Skip to main content

Sequential Precede Chain for Value Symmetry Elimination

  • Conference paper
  • First Online:
Principles and Practice of Constraint Programming (CP 2018)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11008))

  • 1558 Accesses

Abstract

The main global constraint used for removing value symmetries is the value-precede-chain constraint which forces the first occurences of values in an ordered list to be appear in order. We introduce the seq-precede-chain constraint for the restricted, but common, case where the values are \(1,2, \ldots , k\), and variables in the constraint do not take values higher than k. We construct an efficient domain consistent propagator for this constraint, and show how we can generate explanations for its propagation. This leads us to an efficient domain consistent decomposition. We show how we can map any value-precede-chain to use instead seq-precede-chain. Experiments show that the new propagator and decomposition are better than existing approachs to propagating value-precede-chain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    That is, \(\exists ~b_1,\ldots ,b_n.~((b_1 \leftrightarrow x_1=s) \wedge \bigwedge _{i= 2}^{n} b_i \leftrightarrow (b_{i-1} \vee \left\langle x_{i-1} = s \right\rangle ) \wedge \left\langle x_i = t \right\rangle \rightarrow b_{i-1}\). Here \(b_i\) records whether there is an occurrence of s no later than \(x_i\).

  2. 2.

    Note that the size equivalences are generated independently of other instance parameters, so may break existing dominance relationships.

References

  1. Law, Y.C., Lee, J.H.M.: Global constraints for integer and set value precedence. In: Wallace, M. (ed.) CP 2004. LNCS, vol. 3258, pp. 362–376. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30201-8_28

    Chapter  Google Scholar 

  2. Beldiceanu, N., Carlsson, M., Régin, J., Demassey, S.: Global constraint catalogue: \(\mathtt {int\_value\_precede\_chain}\). http://sofdem.github.io/gccat/gccat/Cint_value_precede_chain.html. Accessed April 2018

  3. Pesant, G.: A regular language membership constraint for finite sequences of variables. In: Wallace, M. (ed.) CP 2004. LNCS, vol. 3258, pp. 482–495. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30201-8_36

    Chapter  MATH  Google Scholar 

  4. Cheng, K.C.K., Yap, R.H.C.: Maintaining generalized arc consistency on ad hoc r-ary constraints. In: Stuckey, P.J. (ed.) CP 2008. LNCS, vol. 5202, pp. 509–523. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85958-1_34

    Chapter  Google Scholar 

  5. Perez, G., Régin, J.-C.: Improving GAC-4 for table and MDD constraints. In: O’Sullivan, B. (ed.) CP 2014. LNCS, vol. 8656, pp. 606–621. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10428-7_44

    Chapter  Google Scholar 

  6. Gange, G., Stuckey, P.J., Szymanek, R.: MDD propagators with explanation. Constraints 16(4), 407–429 (2011)

    Article  MathSciNet  Google Scholar 

  7. Katsirelos, G., Narodytska, N., Walsh, T.: Reformulating global grammar constraints. In: van Hoeve, W.-J., Hooker, J.N. (eds.) CPAIOR 2009. LNCS, vol. 5547, pp. 132–147. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01929-6_11

    Chapter  Google Scholar 

  8. Abío, I., Gange, G., Mayer-Eichberger, V., Stuckey, P.J.: On CNF encodings of decision diagrams. In: Quimper, C.-G. (ed.) CPAIOR 2016. LNCS, vol. 9676, pp. 1–17. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33954-2_1

    Chapter  MATH  Google Scholar 

  9. Ohrimenko, O., Stuckey, P., Codish, M.: Propagation via lazy clause generation. Constraints 14(3), 357–391 (2009)

    Article  MathSciNet  Google Scholar 

  10. Freuder, E.C.: A sufficient condition for backtrack-free search. J. ACM 29(1), 24–32 (1982)

    Article  MathSciNet  Google Scholar 

  11. Chu, G.: Improving combinatorial optimization. Ph.D. thesis, Department of Computing and Information Systems, University of Melbourne (2011)

    Google Scholar 

  12. Law, Y.C., Lee, J.H.: Symmetry breaking constraints for value symmetries in constraint satisfaction. Constraints 11(2–3), 221–267 (2006)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This research is supported by the Australian Research Council through grant DE160100568 and the Asian Office of Aerospace Research and Development grant 15-4016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Graeme Gange .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gange, G., Stuckey, P.J. (2018). Sequential Precede Chain for Value Symmetry Elimination. In: Hooker, J. (eds) Principles and Practice of Constraint Programming. CP 2018. Lecture Notes in Computer Science(), vol 11008. Springer, Cham. https://doi.org/10.1007/978-3-319-98334-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98334-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98333-2

  • Online ISBN: 978-3-319-98334-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics