11 ref12 ref19 ref31 ref34">11,12,19,31,34</xref>
          ]. An instance of a
parameterized problem L is a pair (I; k) 2 N for some nite alphabet . For
an instance (I; k) 2 N we call I the main part and k the parameter. kIk
denotes the size of I. L is xed-parameter tractable if there exist a computable
function f and a constant c such that we can decide by an algorithm whether
(I; k) 2 L in time O(f (k)kIkc). Such an algorithm is called an fpt-algorithm.
FPT is the class of all xed-parameter tractable decision problems. The class XP
of non-uniform polynomial-time tractable problems consists of all parameterized
decision problems that can be solved in polynomial time if the parameter is
considered constant. That is, (I; k) 2 L can be decided in time O(kIkf(k)) for
some computable function f .
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Backdoors of Answer Set Programs</title>
        <p>
          In the following, we brie y summarize the concept of ASP backdoors [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. A
(truth) assignment is a mapping : X ! f0; 1g de ned for a set X U of
atoms. For x 2 X, we de ne (x) = 1 (x). By 2X we denote the set of
all assignments : X ! f0; 1g. By 1(b) we denote the preimage 1(b) :=
f a : a 2 X; (a) = b g of the assignment for some truth value b 2 f0; 1g.
De nition 1 (Strong C-Backdoor [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]) Let P be a program, X a set of
atoms, and 2 2X an assignment. The reduct of P under is the logic
program P obtained from P by (i) removing all rules r with H(r) \ 1(1) 6= ;
or H(r) X; (ii) removing all rules r with B+(r) \ 1(0) 6= ;; (iii) removing
all rules r with B (r) \ 1(1) 6= ;; (iv) removing from the heads and bodies
of the remaining rules all literals a; a with a 2 X. Let C be a class of programs.
A set X of atoms is a strong C-backdoor of a program P if P 2 C for all
assignments 2 2X .
        </p>
        <p>By a minimal strong C-backdoor of a program P we mean a strong C-backdoor
of P that does not properly contain a smaller strong C-backdoor of P ; a smallest
strong C-backdoor of P is one of smallest cardinality.</p>
        <p>
          A result by Fichte and Szeider [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] states that all problems in AspFull are
xed-parameter tractable when parameterized by the size of a given strong
C-backdoor for an enumerable target class C Normal and that nding a strong
backdoor is also xed-parameter tractable for various target classes, including
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>Horn.</title>
        <p>3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Backdoor Trees of Answer Set Programs</title>
      <p>
        When we exploit a backdoor X of a program P to nd answer sets according
to a backdoor-based approach [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], the exponential blowup of the running time
depends only on the size of the backdoor X. Thus, we want to nd smallest
P
Px0x1
      </p>
      <p>Py0</p>
      <p>Px0
Px0;x1
Py0y1</p>
      <p>Py0y1</p>
      <p>Py0y1</p>
      <p>Py0y1
Py0y1y2
: : :</p>
      <p>Py0y1y2
: : :</p>
      <p>Py0y1y2
: : :</p>
      <p>Py0y1y2
: : :</p>
      <p>Py0y1y2
: : :</p>
      <p>Py0y1y2
: : :</p>
      <p>Py0y1y2
: : :</p>
      <p>Py0y1y2
: : :
(a) Constructed from the strong Horn-backdoor Y
(b) Constructed from the strong Horn-backdoor X
backdoors e ciently. Evaluation of backdoors then consists of two steps: (i)
computing the answer sets of the program P under the assignment for all 2 2X ,
which produces candidates for answer sets of P (or AS(P; X)1 for short), and
(ii) checking for each M 2 AS(P; X) whether M is a minimal model of P M . In
Step (i) we determine for each 2 2X the answer sets of the reducts P and then
check whether these answer sets give rise to an answer set of P . Consequently,
we have to consider all the 2jXj assignments in the worst case. However, there
are answer set programs where we can nd a backdoor X for which we do not
need all 2jXj assignments, as \shorter" assignments already yield a reduct that
belongs to the considered target class. More formally, there is an assignment 0
such that 0 1 ( 1 for some 2 2X and the reduct P 0 already belongs to
the target class C. Hence, when we incrementally assign truth values to atoms
instead of taking an assignment 2 2X , some atoms in can be irrelevant for
the question whether the reduct belongs to C.</p>
      <p>Interestingly, in some cases it is of advantage to use a backdoor that is not a
smallest backdoor into the target class C. We show this in the following example.
1 Formally, AS(P; X) := f M [</p>
      <p>Px0</p>
      <p>Px0
We observe that Y = fy0; : : : ; ym 1g is a smallest strong Horn-backdoor.
Figure 1(a) visualizes the assignments that we obtain when incrementally
constructing the reducts for 2 2Y . Obviously, we need all 2jY j reducts
since \removing" any atom from an assignment results in P 2= Horn. The
set X = fx0; : : : ; x2m 1g is also a strong backdoor into Horn. The set X is larger
than the set Y , but already for \shorter" assignments 0 than the assignment
reducts 2 2X we obtain that the reduct belongs to Horn. For instance, the
assignment 0 = fx1g yields the reduct Px1 = f y1 x0; x2; : : : ; x2m 1 g, which
belongs to Horn. Hence, we obtain only 2m + 1 reducts, see Figure 1(b).</p>
      <p>
        Example 1 shows that incrementally assigning backdoors can yield reducts
that belong to the considered target class even though not all atoms of the
backdoor are assigned. Then, larger backdoors can yield an exponentially smaller
number of such reducts. A main part for backdoor evaluation is to check whether
a model is a minimal model (\minimality check"). The task is co-NP-complete
in general, but xed-parameter tractable when parameterized by the size of a
smallest backdoor into a subclass of normal programs [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. For the minimality
check we have to consider all backdoor atoms that have been set to true by any
assignment. Hence the backdoor Y from Example 1 yields a signi cantly smaller
number of reducts, however for the minimality check we still have to consider
all subsets of Y . Conversely, we construct subsequently in Example 2 a program
where the number of assignments that we obtain from a smallest strong backdoor
can be arbitrarily larger than the maximum number of atoms in a backdoor that
have been set to true by any assignment on a much larger number of atoms.
Example 2. Let m be some positive integer. We de ne the following program:
Y = fy0; : : : ; ym 1g is a smallest strong Horn-backdoor and again Figure 1(a)
illustrates how we incrementally construct the reducts until P 2 Horn. Same
as in Example 1 we have a complete binary tree with 2m leaves. Further, we
easily observe that X = fx0; x1; : : : ; x2m 1g is a strong Horn-backdoor. Figure 2
visualizes the assignments that we obtain when incrementally constructing the
reducts 2 2X . There we have only 2m + 1 reducts where at most one atom is
set to true.
      </p>
      <p>Before we can make the observations from the previous examples precise,
we provide some basic de nitions. Let X be a set of atoms, T = (N; E; r) a
binary tree with root r, and a labeling that maps any node t 2 N to a
set (t) f a; a : a 2 X g. We denote by X1(t) the positive literals of the
labeling (t), i.e., X1(t) := (t) \ X. The corresponding assignment (t) of t is
the assignment (t) where (t)(a) = 1 if a 2 (t) and (t)(a) = 0 if a 2 (t).
The pair BT = (T; ) is a binary decision tree of P if X at(P ) and the following
conditions hold: (i) for the root r we have (r) = ;, (ii) for any two nodes t; t0 2 N ,
if t0 is a child of t, then either (t0) = (t) [ fag or (t0) = (t) [ fag for some
atom a 2 X n (1t), and (iii) for any three nodes t; t1; t2 2 N , if t1 and t2 are
children of t, then (t1) 6= (t2). We denote by at(BT ) the atoms occurring in
assignments of BT , i.e., at(BT ) := St2N (1t).</p>
      <p>Next, we give a de nition for backdoor trees of answer set programs.
De nition 2 Let P be a program and BT = (T; ) be a binary decision tree
of P where T = (N; E; r). The pair BT = (T; ) is a C-backdoor tree of P
if P 2 C for every leaf t 2 N and = (t). We denote by #leaves(BT)
the number of leaves of T , i.e., #leaves(BT ) := jf t : t is a leaf of T gj. We
denote by gs(BT ) the maximum number of atoms that have been set to true
by a corresponding assignment of any leaf of T , more speci cally, gs(BT ) :=
maxf jX1(t)j : t is a leaf of T g. For reasons explained below, we call gs(BT ) the
Gallo-Scutella parameter of BT .</p>
      <p>In other words, a backdoor tree of a program P is a binary decision tree where
the nodes of the tree are labeled by assignments 2 2X on subsets X at(P ), the
corresponding partial assignment of an inner node yields a reduct P that does
not belong to the considered target class, and the corresponding assignment of
a leaf yields a reduct P that belongs to the considered target class.</p>
      <sec id="sec-3-1">
        <title>Relationship to a Parameter by Gallo and Scutella</title>
        <p>
          Gallo and Scutella [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] introduced a hierarchy of classes of CNF formulas, with
the class of Horn formulas (each clause containing at most one positive literal)
forming its lowest level. They showed that for each level g of the hierarchy, there
are polynomial time algorithms fro checking whether a given formula belongs
to this level and whether a given formula from this level is satis able. The
order of the polynomial bounding the running time, however, depends on the
level k. Therefore these algorithms do not establish xed-parameter tractability
of these problems, and only render the problems as being in the class XP (see
Subsection 2.2).
        </p>
        <p>We consider the parameter in its original context and de nition as nested
classes of families of sets on a family to generalize Horn formulas. Let S be a family
of sets S1; : : : ; Sm, SX = S n f Y 2 S : X Y g, and S X := f S n X : S 2 S g
for some set X. Moreover, (i) S 2 0 if and only if jSj 1 for each S 2 S and
(ii) S 2 k if and only if there is some v 2 S1 i m Si such that Sfvg 2 k 1 and
S fvg 2 k. Then, the class k consists of all propositional formulas F such
that F 0 2 k where F 0 is obtained from F by removing all negative literals (note
that we consider F 0 as a set of clauses and a clause is a set of literals). Observe
that 0 consists of all Horn formulas.</p>
        <p>A backdoor tree of F into Horn formulas is a binary decision tree where the
reduced formula F is Horn for each leaf t and its corresponding assignment .
Proposition 3 (?2) A propositional formula F belongs to k if and only if there
is a backdoor tree BT = (T; ) into Horn formulas of F such that gs(BT ) k.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Backdoor Tree Evaluation</title>
      <p>In this section, we establish an analogue to backdoor evaluation for backdoor
trees. Again we consider the reducts P together with the atoms that are set to
true and extend this notion to the corresponding assignments of the leaves for
binary decision trees.</p>
      <p>De nition 4 Let P be a program, X = at(P ), and BT = (T; ) a binary
decision tree.</p>
      <p>AS(P; ) :=f M [ 1(1) : M 2 AS(P ) g and</p>
      <p>AS(P; BT ) :=f M : t is a leaf of T; = (t); M 2 AS(P; ) g:</p>
      <p>In other words, the sets in AS(P; BT ) are answer sets of P for assignments
to (t) \ at(P ) extended by those atoms which are set to true by . In the
following lemma we will see that the elements in AS(P; BT ) are all the \answer
set candidates" of the original program P . The concepts are similar to ASP
backdoors, but slightly more sophisticated.</p>
      <p>Lemma 5 (?) Let P be a program and BT = (T; ) a binary decision tree of P .
Then, AS(P ) AS(P; BT ).
2 Due to space limitations, proofs of statements marked with \(?)" have been omitted.
Theorem 6 Given a disjunctive program P , an enumerable class C Normal,
and a C-backdoor tree BT = (T; r; ) of P . Let g = gs(BT ), ` = #leaves(BT ),
and n be the input size of P . Then, the problems in AspFull can be solved in
time O(` 2g nc) for some constant c.</p>
      <p>Recall that Example 2 yields programs that have a C-backdoor tree BT with
Gallo-Scutella parameter gs(BT ) = 1 and 2m + 1 leaves whereas a smallest
backdoor is of size m. Backdoor evaluation [16, Thm. 3.9] yields a running
time O(22mnc) for some constant c and input size n of program P . In contrast,
using Theorem 6 we can evaluate the backdoor tree BT in time O(2(2m + 1) nc).
Consequently, we obtain an exponential speedup for certain programs. In the
next section, we will compare backdoor trees with backdoors in more detail.</p>
      <p>Before proving Theorem 6, we need to make some observations. In view of
Lemma 5 we have to consider the corresponding reducts of the leaves t in the
backdoor tree. For each leaf t and its corresponding assignment we construct
the reduct P and compute the set AS(P ). Then, we obtain the set AS(P ) by
checking for each M 2 AS(P ) whether it gives rise to an answer set of P . The
crucial part is again to consider minimality with respect to the Gelfond-Lifschitz
reduct. For the leaf t and its corresponding assignment we can guarantee
minimality with respect to the reduct (P )M . Setting atoms to true by the
assignment does apparently not guarantee minimality with respect to P M (cf.
Lemma 5). Hence, we have to check for each atom in 1(1) whether there is a
\justi cation" to set the atom to true.</p>
      <p>We establish the following result.</p>
      <p>Proposition 7 (?) Let C Normal. Given a program P of input size n, a
C-backdoor tree BT = (T; ) of P of Gallo-Scutella parameter g = gs(BT ), a
leaf t of T , and a set M AS(P; (t)) of atoms, we can check in time O(2g n)
whether M is an answer set of P .</p>
      <sec id="sec-4-1">
        <title>We are now in position to establish Theorem 6.</title>
        <p>Proof of of Theorem 6. Let BT = (T; r; ) be the given C-backdoor tree, g =
gs(BT ), ` = #leaves(BT ), T = (N; E; r), and n the input size of P . According
to Lemma 5, AS(P ) AS(P; BT ). Since P 2 C and C is enumerable, we can
compute AS(P ) in polynomial time for each leaf t 2 N and = (t), say in
tim=e O((tn).cB)yfoPrrsoopmoesictoionnst7a,nwtec.cHanendceec,idjAeSw(hPet)hjer MO(n2cA)fSo(rPe)acihn lteimafetO2(N2g anncd)
and jAS(P; )j O(2g nc) for each M 2 AS(P; ) where = (t) and t is a
leaf of T . Since there are at most l many leaves, we can compute AS(P; T ) and
g nc) and
check whether for Mg 2nAc)S.(PT;hTen) awlesocMan 2alsAoSs(oPlv)ehaollldpsrionbtleimmes Oin(`As2pFull from
jAS(P; T )j O(` 2
AS(P ) within polynomial time. Consequently, the problem is xed-parameter
tractable when parameterized by g + `.
tu</p>
        <p>There are two factors for hardness of ASP problems when parameterized
by the Gallo-Scutella parameter plus the size a backdoor tree (i) atoms that
are set to true which yield potential candidates and are hence important for
the minimality check in each leaf; and (ii) leaves in a backdoor tree which yield
the reducts we have to consider. Both factors of hardness are \used" in the
proof of Theorem 6. Hence, in contrast to Sat backdoor trees we do not simply
parameterize the reasoning problems in AspFull by #leaves(BT ) of a given
backdoor tree BT = (T; ) of P to obtain a more re ned view on backdoors.
Instead we also consider gs(BT ) which is the maximum number of atoms that
are set to true in a leaf of T . This is attributed to the minimality check where
we have to consider the number of atoms that are set to true.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Relation to Backdoors</title>
      <p>In this section, we investigate some connections between backdoors and backdoor
trees. We show that our composed parameter based on backdoor trees is more
general than the size of a backdoor.</p>
      <p>Lemma 8 (?) Let P be a program and C be a hereditary class of programs. If
BT is a C-backdoor tree of P , then at(BT ) is a strong C-backdoor of P .</p>
      <sec id="sec-5-1">
        <title>We make the following observations about binary decision trees.</title>
        <p>Observation 9 (?) Let BT be a binary decision tree, n = jat(BT )j, g = gs(BT ),
and ` = #leaves(BT ). Then, g n ` 1 (1 + n)g 1.</p>
        <p>We establish that every strong backdoor of size k yields a backdoor tree
consisting of at least k + 1 leaves and at most 2k leaves.</p>
        <p>Lemma 10 (?) Let P be a program, C a hereditary class of programs, X a strong
C-backdoor of smallest size of P , and BT = (T; ) a C-backdoor tree of smallest
number of leaves of P . Then, jXj + 1 #leaves(BT ) 2jXj.</p>
        <p>The next observation states that we obtain fewer \answer set candidates"
when evaluating ASP backdoor trees than by evaluating ASP backdoors.
Observation 11 (?) Let P be a program, BT = (T; ) a binary decision tree
of P , X := at(BT ), and AS(P; X) := f M [ 1(1) : 2 2X\ at(P ); M 2 AS(P ) g.
Then, AS(P; BT ) AS(P; X).</p>
        <p>Lemma 12 (?) Let P be a program, C a hereditary class of programs, X a strong
C-backdoor of smallest size of P , and BT = (T; ) a C-backdoor tree of smallest
Gallo-Scutella parameter gs(BT ) of P . Then, gs(BT ) jXj.</p>
        <p>
          Besides having the potential of an exponential speedup (see Example 2), we
can trivially construct from a strong C-backdoor X a C-backdoor tree of P with
g = gs(BT ) and ` = #leaves(BT ) by xing an arbitrary order on the atoms in X
and constructing incrementally all partial assignments until P 2 C or assigns
all atoms in X. Therefore, we have to consider at most 2k+1 1 reducts as we
xed the order on the backdoor atoms. Using the standard backdoor approach
requires to solve the problems in AspFull a running time O(22jXjnc) [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] for some
constant c. By Theorem 6 we can produce solutions in time O(2g+log ` nc) for
some constant c. Since g k and log ` k by Lemmas 12 and 10, 22jXj 2g+log `.
In that way, backdoor trees can only improve the e ciency compared to the
traditional backdoor approach.
6
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Backdoor Tree Detection</title>
      <p>
        When we want to exploit backdoor trees to solve a problem instance, we have to
detect the backdoor tree rst. In this section, we show that detecting
Horn-backdoor trees is xed-parameter tractable when parameterized by Gallo-Scutella
parameter and number of leaves. We establish our xed-parameter tractability
results via kernelization, which is in parameterized complexity theory a
fundamental method for establishing such results [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Intuitively, we can think of
a kernel as a \compressed" version of the input, where the size of a kernel is
bounded by some computable function of the parameter only and the kernel
is produced by a polynomial-time reduction. However, here we need a more
restrictive notion of a kernel, loss-free kernels [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ], which also occur in the context
of subset minimization under the notion of a full kernel [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. A loss-free kernel
contains the union of all minimal solutions and represents in a certain way all
solutions.
      </p>
      <p>We rst de ne the following decision problem:
C-Backdoor-Tree Detection(GS,Leaves)
Given: A program P , an integer g 0, and an integer ` 0.
Parameter: The integer g + `.</p>
      <p>Task: Decide whether P has a C-backdoor tree BT of Gallo-Scutella
parameter gs(BT ) g and #leaves(BT ) `.</p>
      <p>
        By self-reduction (or self-transformation) [
        <xref ref-type="bibr" rid="ref11 ref12 ref38">38,11,12</xref>
        ], we can use a decision
algorithm for C-Backdoor-Tree Detection(GS,Leaves) to actually nd the
backdoor. Again we only require the target class to be hereditary.
Lemma 13 (?) Let C be a hereditary class of programs. If C-Backdoor-Tree
Detection(GS,Leaves) is xed-parameter tractable, then also nding a
C-backdoor tree of a given program P of Gallo-Scutella parameter at most g and at
most ` leaves is xed-parameter tractable (when parameterized by g + `).
      </p>
      <p>
        In the following, we consider backdoor tree detection when parameterized by
the Gallo-Scutella parameter g and the number of leaves ` of a backdoor tree.
Therefore, we consider notions coined by Samer and Szeider [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] in the setting of
propositional satis ability and apply it to Answer Set Programming.
Theorem 14 The problem Horn-Backdoor-Tree Detection(GS,Leaves)
is xed-parameter tractable.
      </p>
      <p>The main ingredient for the proof is that we obtain in polynomial-time an
input program a set K of atoms of size at most k2 + k such that we preserve the
union of all minimal strong Horn-backdoors of size at most k (Lemma 16). In
the previous section, we observed that k is bounded by 2`. Then, because of the
loss-less kernel we can enumerate all C-backdoor trees by brute-force and check
for each tree whether the desired parameters are present.</p>
      <p>Before we can establish the result, we introduce the notion of a loss-free
kernelization for ASP and show how to nd such kernels for the problem Strong
Horn-Backdoor Detection.</p>
      <p>De nition 15 Let C be a class of programs. A loss-free kernelization of the
problem Strong C-Backdoor Detection is a polynomial-time algorithm that
given an instance (I; k), either correctly decides that I does not have a strong
C-backdoor of size at most k, or computes a set K at(P ) such that the following
conditions hold:
1. X K for every minimal strong C-backdoor X of size at most k and
2. there is a computable function f such that jKj f (k).</p>
      <p>
        Lemma 16 ([
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]) The problem Strong Horn-Backdoor Detection has a
loss-free kernelization with loss-free kernels of size k2 + k.
      </p>
      <sec id="sec-6-1">
        <title>We are now in position to establish Theorem 14.</title>
        <p>Proof of Theorem 14. Let C be a class of programs, P a program, g; ` &gt; 0 integers,
and k := 2`. According to Lemma 16, we compute in polynomial-time for the
problem Strong Horn-Backdoor Detection a loss-free kernel K at(P )
of size at most k2 + k (if it exists). If P has a C-backdoor tree BT = (T; ) of
Gallo-Scutella parameter g and at most ` leaves, then at(BT ) is a minimal strong
C-backdoor, g at(BT ), and #leaves(BT ) ` 1. We claim that at(BT ) K
for any C-backdoor tree BT with gs(BT ) g and ` #leaves(BT ). This follows
since at(BT ) contains all minimal strong C-backdoors of size at most k and K is
a loss-free kernel. To actually nd a suitable C-backdoor tree, we can just try
in brute-force all possible C-backdoor trees of P of Gallo-Scutella parameter at
most g and of at most ` leaves. Consequently, the theorem follows.
tu</p>
        <p>In view of this result we can drop the assumption in Theorem 6 that the
backdoor is provided as input:
Corollary 17 Let C Normal be an enumerable class. The problems in
AspFull are all xed-parameter tractable when parameterized by gs(BT ) +
#leaves(BT ) of a smallest gs(BT ) + #leaves(BT ) C-backdoor tree BT .
Proof. Let P be a program and k an integer. Since there are only linearly many
combinations for k = g + l, we can use Lemma 13 to nd a C-backdoor tree BT
of smallest gs(BT ) + #leaves(BT ) where gs(BT ) g and #leaves(BT ) l if it
exists. The remainder follows from Theorem 6.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Discussion and Future Work</title>
      <p>We have introduced backdoor trees to Answer Set Programming. The general
concept is similar to the Sat setting but requires additional considerations. The
minimality check, which is necessary to verify minimality of potential answer
set candidates with respect to the Gelfond-Lifschitz reduct, yields to additional
requirements. Therefore, we parameterize the problem of backdoor tree evaluation
by a parameter composed of the number of leaves of a backdoor tree and maximum
number of atoms that are set to true by a corresponding assignment in a leaf.
The former part is crucial to bound the number of potential reducts and hence to
bound the number of answer set candidates. The latter part is crucial to bound
the number of atoms in any assignment, which we additionally have to consider
for the minimality check.</p>
      <p>Our parameterization raises the question of whether we can drop one part
from the composed parameter. On the one hand, one could parameterize the
evaluation problem just by the number of leaves of the backdoor tree, which
yields xed-parameter tractability, but then the evaluation algorithm does not
necessarily yield any speedup in the algorithm since we still have to consider
the minimality check where a bound on the number of leaves does not pay
o when using our minimality check approach. In other words, the evaluation
problem is xed-parameter tractable when parameterized by the number of
leaves of backdoor tree. We obtain a parameter that might be signi cantly
smaller, but the running time of the evaluation algorithm can be signi cantly
worse (exponentially). On the other hand, one could parameterize the evaluation
problem just by the Gallo-Scutella parameter (the maximal number of atoms that
we have to set to true in any leaf) of the backdoor tree. Since the Gallo-Scutella
parameter of a backdoor tree can be arbitrarily small compared to the number
of leaves of a backdoor tree (and hence the size of a smallest backdoor), we
obtain an arbitrarily smaller parameter. However, since our upper bound for
the number of reducts is (1 + n)g, where n is the number of atoms of the given
program and g the Gallo-Scutella parameter of the backdoor tree, the number
of reducts remains non-uniformly bounded. Hence, it remains open whether
we obtain xed-parameter tractability. Moreover, the backdoor tree detection
problem when parameterized by the Gallo-Scutella parameter is only known to
be in XP and the question of whether it can be carried out in xed-parameter
tractable time is currently open.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abseher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musliu</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Shift design with answer set programming</article-title>
          . In: Calimeri,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Ianni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Truszczynski</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR'15)</source>
          . pp.
          <volume>32</volume>
          {
          <fpage>39</fpage>
          . Springer Verlag, Lexington,
          <string-name>
            <surname>KY</surname>
          </string-name>
          , USA (Sep
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faber</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>WASP: A native ASP solver based on constraint learning</article-title>
          . In: Cabalar,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Son</surname>
          </string-name>
          , T. (eds.)
          <source>Proceedings of the 12th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'13), Lecture Notes in Computer Science</source>
          , vol.
          <volume>8148</volume>
          , pp.
          <volume>54</volume>
          {
          <fpage>66</fpage>
          . Springer Verlag, Corunna,
          <source>Spain (Sep</source>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Advances in WASP</article-title>
          . In: Calimeri,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Ianni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Truszczynski</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR'15)</source>
          . pp.
          <volume>40</volume>
          {
          <fpage>54</fpage>
          . Springer Verlag, Lexington,
          <string-name>
            <surname>KY</surname>
          </string-name>
          , USA (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Andres</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rajaratnam</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sabuncu</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Integrating ASP into ROS for reasoning in robots</article-title>
          . In: Calimeri,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Ianni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Truszczynski</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR'15)</source>
          . pp.
          <volume>69</volume>
          {
          <fpage>82</fpage>
          . Springer Verlag, Lexington,
          <string-name>
            <surname>KY</surname>
          </string-name>
          , USA (Sep
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Apt</surname>
            ,
            <given-names>K.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Blair</surname>
            ,
            <given-names>H.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walker</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Towards a theory of declarative knowledge. Foundations of deductive databases and logic programming pp</article-title>
          .
          <volume>89</volume>
          {
          <issue>148</issue>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ben-Eliyahu</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dechter</surname>
          </string-name>
          , R.:
          <article-title>Propositional semantics for disjunctive logic programs</article-title>
          .
          <source>Ann. Math. Artif. Intell</source>
          .
          <volume>12</volume>
          (
          <issue>1</issue>
          ),
          <volume>53</volume>
          {
          <fpage>87</fpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bliem</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ordyniak</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Clique-width and directed width measures for answer-set programming</article-title>
          . In: Fox,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Kaminka</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 22nd European Conference on Arti cial Intelligence (ECAI'16)</source>
          . The Hague,
          <source>Netherlands (Aug</source>
          <year>2016</year>
          ), to appear.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Calimeri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ianni</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The third open answer set programming competition</article-title>
          .
          <source>Theory Pract</source>
          . Log. Program.
          <volume>14</volume>
          ,
          <issue>117</issue>
          {
          <issue>135</issue>
          (1
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Damaschke</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Parameterized enumeration, transversals, and imperfect phylogeny reconstruction</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>351</volume>
          (
          <issue>3</issue>
          ),
          <volume>337</volume>
          {
          <fpage>350</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Denecker</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vennekens</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bond</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Truszczynski</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The second answer set programming competition</article-title>
          . In: Erdem,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Schaub</surname>
          </string-name>
          , T. (eds.)
          <source>Proceedings of the 10th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'09), Lecture Notes in Computer Science</source>
          , vol.
          <volume>5753</volume>
          , pp.
          <volume>637</volume>
          {
          <fpage>654</fpage>
          . Springer Verlag, Potsdam, Germany (Sep
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Downey</surname>
            ,
            <given-names>R.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fellows</surname>
            ,
            <given-names>M.R.: Parameterized</given-names>
          </string-name>
          <string-name>
            <surname>Complexity</surname>
          </string-name>
          . Monographs in Computer Science, Springer Verlag, New York, NY, USA (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Downey</surname>
            ,
            <given-names>R.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fellows</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          :
          <source>Fundamentals of Parameterized Complexity. Texts in Computer Science</source>
          , Springer Verlag, London, UK (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Eiter</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottlob</surname>
          </string-name>
          , G.:
          <article-title>On the computational cost of disjunctive logic programming: Propositional case</article-title>
          .
          <source>Ann. Math. Artif. Intell</source>
          .
          <volume>15</volume>
          (
          <issue>3</issue>
          {4),
          <volume>289</volume>
          {
          <fpage>323</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Fichte</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hecher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Answer set solving with bounded treewidth revisited</article-title>
          . In: Balduccini,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Janhunen</surname>
          </string-name>
          , T. (eds.)
          <source>Proceedings of the 14th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'17). Lecture Notes in Computer Science</source>
          , vol.
          <volume>10377</volume>
          . Springer Verlag, Espoo,
          <source>Finland (Jul</source>
          <year>2017</year>
          ), to appear.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Fichte</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kronegger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A multiparametric view on answer set programming</article-title>
          . In: Bogaerts,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Harrison</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Informal Proceedings of the 10th Workshop on Answer Set Programming and Other Computing Paradigms (ASPOCP'17)</source>
          (
          <year>2017</year>
          ), to appear.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Fichte</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeider</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Backdoors to normality for disjunctive logic programs</article-title>
          .
          <source>ACM Trans. Comput. Log</source>
          .
          <volume>17</volume>
          (
          <issue>1</issue>
          ) (Oct
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Fichte</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeider</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Backdoors to tractable answer-set programming</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>220</volume>
          (
          <issue>0</issue>
          ),
          <volume>64</volume>
          {
          <fpage>103</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Fichte</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Truszczynski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Dual-normal programs { the forgotten class</article-title>
          .
          <source>Theory Pract</source>
          . Log. Program. (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Flum</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grohe</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Parameterized Complexity Theory, Theoretical Computer Science, vol. XIV. Springer Verlag, Berlin (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Gallo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scutella</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          :
          <article-title>Polynomially solvable satis ability problems</article-title>
          .
          <source>Information Processing Letters</source>
          <volume>29</volume>
          (
          <issue>5</issue>
          ),
          <volume>221</volume>
          {
          <fpage>227</fpage>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Gaspers</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeider</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Backdoors to satisfaction</article-title>
          . In: Bodlaender,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Downey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Fomin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Marx</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.)
          <source>The Multivariate Algorithmic Revolution and Beyond, Lecture Notes in Computer Science</source>
          , vol.
          <volume>7370</volume>
          , pp.
          <volume>287</volume>
          {
          <fpage>317</fpage>
          . Springer Verlag, Heidelberg, Germany (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Gaspers</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeider</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Guarantees and limits of preprocessing in constraint satisfaction and reasoning</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>216</volume>
          (
          <issue>0</issue>
          ),
          <volume>1</volume>
          {
          <fpage>19</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glase</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sabuncu</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Matchmaking with answer set programming</article-title>
          . In: Cabalar,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Son</surname>
          </string-name>
          , T.C. (eds.)
          <source>Proceedings of 12th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'13). Lecture Notes in Computer Science</source>
          , vol.
          <volume>8148</volume>
          , pp.
          <volume>342</volume>
          {
          <fpage>347</fpage>
          . Springer Verlag, Corunna,
          <source>Spain (Sep</source>
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminski</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Kaufmann,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Schaub</surname>
          </string-name>
          , T.:
          <article-title>Multi-Criteria Optimization in Answer Set Programming</article-title>
          . In: Gallagher,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Gelfond</surname>
          </string-name>
          , M. (eds.)
          <source>Technical Communications of the 27th International Conference on Logic Programming (ICLP'11)</source>
          .
          <source>Leibniz International Proceedings in Informatics (LIPIcs)</source>
          , vol.
          <volume>11</volume>
          , pp.
          <volume>1</volume>
          {
          <fpage>10</fpage>
          .
          <string-name>
            <surname>Dagstuhl</surname>
            <given-names>Publishing</given-names>
          </string-name>
          , Lexington,
          <string-name>
            <surname>KY</surname>
          </string-name>
          , USA (Jul
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminski</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Kaufmann,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Schaub</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>Answer Set Solving in Practice</article-title>
          . Morgan &amp;
          <string-name>
            <surname>Claypool</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaufmann</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminski</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostrowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schneider</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Potassco: The Potsdam answer set solving collection</article-title>
          .
          <source>AI</source>
          Communications
          <volume>24</volume>
          (
          <issue>2</issue>
          ),
          <volume>107</volume>
          {
          <fpage>124</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The design of the sixth answer set programming competition</article-title>
          . In: Calimeri,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Ianni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Truszczynski</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR'15)</source>
          . pp.
          <volume>531</volume>
          {
          <fpage>544</fpage>
          . Springer Verlag, Lexington,
          <string-name>
            <surname>KY</surname>
          </string-name>
          , USA (Sep
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Gebser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maratea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>What's hot in the answer set programming competition</article-title>
          . In: Schuurmans,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Wellman</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.P</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 30th AAAI Conference on Arti cial Intelligence (AAAI'16)</source>
          . pp.
          <volume>4327</volume>
          {
          <fpage>4329</fpage>
          . The AAAI Press, Phoenix, Arizona, USA (Feb
          <year>2016</year>
          ), http://www.aaai.org/ocs/index.php/ AAAI/AAAI16/paper/view/12233
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Gelfond</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lifschitz</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The stable model semantics for logic programming</article-title>
          . In: Kowalski,
          <string-name>
            <given-names>R.A.</given-names>
            ,
            <surname>Bowen</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the 5th International Conference and Symposium on Logic Programming (ICLP/SLP'88)</source>
          . vol.
          <volume>2</volume>
          , pp.
          <volume>1070</volume>
          {
          <fpage>1080</fpage>
          . MIT Press, Seattle, WA, USA (
          <year>August 1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Gelfond</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lifschitz</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Classical negation in logic programs</article-title>
          and disjunctive databases.
          <source>New Generation Comput</source>
          .
          <volume>9</volume>
          (
          <issue>3</issue>
          /4),
          <volume>365</volume>
          {
          <fpage>386</fpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeider</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Fixed-parameter algorithms for arti cial intelligence, constraint satisfaction and database problems</article-title>
          .
          <source>The Computer Journal</source>
          <volume>51</volume>
          (
          <issue>3</issue>
          ),
          <volume>303</volume>
          {
          <fpage>325</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Jakl</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pichler</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Answer-set programming with bounded treewidth</article-title>
          . In: Boutilier,
          <string-name>
            <surname>C</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the 21st International Joint Conference on Arti cial Intelligence (IJCAI'09)</source>
          . vol.
          <volume>2</volume>
          , pp.
          <volume>816</volume>
          {
          <fpage>822</fpage>
          . The AAAI Press, Pasadena, CA, USA (Jul
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Marek</surname>
            ,
            <given-names>V.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Truszczynski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Stable models and an alternative logic programming paradigm</article-title>
          . In: Apt,
          <string-name>
            <given-names>K.R.</given-names>
            ,
            <surname>Marek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.W.</given-names>
            ,
            <surname>Truszczynski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Warren</surname>
          </string-name>
          , D.S. (eds.)
          <source>The Logic Programming Paradigm: a 25-Year Perspective</source>
          , pp.
          <volume>375</volume>
          {
          <fpage>398</fpage>
          .
          <string-name>
            <surname>Arti</surname>
          </string-name>
          cial Intelligence, Springer Verlag (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Niedermeier</surname>
          </string-name>
          , R.: Invitation to Fixed-Parameter
          <string-name>
            <surname>Algorithms</surname>
          </string-name>
          ,
          <source>Oxford Lecture Series in Mathematics and its Applications</source>
          , vol.
          <volume>31</volume>
          . Oxford University Press, New York, NY, USA (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35. Niemela,
          <string-name>
            <surname>I.</surname>
          </string-name>
          :
          <article-title>Logic programs with stable model semantics as a constraint programming paradigm</article-title>
          .
          <source>Ann. Math. Artif. Intell</source>
          .
          <volume>25</volume>
          (
          <issue>3</issue>
          ),
          <volume>241</volume>
          {
          <fpage>273</fpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Nishimura</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ragde</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeider</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Detecting backdoor sets with respect to Horn and binary clauses</article-title>
          .
          <source>In: Proceedings of SAT 2004 (Seventh International Conference on Theory and Applications of Satis ability Testing</source>
          ,
          <volume>10</volume>
          {13 May,
          <year>2004</year>
          , Vancouver, BC, Canada). pp.
          <volume>96</volume>
          {
          <issue>103</issue>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Samer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szeider</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Backdoor trees</article-title>
          . In: Holte,
          <string-name>
            <given-names>R.C.</given-names>
            ,
            <surname>Howe</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.E</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of 23rd Conference on Arti cial Intelligence (AAAI'08)</source>
          . pp.
          <volume>363</volume>
          {
          <fpage>368</fpage>
          . The AAAI Press, Chicago, IL, USA (
          <year>July 2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Schnorr</surname>
            ,
            <given-names>C.P.</given-names>
          </string-name>
          :
          <article-title>On self-transformable combinatorial problems</article-title>
          . In: Konig, H.,
          <string-name>
            <surname>Korte</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ritter</surname>
            ,
            <given-names>K</given-names>
          </string-name>
          . (eds.) Mathematical Programming at Oberwolfach,
          <source>Mathematical Programming Studies</source>
          , vol.
          <volume>14</volume>
          , pp.
          <volume>225</volume>
          {
          <fpage>243</fpage>
          . Springer Verlag (
          <year>1981</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Truszczynski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Trichotomy and dichotomy results on the complexity of reasoning with disjunctive logic programs</article-title>
          .
          <source>Theory Pract</source>
          . Log. Program.
          <volume>11</volume>
          ,
          <issue>881</issue>
          {
          <volume>904</volume>
          (11
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomes</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Selman</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>On the connections between backdoors, restarts, and heavy-tailedness in combinatorial search</article-title>
          .
          <source>In: Informal Proceedings of the 6th International Conference on Theory and Applications of Satis ability Testing (SAT'03)</source>
          . pp.
          <volume>222</volume>
          {
          <fpage>230</fpage>
          . Porto no,
          <issue>Italy</issue>
          (May
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>