Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Solving Kirkman’s schoolgirl problem in a few seconds
Barnier N., Brisset P. Constraints10 (1):7-21,2005.Type:Article
Date Reviewed: Nov 15 2006

Symmetry maps solutions to solutions and nonsolutions to nonsolutions. Many constraint programming problems are highly symmetric. Symmetry in constraint programs can cause problems for an algorithm that searches a space of partial assignments, due to redundancy in the search space. Reformulation, adding constraints before search, and adding constraints during search are some ways to break symmetry.

In the social golfer problem, g groups of s golfers play golf for w weeks, such that any two golfers in the same group play at most once. This paper proposes a variation of symmetry breaking via dominance detection (SBDD) that does deep pruning when a symmetry is detected during search, supporting the computation of all of the nonsymmetric solutions for small instances of the social golfer problem.

Barnier and Brisset provide a good introduction to the problem, the best solutions so far for all three approaches, and a good presentation of their variation of SBDD, SBDD+. Their algorithm is based on their observation that most of the symmetries found between two complete solutions involve a mapping from the first week onto itself. Deep pruning is achieved by detecting dominance and following the dominance through ancestors up the tree, thus allowing pruning of more than just the dominated node. Although the technique is completely general, the authors don’t mention whether other symmetric constraint programming problems exhibit this property.

The authors do a great job of surveying solutions to the social golfer problem, and of presenting their results. This paper is worth reading for anyone trying to dig deeply into symmetry breaking in constraint programming.

Reviewer:  Tania Bedrax-Weiss Review #: CR133571 (0710-1018)
Bookmark and Share
  Featured Reviewer  
 
Permutations And Combinations (G.2.1 ... )
 
 
Combinatorial Algorithms (G.2.1 ... )
 
 
Heuristic Methods (I.2.8 ... )
 
 
Combinatorics (G.2.1 )
 
 
Problem Solving, Control Methods, And Search (I.2.8 )
 
Would you recommend this review?
yes
no
Other reviews under "Permutations And Combinations": Date
Computing short generator sequences
Driscoll J., Furst M. Information and Computation 72(2): 117-132, 1987. Type: Article
Jan 1 1988
Permutations of bounded degree generate groups of polynomial diameter
McKenzie P. (ed) Information Processing Letters 19(5): 253-254, 1984. Type: Article
Aug 1 1985
How to construct pseudorandom permutations from pseudorandom functions
Luby M. (ed), Rackoff C. SIAM Journal on Computing 17(2): 373-386, 1988. Type: Article
Jul 1 1989
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy