Recognition of q-Horn formulae in linear time
Discrete Applied Mathematics
Variable and term removal from Boolean formulae
Discrete Applied Mathematics
Journal of Computer and System Sciences - Special issue on the fourteenth annual IEE conference on computational complexity
Which problems have strongly exponential complexity?
Journal of Computer and System Sciences
A perspective on certain polynomial-time solvable classes of satisfiability
Discrete Applied Mathematics
An efficient fixed-parameter algorithm for 3-hitting set
Journal of Discrete Algorithms
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Backdoors to typical case complexity
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
The Multivariate Algorithmic Revolution and Beyond
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I
Parameterized Complexity
Hi-index | 0.00 |
We obtain upper and lower bounds for running times of exponential time algorithms for the detection of weak backdoor sets of 3CNF formulas, considering various base classes. These results include (omitting polynomial factors), (i) a 4.54k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Horn formulas; (ii) a 2.27k algorithm to detect whether there is a weak backdoor set of at most k variables into the class of Krom formulas. These bounds improve an earlier known bound of 6k. We also prove a 2k lower bound for these problems, subject to the Strong Exponential Time Hypothesis.