=Paper=
{{Paper
|id=None
|storemode=property
|title=Recognizing Pseudo-intents is coNP-complete
|pdfUrl=https://ceur-ws.org/Vol-672/paper26.pdf
|volume=Vol-672
|dblpUrl=https://dblp.org/rec/conf/cla/BabinK10
}}
==Recognizing Pseudo-intents is coNP-complete==
Recognizing Pseudo-Intents is coNP-complete
Mikhail A. Babin, Sergei O. Kuznetsov
State University Higher School of Economics,
Myasnitskaya 20, 101000 Moscow, Russia
{mikleb@yandex.ru, skuznetsov@hse.ru}
Abstract. The problem of recognizing whether a subset of attributes
is a pseudo-intent is shown to be coNP-hard, which together with the
previous results means that this problem is coNP-complete. Recogniz-
ing an essential intent is shown to be NP-complete and recognizing the
lectically largest pseudo-intent is shown to be coNP-hard.
1 Introduction
One of the long-standing complexity problems in FCA is the problem of checking
whether a given set of attributes is a pseudo-intent. In [4, 5] it was proved that
this problem lies in the class co-NP, however, the question whether the problem
is complete in this class was still open. In [6] there was a conjecture that this
problem is transhyp-hard [6], which would not mean that this problem is co-NP-
complete. In this paper we prove a stronger statement, namely that the problem
is coNP-hard, which, together with the result from [4, 5] means that the problem
is coNP-complete. This main result has several consequences concerning essen-
tial intents and lectically largest pseudo-intent. Recognizing an essential intent is
NP-complete and recognizing the lectically largest pseudo-intent is coNP-hard.
The rest of the paper is organized as follows: In the second section we introduce
the main definitions and give a precise problem statement. In the third section
we give a proof of the main result. In the fourth section we discuss the complex-
ity of some related problems, namely that of recognizing essential intents and
generating pseudo-intents in the order dual to the lectic one.
2 Definitions
Let G and M be sets, called the set of objects and attributes, respectively. Let I
be a relation I ⊆ G × M between objects and attributes: for g ∈ G, m ∈ M, gIm
holds iff the object g has the attribute m. The triple K = (G, M, I) is called
a (formal) context. If A ⊆ G, B ⊆ M are arbitrary subsets, then the Galois
connection is given by the following derivation operators:
A′ = {m ∈ M | gIm ∀g ∈ A}
B ′ = {g ∈ G | gIm ∀m ∈ B}
Recognizing Pseudo-Intents is coNP-complete 295
The pair (A, B), where A ⊆ G, B ⊆ M , A′ = B, and B ′ = A is called a
(formal) concept (of the context K) with extent A and intent B (in this case we
have also A′′ = A and B ′′ = B). The set of attributes B is implied by the set of
attributes A, or the implication A → B holds, if all objects from G that have all
attributes from the set A also have all attributes from the set B, i.e. A′ ⊆ B ′ .
The operation (·)′′ is a closure operator [1], i.e. it is idempotent (X ′′′′ = X ′′ ),
extensive (X ⊆ X ′′ ), and monotone (X ⊆ Y ⇒ X ′′ ⊆ Y ′′ ). Sets A ⊆ G, B ⊆ M
are called closed if A′′ = A and B ′′ = A. Obviously, extents and intents are
closed sets.
Implications obey the Armstrong rules:
A→B A → B, B ∪ C → D
, , .
A→A A∪C →B A∪C →D
A minimal (in the number of implications) subset of implications, from which
all other implications of a context can be deduced by means of the Armstrong
rules was characterized in [3]. This subset is called the Duquenne Guigues or
stem base in the literature. The premises of the implications of the stem base
can be given by pseudo-intents(see e.g.[1]): a set P ⊆ M is a pseudo-intent if
P 6= P ′′ and Q′′ ⊂ P for every pseudo-intent Q ⊂ P . For a closed set A ⊆ M
such that P * A the intersection A ∩ P is also closed (see [1]). A set Q ⊆ M is
called quasi-closed (quasi-intent) if for any R ⊆ Q one has R′′ ⊆ Q or R′′ = Q′′ .
For example closed sets are quasi-closed. For a quasi-closed set Q it holds that
(Q ∩ C)′′ = (Q ∩ C) for any closed set C such that Q * C. Another definition of
a pseudo-intent, which we will use in this paper, is very close to that from [3]:
a nonclosed set P ⊆ M is a pseudo-intent iff P is quasi-closed and Q′′ ⊆ P for
any quasi-closed set Q ⊂ P (see [4, 5]). A set A ⊆ M is called an essential intent
(essential-closed subset of attributes) iff there is a pseudo-intent P ⊆ M such
that P ′′ = A.
Let G = {g1 , . . . , gn } and M = {m1 , . . . , mn } be sets with same cardinality.
Then the context K = (G, M, I6= ) is called contranominal scale, where I6= =
G × M \ {(g1 , m1 ), . . . , (gn , mn )}. The contranominal scale has the following
property, which we will use later: for any H ⊆ M one has H ′′ = H and H ′ =
{gi | mi ∈
/ H, 1 ≤ i ≤ n}.
3 Recognition of pseudo-intents
Here we discuss the algorithmic complexity of the problem of pseudo-intent
recognition.
Problem: Pseudo-intent recognition (PI)
INPUT: A context K = (G, M, I) and a set P ⊆ M .
QUESTION: Is P a pseudo-intent of K?
In order to prove coN P -hardness of PI we consider the most well-known
N P -complete problem, namely CNF satisfiability.
296 Mikhail A. Babin, Sergei O. Kuznetsov
Problem: CNF satisfiability (SAT)
INPUT: A boolean CNF formula f (x1 , . . . , xn ) = C1 ∧ . . . ∧ Ck
QUESTION: Is f satisfiable?
Consider an arbitrary CNF instance C1 , . . . , Ck with variables x1 , . . . , xn , where
Ci = (li1 ∨. . .∨lini ) (1 ≤ i ≤ k) are clauses and lij ∈ {x1 , . . . , xn }∪{¬x1 , . . . , ¬xn }
(1 ≤ i ≤ k, 1 ≤ j ≤ ni ) are some variables or their negations, called literals.
From this instance we construct a context K = (G, M, I). Define
M = {p, C1 , . . . , Ck , x1 , ¬x1 , . . . , xn , ¬xn , e}
G = {gx1 , g¬x1 , . . . , gxn , g¬xn , gCX , gC , gl1 , . . . , gln }
x ¬x
∪ {glij | 1 ≤ i ≤ n, 1 ≤ j ≤ n} ∪ {gli j | 1 ≤ i ≤ n, 1 ≤ j ≤ n}
For 1 ≤ i ≤ n define the set Li = {x1 , ¬x1 , . . . , xn , ¬xn } \ {xi , ¬xi }. In addition
x ¬x
for 1 ≤ i ≤ n and 1 ≤ j ≤ n define the sets Li j = Li \{xj } and Li j = Li \{¬xj }.
Now we are ready to define I. The relation I is given by two parts. The first
part is
I ∩ {gx1 , g¬x1 , . . . , gxn , g¬xn } × M = C ∪ I6=
C = {(gxi , Cj ) | xi ∈
/ Cj , 1 ≤ i ≤ n, 1 ≤ j ≤ k}
∪ {(g¬xi , Cj ) | ¬xi ∈
/ Cj , 1 ≤ i ≤ n, 1 ≤ j ≤ k}
I6= = {gx1 , g¬x1 , . . . , gxn , g¬xn } × {x1 , ¬x1 , . . . , xn , ¬xn }
,
\ {(gx1 , x1 ), (g¬x1 , ¬x1 ), . . . , (gxn , xn ), (g¬xn , ¬xn )}
hence Ci′ ∩ {gx1 , g¬x1 , . . . , gxn , g¬xn } is the set of objects which correspond to
literals not included in Ci (1 ≤ i ≤ k), and I6= is the relation of the contra-
nominal scale. The rest of I is given by the object intents
′
gCX = M \ {p, e}
′
gC = {p} ∪ {C1 , . . . , Ck }
gl′i = {p} ∪ Li , 1 ≤ i ≤ n
x ′ x
glij = {p} ∪ Li j , 1 ≤ i ≤ n, 1 ≤ j ≤ n
¬x ′ ¬xj
gli j = {p} ∪ Li , 1 ≤ i ≤ n, 1 ≤ j ≤ n
Note that there are some objects (e.g. gl1 and glx11 ) with the same intents, but
this does not matter.
For any A ⊆ {x1 , ¬x1 , . . . , xn , ¬xn } that satisfies A ∩ {xi , ¬xi } =
6 ∅ for 1 ≤
i ≤ n, we define truth assignment φA :
true,
if xi ∈
/ A and ¬xi ∈ A;
φA (xi ) = f alse, if ¬xi ∈ / A and xi ∈ A;
f alse, otherwise (xi ∈ A and ¬xi ∈ A);
Recognizing Pseudo-Intents is coNP-complete 297
p C1 C2 · · · Ck x1 ¬x1 · · · xn ¬xn e
gx1
g¬x1
..
. C I6=
gxn
g¬xn
gCX × ······ × × ············ ×
gC × × ······ ×
gl1 × L1
glx11 × Lx1 1
gl¬x 1
1
× L¬x
1
1
.. .. ..
. . .
glx1n × Lx1 n
gl¬x 1
n
× L¬x
1
n
.. .. ..
. . .
gln × Ln
glxn1 × Lxn1
gl¬x n
1
× L¬x
n
1
.. .. ..
. . .
glxnn × Lxnn
gl¬x n
n
× L¬x
n
n
Table 1. Context K.
298 Mikhail A. Babin, Sergei O. Kuznetsov
In the case xi ∈
/ A and ¬xi ∈ / A for some 1 ≤ i ≤ n, φA is undefined. Note that
for A ⊆ {x1 , ¬x1 , . . . , xn , ¬xn } the truth assignment φA is (correctly) defined iff
A * Li for every 1 ≤ i ≤ n.
Symmetrically for a truth assignment φ define the set Aφ = {¬xi | φ(xi ) =
true} ∪ {xi | φ(xi ) = f alse}.
Before proving coN P -hardness of PI we prove some auxiliary statements.
The following lemma is crucial for the reduction from SAT to the complement
of PI.
Lemma 1 If a subset A ⊆ {x1 , ¬x1 , . . . , xn , ¬xn } is closed and A * gl′i for any
1 ≤ i ≤ n then φA is defined and φA satisfies f i.e f (φA ) = true. Conversely,
if a truth assignment φ satisfies f , then Aφ is closed and Aφ * gl′i for every
1 ≤ i ≤ n.
Proof. Let A ⊆ {x1 , ¬x1 , . . . , xn , ¬xn } and A is not a subset of any gl′i (1 ≤ i ≤
n), then A * Li for any 1 ≤ i ≤ n and hence (by definition of φA ) φA is defined.
Since I6= is the relation of contranominal scale and any intent can be expressed
as the intersection of object intents, we have A′ = {gxi | xi ∈ / A} ∪ {g¬xi | ¬xi ∈ /
A}∪B, where B ⊆ G−{gx1 , g¬x1 , . . . , gxn , g¬xn }. Since A * Li for any 1 ≤ i ≤ n
x ¬x
we also have A * Li j and A * Li j for every 1 ≤ i ≤ n and 1 ≤ j ≤ n. Thus
B = {gCX }.
Suppose A′′ = A. Then A ∩ {C1 , . . . , Ck } = ∅ and hence for every 1 ≤ i ≤ k
there is some g ∈ A′ that Ci ∈ / g ′ . Since Ci ∈ gCX ′
and A′ = {gxi | xi ∈ /
A} ∪ {g¬xi | ¬xi ∈ / A} ∪ {gCX } the latter means that g ∈ {gxi | xi ∈ / A} ∪ {g¬xi |
¬xi ∈ / A}. Then, by definition of the relation C, there is a literal xj ∈ / A or
¬xj ∈ / A that belongs to Ci . Thus φA satisfies Ci for every 1 ≤ i ≤ k.
Now let φ be a truth assignment and f (φ) = true. Obviously, Aφ * gl′i
for every 1 ≤ i ≤ n (by definition of Aφ ). Then A′φ = {gxi | xi ∈ / Aφ } ∪
{g¬xi | ¬xi ∈ / Aφ } ∪ {gCX }. Note that A′′φ ∩ {x1 , ¬x1 , . . . , xn , ¬xn } = Aφ ∩
′
{x1 , ¬x1 , . . . , xn , ¬xn } and Aφ ⊆ gCX . Hence Aφ is closed iff Aφ ∩{C1 , . . . , Ck } =
∅. Assume that Ci ∈ Aφ ∩ {C1 , . . . , Ck } for some 1 ≤ i ≤ k. This means that
Ci ∈ gx′ j and Ci ∈ g¬x ′
r
for every xj ∈/ Aφ and ¬xr ∈ / Aφ . But then by definition
of the relation C the clause Ci is not satisfied by φ. 2
Proposition 2 For any 1 ≤ i ≤ n if A ⊆ gl′i then A is closed.
xj ′ ¬xj ′
Proof. Let A ⊆ gl′i and p ∈ A. Then A′′ = xj ∈A / gli ∩
T T
/ gl i
¬xj ∈A = A. In
/ A we can express A′′ as A′′ = (A ∪ {p})′′ ∩ gCX
the case p ∈ ′
= A. 2
Now we are ready to prove coN P -hardness of PI.
Theorem 3 PI is coN P -hard.
Proof. We reduce CNF to the complement of PI. Given a CNF instance f =
C1 ∧ . . . ∧ Ck , we construct a context K like that described above (see Table 1).
We take P = M \ {e} as a set for deciding whether it a pseudo-intent. Hence
the corresponding PI instance is (K, P ) and we prove that f is satisfiable if and
Recognizing Pseudo-Intents is coNP-complete 299
only if P is not a pseudo-intent of K. Without loss of generality we will assume
that for every 1 ≤ i ≤ n the clause xi ∨ ¬xi is included in f (it does not affect
satisfiability).
(⇒) Let f be satisfiable and let φ be the truth assignment that satisfies
f (φ) = true. Consider the set Q = {p} ∪ Aφ . As we will see later Q is a pseudo-
intent, Q ⊂ P and Q′′ = M * P , and hence P is not a pseudo-intent. First
let us check that Q′′ = M . Since p ∈ Q we should test only that Q * g ′ ,
x ¬x
where g ∈ {gC , gl1 , . . . , gln } ∪ {glij | 1 ≤ i ≤ n, 1 ≤ j ≤ n} ∪ {gli j | 1 ≤ i ≤
′
n, 1 ≤ j ≤ n}. Clearly Q * gC because Aφ is not empty. By Lemma 1 for
x ′ ¬x ′
any 1 ≤ i ≤ n, Aφ * gl′i , therefore Q * gli . Hence Q * glij and Q * gli j
(1 ≤ i ≤ n, 1 ≤ j ≤ n). In order to prove that Q is a pseudo-intent we show
that any proper subset of Q is closed. Consider an arbitrary set A ⊂ Q. If p ∈ A
then (since A 6= Q) there is a literal l ∈ {x1 , ¬x1 , . . . , xn , ¬xn } such that l ∈ Q
and l ∈ / A. Thus by proposition 2 the subset A is closed. Now let p ∈ / A then
if A = Q \ {p} = Aφ by lemma 1 the subset A is closed. If A 6= Q \ {p} then
A ⊂ Aφ and by proposition 2 the subset A is closed.
(⇐) Now let a pseudo-intent Q be a proper subset of P (i.e. Q ⊂ P ) and
Q′′ * P . Then Q is not a subset of any object intent of K. Together with the
fact of quasi-closedness of Q this implies that Q∩g ′ is closed for any g ∈ G. Note
′ ′ ′
that p ∈ Q since otherwise Q ⊆ gCX . Consider Q ∩ gC . Since Q ∩ gC is closed
′ ′ ′ ′
and p ∈ Q ∩ gC , there are only two possibilities: Q ∩ gC = p or Q ∩ gC = gC .
′ ′ ′
Assume Q ∩ gC = gC . Then Q = gC ∪ B, where B ⊂ {x1 , ¬x1 , . . . , xn , ¬xn } and
′ ′
B 6= ∅ (because Q 6= P and Q 6= gC ). Consider Q ∩ gCX = {C1 , . . . , Ck } ∪ B.
This set must be closed by quasi-closedness of Q. Note that {C1 , . . . , Ck } ∪
B * gl′i , for any 1 ≤ i ≤ n and {C1 , . . . , Ck } ∪ B * gC ′
(since B 6= ∅). Thus
(Q ∩ gCX ) ⊆ {gx1 , g¬x1 , . . . , gxn , g¬xn }. Since (Q ∩ gCX )′ 6= ∅ there is a literal
′ ′ ′
′
l ∈ {x1 , ¬x1 , . . . , xn , ¬xn } such that gl ∈ (Q ∩ gCX )′ . Then, by definition of gl′
′
and the fact that some clause Ci contains the literal l we get that Ci ∈ / Q ∩ gCX .
′ ′
Thus Q ∩ gC = p and Q \ {p} = Q ∩ gCX ⊆ {x1 , ¬x1 , . . . , xn , ¬xn }. Moreover,
Q * gl′i for every 1 ≤ i ≤ n, hence φ = φQ\{p} is (correctly) defined. Since
Q \ {p} is closed by lemma 1, the truth assignment φ satisfies f . 2
In [4] it was shown that P I ∈ coNP hence we obtain
Corollary 1. PI is coN P -complete.
4 Recognizing essential intents and lectically largest
pseudo-intents
An important problem related to recognizing pseudo-intents is deciding whether
a given set is the lectically largest pseudo-intent.
Let M = {m1 , . . . , mn } be a finite set with linear order on it (m1 < · · · <
mn ). For sets A ⊆ M and B ⊆ M we say that A lectically smaller than B
(A < B, B is lectically larger than A) if ∃mi ∈ B \ A : A ∩ {mj ∈ M | j < i} =
B ∩ {mj ∈ M | j < i}. It is not hard to see that the lectic order is a linear order
on the subsets of M .
300 Mikhail A. Babin, Sergei O. Kuznetsov
Problem: The lectically largest pseudo-intent (LLPI)
INPUT: A context K = (G, M, I) with linear order on M and a set P ⊆ M .
QUESTION: Is P the lectically largest pseudo-intent of K?
Proposition 4 LLPI is coN P -hard.
Proof. We reduce SAT to the complement of LLPI as in the proof of Theorem 3 .
The linear order on M is: p < C1 < . . . < Ck < x1 < ¬x1 < . . . < xn < ¬xn < e.
Since P = M \ {e} and M is closed, P is the lectically largest pseudo-intent iff
P is a pseudo-intent. 2
Thus it is impossible to find the lectically largest pseudo-intent in polynomial
time unless P = N P .
In [8] it was shown that pseudo-intents cannot be enumerated with polyno-
mial delay in the lectic order (unless P = N P ). Proposition 4 shows that this
also cannot be done in the dual order, i.e., the following corollary holds.
Corollary. Pseudo-intents cannot be generated with polynomial delay in the
order dual to the lectic one unless P = N P .
Another problem related to the problem of recognizing pseudo-intents is that of
recognizing essential intents.
Problem: Essential intents recognition (EI)
INPUT: A context K = (G, M, I) and a set A ⊆ M .
QUESTION: Is A an essential intent of K?
Proposition 5 EI is NP-complete.
Proof. 1. NP-Hardness. We reduce SAT to EI, in the same way as in the
reduction from SAT, to the complement of PI. Let us construct the context
K2 = (G, M \ {e}, I), where G, M and I are the sets of objects, attributes and
the relation of context K from the proof of Theorem 3 (see Table 1). Obviously,
M \ {e} is an essential intent of K2 iff M \ {e} is not a pseudo-intent of K.
2. Membership in NP. The set A is an essential intent of the context K =
(G, M, I) iff there is a pseudo-intent P ⊆ M such that P ′′ = A. Since a pseudo-
intent is an inclusion-minimal quasi-closed set with the same closure (e.g. see
[4]), a set A is an essential intent iff there is quasi-closed set Q ⊆ M such that
Q′′ = A. Quasi-closedness can be tested in polynomial time (see [4]). Hence a
nondeterministic guess for checking essential-intent A can be a quasi-closed set
Q such that Q′′ = A. 2.
Conclusion
A long-standing complexity problem about the complexity of recognizing a pseudo-
intent was solved. This problem was shown to be coNP-complete. This main
Recognizing Pseudo-Intents is coNP-complete 301
result has several important consequences concerning essential intents and the
lectically largest pseudo-intent. Recognizing an essential intent was shown to be
NP-complete and recognizing the lectically largest pseudo-intent was shown to be
coNP-hard. The latter fact means that pseudo-intents cannot be generated with
polynomial delay in the order dual to the lectic one unless P = N P . Whether
pseudo-intents cannot be generated with polynomial delay (unless P = N P ) in
arbitrary order still remains an important open problem.
References
1. B. Ganter and R. Wille, Formal Concept Analysis: Mathematical Foundations;
Springer, Berlin (1999).
2. M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory
of NP-Completeness; Freeman, San Francisco (1979).
3. J. L. Guigues and V. Duquenne, Familles minimales d’implications informatives re-
sultant d’un tableau de données binaries, Mathématiques, Informatique et Sciences
Humaines; 95:5-18, (1986).
4. S. O. Kuznetsov and S. A. Obiedkov, Counting pseudo-intents and #P-
completeness. In R. Missaoui and J. Schmid, Eds, ICFCA 2006,Lecture Notes in
Computer Science, vol. 3874, 306-308, Springer-Verlag, (2006).
5. S. O. Kuznetsov and S. A. Obiedkov, Some decision and counting problems
of the duquenne-guigues basis of implications, Discrete Applied Mathematics,
156(11):1994-2003, (2008).
6. B. Sertkaya, Towards the complexity of recognizing pseudo-intents, In F. Dau and
S. Rudolph, Eds, ICCS 2009, Lecture Notes in Computer Science, vol. 5662, 284–
292, Springer-Verlag, (2009)
7. B. Sertkaya, Some computational problems related to pseudo-intents, In S. Ferre
and S. Rudolph, Eds, ICFCA 2009, Lecture Notes in Computer Science, vol. 5662,
284–292, Springer-Verlag, (2009)
8. F. Distel, Hardness of enumerating pseudo-intents in the lectic order. In L. Kwuida
and B. Sertkaya, Eds, ICFCA 2010, Lecture Notes in Artificial Intelligence, vol.
5986, 124–137, Springer-Verlag, (2010)