560 likes | 688 Views
Arc Consistency. Problem Solving With Constraints CSCE421/821, Spring 2011 www.cse.unl.edu/~ choueiry/F11-496-896 All questions: cse496cp@cse.unl.edu Berthe Y. Choueiry (Shu-we-ri) Avery Hall, Room 360 Tel: +1(402)472-5444. Lecture Sources. Required reading
E N D
Arc Consistency Problem Solving With Constraints CSCE421/821, Spring 2011 www.cse.unl.edu/~choueiry/F11-496-896 All questions: cse496cp@cse.unl.edu Berthe Y. Choueiry (Shu-we-ri) Avery Hall, Room 360 Tel: +1(402)472-5444
Lecture Sources Required reading • Algorithms for Constraint Satisfaction Problems, Mackworth and Freuder AIJ'85 (focus on Node consistency, arc consistency) • Sections 3.1 & 3.2 Chapter 3. Constraint Processing. Dechter Recommended reading • Bartak: Consistency Techniques (link) • Constraint Propagation with Interval Labels, Davis, AIJ'87
Outline • Motivation (done) & background • Node consistency and its complexity • Arc consistency and its complexity • Criteria for performance comparison and CSP parameters. • Experiments • Random CSPs (Model B) • Statistical Analysis
Basic Consistency: Notation Examining finite, binary CSPs Notation: Given variables i,j,k with values x,y,z, the predicate Pijk(x,y,z) is true iff the 3-tuple (x,y,z) Rijk Node consistency: checking Pi(x) Arc consistency: checking Pij(x,y)
time space Worst-case asymptotic complexity Worst-case complexity as a function of the input parameters Upper bound: f(n) is O(g(n)) means that f(n)c.g(n) f grows as g or slower Lower bound: f(n) is (h(n)) means that f(n) c.h(n) f grows as g or faster Input parameters for a CSP: n = number of variables a = (max) size of a domain dk = degree of Vk ( n-1) e = number of edges (or constraints) [(n-1), n(n-1)/2]
Outline • Motivation (done) & background • Node consistency and its complexity • Arc consistency and its complexity • Criteria for performance comparison and CSP parameters. • Experiments • Random CSPs (Model B) • Statistical Analysis
Node consistency (NC) Procedure NC({V1,V2,…,Vn}) For i 1until ndo DVi DVi { x | Pi(x) } • For each variable, we check a values • We have n variables, we do n.a checks • NC is O(a.n) • Alert: check for domain wipe-out, domain annihilation IfDvi (Di=∅) Then BREAK
Outline • Motivation (done) & background • Node consistency and its complexity • Arc consistency and its complexity • Algorithms AC1, AC3, AC4, AC2001 • Criteria for performance comparison and CSP parameters. • Experiments • Random CSPs (Model B) • Statistical Analysis
Vj Vi Vi Vj 1 1 1 2 2 2 2 3 3 3 Arc Consistency Adapted from Dechter Definition: Given a constraint graph G, • A variable Vi is arc consistent relative toVj iff for every value a DVi, there exists b DVj | (a,b) RVi,Vj • The constraint CVi,Vj is arc consistent iff • Viis arc consistent relative to Vj and • Vjis arc consistent relative to Vi • A binary CSP is arc-consistent iff every constraint (or sub-graph of size 2) is arc consistent
Main Functions • Variable-value pair • (Vi,a), ⟨Vi,a⟩: variable, value from its domain • CHECK(⟨Vi,a⟩,⟨Vj,b⟩) • Returns true if (a,b)∈RVi,Vj, false otherwise • SUPPORTED(⟨Vi,a⟩,Vj) • Verifies that ⟨Vi,a⟩ has at least one support in CVi,Vj • Is not standard ‘terminology,’ but my ‘convention’ • REVISE(Vi,Vj) • Updates DVi given RVi,Vj • BREAK when domain wipe-out
Arc Consistency Algorithms • AC-1, AC-3, …, AC2001: arc consistency algorithms • Update all domains given all constraints • Call REVISE • Differ in how they manage updates (queue) • Complexity • Nbr of variables: n, Domain size: d, Nbr of constraints: e,degree of graph deg • #CC is a global variable • Keeps track of the number of times that the definition of a binary relation is accessed • Is a cost measure, to compare algorithms’ performance in practive • Assumption • Domains are sorted alphabetically (lexicographic)
CHECK(⟨Vi,a⟩,⟨Vj,b⟩) • Operation • Verifies whether a constraint exists between Vi,Vj • If a constraint exists • Increases #CC • Accesses the constraint between Vi,Vj • Verifies if (a,b)∈RVi,Vj • Returns true if (a,b) is consistent • Returns false if (a,b) is not consistent • If no constraints exist • Returns true (universal constraint!) • Pseudo code, necessary? • Complexity? cost in practice?
SUPPORTED(⟨Vi,a⟩,Vj) SUPPORTED(⟨Vi,a⟩,Vj) • support nil • b DVj • If CHECK(⟨Vi,a⟩,⟨Vi,b⟩) • Then Begin • support true • RETURN support • End • RETURN support • Complexity? • Once you find a support, stop looking • Cost in practice depends on implementation
REVISE(Vi, Vj): Description • Function • Updates DVi given the constraint CVi,Vj • Is directional: does not update DVj • Calls SUPPORTED(⟨Vi,*⟩,Vj) • If DVi is modified • Returns true, false otherwise
REVISE(Vi, Vj): Pseudocode REVISE(Vi, Vj) • revised false • x DVi • found SUPPORTED(⟨Vi,x⟩,Vj) • Iffound = false • Then Begin • revised true • DVi DVi\ {x} • End • RETURN revised • Complexity?
Revise: example R. Dechter • REVISE(Vi,Vj) • REVISE(Vi,Vj) Vi Vj Vi Vj 1 1 1 2 2 2 2 3 3 3
Arc Consistency (AC-1) Procedure AC-1: • NC(Problem) • Q {(i, j) | (i,j) directed arcs in constraint network of Problem, i j } • Repeat • change false • Foreach (i, j) Q do 6 Begin // for each • updated REVISE(i, j) • If DVi = {} Then Return falseElse change (updatedorchange) • End // for each • Until change = false • Return Problem • AC-1 does not update Q, the queue of arcs • No algorithm can have time complexity below O(ea2) • AC1 should test for empty domains (does not in the paper)
Warning • Most papers do not check for domain wipe-out • In your code, have AC1 • Always check for domain wipe out and • terminate/interrupt the algorithm when that occurs • Complexity versus performance • Does not affect worst-case complexity • In practice, saves lots of #CC and cycles
Arc Consistency (AC-1) • If a domain is wiped out, AC1 returns nil • Otherwise, returns the problem given as input (alternatively, change) Procedure AC-1: • NC(Problem) • Q {(i, j) | (i,j) directed arcs in constraint network of Problem, i j } • Repeat • change false • Foreach (i, j) Q do 6 Begin // for each • updated REVISE(i, j) • If DVi = {} Then Return falseElse change (updatedorchange) • End // for each • Until change = false • Return Problem
V1 V1 V1 V1 V3 V2 V3 V3 V2 V3 V2 V2 V1 V1 V1 V3 V2 V3 V3 V2 V2 Arc consistency • AC may discover the solution Example borrowed from Dechter
Arc consistency 2. AC may discover inconsistency Example borrowed from Dechter
x [0, 10] x [0, 7] x [4, 7] x y-3 x y-3 x y-3 y [0, 10] y [3, 10] y [7, 10] NC & AC Example courtesy of M. Fromherz Unary constraint x>3 is imposed AC propagates bounds again AC propagates bound
Complexity of AC-1 Procedure AC-1: 1 begin 2 for i 1 untilndo NC(i) 3 Q {(i, j) | (i,j) arcs(G), i j 4 repeat 5 begin 6 CHANGE false 7 for each (i, j) Q do CHANGE (REVISE(i, j) or CHANGE) 8 end 9 until ¬ CHANGE 10 end Note: Q is not modified and |Q| = 2e • 4 9 repeats at most n·a times • Each iteration has |Q| = 2e calls to REVISE • Revise requires at most a2 checks of Pij AC-1 is O(a3· n · e)
AC versions • AC-1 does not update Q, the queue of arcs • AC-2 iterates over arcs connected to at least one node whose domain has been modified. Nodes are ordered. • AC-3 same as AC-2, nodes are not ordered
AC-3 AC-3 iterates over arcs connected to at least one node whose domain has been modified Procedure AC-3: • NC(Problem) • fori 1 untilndo NC(i) • Q { (i, j) | (i, j) directed arcs in constraint network of Problem, i j } • WhileQ is not empty do • Begin • select and delete any arc (k,m) Q • If REVISE(k,m) ThenQQ { (I,k) | (I,k) arcs(G), ik, im } • End (Don’t forget to make AC-3 check for domain wipe out)
Complexity of AC-3 • Procedure AC-3: • 1 begin • 2 fori 1 untilndoNC(i) • 3 Q {(i, j) | (I,j) arcs(G), ij } • 4 WhileQ is not empty do • 5 begin • select and delete any arc (k,m) Q • 7 If Revise(k, m) thenQQ{ (i,k) | (I,k) arcs(G), ik, im } • 8 end • 9 end • First |Q| = 2e, then it grows and shrinks 48 • Worst case: • 1 element is deleted from DVk per iteration • none of the arcs added is in Q • Line 7: a·(dk - 1) • Lines 4 - 8: • Revise: a2 checks of Pij • AC-3 is O(a2(2e + a(2e-n))) • Connected graph (en – 1), AC-3 is O(a3e) • If AC-p, AC-3 is O(a2e) AC-3 is (a2e) • Complete graph: O(a3n2)
V2 V2 V1 V1 { 1, 2, 3, 4 } { 1, 2, 3, 4, 5 } { 1, 3, 5 } { 1, 2, 3, 4, 5 } { 1, 3, 5 } { 1, 2, 3, 5 } { 1, 2, 3, 4, 5 } { 1, 2, 3, 4, 5 } V4 V3 V4 V3 Example: Apply AC-3 Example: Apply AC-3 Thanks to Xu Lin DV1 = {1, 2, 3, 4, 5} DV2 = {1, 2, 3, 4, 5} DV3 = {1, 2, 3, 4, 5} DV4 = {1, 2, 3, 4, 5} CV2,V3 = {(2, 2), (4, 5), (2, 5), (3, 5), (2, 3), (5, 1), (1, 2), (5, 3), (2, 1), (1, 1)} CV1,V3 = {(5, 5), (2, 4), (3, 5), (3, 3), (5, 3), (4, 4), (5, 4), (3, 4), (1, 1), (3, 1)} CV2,V4 = {(1, 2), (3, 2), (3, 1), (4, 5), (2, 3), (4, 1), (1, 1), (4, 3), (2, 2), (1, 5)}
Applying AC-3 Thanks to Xu Lin • Queue = {CV2, V4, CV4,V2, CV1,V3, CV2,V3, CV3, V1, CV3,V2} • Revise(V2,V4): DV2DV2 \ {5} = {1, 2, 3, 4} • Queue = {CV4,V2, CV1,V3, CV2,V3, CV3, V1, CV3, V2} • Revise(V4, V2): DV4 DV4 \ {4} = {1, 2, 3, 5} • Queue = {CV1,V3, CV2,V3, CV3, V1, CV3, V2} • Revise(V1, V3): DV1 {1, 2, 3, 4, 5} • Queue = {CV2,V3, CV3, V1, CV3, V2} • Revise(V2, V3): DV2 {1, 2, 3, 4}
Applying AC-3 (cont.) Thanks to Xu Lin • Queue = {CV3, V1, CV3, V2} • Revise(V3, V1): DV3 DV3 \ {2} = {1, 3, 4, 5} • Queue = {CV2, V3, CV3, V2} • Revise(V2, V3): DV2 DV2 • Queue = {CV3, V2} • Revise(V3, V2): DV3 {1, 3, 5} • Queue = {CV1, V3} • Revise(V1, V3): DV1 {1, 3, 5} END
AC-4 Mohr & Henderson (AIJ 86): • AC-3 O(a3e) AC-4 O(a2e) • AC-4 is optimal • Trade repetition of consistency-check operations with heavy bookkeeping on which and how many values support a given value for a given variable • Data structures it uses: • m: values that are active, not filtered • s: lists all vvp's that support a given vvp • counter: given a vvp, provides the number of support provided by a given variable • How it proceeds: • Generates data structures • Prepares data structures • Iterates over constraints while updating support in data structures
counter ( V , V ), 3 0 4 2 ( V , V ), 2 0 4 2 ( V , V ), 1 0 4 2 ( V , V ), 1 0 2 3 M M ( V , V ), 4 0 1 3 Step 1: Generate 3 data structures • mand s have as many rows as there are vvp’s in the problem • counterhasas many rows as there are tuples in the constraints
Step 2: Prepare data structures Data structures: s and counter. • Checks for every constraint CVi,Vj all tuples Vi=ai, Vj=bj_) • When the tuple is allowed, then update: • s(Vj,bj) s(Vj,bj) {(Vi, ai)} and • counter(Vj,bj) (Vj,bj) + 1 Update counter ((V2, V3), 2) to value 1 Update counter ((V3, V2), 2) to value 1 Update s-htable (V2, 2) to value ((V3, 2)) Update s-htable (V3, 2) to value ((V2, 2)) Update counter ((V2, V3), 4) to value 1 Update counter ((V3, V2), 5) to value 1 Update s-htable (V2, 4) to value ((V3, 5)) Update s-htable (V3, 5) to value ((V2, 4))
Constraints CV2,V3 and CV3,V2 Updating m Note that (V3, V2),4 0 thus we remove 4 from the domain of V3 and update (V3, 4) nil in m Updating counter Since 4 is removed from DV3 then for every (Vk, l) | (V3, 4) s[(Vk, l)], we decrement counter[(Vk, V3), l] by 1
AC2001 • When checking (Vi,a) against Vj • Keep track of the Vj value that supports (Vi,a) • Last((Vi,a),Vi) • Next time when checking again (Vi,a) against Vj, we start from Last((Vi,a),Vi) and don’t have to traverse again the domain of Vj again or list of tuples in CViVj • Big savings..
Summary of arc-consistency algorithms • AC-4 is optimal (worst-case) [Mohr & Henderson, AIJ 86] • Warning: worst-case complexity is pessimistic. Better worst-case complexity: AC-4 Better average behavior: AC-3 [Wallace, IJCAI 93] • AC-5: special constraints [Van Hentenryck, Deville, Teng 92] functional, anti-functional, and monotonic constraints • AC-6, AC-7: general but rely heavily on data structures for bookkeeping [Bessière & Régin] • Now, back to AC-3: AC-2000, AC-2001≡AC-3.1, AC3.3, etc. • Non-binary constraints: • GAC (general) [Mohr & Masini 1988] • all-different (dedicated) [Régin, 94]
Outline • Motivation (done) & background • Node consistency and its complexity • Arc consistency and its complexity • Performance comparison • Criteria and CSP parameters • Experiments • Random CSPs (Model B) • Statistical Analysis
CSP parameters ⟨n,a, t, d⟩ • n is number of variables • a is maximum domain size • t is constraint tightness: • d is constraint density where e is the #constraints, emin=(n-1), and emax = n(n-1)/2 Lately, we use constraint ratiop = e/emax → Constraints in random problems often generated uniform → Use only connected graphs (throw the unconnected ones away)
Criteria for performance comparison • Bounding time and space complexity (theoretical) • worst-case: always • average-case: never • Best-case: sometimes • Counting #CC and #NV (theoretical, empirical) • Measuring CPU time (empirical)
Performance comparisonCourtesy of Lin XU AC-3, AC-7, AC-4 on n=10,a=10,t,d=0.6 displaying #CC and CPU time AC-3 AC-4 AC-7
Wisdom (?) Free adaptation from Bessière • When a single constraint check is very expensive to make, use AC-7. • When there is a lot of propagation, use AC-4 • When little propagation and constraint checks are cheap, use AC-3x
Performance comparison Courtesy of Shant AC3, AC3.1, AC4 on on n=40,a=16,t,d=0.15 displaying #CC and CPU time
AC-what? Instructor’s personal opinion • Used to recommend using AC-3 • Now, recommend using AC2001 • Do the project on AC-* if you are curious.. [Régin 03]
= = = AC is not enough Example borrowed from Dechter Arc-consistent? Satisfiable? seek higher levels of consistency V V 1 1 b a a b V V V V 2 3 2 a b 3 b a a b a b
WARNING → Completeness: (i.e., for solving the CSP)Running the Waltz Algorithm does not solve the problem. A=2 B=3 is still not a solution! →Quiescence: The Waltz algorithm may go into infinite loops even if problem is solvable x [0, 100] x = y y [0, 100] x = 2y →Davis characterizes the completeness and quiescence of the Waltz algorithm (see Table 3) in terms of • constraint types • domain types
Outline • Motivation (done) & background • Node consistency and its complexity • Arc consistency and its complexity • Criteria for performance comparison and CSP parameters. • Experiments • Random CSPs (Model B) • Statistical Analysis
Empirical evaluations: random problems • Various models exist (use Model B) • Models A, B, C, E, F, etc. • Vary parameters: <n, a, t, p> • Number of variables: n • Domain size: a,d • Constraint tightness: t = |forbidden tuples| / | all tuples | • Proportion of constraints (a.k.a., constraint density, constraint probability): p1 = e / emax • Issues: • Uniformity • Difficulty (phase transition) • Solvability of instances (for incomplete search techniques)
Model B • Input: n, a, t, p1 • Generate n nodes • Generate a list of n.(n-1)/2 tuples of all combinations of 2 nodes • Choose e elements from above list as constraints to between the n nodes • If the graph is not connected, throw away, go back to step 4, else proceed • Generate a list of a2 tuples of all combinations of 2 values • For each constraint, choose randomly a number of tuples from the list to guarantee tightness t for the constraint
Phase transition [Cheeseman et al. ‘91] Mostly un-solvable problems Mostly solvable problems Cost of solving Order parameter Critical value of order parameter • Significant increase of cost around critical value • In CSPs, order parameter is constraint tightness & ratio • Algorithms compared around phase transition
Tests • Fix n, a, p1 and • Vary t in {0.1, 0.2, …,0.9} • Fix n, a, t and • Vary p1 in {0.1, 0.2, …,0.9} • For each data point (for each value of t/p1) • Generate (at least) 50 instances • Store all instances • Make measurements • #CC, CPU time (in other contexts, #NV, #messages, etc.)
Comparing two algorithms A1 and A2 • Store all measurements in Excel • Use Excel, R, SAS, etc. for statistical measurements • Use the t-test, paired test • Comparingmeasurements • A1, A2 a significantly different • Comparing ln measurements • A1is significantly better than A2 For Excel: Microsoft button, Excel Options, Adds in, Analysis ToolPak, Go, check the box for Analysis ToolPak, Go. Intall…