<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Backdoor Trees for Answer Set Programming</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Johannes</forename><forename type="middle">K</forename><surname>Fichte</surname></persName>
							<email>johannes.fichte@tuwien.ac.at</email>
							<affiliation key="aff0">
								<orgName type="institution">TU Wien</orgName>
								<address>
									<settlement>Vienna</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stefan</forename><surname>Szeider</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">TU Wien</orgName>
								<address>
									<settlement>Vienna</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Backdoor Trees for Answer Set Programming</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4624BA509AF81520AC44E20CC6CE1051</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T08:12+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We translate the concept of backdoor trees from SAT to propositional Answer Set Programming (ASP). By means of backdoor trees we can reduce a reasoning task for a general ASP instance to reasoning tasks on several tractable ASP instances. We demonstrate that the number of tractable ASP instances can be drastically reduced in comparison to a related approach based on strong backdoors.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Answer Set Programming (ASP) is a popular framework for declarative modelling and problem solving <ref type="bibr" target="#b24">[25,</ref><ref type="bibr" target="#b32">33,</ref><ref type="bibr" target="#b34">35]</ref>. It has successfully been used to solve a wide variety of problems in artificial intelligence and reasoning, e.g., match making <ref type="bibr" target="#b22">[23]</ref>, optimization of packaging of Linux distributions <ref type="bibr" target="#b23">[24]</ref>, reasoning in robots <ref type="bibr" target="#b3">[4]</ref>, and shift design <ref type="bibr" target="#b0">[1]</ref>. In ASP, problems are usually modelled by means of rules and constraints that form a disjunctive logic program. The solutions to the program are the so-called answer sets (or stable models). Solving a problem means to search for answer sets of logic programs. In this paper, we are mainly interested in computational decision problems for propositional disjunctive ASP such as deciding whether a program has an answer set (Consistency), whether a certain atom is contained in at least one <ref type="bibr">(Brave Reasoning)</ref> or in all answer sets (Skeptical Reasoning). Further, we consider the problems counting all answer sets (Counting) and enumerating all answer sets (Enum).</p><p>Developers of modern ASP solvers such as Clasp <ref type="bibr" target="#b25">[26]</ref> or Wasp <ref type="bibr" target="#b2">[3]</ref> have demonstrated in several competitions <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b26">27,</ref><ref type="bibr" target="#b27">28]</ref> that ASP solving can be efficiently used to solve a wide variety of instances. However from the perspective of classical worst case complexity, many decision problems for disjunctive ASP are "harder than NP" and have a higher worst-case complexity than CSP and Sat. More precisely, the problems Consistency, Brave Reasoning, and Skeptical Reasoning are complete for the second level of the Polynomial Hierarchy <ref type="bibr" target="#b12">[13]</ref>.</p><p>In the literature, more fine-grained results on computational complexity of the ASP decision problems have been established. Syntactic properties where the input is restricted to certain fragments have been identified under which the computational complexity drops and where the problems can be solved more</p><p>The first author has been supported by the Austrian Science Fund (FWF), Grant Y698, and is also affiliated with the Institute of Computer Science and Computational Science at University of Potsdam, Germany.</p><p>efficiently <ref type="bibr" target="#b28">[29,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b38">39,</ref><ref type="bibr" target="#b17">18]</ref>. Parameterized complexity analyses, which take the input size of an instance along with a parameter, indicating the presence of a certain "hidden structure", have been carried out <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b13">14,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b31">32]</ref>. The central idea of parameterized complexity is that instances originating in practical applications are often structured in a way that facilitates obtaining a solution relatively fast. An interesting parameter can be gained from backdoors <ref type="bibr" target="#b15">[16]</ref>. Backdoors can be used as clever reasoning shortcuts through the search space. For a backdoor one usually fixes a class C of programs, commonly called target class, where the problem under consideration is computationally easier, e.g., the class of Horn programs. Given an input program P , a strong backdoor into the target class C is a preferably small set X of atoms such that for any truth assignment τ to the atoms in X the program under the truth assignment τ (the reduct P τ , see Definition 1) belongs to C. Then, for program P and a strong backdoor X into C we have to consider 2 |X| truth assignments to the atoms in the backdoor X. Exploiting backdoors usually consists of two steps (i) finding a backdoor of the given instance (backdoor detection) and (ii) applying the backdoor to the instance, determining a candidate solution, and verifying its minimality (backdoor evaluation).</p><p>In this paper, we consider backdoor trees, which provide a more fine-grained approach to the evaluation of strong backdoors, where we take partial assignments in the evaluation into account. When using backdoors for a parameterized complexity analysis one only considers the size k of a backdoor as a parameter. Evaluating a given backdoor results in 2 k (total) assignments to the atoms in the backdoor and thus 2 k programs with respect to the possible assignments. However, a partial assignment to fewer than k atoms can already yield a program that belongs to the fixed target class. Therefore, we consider binary decision trees, which make partial assignments to backdoor atoms in a program precise and lead us to the notion of backdoor trees. We investigate under which conditions (i) we need to consider significantly fewer than 2 k assignment reducts and (ii) we can significantly improve parts of the backdoor evaluation (minimality check) if those assignments set only a small number of atoms to true.</p><p>Our main contributions are as follows:</p><p>1. We define backdoor trees for Answer Set Programming, extend the concept of backdoors from sets to trees (with similar steps detection and evaluation), and establish that the reducts that we obtain from a backdoor tree are sufficient to find all answer sets. 2. We show that backdoor tree evaluation is fixed-parameter tractable when parameterized by a composed parameter, which incorporates considerations of (i) and (ii) from above of a given backdoor tree into Horn and other classes. 3. We establish fixed-parameter tractability for backdoor tree detection for backdoor trees into the target class Horn.</p><p>Related Work. Backdoors were originally introduced by Williams, Gomes, and Selman <ref type="bibr" target="#b39">[40]</ref> as a tool for the theoretical analysis of decision heuristics in the area of Sat and CSP. Nishimura et al. <ref type="bibr" target="#b35">[36]</ref> started a systematic investigation of the parameterized complexity of backdoor detection for SAT, which triggered a lot of follow-up work <ref type="bibr" target="#b20">[21]</ref>. Samer and Szeider <ref type="bibr" target="#b36">[37]</ref> introduced backdoor trees for Sat as a refinement of backdoors and showed that Sat is fixed parameter tractable when parameterized by the number of leaves in a backdoor tree. The problems of detecting backdoor trees into 2CNF and Horn formulas are fixed parameter tractable.</p><p>2 Preliminaries We write H(r) = {a 1 , . . . , a l } (the head of r), B + (r) = {b 1 , . . . , b n } (the positive body of r), and B − (r) = {c 1 , . . . , c m } (the negative body of r). We denote the sets of atoms occurring in a rule r or in a program P by at(r) = H(r) ∪ B + (r) ∪ B − (r) and at(P ) = r∈P at(r), respectively. We denote the number of rules of P by |P | = |{ r : r ∈ P }|. The size P of a program P is defined as</p><formula xml:id="formula_0">r∈P |H(r)| + |B + (r)| + |B − (r)|. A rule r is is normal if |H(r)| ≤ 1, r is a constraint (integrity rule) if |H(r)| = 0,</formula><p>r is Horn if it is positive and normal or a constraint. We say that a program has a certain property if all its rules have the property. Horn refers to the class of all Horn programs. We denote the class of all normal programs by Normal. Let P and P be programs. We say that P is a subprogram of P (in symbols P ⊆ P ) if for each rule r ∈ P there is some rule r ∈ P with H(r ) ⊆ H(r), B + (r ) ⊆ B + (r), B − (r ) ⊆ B − (r). Let C be a class of programs. We call a class C of programs hereditary if for each P ∈ C all subprograms of P are in C as well.</p><p>A set M of atoms satisfies a rule r if (H(r) ∪ B − (r)) ∩ M = ∅ or B + (r)\M = ∅. M is a model of P if it satisfies all rules of P . The Gelfond-Lifschitz (GL) reduct of a program P under a set M of atoms is the program P M obtained from P by first removing all rules r with B − (r) ∩ M = ∅ and then removing all z where z ∈ B − (r) from the remaining rules r <ref type="bibr" target="#b29">[30]</ref>. M is an answer set (or stable model ) of a program P if M is a minimal model of P M . We denote by AS(P ) the set of all answer sets of P . A class C of programs is enumerable if for each P ∈ C we can compute AS(P ) in polynomial time.</p><p>In this paper, we consider the following fundamental ASP problems for a given program P : Consistency asks whether P has an answer set, Brave Reasoning asks whether a belongs to some answer set of P , Skeptical Reasoning asks whether a belongs to all answer sets of P , Counting asks to compute the number of answer sets of P , and Enum asks to list all answer sets of P . We denote by AspFull the family of all problems Consistency, Brave Reasoning, Skeptical Reasoning, Counting, and Enum.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Parameterized Complexity</head><p>We briefly give some background on parameterized complexity. For more detailed information we refer to other sources <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b30">31,</ref><ref type="bibr" target="#b33">34]</ref>. An instance of a parameterized problem L is a pair (I, k) ∈ Σ * × N for some finite alphabet Σ. For an instance (I, k) ∈ Σ * × N we call I the main part and k the parameter. I denotes the size of I. L is fixed-parameter tractable if there exist a computable function f and a constant c such that we can decide by an algorithm whether</p><formula xml:id="formula_1">(I, k) ∈ L in time O(f (k) I c ). Such an algorithm is called an fpt-algorithm.</formula><p>FPT is the class of all fixed-parameter tractable decision problems. The class XP of non-uniform polynomial-time tractable problems consists of all parameterized decision problems that can be solved in polynomial time if the parameter is considered constant. That is, (I, k) ∈ L can be decided in time O( I f (k) ) for some computable function f .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Backdoors of Answer Set Programs</head><p>In the following, we briefly summarize the concept of ASP backdoors <ref type="bibr" target="#b16">[17]</ref>. A (truth) assignment is a mapping τ : X → {0, 1} defined for a set X ⊆ U of atoms. For x ∈ X, we define τ (x) = 1 − τ (x). By 2 X we denote the set of all assignments τ :</p><formula xml:id="formula_2">X → {0, 1}. By τ −1 (b) we denote the preimage τ −1 (b) := { a : a ∈ X, τ (a) = b } of the assignment τ for some truth value b ∈ {0, 1}.</formula><p>Definition 1 (Strong C-Backdoor <ref type="bibr" target="#b16">[17]</ref>) Let P be a program, X a set of atoms, and τ ∈ 2 X an assignment. The reduct of P under τ is the logic program P τ obtained from P by (i) removing all rules r with H(r) ∩ τ −1 (1) = ∅ or H(r) ⊆ X; (ii) removing all rules r with B + (r) ∩ τ −1 (0) = ∅; (iii) removing all rules r with B − (r) ∩ τ −1 (1) = ∅; (iv) removing from the heads and bodies of the remaining rules all literals a, ā with a ∈ X. Let C be a class of programs. A set X of atoms is a strong C-backdoor of a program P if P τ ∈ C for all assignments τ ∈ 2 X . By a minimal strong C-backdoor of a program P we mean a strong C-backdoor of P that does not properly contain a smaller strong C-backdoor of P ; a smallest strong C-backdoor of P is one of smallest cardinality.</p><p>A result by Fichte and Szeider <ref type="bibr" target="#b16">[17]</ref> states that all problems in AspFull are fixed-parameter tractable when parameterized by the size of a given strong C-backdoor for an enumerable target class C ⊆ Normal and that finding a strong backdoor is also fixed-parameter tractable for various target classes, including Horn.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Backdoor Trees of Answer Set Programs</head><p>When we exploit a backdoor X of a program P to find answer sets according to a backdoor-based approach <ref type="bibr" target="#b16">[17]</ref>, the exponential blowup of the running time depends only on the size of the backdoor X. Thus, we want to find smallest backdoors efficiently. Evaluation of backdoors then consists of two steps: (i) computing the answer sets of the program P under the assignment τ for all τ ∈ 2 X , which produces candidates for answer sets of P (or AS(P, X)<ref type="foot" target="#foot_0">1</ref> for short), and (ii) checking for each M ∈ AS(P, X) whether M is a minimal model of P M . In</p><p>Step (i) we determine for each τ ∈ 2 X the answer sets of the reducts P τ and then check whether these answer sets give rise to an answer set of P . Consequently, we have to consider all the 2 |X| assignments in the worst case. However, there are answer set programs where we can find a backdoor X for which we do not need all 2 |X| assignments, as "shorter" assignments already yield a reduct that belongs to the considered target class. More formally, there is an assignment τ such that τ −1 τ −1 for some τ ∈ 2 X and the reduct P τ already belongs to the target class C. Hence, when we incrementally assign truth values to atoms instead of taking an assignment τ ∈ 2 X , some atoms in τ can be irrelevant for the question whether the reduct belongs to C.</p><p>Interestingly, in some cases it is of advantage to use a backdoor that is not a smallest backdoor into the target class C. We show this in the following example. Example 1. Let m be some positive integer. Consider the following program:</p><formula xml:id="formula_3">P := { y 0 ∨ x 0 ← x 1 , . . . , x 2m } ∪ { y j ∨ x i ← x 0 . . . , x i−1 , x i+1 , . . . , x 2m−1 ; x 0 ← x 1 , . . . , x 2m−1 , ȳj ; x i ← x 0 , x i−1 , x i+1 , x 2m−1 , ȳj : j = (i mod m), 0 ≤ i &lt; 2m }.</formula><p>We observe that Y = {y 0 , . . . , y m−1 } is a smallest strong Horn-backdoor.</p><p>Figure <ref type="figure">1</ref>(a) visualizes the assignments that we obtain when incrementally constructing the reducts for τ ∈ 2 Y . Obviously, we need all 2 |Y | reducts since "removing" any atom from an assignment τ results in P τ / ∈ Horn. The set X = {x 0 , . . . , x 2m−1 } is also a strong backdoor into Horn. The set X is larger than the set Y , but already for "shorter" assignments τ than the assignment reducts τ ∈ 2 X we obtain that the reduct belongs to Horn. For instance, the assignment τ = {x 1 } yields the reduct P x1 = { y 1 ← x 0 , x 2 , . . . , x 2m−1 }, which belongs to Horn. Hence, we obtain only 2m + 1 reducts, see Figure <ref type="figure">1(b)</ref>.</p><p>Example 1 shows that incrementally assigning backdoors can yield reducts that belong to the considered target class even though not all atoms of the backdoor are assigned. Then, larger backdoors can yield an exponentially smaller number of such reducts. A main part for backdoor evaluation is to check whether a model is a minimal model ("minimality check"). The task is co-NP-complete in general, but fixed-parameter tractable when parameterized by the size of a smallest backdoor into a subclass of normal programs <ref type="bibr" target="#b16">[17]</ref>. For the minimality check we have to consider all backdoor atoms that have been set to true by any assignment. Hence the backdoor Y from Example 1 yields a significantly smaller number of reducts, however for the minimality check we still have to consider all subsets of Y . Conversely, we construct subsequently in Example 2 a program where the number of assignments that we obtain from a smallest strong backdoor can be arbitrarily larger than the maximum number of atoms in a backdoor that have been set to true by any assignment on a much larger number of atoms.</p><p>Example 2. Let m be some positive integer. We define the following program:</p><formula xml:id="formula_4">P := { y 0 ∨ x0 ← x1 , . . . , x2m−1 } ∪ { y j ∨ x i ← x0 . . . , xi−1 , xi+1 , . . . , x2m−1 ; x 0 ← x 1 , . . . , x 2m−1 , ȳj ; x i ← x0 , xi−1 , xi+1 , x2m−1 , ȳj : j = (i mod m), 0 ≤ i &lt; 2m }.</formula><p>Y = {y 0 , . . . , y m−1 } is a smallest strong Horn-backdoor and again Figure <ref type="figure">1(a)</ref> illustrates how we incrementally construct the reducts until P τ ∈ Horn. Same as in Example 1 we have a complete binary tree with 2 m leaves. Further, we easily observe that X = {x 0 , x 1 , . . . , x 2m−1 } is a strong Horn-backdoor. Figure <ref type="figure">2</ref> visualizes the assignments that we obtain when incrementally constructing the reducts τ ∈ 2 X . There we have only 2m + 1 reducts where at most one atom is set to true.</p><p>Before we can make the observations from the previous examples precise, we provide some basic definitions. Let X be a set of atoms, T = (N, E, r) a binary tree with root r, and χ a labeling that maps any node t ∈ N to a set χ(t) ⊆ { a, ā : a ∈ X }. We denote by X 1 (t) the positive literals of the labeling χ(t), i.e., X 1 (t) := χ(t) ∩ X. The corresponding assignment τ χ(t) of t is the assignment τ χ(t) where τ χ(t</p><formula xml:id="formula_5">) (a) = 1 if a ∈ χ(t) and τ χ(t) (a) = 0 if ā ∈ χ(t).</formula><p>The pair BT = (T, χ) is a binary decision tree of P if X ⊆ at(P ) and the following conditions hold: (i) for the root r we have χ(r) = ∅, (ii) for any two nodes t, t ∈ N , if t is a child of t, then either χ(t ) = χ(t) ∪ {ā} or χ(t ) = χ(t) ∪ {a} for some atom a ∈ X \ τ −1 χ(t) , and (iii) for any three nodes t, t 1 , t 2 ∈ N , if t 1 and t 2 are children of t, then χ(t 1 ) = χ(t 2 ). We denote by at(BT ) the atoms occurring in assignments of BT , i.e., at(BT ) := t∈N τ −1 χ(t) . Next, we give a definition for backdoor trees of answer set programs.</p><p>Definition 2 Let P be a program and BT = (T, χ) be a binary decision tree of P where T = (N, E, r). The pair BT = (T, χ) is a C-backdoor tree of P if P τ ∈ C for every leaf t ∈ N and τ = τ χ(t) . We denote by #leaves(BT) the number of leaves of T , i.e., #leaves(BT ) := |{ t : t is a leaf of T }|. We denote by gs(BT ) the maximum number of atoms that have been set to true by a corresponding assignment of any leaf of T , more specifically, gs(BT ) := max{ |X 1 (t)| : t is a leaf of T }. For reasons explained below, we call gs(BT ) the Gallo-Scutellà parameter of BT .</p><p>In other words, a backdoor tree of a program P is a binary decision tree where the nodes of the tree are labeled by assignments τ ∈ 2 X on subsets X ⊆ at(P ), the corresponding partial assignment τ of an inner node yields a reduct P τ that does not belong to the considered target class, and the corresponding assignment τ of a leaf yields a reduct P τ that belongs to the considered target class.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Relationship to a Parameter by Gallo and Scutellà</head><p>Gallo and Scutellà <ref type="bibr" target="#b19">[20]</ref> introduced a hierarchy of classes of CNF formulas, with the class of Horn formulas (each clause containing at most one positive literal) forming its lowest level. They showed that for each level g of the hierarchy, there are polynomial time algorithms fro checking whether a given formula belongs to this level and whether a given formula from this level is satisfiable. The order of the polynomial bounding the running time, however, depends on the level k. Therefore these algorithms do not establish fixed-parameter tractability of these problems, and only render the problems as being in the class XP (see Subsection 2.2).</p><p>We consider the parameter in its original context and definition as nested classes of families of sets on a family to generalize Horn formulas. Let S be a family of sets S 1 , . . . , S m , S X = S \ { Y ∈ S : X ⊆ Y }, and S − X := { S \ X : S ∈ S } for some set X. Moreover, (i) S ∈ Σ 0 if and only if |S| ≤ 1 for each S ∈ S and (ii) S ∈ Σ k if and only if there is some v ∈ 1≤i≤m S i such that S {v} ∈ Σ k−1 and S − {v} ∈ Σ k . Then, the class Γ k consists of all propositional formulas F such that F ∈ Σ k where F is obtained from F by removing all negative literals (note that we consider F as a set of clauses and a clause is a set of literals). Observe that Γ 0 consists of all Horn formulas.</p><p>A backdoor tree of F into Horn formulas is a binary decision tree where the reduced formula F τ is Horn for each leaf t and its corresponding assignment τ . Proposition 3 (<ref type="foot" target="#foot_2">2</ref> ) A propositional formula F belongs to Γ k if and only if there is a backdoor tree BT = (T, χ) into Horn formulas of F such that gs(BT ) ≤ k.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Backdoor Tree Evaluation</head><p>In this section, we establish an analogue to backdoor evaluation for backdoor trees. Again we consider the reducts P τ together with the atoms that are set to true and extend this notion to the corresponding assignments of the leaves for binary decision trees.</p><p>Definition 4 Let P be a program, X = at(P ), and BT = (T, χ) a binary decision tree.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>AS(P, τ</head><formula xml:id="formula_6">) :={ M ∪ τ −1 (1) : M ∈ AS(P τ ) } and AS(P, BT ) :={ M : t is a leaf of T, τ = χ(t), M ∈ AS(P, τ ) }.</formula><p>In other words, the sets in AS(P, BT ) are answer sets of P τ for assignments τ to χ(t) ∩ at(P ) extended by those atoms which are set to true by τ . In the following lemma we will see that the elements in AS(P, BT ) are all the "answer set candidates" of the original program P . The concepts are similar to ASP backdoors, but slightly more sophisticated. Lemma 5 ( ) Let P be a program and BT = (T, χ) a binary decision tree of P . Then, AS(P ) ⊆ AS(P, BT ).</p><p>Theorem 6 Given a disjunctive program P , an enumerable class C ⊆ Normal, and a C-backdoor tree BT = (T, r, χ) of P . Let g = gs(BT ), = #leaves(BT ), and n be the input size of P . Then, the problems in AspFull can be solved in time O( • 2 g • n c ) for some constant c.</p><p>Recall that Example 2 yields programs that have a C-backdoor tree BT with Gallo-Scutellà parameter gs(BT ) = 1 and 2m + 1 leaves whereas a smallest backdoor is of size m. Backdoor evaluation <ref type="bibr" target="#b15">[16,</ref><ref type="bibr">Thm. 3</ref>.9] yields a running time O(2 2m n c ) for some constant c and input size n of program P . In contrast, using Theorem 6 we can evaluate the backdoor tree BT in time O(2(2m + 1) • n c ). Consequently, we obtain an exponential speedup for certain programs. In the next section, we will compare backdoor trees with backdoors in more detail.</p><p>Before proving Theorem 6, we need to make some observations. In view of Lemma 5 we have to consider the corresponding reducts of the leaves t in the backdoor tree. For each leaf t and its corresponding assignment τ we construct the reduct P τ and compute the set AS(P τ ). Then, we obtain the set AS(P ) by checking for each M ∈ AS(P τ ) whether it gives rise to an answer set of P . The crucial part is again to consider minimality with respect to the Gelfond-Lifschitz reduct. For the leaf t and its corresponding assignment τ we can guarantee minimality with respect to the reduct (P τ ) M . Setting atoms to true by the assignment τ does apparently not guarantee minimality with respect to P M (cf. <ref type="bibr">Lemma 5)</ref>. Hence, we have to check for each atom in τ −1 (1) whether there is a "justification" to set the atom to true.</p><p>We establish the following result. whether M is an answer set of P .</p><p>We are now in position to establish Theorem 6.</p><p>Proof of of Theorem 6. Let BT = (T, r, χ) be the given C-backdoor tree, g = gs(BT ), = #leaves(BT ), T = (N, E, r), and n the input size of P . According to Lemma 5, AS(P ) ⊆ AS(P, BT ). Since P τ ∈ C and C is enumerable, we can compute AS(P τ ) in polynomial time for each leaf t ∈ N and τ = τ χ(t) , say in time O(n c ) for some constant c. Hence, |AS(P τ )| ≤ O(n c ) for each leaf t ∈ N and τ = τ χ(t) . By Proposition 7, we can decide whether</p><formula xml:id="formula_7">M ∈ AS(P ) in time O(2 g • n c ) and |AS(P, τ )| ≤ O(2 g • n c</formula><p>) for each M ∈ AS(P, τ ) where τ = τ χ(t) and t is a leaf of T . Since there are at most l many leaves, we can compute AS(P, T ) and check whether for M ∈ AS(P, T ) also M ∈ AS(P ) holds in time O( • 2 g • n c ) and</p><formula xml:id="formula_8">|AS(P, T )| ≤ O( • 2 g • n c</formula><p>). Then we can also solve all problems in AspFull from AS(P ) within polynomial time. Consequently, the problem is fixed-parameter tractable when parameterized by g + .</p><p>There are two factors for hardness of ASP problems when parameterized by the Gallo-Scutellà parameter plus the size a backdoor tree (i) atoms that are set to true which yield potential candidates and are hence important for the minimality check in each leaf; and (ii) leaves in a backdoor tree which yield the reducts we have to consider. Both factors of hardness are "used" in the proof of Theorem 6. Hence, in contrast to Sat backdoor trees we do not simply parameterize the reasoning problems in AspFull by #leaves(BT ) of a given backdoor tree BT = (T, χ) of P to obtain a more refined view on backdoors. Instead we also consider gs(BT ) which is the maximum number of atoms that are set to true in a leaf of T . This is attributed to the minimality check where we have to consider the number of atoms that are set to true.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Relation to Backdoors</head><p>In this section, we investigate some connections between backdoors and backdoor trees. We show that our composed parameter based on backdoor trees is more general than the size of a backdoor. Lemma 8 ( ) Let P be a program and C be a hereditary class of programs. If BT is a C-backdoor tree of P , then at(BT ) is a strong C-backdoor of P .</p><p>We make the following observations about binary decision trees. Observation 9 ( ) Let BT be a binary decision tree, n = |at(BT )|, g = gs(BT ), and = #leaves(BT ). Then,</p><formula xml:id="formula_9">g ≤ n ≤ − 1 ≤ (1 + n) g − 1.</formula><p>We establish that every strong backdoor of size k yields a backdoor tree consisting of at least k + 1 leaves and at most 2 k leaves. Lemma 10 ( ) Let P be a program, C a hereditary class of programs, X a strong C-backdoor of smallest size of P , and BT = (T, χ) a C-backdoor tree of smallest number of leaves of P . Then,</p><formula xml:id="formula_10">|X| + 1 ≤ #leaves(BT ) ≤ 2 |X| .</formula><p>The next observation states that we obtain fewer "answer set candidates" when evaluating ASP backdoor trees than by evaluating ASP backdoors. Observation 11 ( ) Let P be a program, BT = (T, χ) a binary decision tree of P , X := at(BT ), and AS(P, X) := { M ∪τ −1 (1) : τ ∈ 2 X∩ at(P ) , M ∈ AS(P τ ) }. Then, AS(P, BT ) ⊆ AS(P, X). Besides having the potential of an exponential speedup (see Example 2), we can trivially construct from a strong C-backdoor X a C-backdoor tree of P with g = gs(BT ) and = #leaves(BT ) by fixing an arbitrary order on the atoms in X and constructing incrementally all partial assignments τ until P τ ∈ C or τ assigns all atoms in X. Therefore, we have to consider at most 2 k+1 − 1 reducts as we fixed the order on the backdoor atoms. Using the standard backdoor approach requires to solve the problems in AspFull a running time O(2 2|X| n c ) <ref type="bibr" target="#b15">[16]</ref> for some constant c. By Theorem 6 we can produce solutions in time O(2 g+log • n c ) for some constant c. Since g ≤ k and log ≤ k by Lemmas 12 and 10, 2 2|X| ≥ 2 g+log . In that way, backdoor trees can only improve the efficiency compared to the traditional backdoor approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Backdoor Tree Detection</head><p>When we want to exploit backdoor trees to solve a problem instance, we have to detect the backdoor tree first. In this section, we show that detecting Horn-backdoor trees is fixed-parameter tractable when parameterized by Gallo-Scutellà parameter and number of leaves. We establish our fixed-parameter tractability results via kernelization, which is in parameterized complexity theory a fundamental method for establishing such results <ref type="bibr" target="#b21">[22]</ref>. Intuitively, we can think of a kernel as a "compressed" version of the input, where the size of a kernel is bounded by some computable function of the parameter only and the kernel is produced by a polynomial-time reduction. However, here we need a more restrictive notion of a kernel, loss-free kernels <ref type="bibr" target="#b36">[37]</ref>, which also occur in the context of subset minimization under the notion of a full kernel <ref type="bibr" target="#b8">[9]</ref>. A loss-free kernel contains the union of all minimal solutions and represents in a certain way all solutions.</p><p>We first define the following decision problem:</p><p>C-Backdoor-Tree Detection(GS,Leaves)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Given:</head><p>A program P , an integer g ≥ 0, and an integer ≥ 0. Parameter: The integer g + .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Task:</head><p>Decide whether P has a C-backdoor tree BT of Gallo-Scutellà parameter gs(BT ) ≤ g and #leaves(BT ) ≤ .</p><p>By self-reduction (or self-transformation) <ref type="bibr" target="#b37">[38,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>, we can use a decision algorithm for C-Backdoor-Tree Detection(GS,Leaves) to actually find the backdoor. Again we only require the target class to be hereditary. Lemma 13 ( ) Let C be a hereditary class of programs. If C-Backdoor-Tree Detection(GS,Leaves) is fixed-parameter tractable, then also finding a C-backdoor tree of a given program P of Gallo-Scutellà parameter at most g and at most leaves is fixed-parameter tractable (when parameterized by g + ).</p><p>In the following, we consider backdoor tree detection when parameterized by the Gallo-Scutellà parameter g and the number of leaves of a backdoor tree. Therefore, we consider notions coined by Samer and Szeider <ref type="bibr" target="#b36">[37]</ref> in the setting of propositional satisfiability and apply it to Answer Set Programming.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 14</head><p>The problem Horn-Backdoor-Tree Detection(GS,Leaves) is fixed-parameter tractable.</p><p>The main ingredient for the proof is that we obtain in polynomial-time an input program a set K of atoms of size at most k 2 + k such that we preserve the union of all minimal strong Horn-backdoors of size at most k (Lemma 16). In the previous section, we observed that k is bounded by 2 . Then, because of the loss-less kernel we can enumerate all C-backdoor trees by brute-force and check for each tree whether the desired parameters are present.</p><p>Before we can establish the result, we introduce the notion of a loss-free kernelization for ASP and show how to find such kernels for the problem Strong Horn-Backdoor Detection.</p><p>Definition 15 Let C be a class of programs. A loss-free kernelization of the problem Strong C-Backdoor Detection is a polynomial-time algorithm that given an instance (I, k), either correctly decides that I does not have a strong C-backdoor of size at most k, or computes a set K ⊆ at(P ) such that the following conditions hold:</p><p>1. X ⊆ K for every minimal strong C-backdoor X of size at most k and 2. there is a computable function f such that |K| ≤ f (k).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma 16 ([37])</head><p>The problem Strong Horn-Backdoor Detection has a loss-free kernelization with loss-free kernels of size k 2 + k.</p><p>We are now in position to establish Theorem 14.</p><p>Proof of Theorem 14. Let C be a class of programs, P a program, g, &gt; 0 integers, and k := 2 . According to Lemma 16, we compute in polynomial-time for the problem Strong Horn-Backdoor Detection a loss-free kernel K ⊆ at(P ) of size at most k 2 + k (if it exists). If P has a C-backdoor tree BT = (T, χ) of Gallo-Scutellà parameter g and at most leaves, then at(BT ) is a minimal strong C-backdoor, g ≤ at(BT ), and #leaves(BT ) ≤ − 1. We claim that at(BT ) ⊆ K for any C-backdoor tree BT with gs(BT ) ≤ g and ≤ #leaves(BT ). This follows since at(BT ) contains all minimal strong C-backdoors of size at most k and K is a loss-free kernel. To actually find a suitable C-backdoor tree, we can just try in brute-force all possible C-backdoor trees of P of Gallo-Scutellà parameter at most g and of at most leaves. Consequently, the theorem follows.</p><p>In view of this result we can drop the assumption in Theorem 6 that the backdoor is provided as input:</p><p>Corollary 17 Let C ⊆ Normal be an enumerable class. The problems in AspFull are all fixed-parameter tractable when parameterized by gs(BT ) + #leaves(BT ) of a smallest gs(BT ) + #leaves(BT ) C-backdoor tree BT .</p><p>Proof. Let P be a program and k an integer. Since there are only linearly many combinations for k = g + l, we can use Lemma 13 to find a C-backdoor tree BT of smallest gs(BT ) + #leaves(BT ) where gs(BT ) ≤ g and #leaves(BT ) ≤ l if it exists. The remainder follows from Theorem 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Discussion and Future Work</head><p>We have introduced backdoor trees to Answer Set Programming. The general concept is similar to the Sat setting but requires additional considerations. The minimality check, which is necessary to verify minimality of potential answer set candidates with respect to the Gelfond-Lifschitz reduct, yields to additional requirements. Therefore, we parameterize the problem of backdoor tree evaluation by a parameter composed of the number of leaves of a backdoor tree and maximum number of atoms that are set to true by a corresponding assignment in a leaf. The former part is crucial to bound the number of potential reducts and hence to bound the number of answer set candidates. The latter part is crucial to bound the number of atoms in any assignment, which we additionally have to consider for the minimality check.</p><p>Our parameterization raises the question of whether we can drop one part from the composed parameter. On the one hand, one could parameterize the evaluation problem just by the number of leaves of the backdoor tree, which yields fixed-parameter tractability, but then the evaluation algorithm does not necessarily yield any speedup in the algorithm since we still have to consider the minimality check where a bound on the number of leaves does not pay off when using our minimality check approach. In other words, the evaluation problem is fixed-parameter tractable when parameterized by the number of leaves of backdoor tree. We obtain a parameter that might be significantly smaller, but the running time of the evaluation algorithm can be significantly worse (exponentially). On the other hand, one could parameterize the evaluation problem just by the Gallo-Scutellà parameter (the maximal number of atoms that we have to set to true in any leaf) of the backdoor tree. Since the Gallo-Scutellà parameter of a backdoor tree can be arbitrarily small compared to the number of leaves of a backdoor tree (and hence the size of a smallest backdoor), we obtain an arbitrarily smaller parameter. However, since our upper bound for the number of reducts is (1 + n) g , where n is the number of atoms of the given program and g the Gallo-Scutellà parameter of the backdoor tree, the number of reducts remains non-uniformly bounded. Hence, it remains open whether we obtain fixed-parameter tractability. Moreover, the backdoor tree detection problem when parameterized by the Gallo-Scutellà parameter is only known to be in XP and the question of whether it can be carried out in fixed-parameter tractable time is currently open.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>1 Px 0 x 1 x 2 Px 0 x1 x 2 Fig. 1 :</head><label>1221</label><figDesc>Fig. 1: Illustration of reducts of the program P and the strong Horn-backdoors X and Y from Example 1. A gray colored node indicates that the respective program does not belong to Horn. A white colored node indicates that the respective program belongs to Horn.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>1 Fig. 2 :</head><label>12</label><figDesc>Fig. 2: A Horn-backdoor tree BT = (T, χ) of program R from Example 2.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Proposition 7 (</head><label>7</label><figDesc>) Let C ⊆ Normal. Given a program P of input size n, a C-backdoor tree BT = (T, χ) of P of Gallo-Scutellà parameter g = gs(BT ), a leaf t of T , and a set M ⊆ AS(P, τ χ(t) ) of atoms, we can check in time O(2 g • n)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Lemma 12 (</head><label>12</label><figDesc>) Let P be a program, C a hereditary class of programs, X a strong C-backdoor of smallest size of P , and BT = (T, χ) a C-backdoor tree of smallest Gallo-Scutellà parameter gs(BT ) of P . Then, gs(BT ) ≤ |X|.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>We consider a universe U of propositional atoms. A literal is an atom a ∈ U or its negation ā. A disjunctive logic program (or simply a program) P is a set of rules of the form a 1 ∨ . . . ∨ a l ← b 1 , . . . , b n , c1 , . . . , cm where a 1 , . . . , a l , b 1 , . . . , b n , c 1 , . . . , c m are atoms and l, n, m are non-negative integers.</figDesc><table><row><cell>2.1 Answer Set Programming</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Formally, AS(P, X) := { M ∪ τ −1 (1) : τ ∈</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">X∩ at(P ) , M ∈ AS(Pτ ) }.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_2">Due to space limitations, proofs of statements marked with "( )" have been omitted.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Shift design with answer set programming</title>
		<author>
			<persName><forename type="first">M</forename><surname>Abseher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Musliu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Calimeri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Ianni</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</editor>
		<meeting>the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15<address><addrLine>Lexington, KY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2015-09">Sep 2015</date>
			<biblScope unit="page" from="32" to="39" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">WASP: A native ASP solver based on constraint learning</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alviano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Dodaro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Faber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Leone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ricca</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;13)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Cabalar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Son</surname></persName>
		</editor>
		<meeting>the 12th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;13)<address><addrLine>Corunna, Spain</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2013-09">Sep 2013</date>
			<biblScope unit="volume">8148</biblScope>
			<biblScope unit="page" from="54" to="66" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Advances in WASP</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alviano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Dodaro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Leone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ricca</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Calimeri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Ianni</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</editor>
		<meeting>the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15<address><addrLine>Lexington, KY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="40" to="54" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Integrating ASP into ROS for reasoning in robots</title>
		<author>
			<persName><forename type="first">B</forename><surname>Andres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rajaratnam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sabuncu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Calimeri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Ianni</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</editor>
		<meeting>the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15<address><addrLine>Lexington, KY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2015-09">Sep 2015</date>
			<biblScope unit="page" from="69" to="82" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Towards a theory of declarative knowledge. Foundations of deductive databases and logic programming</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">R</forename><surname>Apt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Blair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Walker</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1988">1988</date>
			<biblScope unit="page" from="89" to="148" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Propositional semantics for disjunctive logic programs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Ben-Eliyahu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dechter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. Math. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="53" to="87" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Clique-width and directed width measures for answer-set programming</title>
		<author>
			<persName><forename type="first">B</forename><surname>Bliem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ordyniak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 22nd European Conference on Artificial Intelligence (ECAI&apos;16)</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Fox</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Kaminka</surname></persName>
		</editor>
		<meeting>the 22nd European Conference on Artificial Intelligence (ECAI&apos;16)<address><addrLine>The Hague, Netherlands</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-08">Aug 2016</date>
		</imprint>
	</monogr>
	<note>to appear</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The third open answer set programming competition</title>
		<author>
			<persName><forename type="first">F</forename><surname>Calimeri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ianni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ricca</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory Pract. Log. Program</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="117" to="135" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Parameterized enumeration, transversals, and imperfect phylogeny reconstruction</title>
		<author>
			<persName><forename type="first">P</forename><surname>Damaschke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">351</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="337" to="350" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The second answer set programming competition</title>
		<author>
			<persName><forename type="first">M</forename><surname>Denecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vennekens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bond</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;09)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">E</forename><surname>Erdem</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Lin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</editor>
		<meeting>the 10th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;09)<address><addrLine>Potsdam, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2009-09">Sep 2009</date>
			<biblScope unit="volume">5753</biblScope>
			<biblScope unit="page" from="637" to="654" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Parameterized Complexity</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">G</forename><surname>Downey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Fellows</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Monographs in Computer Science</title>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Springer Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Fundamentals of Parameterized Complexity</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">G</forename><surname>Downey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Fellows</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Texts in Computer Science</title>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Springer Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">On the computational cost of disjunctive logic programming: Propositional case</title>
		<author>
			<persName><forename type="first">T</forename><surname>Eiter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. Math. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="289" to="323" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Answer set solving with bounded treewidth revisited</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Fichte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hecher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Morak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;17)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">M</forename><surname>Balduccini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Janhunen</surname></persName>
		</editor>
		<meeting>the 14th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;17)<address><addrLine>Espoo, Finland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2017-07">Jul 2017</date>
			<biblScope unit="volume">10377</biblScope>
		</imprint>
	</monogr>
	<note>to appear</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A multiparametric view on answer set programming</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Fichte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kronegger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Informal Proceedings of the 10th Workshop on Answer Set Programming and Other Computing Paradigms (ASPOCP&apos;17)</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Bogaerts</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Harrison</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note>to appear</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Backdoors to normality for disjunctive logic programs</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Fichte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Comput. Log</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2015-10">Oct 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Backdoors to tractable answer-set programming</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Fichte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">220</biblScope>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page" from="64" to="103" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Dual-normal programs -the forgotten class</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Fichte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory Pract. Log. Program</title>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Parameterized Complexity Theory</title>
		<author>
			<persName><forename type="first">J</forename><surname>Flum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Grohe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">XIV</biblScope>
			<date type="published" when="2006">2006</date>
			<publisher>Springer Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Polynomially solvable satisfiability problems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Gallo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Scutellà</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="221" to="227" />
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Backdoors to satisfaction</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gaspers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Multivariate Algorithmic Revolution and Beyond</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">H</forename><surname>Bodlaender</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Downey</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Fomin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Marx</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg, Germany</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">7370</biblScope>
			<biblScope unit="page" from="287" to="317" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Guarantees and limits of preprocessing in constraint satisfaction and reasoning</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gaspers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">216</biblScope>
			<biblScope unit="issue">0</biblScope>
			<biblScope unit="page" from="1" to="19" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Matchmaking with answer set programming</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Glase</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sabuncu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 12th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;13)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Cabalar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><forename type="middle">C</forename><surname>Son</surname></persName>
		</editor>
		<meeting>12th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;13)<address><addrLine>Corunna, Spain</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2013-09">Sep 2013</date>
			<biblScope unit="volume">8148</biblScope>
			<biblScope unit="page" from="342" to="347" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Multi-Criteria Optimization in Answer Set Programming</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kaminski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Kaufmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Technical Communications of the 27th International Conference on Logic Programming (ICLP&apos;11)</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Gallagher</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Gelfond</surname></persName>
		</editor>
		<meeting><address><addrLine>Lexington, KY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Dagstuhl Publishing</publisher>
			<date type="published" when="2011-07">Jul 2011</date>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
	<note>Leibniz International Proceedings in Informatics (LIPIcs)</note>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">Answer Set Solving in Practice</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kaminski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Kaufmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Morgan &amp; Claypool</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Potassco: The Potsdam answer set solving collection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Kaufmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kaminski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ostrowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schneider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI Communications</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="107" to="124" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">The design of the sixth answer set programming competition</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Maratea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ricca</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Calimeri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Ianni</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Truszczynski</surname></persName>
		</editor>
		<meeting>the 13th International Conference Logic Programming and Nonmonotonic Reasoning (LPNMR&apos;15<address><addrLine>Lexington, KY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2015-09">Sep 2015</date>
			<biblScope unit="page" from="531" to="544" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">What&apos;s hot in the answer set programming competition</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gebser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Maratea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ricca</surname></persName>
		</author>
		<ptr target="http://www.aaai.org/ocs/index.php/AAAI/AAAI16/paper/view/12233" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI&apos;16)</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Schuurmans</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Wellman</surname></persName>
		</editor>
		<meeting>the 30th AAAI Conference on Artificial Intelligence (AAAI&apos;16)<address><addrLine>Phoenix, Arizona, USA</addrLine></address></meeting>
		<imprint>
			<publisher>The AAAI Press</publisher>
			<date type="published" when="2016-02">Feb 2016</date>
			<biblScope unit="page" from="4327" to="4329" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">The stable model semantics for logic programming</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gelfond</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lifschitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Conference and Symposium on Logic Programming (ICLP/SLP&apos;88)</title>
				<editor>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Kowalski</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Bowen</surname></persName>
		</editor>
		<meeting>the 5th International Conference and Symposium on Logic Programming (ICLP/SLP&apos;88)<address><addrLine>Seattle, WA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>MIT Press</publisher>
			<date type="published" when="1988-08">August 1988</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="1070" to="1080" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Classical negation in logic programs and disjunctive databases</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gelfond</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lifschitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">New Generation Comput</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3/4</biblScope>
			<biblScope unit="page" from="365" to="386" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Fixed-parameter algorithms for artificial intelligence, constraint satisfaction and database problems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Computer Journal</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="303" to="325" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Answer-set programming with bounded treewidth</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jakl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Pichler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI&apos;09)</title>
				<editor>
			<persName><forename type="first">C</forename><surname>Boutilier</surname></persName>
		</editor>
		<meeting>the 21st International Joint Conference on Artificial Intelligence (IJCAI&apos;09)<address><addrLine>Pasadena, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>The AAAI Press</publisher>
			<date type="published" when="2009-07">Jul 2009</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="816" to="822" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Stable models and an alternative logic programming paradigm</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Marek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Logic Programming Paradigm: a 25-Year Perspective</title>
				<editor>
			<persName><forename type="first">K</forename><forename type="middle">R</forename><surname>Apt</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Marek</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Warren</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="375" to="398" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Invitation to Fixed-Parameter Algorithms</title>
		<author>
			<persName><forename type="first">R</forename><surname>Niedermeier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Oxford Lecture Series in Mathematics and its Applications</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<date type="published" when="2006">2006</date>
			<publisher>Oxford University Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Logic programs with stable model semantics as a constraint programming paradigm</title>
		<author>
			<persName><forename type="first">I</forename><surname>Niemelä</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ann. Math. Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="241" to="273" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Detecting backdoor sets with respect to Horn and binary clauses</title>
		<author>
			<persName><forename type="first">N</forename><surname>Nishimura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ragde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of SAT 2004 (Seventh International Conference on Theory and Applications of Satisfiability Testing</title>
				<meeting>SAT 2004 (Seventh International Conference on Theory and Applications of Satisfiability Testing<address><addrLine>Vancouver, BC, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004-05-13">10-13 May, 2004. 2004</date>
			<biblScope unit="page" from="96" to="103" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Backdoor trees</title>
		<author>
			<persName><forename type="first">M</forename><surname>Samer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 23rd Conference on Artificial Intelligence (AAAI&apos;08)</title>
				<editor>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Holte</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Howe</surname></persName>
		</editor>
		<meeting>23rd Conference on Artificial Intelligence (AAAI&apos;08)<address><addrLine>Chicago, IL, USA</addrLine></address></meeting>
		<imprint>
			<publisher>The AAAI Press</publisher>
			<date type="published" when="2008-07">July 2008</date>
			<biblScope unit="page" from="363" to="368" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">On self-transformable combinatorial problems</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">P</forename><surname>Schnorr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematical Programming at Oberwolfach</title>
		<title level="s">Mathematical Programming Studies</title>
		<editor>
			<persName><forename type="first">H</forename><surname>König</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Korte</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Ritter</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="1981">1981</date>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="225" to="243" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Trichotomy and dichotomy results on the complexity of reasoning with disjunctive logic programs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Truszczyński</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory Pract. Log. Program</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="881" to="904" />
			<date type="published" when="2011">11. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">On the connections between backdoors, restarts, and heavy-tailedness in combinatorial search</title>
		<author>
			<persName><forename type="first">R</forename><surname>Williams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gomes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Selman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Informal Proceedings of the 6th International Conference on Theory and Applications of Satisfiability Testing (SAT&apos;03)</title>
				<meeting><address><addrLine>Portofino, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2003-05">May 2003</date>
			<biblScope unit="page" from="222" to="230" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
