Skip to main navigation Skip to search Skip to main content

Preferential attachment in constraint networks

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

Many complex real-world systems can be modeled using a graphical structure such as a constraint network. If the properties of such a structure can be exploited, many challenging computational tasks can have good typical-case runtimes even if they are theoretically intractable in general. In this paper we show that many real-world constraint networks induce binary networks that share a common underlying structural characterisation; namely, that their degree distributions exhibit preferential attachment. We report on a novel constraint network generator for random constraint networks that have a scale-free macrostructure. This scale-free generator is based on the well known Barabasi-Albert preferential attachment model. Using this model we demonstrate that real-world constraint networks exhibit degree distributions that are more like those found in scale-free graphs. We also show that the effect of standard degree-based search heuristics on real-world problems exhibiting power-law degree distributions is greater than problems with a uniform random structure. We also show that the backdoor sizes for preferentially attached constraint networks are smaller than those of uniform random problems. This paper provides a novel basis for studying realistic constraint models.

Original languageEnglish
Title of host publicationICTAI 2009 - 21st IEEE International Conference on Tools with Artificial Intelligence
Pages708-715
Number of pages8
DOIs
Publication statusPublished - 2009
Event21st IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2009 - Newark, NJ, United States
Duration: 2 Nov 20095 Nov 2009

Publication series

NameProceedings - International Conference on Tools with Artificial Intelligence, ICTAI
ISSN (Print)1082-3409

Conference

Conference21st IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2009
Country/TerritoryUnited States
CityNewark, NJ
Period2/11/095/11/09

Fingerprint

Dive into the research topics of 'Preferential attachment in constraint networks'. Together they form a unique fingerprint.

Cite this