skip to main content
research-article

Cops-Robber Games and the Resolution of Tseitin Formulas

Published:04 March 2020Publication History
Skip Abstract Section

Abstract

We characterize several complexity measures for the resolution of Tseitin formulas in terms of a two person cop-robber game. Our game is a slight variation of the one Seymour and Thomas used in order to characterize the tree-width parameter. For any undirected graph, by counting the number of cops needed in our game in order to catch a robber in it, we are able to exactly characterize the width, variable space, and depth measures for the resolution of the Tseitin formula corresponding to that graph. We also give an exact game characterization of resolution variable space for any formula.

We show that our game can be played in a monotone way. This implies that the associated resolution measures on Tseitin formulas correspond exactly to those under the restriction of Davis-Putnam resolution, implying that this kind of resolution is optimal on Tseitin formulas for all the considered measures.

Using our characterizations, we improve the existing complexity bounds for Tseitin formulas showing that resolution width, depth, and variable space coincide up to a logarithmic factor, and that variable space is bounded by the clause space times a logarithmic factor.

References

  1. I. Adler. 2004. Marshals, monotone marshals, and hypertree width. Journal of Graph Theory 47 (2004), 275--296.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Alekhnovich and A. A. Razborov. 2011. Satisfiability, branch-width and Tseitin tautologies. Computational Complexity 20, 4 (2011), 649--678.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Alekhnovich, E. Ben-Sasson, A. A. Razborov, and A. Wigderson. 2002. Space complexity in propositional calculus. SIAM J. Comput. 31, 4 (2002), 1184--1211.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Atserias. 2008. On digraph coloring problems and trewidth duality. European Journal of Combinatorics 29 (2008), 796--820.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Atserias and V. Dalmau. 2003. A combinatorial characterization of resolution width. In Proceedings of the 18th IEEE Conference on Computational Complexity. 239--247.Google ScholarGoogle Scholar
  6. P. Beame, C. Beck, and R. Impagliazzo. 2016. Time-space trade-offs in resolution: Superpolynomial lower bounds for superlinear space. SIAM J. Comput. 49, 4 (2016), 1612--1645.Google ScholarGoogle ScholarCross RefCross Ref
  7. C. Beck, J. Nordström, and B. Tang. 2013. Some trade-off results for polynomial calculus: Extended abstract. Proceedings of the 45th ACM Symposium on the Theory of Computing (2013), 813--822.Google ScholarGoogle Scholar
  8. E. Ben-Sasson and A. Wigderson. 2001. Short proofs are narrow—Resolution made simple. Journal of the ACM 48, 2 (2001), 149--169.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. A. Ellis, I. H. Sudborough, and J. S. Turner. 1994. The vertex separation and search number of a graph. Information and Computation 113, 1 (1994), 50--79.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. L. Esteban and J. Torán. 2001. Space bounds for resolution. Information and Computation 171, 1 (2001), 84--97.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. V. Fomin and D. Thilikos. 2008. An annotated bibliography on guaranteed graph searching. Theoretical Computer Science 399 (2008), 236--245.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Gottlob, N. Leone, and F. Scarello. 2003. Robbers, marshals and guards: Game theoretic and logical characterizations of hypertree width. Journal of Computer and System Sciences 66 (2003), 775--808.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Hertel. 2008. Applications of games to propositional proof complexity. Ph.D. Thesis. University of Toronto, 2008.Google ScholarGoogle Scholar
  14. L. M. Kirousis and C. H. Papadimitriou. 1986. Searching and pebbling. Theoretical Computer Science 47, 3 (1986), 205--218.Google ScholarGoogle ScholarCross RefCross Ref
  15. A. S. LaPaugh. 1883. Recontamination does not help to search a graph. Tech. Report Electrical Engineering and Comp. Science Dept. Princeton University, 1883.Google ScholarGoogle Scholar
  16. A. Razborov. 2018. On space and depth in resolution. Computational Complexity 27, 3 (2018), 511--559.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. D. Seymour and R. Thomas. 1993. Graph searching and a min-max theorem of tree-width. Journal of Combinatorial Theory Series B 58 (1993), 22--35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Torán. 2004. Space and width in propositional resolution. Computational Complexity Column, Bulletin of EATCS 83 (2004), 86--104.Google ScholarGoogle Scholar
  19. G. S. Tseitin. 1968. On the complexity of derivation in propositional calculus. In Studies in Constructive Mathematics and Mathematical Logic, Part 2, pages 115--125. Consultants Bureau, 1968.Google ScholarGoogle Scholar
  20. A. Urquhart. 1987. Hard examples for resolution. Journal of the ACM 34 (1987), 209--219.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Urquhart. 2011. The depth of resolution proofs. Studia Logica 99 (2011), 349--364.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Urquhart. 2012. Width and size of regular resolution proofs. Logical Methods in Computer Science 8 (2012), 1--15.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Cops-Robber Games and the Resolution of Tseitin Formulas

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Computation Theory
          ACM Transactions on Computation Theory  Volume 12, Issue 2
          June 2020
          138 pages
          ISSN:1942-3454
          EISSN:1942-3462
          DOI:10.1145/3382781
          Issue’s Table of Contents

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 March 2020
          • Accepted: 1 November 2019
          • Revised: 1 April 2019
          • Received: 1 October 2018
          Published in toct Volume 12, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format