Download presentation

Presentation is loading. Please wait.

1
**Introduction to Constraint Programming**

Peter van Beek University of Waterloo

2
**Acknowledgements Patrick Prosser Christian Schulte Michael Chase**

Abid Malik Tyrel Russell

3
**Outline Introduction Constraint propagation Backtracking search**

Global constraints Symmetry Modeling

4
**Some additional resources**

“Handbook of Constraint Programming,” edited by F. Rossi, P. van Beek, T. Walsh “Constraint-Based Local Search”, by Pascal Van Hentenryck and Laurent Michel Integrated Methods for Optimization, by John N. Hooker “Programming with Constraints,” by Kim Marriott, Peter J. Stuckey “Principles of Constraint Programming,” by Krzysztof Apt “Constraint Processing,” by Rina Dechter

5
**Outline Introduction Constraint propagation Backtracking search**

Global constraints Symmetry Modeling

6
**What is constraint programming?**

Idea: Solve a problem by stating constraints on acceptable solutions Advantages: constraints often a natural part of problems especially true of difficult combinatorial problems once problem is modeled using constraints, wide selection of solution techniques available Constraint programming is an active area of research draws on techniques from artificial intelligence, algorithms, databases, programming languages, and operations research

7
**What is constraint programming?**

Constraint programming is similar to mathematical programming declarative user states the constraints general purpose constraint solver, often based on backtracking search, is used to solve the constraints Constraint programming is similar to computer programming extensible user-defined constraints allows user to program a strategy to search for a solution

8
**What is constraint programming?**

Constraint programming is a problem-solving methodology Model problem Solve model specify in terms of constraints on acceptable solutions define/choose constraint model: variables, domains, constraints define/choose search algorithm define/choose heuristics

9
**What is constraint programming?**

Constraint programming is a collection of core techniques Modeling deciding on variables/domains/constraints improving the efficiency of a model Solving local consistency constraint propagation global constraints search backtracking search hybrid methods

10
**Acknowledgement: Patrick Prosser**

Place numbers 1 through 8 on nodes, where each number appears exactly once and no connected nodes have consecutive numbers ? Acknowledgement: Patrick Prosser

11
**Backtracking search ? Guess a value, but be prepared to backtrack**

Which nodes are hardest to number?

12
Backtracking search ? Which nodes are hardest to number?

13
**Backtracking search ? Which are the least constraining values to use?**

14
Backtracking search ? 1 8 Symmetry means we don’t need to consider:

15
**Inference/propagation**

{1,2,3,4,5,6,7,8} ? 1 8 We can now eliminate many values for other nodes

16
**Inference/propagation**

{3,4,5,6} ? 1 8 {3,4,5,6} By symmetry

17
**Inference/propagation**

{3,4,5,6} {1,2,3,4,5,6,7,8} ? 1 8 {3,4,5,6}

18
**Inference/propagation**

{3,4,5,6} {3,4,5,6} ? 1 8 {3,4,5,6} {3,4,5,6} By symmetry

19
**Inference/propagation**

{3,4,5,6} {3,4,5,6} ? 1 8 {3,4,5,6,7} {2,3,4,5,6} {3,4,5,6} {3,4,5,6}

20
**Inference/propagation**

{3,4,5,6} {3,4,5,6} ? 1 8 2 7 {3,4,5,6} {3,4,5,6}

21
**Inference/propagation**

{3,4,5,6} {3,4,5,6} ? 1 8 2 7 {3,4,5,6} {3,4,5,6} And propagate

22
**Inference/propagation**

{3,4,5} {4,5,6} ? 1 8 2 7 {3,4,5} {4,5,6} Guess a value, but be prepared to backtrack

23
**Inference/propagation**

{4,5,6} 3 1 ? 8 2 7 {3,4,5} {4,5,6} Guess a value, but be prepared to backtrack

24
**Inference/propagation**

{4,5,6} 3 1 ? 8 2 7 {3,4,5} {4,5,6} And propagate

25
**Inference/propagation**

{5,6} 3 1 ? 8 2 7 {4,5} {4,5,6} More propagation?

26
**Inference/propagation**

3 1 4 5 8 6 2 7 A solution

27
**Constraint programming methodology**

Model problem Solve model specify in terms of constraints on acceptable solutions define/choose constraint model: variables, domains, constraints define/choose search algorithm define/choose heuristics Constraint Satisfaction Problem

28
**Constraint satisfaction problem (CSP)**

A CSP is defined by: a set of variables {x1, …, xn} a set of values for each variable dom(x1), …, dom(xn) a set of constraints {C1, …, Cm} A solution to a CSP is a complete assignment to all the variables that satisfies the constraints

29
**Given a CSP Determine whether it has a solution or not**

Find one solution Find all solutions Find an optimal solution, given some cost function

30
**Example domains and constraints**

Reals, linear constraints 3x + 4y ≤ 7, 5x – 3y + z = 2 Guassian elimination, linear programming Integers, linear constraints integer linear programming, branch-and-bound Boolean values, clauses Here: finite domains rich constraint languages user-defined constraints global constraints

31
**Constraint languages Usual arithmetic operators:**

=, , , < , > , , + , , *, /, absolute value, exponentiation e.g., 3x + 4y 7, 5x3 – x*y = 9 Usual logical operators: , , , (or “if … then”) e.g., if x = 1 then y = 2, x y z, (3x + 4y 7) (x*y = z) Global constraints: alldifferent(x1, …, xn) pairwise different cardinality(x1, …, xn, l, u) each value must be assigned to at least l variables and at most u variables Table constraints

32
**Constraint model for puzzle**

variables v1, …, v8 domains {1, …, 8} constraints | v1 – v2 | 1 | v1 – v3 | 1 … | v7 – v8 | 1 alldifferent(v1, …, v8) ?

33
**Example: Instruction scheduling**

Given a basic-block of code and a multiple-issue pipelined processor, find the minimum length schedule (a + b) + c

34
**Example: evaluate (a + b) + c**

instructions A r1 a B r2 b C r3 c D r1 r1 + r2 E r1 r1 + r3 3 1 A B D C E dependency DAG

35
**Example: evaluate (a + b) + c**

non-optimal schedule A r1 a B r2 b nop D r1 r1 + r2 C r3 c E r1 r1 + r3 3 1 A B D C E dependency DAG

36
**Example: evaluate (a + b) + c**

optimal schedule A r1 a B r2 b C r3 c nop D r1 r1 + r2 E r1 r1 + r3 3 1 A B D C E dependency DAG

37
**Constraint model variables A, B, C, D, E domains {1, …, m} constraints**

D A + 3 D B + 3 E C + 3 E D + 1 cardinality(A, B, C, D, E, 0, width) 3 1 A B D C E dependency DAG

38
**Example: Boolean satisfiability**

(x1 x2 x4) (x2 x4 x5) (x3 x4 x5) Given a Boolean formula, does there exist a satisfying assignment

39
**Constraint model variables: x1, x2 , x3 , x4 , x5 domains:**

{true, false} constraints: (x1 x2 x4) (x2 x4 x5) (x3 x4 x5) (x1 x2 x4) (x2 x4 x5) (x3 x4 x5)

40
**Example: 3-SAT A solution x1 = false x2 = false x3 = false**

x4 = true x5 = false (x1 x2 x4) (x2 x4 x5) (x3 x4 x5)

41
**Example: Graph coloring**

Given k colors, does there exist a coloring of the nodes such that adjacent nodes are assigned different colors

42
**Example: 3-coloring variables: v1, v2 , v3 , v4 , v5 v1 v2 domains:**

{1, 2, 3} constraints: vi vj if vi and vj are adjacent v1 v2 v3 v4 v5

43
**Example: 3-coloring A solution v1 = 1 v1 v2 = 2 v2 v3 = 2 v4 = 1**

44
Example: n-queens Place n-queens on an n n board so that no pair of queens attacks each other

45
**Constraint model variables: x1, x2 , x3 , x4 domains: {1, 2, 3, 4}**

constraints: x1 x2 | x1 – x2 | 1 x1 x3 | x1 – x3 | 2 x1 x4 | x1 – x4 | 3 x2 x3 | x2 – x3 | 1 x2 x4 | x2 – x4 | 2 x3 x4 | x3 – x4 | 1 x1 x2 x3 x4 1 2 3 4

46
**Example: 4-queens Q Q Q Q x1 x2 x3 x4 A solution x1 = 2 x2 = 4 x3 = 1**

47
**A closer look at constraints**

An assignment (also called an instantiation) x = a, where a dom(x), A tuple t over an ordered set of variables {x1, …, xk} is an ordered list of values (a1, …, ak) such that ai dom(xi), i = 1, …, k can be viewed as a set of assignments {x1 = a1, …, xk = ak} Given a tuple t, notation t[xi] selects out the value for variable xi; i.e.,t[xi] = ai

48
**A closer look at constraints**

Each constraint C is a relation a set of tuples over some ordered subset of the variables, denoted by vars(C) specifies the allowed combinations of values for the variables in vars(C) The size of vars(C) is known as the arity of the constraint a unary constraint has an arity of 1 a binary constraint has an arity of 2 a non-binary constraint has arity greater than 2

49
**Example Let intensional Then extensional (table constraint)**

dom(x1) = {1, 2, 3, 4}, dom(x2) = {1, 2, 3, 4} C be the constraint x1 x2 | x1 – x2 | 1 Then vars(C) = {x1, x2} tuples in C = {(1,3), (1,4), (2,4), (3,1), (4,1), (4,2)} C is a binary constraint intensional extensional (table constraint)

50
**Constraint programming methodology**

Model problem Solve model specify in terms of constraints on acceptable solutions define/choose constraint model: variables, domains, constraints define/choose search algorithm define/choose heuristics Constraint Satisfaction Problem

51
**Example constraint systems/languages**

52
**Application areas scheduling logistics planning**

supply chain management rostering timetabling vehicle routing bioinformatics networks configuration assembly line sequencing cellular frequency assignment airport counter and gate allocation airline crew scheduling optimize placement of transmitters for wireless …

53
**Some commercial applications**

54
**Testimonial Hi Prof. van Beek,**

I am a graduate student from Management Sciences and was in your AI and CP courses last year. I applied some of the CP concepts like redundant modeling and exploiting problem symmetry that you taught us in class to optimization problems at Canadian Tire. This together with the MIP solver was able to give us much better results in a fraction of the time. The integration of CP and OR was at a very high level and not at the solver level, which the Optimization team at Canadian Tire found very encouraging (they do not like anything complex). Following this, I am working as a part time Optimization consultant this term to explore further research avenues for logistics problems that they have. Just thought I should share the CP success story and thank you for introducing me to CP. Best regards, A Grateful Student

55
**Outline Introduction Constraint propagation Backtracking search**

Global constraints Soft constraints Symmetry Modeling

56
**Fundamental insight: Local consistency**

A local inconsistency is an instantiation of some of the variables that satisfies the relevant constraints but: cannot be extended to one or more additional variables so cannot be part of any solution Has led to: definitions of conditions that characterize the level of local consistency of a CSP algorithms which enforce these levels of local consistency by removing inconsistencies from the CSP effective backtracking algorithms for finding solutions to a CSP that maintain a level of local consistency during the search

57
**Enforcing local consistency: constraint propagation**

Here, focus on: Given a constraint, remove a value from the domain of a variable if it cannot be part of a solution according to that constraint

58
**Local consistency: arc consistency**

Given a constraint C, a value a dom(x) for a variable x vars(C) has: a domain support in C if there exists a t C such that t[x] = a and t[y] dom(y), for every y vars(C) i.e., there exists values for each of the other variables (from their respective domains) such that the constraint is satisfied A constraint C is: arc consistent iff for each x vars(C), each value a dom(x) has a domain support in C A CSP is: arc consistent if every constraint is arc consistent A CSP can be made arc consistent by repeatedly removing unsupported values from the domains of its variables

59
**Arc consistency’s other names**

domain consistency hyper-arc consistency generalized arc consistency (GAC)

60
**Generic arc consistency algorithm**

ac() : boolean Q all variable/constraint pairs (x, C) while Q {} do select and remove a pair (x, C) from Q if revise(x, C) then if dom(x) = {} return false else add pairs to Q return true revise(x, C) : boolean change false for each v dom(x) do if t C s.t. t[x] = v then remove v from dom(x) change true return change

61
**Generic arc consistency algorithm**

ac() : boolean Q all variable/constraint pairs (x, C) while Q {} do select and remove a pair (x, C) from Q if revise(x, C) then if dom(x) = {} return false else add pairs to Q return true variable x y z domain {1, 2, 3} constraints C1: x < y C2: y < z revise(x, C) : boolean change false for each v dom(x) do if t C s.t. t[x] = v then remove v from dom(x) change true return change

62
**4-queens: Is it arc consistent?**

variables: x1, x2 , x3 , x4 domains: {1, 2, 3, 4} constraints: x1 x2 | x1 – x2 | 1 x1 x3 | x1 – x3 | 2 x1 x4 | x1 – x4 | 3 x2 x3 | x2 – x3 | 1 x2 x4 | x2 – x4 | 2 x3 x4 | x3 – x4 | 1 x1 x2 x3 x4 Q Q 1 Q Q 2 Q Q 3 Q Q 4

63
**Improvements Much work on efficient algorithms for table constraints**

Special purpose algorithms for global constraints (coming later)

64
**Local consistency: bounds consistency**

Given a constraint C, a value a dom(x) for a variable x vars(C) has: an interval support in C if there exists a t C such that t[x] = a and t[y] [min(dom(y)), max(dom(y))], for every y vars(C) i.e., there exists values for each of the other variables (from their respective domains treated as an interval) such that the constraint is satisfied A constraint C is said to be: bounds consistent iff for each x vars(C), each of the values min(dom(x)) and max(dom(x)) has an interval support in C A CSP is: bounds consistent if every constraint is bounds consistent A CSP can be made bounds consistent by repeatedly removing unsupported values from the domains of its variables

65
**Example of bounds consistency: instruction scheduling**

variables A, B, C, D, E domains {1, …, m} constraints D A + 3 D B + 3 E C + 3 E D + 1 cardinality(A, B, C, D, E, 0, width) 3 1 A B D C E dependency DAG

66
**Constraint propagation: Bounds consistency**

variable A B C D E domain [1, 6] [1, 3] [1, 2] [1, 3] [1, 2] [1, 3] [3, 3] [4, 6] [4, 5] [4, 6] [5, 6] [6, 6] constraints D A + 3 D B + 3 E C + 3 E D + 1 cardinality(A, B, C, D, E, 1)

67
**Singleton consistency**

Let t be a set of assignments to some of the variables of a CSP P e.g., {x = 1} The CSP induced by t, denoted P|t, is the same as P except that the domain of each variable x in vars(t) contains only one value t[x], the value that has been assigned to x by t e.g., for P|{x = 1}, the domain of x is just {1}; everything else the same A CSP P is: singleton arc consistent iff for all variables x, for all a dom(x), P|{x=a} is not arc inconsistent singleton bounds consistent iff for all variables x, for all a dom(x), P|{x=a} is not bounds inconsistent

68
**Constraint propagation: Singleton arc consistency**

Consider { x1 = 1} variable x1 x2 x3 x4 domain {1, 2, 3, 4} 4 3 2 1 x1 x2 x3 x4 Q constraints x1 x2 | x1 – x2 | 1 x1 x3 | x1 – x3 | 2 x1 x4 | x1 – x4 | 3 x2 x3 | x2 – x3 | 1 x2 x4 | x2 – x4 | 2 x3 x4 | x3 – x4 | 1 ?

69
**Constraint propagation: Singleton arc consistency**

Consider { x1 = 2} variable x1 x2 x3 x4 domain {1, 2, 3, 4} 4 3 2 1 x1 x2 x3 x4 Q constraints x1 x2 | x1 – x2 | 1 x1 x3 | x1 – x3 | 2 x1 x4 | x1 – x4 | 3 x2 x3 | x2 – x3 | 1 x2 x4 | x2 – x4 | 2 x3 x4 | x3 – x4 | 1 ?

70
**Outline Introduction Constraint propagation Backtracking search**

Global constraints Symmetry Modeling

71
**Constraint programming methodology**

Model problem Solve model specify in terms of constraints on acceptable solutions define/choose constraint model: variables, domains, constraints define/choose search algorithm define/choose heuristics

72
**Backtracking search CSPs often solved using backtracking search**

Many techniques for improving efficiency of a backtracking search algorithm branching strategies, constraint propagation, nogood recording, non-chronological backtracking (backjumping), heuristics for variable and value ordering, portfolios and restart strategies techniques are not always orthogonal; combining can give a multiplicative effect a degradation effect Best combinations of these techniques give robust backtracking algorithms that can routinely solve large, hard instances that are of practical importance

73
**Outline Introduction Constraint propagation Backtracking search**

branching strategies constraint propagation non-chronological backtracking nogood recording heuristics for variable and value ordering portfolios and restart strategies Global constraints Symmetry Modeling

74
Backtracking search A backtracking search is a depth-first traversal of a search tree search tree is generated as the search progresses search tree represents alternative choices that may have to be examined in order to find a solution method of extending a node in the search tree is often called a branching strategy

75
**Generic backtracking algorithm**

treeSearch( i : integer ) : integer if all variables assigned a value then return 0 // solution found x getNextVariable( ) backtrackLevel i for each branching constraint bi do post( bi ) if propagate( bi ) then backtrackLevel treeSearch( i + 1 ) undo( bi ) if backtrackLevel < i then return backtrackLevel backtrackLevel getBacktrackLevel() setNogoods()

76
**Branching strategies …**

A node p = {b1, …, bj} in the search tree is a set of branching constraints, where bi, 1 ≤ i ≤ j, is the branching constraint posted at level i in search tree A node p is extended by posting a branching constraint to ensure completeness, the constraints posted on all the branches from a node must be mutually exclusive and exhaustive p = {b1, …, bj} p {bj+1} 1 k …

77
**Popular branching strategies**

Running example: let x be the variable branched on, let dom(x) = {1, …, 6} Enumeration (or d-way branching) variable x is instantiated in turn to each value in its domain e.g., x = 1 is posted along the first branch, x = 2 along second branch, … Binary choice points (or 2-way branching) variable x is instantiated to some value in its domain e.g., x = 1 is posted along the first branch, x 1 along second branch, respectively Domain splitting constraint posted splits the domain of the variable e.g., x 3 is posted along the first branch, x > 3 along second branch, respectively

78
**Other branching strategies**

Posting non-unary branching constraints, branching strategies that are specific to class of problems Example: job shop scheduling must schedule a set of tasks t1, …, tk on a set of resources let xi be a variable representing the starting time of task ti let di be the fixed duration of task ti idea: serialize the tasks that share a resource consider two task t1 and t2 which share a resource post the constraint x1 + d1 <= x2 along one branch post the constraint x2 + d2 <= x1 along the other branch

79
**Outline Introduction Constraint propagation Backtracking search**

branching strategies constraint propagation non-chronological backtracking nogood recording heuristics for variable and value ordering portfolios and restart strategies Global constraints Symmetry Modeling

80
**Constraint propagation**

Effective backtracking algorithms for constraint programming maintain a level of local consistency during the search; i.e., perform constraint propagation A generic scheme to maintain a level of local consistency in a backtracking search is to perform constraint propagation at each node in the search tree if any domain of a variable becomes empty, inconsistent so backtrack

81
**Constraint propagation**

Backtracking search integrated with constraint propagation has two important benefits 1. removing inconsistencies during search can dramatically prune the search tree by removing deadends and by simplifying the remaining sub-problem 2. some of the most important variable ordering heuristics make use of the information gathered by constraint propagation

82
**Maintaining a level of local consistency**

Definitions of local consistency can be categorized by whether: only unary constraints need to be posted during constraint propagation; sometimes called domain filtering higher arity constraints may need to be posted In implementations of backtracking domains represented extensionally posting and retracting unary constraints can be done very efficiently important that algorithms for enforcing a level of local consistency be incremental

83
**Some backtracking algorithms**

Chronological backtracking (BT) naïve backtracking: performs no constraint propagation, only checks a constraint if all of its variables have been instantiated; chronologically backtracks Forward checking (FC) maintains arc consistency on all constraints with exactly one uninstantiated variable; chronologically backtracks Maintaining arc consistency (MAC) maintains arc consistency on all constraints with at least one uninstantiated variable; chronologically backtracks Conflict-directed backjumping (CBJ) backjumps; no constraint propagation

84
**Constraint model for 4-queens**

variables: x1, x2 , x3 , x4 domains: {1, 2, 3, 4} constraints: x1 x2 | x1 – x2 | 1 x1 x3 | x1 – x3 | 2 x1 x4 | x1 – x4 | 3 x2 x3 | x2 – x3 | 1 x2 x4 | x2 – x4 | 2 x3 x4 | x3 – x4 | 1 x1 x2 x3 x4 1 2 3 4

85
**Search tree for 4-queens**

x1=1 x1= 4 x1 x2 x3 x4 (1,1,1,1) (2,4,1,3) (3,1,4,2) (4,4,4,4)

86
**Chronological backtracking (BT)**

Q … Q Q Q Q Q

87
**Forward checking (FC) Q**

Enforce arc consistency on constraints with exactly one variable uninstantiated 4 3 2 1 x1 x2 x3 x4 Q { x1 = 1} constraints: x1 x2 |x1 – x2| 1 x1 x3 |x1 – x3| 2 x1 x4 |x1 – x4| 3

88
**Forward checking (FC) on 4-queens**

… Q Q Q Q

89
**Maintaining arc consistency (MAC)**

Enforce arc consistency on constraints with at least one variable uninstantiated { x1 = 1} 4 3 2 1 x1 x2 x3 x4 Q constraints: x1 x2 | x1 – x2 | 1 x1 x3 | x1 – x3 | 2 x1 x4 | x1 – x4 | 3 x2 x3 | x2 – x3 | 1 x2 x4 | x2 – x4 | 2 x3 x4 | x3 – x4 | 1 ?

90
**Maintaining arc consistency (MAC) on 4-queens**

√

91
**Outline Introduction Constraint propagation Backtracking search**

branching strategies constraint propagation non-chronological backtracking nogood recording heuristics for variable and value ordering portfolios and restart strategies Global constraints Symmetry Modeling

92
**Non-chronological backtracking**

Upon discovering a deadend, a backtracking algorithm must retract some previously posted branching constraint chronological backtracking: only the most recently posted branching constraint is retracted non-chronological backtracking: algorithm backtracks to and retracts the closest branching constraint which bears some responsibility for the deadend

93
**Conflict-directed backjumping (CBJ)**

{x1 = 1} x1 x3 x4 x2 Q 4 3 2 1 x1 {x1 = 1, x2 = 3} Q x2 Q x1 {x1 = 1, x2 = 3 , x4 = 2} x2 x3

94
**Outline Introduction Constraint propagation Backtracking search**

branching strategies constraint propagation non-chronological backtracking nogood recording heuristics for variable and value ordering portfolios and restart strategies Global constraints Symmetry Modeling

95
Nogood recording One of the most effective techniques known for improving the performance of backtracking search on a CSP is to add redundant (implied) constraints a constraint is redundant if set of solutions does not change when constraint is added Three methods: add hand-crafted constraints during modeling apply a consistency algorithm before solving learn constraints while solving nogood recording

96
Nogood recording A nogood is a set of assignments and branching constraints that is not consistent with any solution i.e., there does not exist a solutionan assignment of a value to each variable that satisfies all the constraintsthat also satisfies all the assignments and branching constraints in the nogood

97
**Example nogoods: 4-queens**

3 2 1 Q x1 x3 x4 x2 Set of assignments {x1 = 1, x2 = 3} is a nogood to rule out the nogood, the redundant constraint (x1 = 1 x2 = 3) could be recorded, which is just x1 1 x2 3 recorded constraints can be checked and propagated just like the original constraints But {x1 = 1, x2 = 3} is not a minimal nogood

98
Nogood recording If the CSP had included the nogood as a constraint, deadend would not have been visited Idea: record nogoods that might be useful later in the search

99
**Discovering nogoods Discover nogoods when: Tricky when:**

during backtracking search when current set of assignments and branching constraints fails during backtracking search when nogoods have been discovered for every branch set of assignments {x1 = 1, x2 = 1} is a nogood set of assignments {x1 = 1, x2 = 2} is a nogood set of assignments {x1 = 1, x2 = 3} is a nogood set of assignments {x1 = 1, x2 = 4} is a nogood {x1 = 1} is a nogood Tricky when: backtracking algorithm maintains a level of local consistency in the presence of global constraints Standard in SAT solvers Currently not yet widely used for solving general CSPs

100
**Outline Introduction Constraint propagation Backtracking search**

branching strategies constraint propagation non-chronological backtracking nogood recording heuristics for variable and value ordering portfolios and restart strategies Global constraints Symmetry Modeling

101
**Heuristics for backtracking algorithms**

Variable ordering (very important) what variable to branch on next Value ordering (can be important) given a choice of variable, what order to try values

102
**Variable ordering Domain dependent heuristics**

Domain independent heuristics Static variable ordering fixed before search starts Dynamic variable ordering chosen during search

103
**Variable ordering: Possible goals**

Minimize the underlying search space static ordering example: suppose x1, x2, x3, x4 with domain sizes 2, 4, 8, 16 compare static ordering x1, x2, x3, x4 vs x4, x3, x2, x1 Minimize expected depth of any branch Minimize expected number of branches Minimize size of search space explored by backtracking algorithm intractable to find “best” variable

104
**Variable ordering: Basic idea**

Assign a heuristic value to a variable that estimates how difficult it is to find a satisfying value for that variable Principle: most likely to fail first or don’t postpone the hard part

105
**Some dynamic variable ordering heuristics**

Let rem( x | p ) be the number of values that remain in the domain of variable x after constraint propagation, give a set of branching constraints p. dom: choose the variable x that minimizes: rem( x | p ) dom / deg: divide domain size of a variable by degree of the variable dom / wdeg: divide domain size of a variable by weighted degree of variable

106
**Some dynamic variable ordering heuristics**

Let rem( x | p ) be the number of values that remain in the domain of variable x after constraint propagation, give a set of branching constraints p. More elaborate schemes, e.g., choose the variable x that minimizes: rem( y | p {x = a}) Impact-based variable ordering: count up effect (domain reductions) pick variable with largest effect works well in conjunction with singleton consistency a dom(x) y where y ranges over some or all unassigned variables

107
**Value ordering: Basic idea**

Principle: given that we have already chosen the next variable to instantiate, choose first the values that are most likely to succeed Choose the next value for variable x: estimate the number of solutions for each value a for x estimate the probability of a solution for each value a for x Example: choose the variable a dom(x) that maximizes: rem( y | p {x = a}) y where y ranges over some or all unassigned variables

108
**Outline Introduction Constraint propagation Backtracking search**

branching strategies constraint propagation non-chronological backtracking nogood recording heuristics for variable and value ordering portfolios and restart strategies Global constraints Symmetry Modeling

109
Portfolios Observation: Backtracking algorithms can be quite brittle, performing well on some instances but poorly on other similar instances Portfolios of algorithms have been proposed and shown to improve performance We are the last Dodos on the planet, so I’ve put all of our eggs safely into this basket…

110
**Portfolios: Definitions**

Given a set of backtracking algorithms and a time deadline d, a portfolio P for a single processor is a sequence of pairs, An algorithm selection portfolio is a portfolio where, A restart strategy portfolio is a portfolio where,

111
**Portfolios Instance-based Class-based**

intended to be used on an instance of a problem which portfolio determined online Class-based intended to be used on all instances in a class of problems which portfolio determined offline

112
**Examples of general portfolios**

Increasing levels of constraint propagation Phase 1 bounds consistency Phase 2 singleton bounds consistency Phase 3 singleton singleton bounds consistency Alternative search heuristics

113
**Restart strategy portfolio**

Randomize backtracking algorithm randomize selection of a value randomize selection of a variable A restart strategy (t1, t2, t3, …, tm) is a sequence idea: randomized backtracking algorithm is run for t1 steps. If no solution is found within that cutoff, the algorithm is restarted and run for t steps, and so on

114
Restart strategies Let f(t) be the probability a randomized backtracking algorithm A on instance x stops after taking exactly t steps f(t) is called the runtime distribution of algorithm A on instance x Given the runtime distribution of an instance, the optimal restart strategy for that instance is given by (t*, t*, t*, …), for some fixed cutoff t* A fixed cutoff strategy is an example of a non-universal strategy: designed to work on a particular instance

115
**Universal restart strategies**

Non-universal strategies are open to catastrophic failure In contrast to non-universal strategies, universal strategies are designed to be used on any instance Luby strategy Walsh strategy (1, 1, 2, 1, 1, 2, 4, 1, 1, 2, 1, 1, 2, 4, 8, 1, …) grows linearly (1, r, r2, r3, …), r > 1 grows exponentially

116
**Summary: backtracking search**

CSPs often solved using backtracking search Many techniques for improving efficiency of a backtracking search algorithm branching strategies, constraint propagation, nogood recording, non-chronological backtracking (backjumping), heuristics for variable and value ordering, portfolios and restart strategies Best combinations of these techniques give robust backtracking algorithms that can routinely solve large, hard instances that are of practical importance

117
**Outline Introduction Constraint propagation Backtracking search**

Global constraints Symmetry Modeling

118
Global constraints A global constraint is a constraint that can be specified over an arbitrary number of variables Advantages: captures common constraint patterns efficient, special purpose constraint propagation algorithms can be designed

119
**Alldifferent constraint**

Consists of: set of variables {x1, …, xn} Satisfied iff: each of the variables is assigned a different value

120
**Alldifferent: example of arc consistency**

Suppose alldifferent(x1, x2, x3, x4) where: dom(x1) = {b, c, d, e} dom(x2) = {b, d} dom(x3) = {a, b, c, d} dom(x4) = {b, d} Enforcing domain consistency yields dom(x1) = {c, e} dom(x3) = {a, c}

121
**Alldifferent: algorithm for arc consistency**

General idea: based on matching theory applied to variable-value graph Suppose alldifferent(x1, x2, x3, x4) where: dom(x1) = {b, c, d, e} dom(x2) = {b, d} dom(x3) = {a, b, c, d} dom(x4) = {b, d} Construct variable-value graph x1 x2 x3 x4 a b c d e

122
**Alldifferent: algorithm for arc consistency**

A matching is a subset of the edges such that no two edges share a vertex. A matching covers a set of vertices if each vertex participates in an edge. A matching that covers the variables is a solution to the constraint x1 x2 x3 x4 a b c d e

123
**Alldifferent: algorithm for arc consistency**

An alldifferent contraint is arc consistent if every edge in the variable-value graph belongs to some matching that covers the variables Remove edges/values that do not belong to some covering matching Example: x b x1 x2 x3 x4 a b c d e

124
**Alldifferent: algorithm for arc consistency**

An alldifferent constraint is arc consistent if every edge in the variable-value graph belongs to some matching that covers the variables Remove edges/values that do not belong to some covering matching Example: x b So, remove b from dom(x1) x1 x2 x3 x4 a b c d e

125
**Alldifferent: example of bounds consistency**

Suppose alldifferent(A, B, C, D, E, F) where: dom(A) = {3, 4, 5, 6} dom(B) = {3, 4} dom(C) = {2, 3, 4, 5} dom(D) = {2, 3, 4} dom(E) = {3, 4} dom(F) = {1, 2, 3, 4, 5, 6} Enforcing bounds consistency yields: dom(A) = {6} dom(B) = {3, 4} dom(C) = {5} dom(D) = {2} dom(E) = {3, 4} dom(F) = {1}

126
**Alldifferent: algorithm for bounds consistency**

General idea: based on Hall intervals Let I be an interval and let vars(I) be the set of variables whose domains are contained in I; i.e., vars(I) = { xi | dom(xi) I } A Hall interval is an interval I such that | vars(I) | = | I | Example: dom(A) = {3, 4, 5, 6} dom(B) = {3, 4} dom(C) = {2, 3, 4, 5} dom(D) = {2, 3, 4} dom(E) = {3, 4} dom(F) = {1, 2, 3, 4, 5, 6} Hall intervals [3, 4] vars([3,4]) = {B, E} [2, 4] vars([2,4]) = {B, D, E} [2, 5] vars([2,5]) = {B, C, D, E} [2, 6] vars([2,6]) = {A, B, C, D, E} [1, 6] vars([1,6]) = {A, B, C, D, E, F}

127
**Alldifferent: algorithm for bounds consistency**

If there exists a Hall interval I then any assignment of values to the variables in vars(I) will use all of the values in I So, remove these values from the domains of the other variables Example: dom(A) = {3, 4, 5, 6} dom(B) = {3, 4} dom(C) = {2, 3, 4, 5} dom(D) = {2, 3, 4} dom(E) = {3, 4} dom(F) = {1, 2, 3, 4, 5, 6} Hall intervals [3, 4] vars([3,4]) = {B, E} [2, 4] vars([2,4]) = {B, D, E} [2, 5] vars([2,5]) = {B, C, D, E} [2, 6] vars([2,6]) = {A, B, C, D, E} [1, 6] vars([1,6]) = {A, B, C, D, E, F}

128
**Alldifferent example: Sudoku**

Each Sudoku has a unique solution that can be reached logically without guessing. Enter digits from 1 to 9 into the blank spaces. Every row must contain one of each digit. So must every column, as must every 3x3 square. 5 3 7 6 1 9 8 4 2

129
**Sudoku 5 3 7 6 1 9 8 4 2 … x1 x2 x3 x4 x5 x6 x7 x8 x9 x10 x11 x12 x13**

130
**Sudoku 5 3 7 6 1 9 8 4 2 dom(xi) = {1, …, 9}, for all i = 1, …, 81**

alldifferent(x1, x2, x3, x4, x5, x6, x7, x8, x9) … alldifferent(x1, x10, x19, x28, x37, x46, x55, x64, x73) alldifferent(x1, x2, x3, x10, x11, x12, x19, x20, x21) x1 = 5, x2 = 3, x5 = 7, …, x81 = 9

131
**Global cardinality constraint (cardinality)**

Consists of: set of variables {x1, …, xn} a domain D = dom(x1) ∙ ∙ ∙ dom(xn) for each v D, a pair [lv, uv] Satisfied iff: number of times a value v is assigned to a variable is at least lv and at most uv Special cases include: lv = 0, uv = 1, for all v D (the alldifferent constraint) lv = 1, uv = 1, for all v D (the permutation constraint) lv = 1, uv 1, for all v D

132
**Cardinality: example of bounds consistency**

Suppose cardinality(A, B, C, D, E, F, G) where: dom(A) = {1, 2} dom(B) = {1, 2} dom(C) = {1, 2} dom(D) = {1, 2} dom(E) = {1, 2, 3} dom(F) = {2, 3, 4, 5} dom(G) = {3, 5} Enforcing bounds consistency yields: dom(A) = {1, 2} dom(B) = {1, 2} dom(C) = {1, 2} dom(D) = {1, 2} dom(E) = {3} dom(F) = {4, 5} dom(F) = {5} 1: [1, 2] 2: [1, 2] 3: [1, 1] 4: [0, 2] 5: [0, 2]

133
Sudoku 5 3 7 6 1 9 8 4 2 D = {1, 2, 3, 4, 5, 6, 7, 8, 9} lv = 1, uv = 1, for all v D dom(xi) = {1, …, 9}, for all i = 1, …, 81 card(x1, x2, x3, x4, x5, x6, x7, x8, x9) … card(x1, x10, x19, x28, x37, x46, x55, x64, x73) card(x1, x2, x3, x10, x11, x12, x19, x20, x21) x1 = 5, x2 = 3, x5 = 7, …, x81 = 9

134
One of the Sudoku “17” 1 4 2 5 7 8 3 9 6 Using cardinality constraints, all of these most difficult instances can be solved with just constraint propagation; i.e., no backtracking

135
**Knapsack constraint Consists of: Satisfied iff:**

set of variables {x1, …, xn} a scalar value ci for each xi two scalar values L and U Satisfied iff: L ci xi U n i =1

136
**Knapsack: example of domain consistency**

Suppose knapsack constraint 80 27x1 + 37x2 + 45x3 + 53x4 82 where: dom(x1) = {0, 1, 2, 3} dom(x2) = {0, 1, 2, 3} dom(x3) = {0, 1, 2, 3} dom(x4) = {0, 1, 2, 3} Enforcing domain consistency yields dom(x1) = {0, 1, 3} dom(x2) = {0, 1} dom(x3) = {0, 1} dom(x4) = {0, 1} Example of a propagator that solves an NP- Complete problem using a pseudo-polynomial algorithm based on dynamic programming

137
**Element constraint Consists of: Satisfied iff:**

an array of variables x = [x1, …, xn] an integer variable i a variable y with arbitrary finite domain Satisfied iff: xi = y

138
**Element: example of domain consistency**

Suppose xi = y where: x = [d, e, h, g]; i.e., dom(x1) = {d}, …, dom(x4) = {g} dom(i) = {2, 3, 4} dom(y) = {a, b, c, d, e, f, g} Enforcing domain consistency yields: dom(i) = {2, 4} dom(y) = {e, g}

139
**Lexicographic constraint (lex)**

Consists of: an array of variables x = [x1, …, xn] an array of variables y = [y1, …, yn] x lex y satisfied iff: x is lexicographically less than or equal to y (x1 < y1) or (x1 = y1 and x2 < y2) or (x1 = y1 and x2 = y2 and x3 < y3) or … (x1 = y1 and x2 = y2 and … xn = yn) Use: especially useful for symmetry breaking

140
**Lexicographic: example of domain consistency**

Suppose x = [x1, x2, x3 , x4 , x5] and y = [y1, y2, y3 , y4 , y5] where: Enforcing domain consistency on x lex y yields: X {2} {1,3,4} {1,2,3,4,5} {1,2} {3,4,5} y {0,1,2} {1} {0,1,2,3,4} {0,1} X {2} {1,3,4} {1,2,3,4,5} {1,2} {3,4,5} y {0,1,2} {1} {0,1,2,3,4} {0,1}

141
**Other global constraints**

Regular constraint sequence of variables values taken by these variables belongs to a given regular language applications: rostering and sequencing problems Cumulative constraint collection of tasks: release time, processing time, deadline, resource consumption resource capacities applications: scheduling Stretch constraint, nvalue constraint, … Optimization global constraints

142
**Outline Introduction Constraint propagation Backtracking search**

Global constraints Symmetry Modeling

143
**Symmetry in constraint models**

Many constraint models contain symmetry variables are “interchangeable” values are “interchangeable” variable-value symmetry As a result, when searching for a solution: search tree contains many equivalent subtrees if a subtree does not contain a solution, neither will equivalent subtrees elsewhere in the tree failing to recognize equivalent subtrees results in needless search

144
**Example of variable symmetry: block scheduling**

A, B, C, D, E domains {1, …, m} constraints D A + 3 D B + 3 E C + 3 E D + 1 cardinality(A, B, C, D, E, 1) 3 1 A B D C E dependency DAG Variables A and B are symmetric

145
**Example of variable symmetry: block scheduling**

dependency DAG …

146
**Example of value symmetry: 3-coloring**

variables: v1, v2 , v3 , v4 , v5 domains: {1, 2, 3} constraints: v1 v2 v1 v3 v2 v4 v3 v4 v3 v5 v4 v5 v1 v2 v3 v4 v5

147
**Example of value symmetry: 3-coloring**

A solution v1 = 1 v2 = 2 v3 = 2 v4 = 1 v5 = 3 v1 v2 v3 v4 Mapping v5

148
**Example of value symmetry: 3-coloring**

Another solution v1 = 1 v2 = 2 v3 = 2 v4 = 1 v5 = 3 v1 v2 v3 v4 v5

149
**Example of value symmetry: 3-coloring**

A partial non-solution v1 = 1 v2 = 2 v3 = 3 v1 v2 v3 v4 Another partial non-solution v1 = 1 v2 = 2 v3 = 3 v5 And so on …

150
**Example of variable-value symmetry: 4-queens**

variables: x1, x2 , x3 , x4 domains: {1, 2, 3, 4} constraints: x1 x2 | x1 – x2 | 1 x1 x3 | x1 – x3 | 2 x1 x4 | x1 – x4 | 3 x2 x3 | x2 – x3 | 1 x2 x4 | x2 – x4 | 2 x3 x4 | x3 – x4 | 1 x1 x2 x3 x4 1 2 3 4

151
**Symmetries for 4-queens**

2 1 3 4 5 6 7 10 9 8 11 12 13 14 15 16 9 13 5 1 14 10 6 11 15 2 7 3 16 12 8 4 15 16 14 13 12 11 10 7 8 9 6 5 4 3 2 1 8 4 12 16 3 7 11 6 2 15 10 14 1 5 9 13 identity rotate 90 rotate 180 rotate 270 14 13 15 16 9 10 11 6 5 12 7 8 1 2 3 4 3 4 2 1 8 7 6 11 12 5 10 9 16 15 14 13 12 16 8 4 15 11 7 10 14 3 6 2 13 9 5 1 5 1 9 13 2 6 10 7 3 14 11 15 4 8 12 16 horizontal axis vertical axis diagonal 1 diagonal 2

152
**Example of variable-value symmetry: 4-queens**

A partial non-solution x1 = 1 x1 x2 x3 x4 Another partial non-solution x4 = 4 Q 1 x1 = 1 x1 1 x4 = 4 x4 4 2 3 4

153
**A formal definition of symmetry**

Let P be a CSP where V = {x1, …, xn} is the set of variables D = dom(x1) dom(xn) is the set of values A (solution) symmetry of P is a permutation of the set V D that preserves the set of solutions of P special cases: value ordering symmetry variable ordering symmetry

154
**Symmetries and permutations**

2 1 3 4 5 6 7 10 9 8 11 12 13 14 15 16 ( ) identity 13 14 15 16 ( ) 9 10 11 12 5 6 7 8 ( ) 1 2 3 4 horizontal axis

155
**Symmetries and permutations**

x1 x2 x3 x4 2 1 3 4 5 6 7 10 9 8 11 12 13 14 15 16 1 15 16 14 13 12 11 10 7 8 9 6 5 4 3 2 1 x1 = 1 x1 = 1 x1 = 2 x1 = 2 … x1 = 1 x4 = 4 x1 = 2 x4 = 3 … 2 3 4 identity rotate 180 x1 x2 x3 x4 1 13 14 15 16 x1 = 1 x1 = 4 x1 = 2 x1 = 3 … 2 9 10 11 12 3 5 6 7 8 4 1 2 3 4 horizontal axis

156
**Mitigating symmetry in constraint models**

Reformulate the constraint model to reduce or eliminate symmetry e.g., use set variables Break symmetry by adding constraints to model leave at least one solution eliminate some/all symmetric solutions and non-solutions Break symmetry during backtracking search algorithm recognize and ignore some/all symmetric parts of the search tree dynamically while searching

157
**Breaking symmetry by adding constraints to model: block scheduling**

variables A, B, C, D, E domains {1, …, m} constraints D A + 3 D B + 3 E C + 3 E D + 1 cardinality(A, B, C, D, E, 0, 1) 3 1 A B D C E dependency DAG B A + 1

158
**Breaking symmetry by adding constraints to model: 3-coloring**

variables: v1, v2 , v3 , v4 , v5 domains: {1, 2, 3} constraints: vi vj if vi and vj are adjacent v1 v2 v3 v4 fixing colors in a single clique v5

159
**Breaking symmetry by adding constraints to model: 4-queens**

variables: x1, x2 , x3 , x4 domains: {1, 2, 3, 4} constraints: xi xi | xi – xj | | i – j | x1 x2 x3 x4 1 2 3 break horizontal symmetry by adding x1 ≤ 2 4 break vertical symmetry by adding x2 ≤ x3 but …

160
**Danger of adding symmetry breaking constraints**

Q x1 x2 x3 x4 4 3 2 1 x1 x2 x3 x4 Q 1 Q 2 Q 3 Q 4 adding x2 ≤ x3 removes this solution adding x1 ≤ 2 removes this solution

161
**Breaking symmetry during backtracking search**

Let g() be a permutation Let p be a node in the search tree a set of assignments and branching constraints Suppose node p is to be extended by x = v Post the constraint: (p g(p) x v) g(x v)

162
**Breaking symmetry during backtracking search: 4-queens**

p x1 = 1 x1 1 x4 = 4 x4 4 General form: (p g(p) x v) g(x v) Here (p is empty): (x v) g(x v) So, post: (x1 1) (x1 4 x4 1 x4 4)

163
**Outline Introduction Constraint propagation Backtracking search**

Global constraints Symmetry Modeling

164
**Constraint programming**

Model problem specify in terms of constraints on acceptable solutions define variables (denotations) and domains define constraints in some language Solve model define algorithm design heuristics CSP

165
**Example constraint systems/languages**

166
**Unfortunately… Often easy to state a model**

Much harder is to design an efficient model given a solver even harder still to design an efficient model + solver + heuristics

167
**Importance of the constraint model**

“In integer programming, formulating a ‘good’ model is of crucial importance to solving the model.” G. L. Nemhauser and L. A. Wolsey Handbook in OR & MS, 1989 “Same for constraint programming.” Helmut Simonis, expert CP modeler

168
**Measures for comparing models**

How easy is it to write down, understand, modify, debug, communicate? How computationally difficult is it to solve?

169
**Computational difficulty?**

What is a good model depends on algorithm Choice of variables defines search space Choice of constraints defines how search space can be reduced how search can be guided

170
**Computational complexity**

How hard is it to solve a CSP instance? Class of all CSP instances is NP-hard if CSPs can be solved efficiently (polynomially), then so can Boolean satisfiability, set covering, partition, traveling salesperson problem, graph coloring, … so unlikely efficient general-purpose algorithms exists

171
Should we give up? “While a method for computing the solutions to NP-complete problems using a reasonable amount of time remains undiscovered, computer scientists and programmers still frequently encounter NP-complete problems. An expert programmer should be able to recognize an NP-complete problem so that he or she does not unknowingly waste time trying to solve a problem which so far has eluded generations of computer scientists.” Wikipedia, 2009

172
An exponential curve time (seconds) size of instance

173
**Another exponential curve**

Acceptable solving time Instances that arise in practice

174
**Improving model efficiency**

Reformulate the model change the denotation of the variables Given a model: add redundant variables add redundant constraints add a redundant model redundant (or implied): does not change the set of solutions and hence are logically redundant add symmetry-breaking add dominance constraints symmetry-breaking and dominance do change the set of solutions must leave at least one solution (satisfaction) or an optimal solution (optimization)

175
**Reformulate the model Change the denotation of the variables**

i.e., what does assigning a value to a variable mean in terms of the original problem? Example: 4-queens xi = j means place the queen in column i, row j xi = j means place the queen in row i, column j x = [i, j] means place the queen in row i, column j xij = means there is no queen in row i, column j

176
**Example: crossword puzzles**

1 2 3 4 5 a aardvark aback abacus abaft abalone abandon ... … monarch monarchy monarda ... zymurgy zyrian zythum 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

177
**Adding redundant (auxiliary) variables**

Variables that are abstractions of other variables e.g, decision variables suppose x has domain {1,…,10} add Boolean variable to represent decisions (x < 5), (x 5) Variables that represent constraints (reified constraints) e.g., associate a decision variable x with a constraint so that x takes the value 1 if the constraint is satisfied and 0 otherwise suppose there is the constraint: (y1 + d1 ≤ y2 ) (y2 + d2 ≤ y1) add Boolean variable to represent (y1 + d1 ≤ y2 )

178
**Adding redundant constraints**

Improve computational efficiency of model by adding “right” constraints dead-ends encountered earlier in search process Three methods: apply a local consistency enforcing algorithm before solving learn constraints (nogoods) while solving add hand-crafted constraints during modeling Can often be explained as projections of conjunctions of a subset of the existing constraints

179
**Adding redundant models**

Consider two alternative constraint models for the same problem example: 4-queens Combine into one constraint model channeling constraints xi = j yj = i for all i, j 4 3 2 1 x1 x3 x4 x2 y4 y3 y2 y1 1 3 4 2

180
**Outline: putting it all together**

Constraint propagation Backtracking search Global constraints Symmetry Modeling

181
**Case Study: An Application of Constraint Programming to Superblock Instruction Scheduling**

182
**Computer architecture: Performing instructions in parallel**

Multiple-issue multiple functional units; e.g., ALUs, FPUs, load/store units, branch units multiple instructions can be issued (begin execution) each clock cycle issue width max number of instructions that can be issued each clock cycle on most architectures issue width less than number of functional units

183
**Analogy: vehicle assembly line**

Computer architecture: Performing instructions in parallel Pipelining overlap execution of instructions on a single functional unit latency of an instruction number of cycles before result is available execution time of an instruction number of cycles before next instruction can be issued on same functional unit serializing instruction instruction that requires exclusive use of entire processor in cycle in which it is issued Analogy: vehicle assembly line

184
**Superblock instruction scheduling**

assignment of a clock cycle to each instruction needed to take advantage of complex features of architecture sometimes necessary for correctness (VLIW) Basic block straight-line sequence of code with single entry, single exit Superblock collection of basic blocks with a unique entrance but multiple exits Given a target architecture, find schedule with minimum expected completion time

185
**Example superblock 1 5 2 40% 60% dependency DAG nodes arcs A:1 D:1 C:1**

F:1 G:1 2 B:3 40% 60% 5 dependency DAG nodes one for each instruction labeled with execution time nodes F and G are branch instructions, labeled with probability the exit is taken arcs represent precedence labeled with latencies

186
Example superblock 1 A:1 D:1 C:1 E:1 F:1 G:1 2 B:3 40% 60% 5 optimal cost schedule for 2-issue processor cycle ALU FPU 1 A 2 B 3 4 5 C 6 7 D 8 E 9 F 10 G

187
**Approaches Superblock instruction scheduling is NP-complete**

Heuristic approaches in all commercial and open-source research compilers greedy list scheduling algorithm coupled with a priority heuristic e.g., dependency height and speculative yield (DHASY) heuristic Here: Optimal approach useful when longer compile times are tolerable e.g., compiling for software libraries, digital signal processing, embedded applications, final production build

188
Assumptions Much previous work assumes an idealized architectural model processor is fully pipelined: every instruction has an execution time of 1 issue width of processor is equal to number of functional units processor contains no serializing instructions However, compiler needs an accurate architectural model to schedule code in best possible manner An architectural model is said to be to realistic if it does not make any of these simplifying assumptions

189
**Optimal approaches: State-of-the-art for basic blocks**

Idealized architectures Wilken et al. (2000) van Beek & Wilken (2001) Malik et al. (2006) Scale up to largest basic blocks that arise in practice Realistic architectures Ertl & Krall (1991) Kästner & Winkel (2001) Liu & Chow (2002) Do not scale beyond instructions (largest that arise in practice have instructions) Here: Builds on Malik et al. (2006) Scales up to largest basic blocks that arise in practice Applies to realistic architectures

190
**Optimal approaches: State-of-the-art for superblocks**

Idealized architectures Shobaki & Wilken (2004) Scales up to large superblocks Realistic architectures No work Here: Scales up to larger and more difficult superblocks Applies to realistic architectures

191
**Basic constraint model**

1 1 variables A, B, C, D, E, F, G domains {1, …, m} constraints B A + 1, C A + 1, D B + 5, …, G F card(A, B, C, F, G, nALU) card(D, E, nFPU) card(A, …, G, issuewidth) cost function 40F + 60G B C 5 5 D E 2 2 F 40% G 60%

192
**Basic constraint model (con’t)**

non-fully pipelined instructions B:3 introduce auxiliary variables PB,1 PB,2 introduce additional constraints B + 1 = PB,1 B + 2 = PB,2 card(A, B, PB,1, PB,2 C, F, G, nALU) serializing instructions similar technique

193
**Improving the model Add constraints to increase constraint propagation**

implied constraints: do not change set of solutions dominance constraints: preserve an optimal solution Here: many constraints added to constraint model in extensive preprocessing stage that occurs once extensive preprocessing effort pays off as model is solved many times

194
**Improving the model: Implied constraints**

Let nodes i and j define a region; i.e., there is more than one path from i to j i j

195
**Improving the model: Implied constraints**

Implied constraint added to model: xj xi + di,j if region small enough, di,j is exactly determined by solving region in isolation if region larger, di,j is a lower bound estimate Implied constraint added to model: xj xi + di,j only if i and j are articulation nodes and region small enough to be solved quickly and exactly in isolation tight upper bound on distance between i and j in any optimal schedule

196
**Implied constraints: xj xi + di,j**

B E D H F G C 1 3

197
**Implied constraints: xj xi + di,j**

B E D H F G C 1 3 A F 5 j j+1 j+2 j+3 j+4 j+5 Add: F ≥ A + 5

198
**Implied constraints: xj xi + di,j**

B E D H F G C 1 3 A E H j j+1 j+2 j+3 j+4 j+5 Add: H ≥ E + 5 5

199
**Implied constraints: xj xi + di,j**

B E D H F G C 1 3 A 9 A j j+1 j+2 j+3 j+4 j+5 j+6 j+7 j+8 j+9 H Add: H ≥ A + 9

200
**Improving the model: Dominance constraints**

Dominance constraints added to model: xj xi requires identifying pairs of disjoint, isomorphic subgraphs mapping must preserve instruction types, edges, latencies fast heuristic approach to finding pairs Example {D} and {E} are subgraphs that satisfy conditions Can add edge from D to E B 5 5 D E 2 F

201
**Improving the solver: From optimization to satisfaction**

Find bounds on cost function upper bound found using list scheduling algorithm Enumerate solutions to cost function (knapsack constraint) lower bound ≤ 40F + 60G ≤ upper bound Step through in increasing order of cost until one is found that can be extended to a solution to entire constraint model testing whether a solution to cost function can be extended is done using a backtracking search algorithm

202
**Improving the solver: Portfolios**

Use portfolio to improve performance of backtracking search algorithm Increasing levels of constraint propagation Phase 1 bounds consistency Phase 2 singleton bounds consistency Phase 3 singleton singleton bounds consistency Restart and move to next phase if solution not found within time limit

203
**Improving the solver: Impact-based variable ordering**

During Phases 2 & 3, use impact-based variable ordering heuristic to improve performance of backtracking search algorithm measure the importance of a variable for reducing search space very effective and essentially free as a side-effect of enforcing singleton consistency

204
**Case study: Value of constraint programming**

Ease of adding constraints to model realistic architectures not clear how to similarly extend previously proposed enumeration and integer programming approaches global constraints Allows and facilitates programming in the computer science sense of the word allowed us to incorporate and fine-tune ideas such as portfolios and impact-based variable ordering heuristics into our solver

205
**Coming next … Combining CP and Operations Research, John Hooker, CMU**

Modeling in CP, Helmut Simonis, Cork Constraint Computation Centre CP languages, systems, and examples OPL studio, Paul Shaw, ILOG Comet, Laurent Michel, U. of Connecticut

Similar presentations

OK

1 Backdoors To Typical Case Complexity Ryan Williams Carnegie Mellon University Joint work with: Carla Gomes and Bart Selman Cornell University.

1 Backdoors To Typical Case Complexity Ryan Williams Carnegie Mellon University Joint work with: Carla Gomes and Bart Selman Cornell University.

© 2018 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on product advertising in cartoons Ppt on applied operational research notes Download ppt on time management for students Ppt on noise in communication system Ppt on home automation using mobile communication Best ppt on bluetooth technology Waters view ppt on iphone Ppt on domestic robots 2020 Ppt on any social issues in india Ppt on contact and noncontact forces