Recently, the proof system for the model counting problem #SAT was introduced by Fichte, Hecher and Roland (SAT’22). As demonstrated by Fichte et al., the system can be used for proof logging for state-of-the-art #SAT solvers.
We perform a proof-complexity study of . For this we first simplify the rules of and obtain a calculus that is polynomially equivalent to . We then establish an exponential lower bound for the number of proof steps in (and hence also in ) for a specific family of CNFs. We also explain a tight connection between proofs and decision DNNFs.
The problem to decide whether a Boolean formula is satisfiable (SAT) is one of central problems in computer science, both theoretically and practically. From the theoretical side, SAT is the canonical -complete problem [19], making it intractable unless P = NP. From the practical side, the ‘SAT revolution’ [37] with the evolution of practical SAT solvers has turned SAT into a tractable problem for many industrial instances [8].
In this paper we consider the model counting problem (#SAT) which asks how many satisfying assignments a given Boolean formula has. While #SAT is obviously a generalization of SAT, it is presumably much harder. #SAT is the canonical complete problem for the function class . While FP = #P would imply P = NP, it is known that FP = #P is even equivalent to P = PP. The power of #SAT is also illustrated by Toda’s theorem [36] stating that any problem in the polynomial hierarchy can be solved in polynomial time with oracle access to #SAT.
Despite its higher complexity, #SAT solving has been actively pursued through the past two decades [26] and a number of #SAT solvers have been developed throughout the years. In fact, the past years have witnessed increased interest in #SAT solving with an annual model counting competition being organised since 2020 as part of the SAT conference [23]. #SAT solvers allow to tackle a large variety of real-world questions, including all kinds of problems in the areas probabilistic reasoning [2,31], risk analysis [22,40] and explainable artificial intelligence [3,34].
Unlike in SAT solving where conflict-driven clause learning (CDCL) [32] dominates the scene, there are a number of conceptually different approaches to #SAT solving, including the lifting of standard techniques from SAT-solving [35], employing knowledge compilation [30], and via dynamic programming [25]. While some approaches try to approximate the number of solutions, we will only consider exact model counting in the following.
There is a tight correspondence between practical SAT solving and propositional proof systems [14]. While we know that in principle every SAT solver implicitly defines a proof system, a seminal result of [1,33] established that CDCL (at least in its nondeterministic version) is equivalent to the resolution proof system. However, practical CDCL with e.g. the VSIDS heuristics corresponds to an exponentially weaker proof system than resolution [38]. In the same vein, there has recently been a line of research to understand the correspondence between solvers for quantified Boolean formulas (QBF) and QBF resolution proof systems [6,9,10]. This correspondence between solvers and proofs is not only of theoretical, but also of immense practical interest as it can be used for proof logging, i.e. for certifying the correctness of solvers on unsatisfiable SAT or QBF instances. Optimised proof systems have been devised in terms of RAT/DRAT for SAT [28,39] and QRAT for QBF [29] for this purpose. These proof systems aim to capture all modern solving techniques, including preprocessing and therefore tend to be very powerful [15,18]. In particular, in contrast to weak proof systems such as resolution, no lower bounds are known for RAT or QRAT.
In sharp contrast, far less is known about the correspondence of model counting solvers to proof systems. To our knowledge, there are currently three proof systems for #SAT. One is a static proof system based on decision DNNFs called (#SAT) (the acronym stands for Knowledge Compilation based Proof System for #SAT) [16]. A very similar idea was used to modify current knowledge compilers such that they output certifiable decision DNNFs [17]. With the help of an implemented checker it can be verified in polynomial time that a given CNF is indeed equivalent to the resulting certifiable decision DNNF.
The second, a line based proof system called [24] (the acronym stands for Model-counting Induction by Claim Extension), was introduced in 2022 [24]. Interestingly, the system not only provides a theoretical proof system for #SAT, but also allows proof logging for a number of state-of-the-art solvers in model counting, including [35], [25] and [30], as demonstrated in [24]. Hence proofs can be used to verify the correctness of answers of these #SAT solvers.
A third proof system was introduced very recently [13] for certified proof checking of #SAT solvers. The system is similar in spirit to the general proof-checking formats RAT and DRAT [28,39] used for SAT solving and employs Partitioned-Operation Graphs (POGs).
Our Contributions
We perform a proof complexity analysis of the #SAT proof system from [24]. Prior to this paper, no proof complexity results for were known. Our results can be summarised as follows.
(a) A simplified proof system MICE’. We analyse the proof system and define a somewhat simplified calculus . Lines in are of the form where F is a propositional formula V is a set of variables, A is a partial assignment and . Semantically, these lines express that the formula F under the partial assignment A has precisely c models. The system then employs four rules to derive new lines with the ultimate goal to derive a line . Thus in the ultimate line, c is the number of models of the formula F.
The four rules of the system include one axiom rule for satisfying total assignments and three rules to compose, join and extend existing lines. All the rules have a rather extensive set of side conditions to verify their applicability. For the composition rule this even includes an external resolution proof to check that the composition of claims in the rule indeed covers all models.
The variable set V does not feature in the semantical explanation above. While it might be tempting to choose for all lines (as is done in the final claim), we show that this restriction is too strong and results in an exponentially weaker system. Nevertheless, we show that we can slightly adapt the rules of (in particular the extension rule) and obtain a system for which we can impose for all lines without weakening the system. Lines in therefore can take the form . This allows to eliminate and simplify some of the side conditions for the original rules of when transferring to . Our simplified system is as strong as in terms of simulations (Propositions 4.8 and 4.9). Hence also can be used for proof logging for the #SAT solvers mentioned above.
(b) Lower bounds for MICE and MICE’. We show an exponential lower bound for the proof size in (and hence also for ) for a specific family of CNFs.
As mentioned above, the composition rule of (and ) incorporates resolution proofs. Exploiting this feature, it is not too hard to transfer resolution lower bounds to . In fact, we can show that on unsatisfiable formulas, resolution is polynomially equivalent to (Theorem 5.1).
However, we would view such a transferred resolution lower bound not as a ‘genuine’ and interesting lower bound for . We therefore show a stronger bound for for the number of proof steps (where we disregard the size of the attached resolution proofs). In our main result we show a lower bound of for the number of proof steps for a specific set of CNFs, termed , based on the parity function (Theorem 5.6). Technically, our lower bound is established by showing that in proofs of , all applications of the join and extension rules preserve the model count.
(c) A connection between MICE and decision DNNFs. We show a tight connection between and decision DNNFs. Specifically, we efficiently extract a decision DNNF from a proof (Theorem 6.1). This provides an alternative way to obtain lower bounds for .
Organisation
The remainder of this article is organised as follows. After reviewing some standard notions from propositional logic and proof systems in Section 2, we revise the #SAT proof system from [24] in Section 3 and show some properties of the system. This gives rise to a simplified proof system which we define in Section 4. Section 5 contains our results on the exponential lower bound for (and hence for ). In Section 6 we explain the connections to decision DNNFs, yielding additional lower bounds. We conclude in Section 7 with relations to some open questions and future directions.
Preliminaries
We introduce some notations used in this paper. A literal l is a variable z or its negation , with . A clause is a disjunction of literals, a conjunctive normal form (CNF) is a conjunction of clauses. Often, we write clauses as sets of literals and formulas as sets of clauses. We assume that every propositional formula is written in CNF.
For a formula F, denotes the set of all variables that occur in F, and is the set of all literals of F. If is a clause and is a set of variables, we define and denotes the formula F with every clause C replaced by . An assignment is a function α mapping variables to Boolean values. If a function F evaluates to true under an assignment α, we say α satisfies F and write . We also allow α to be a partial assignment to or to contain variables not occurring in F. Occasionally, we interpret an assignment as a CNF consisting of precisely those unit clauses that specify the assignment. Therefore, the set operations are well defined for formulas and assignments. We say that two assignments are consistent if their union is satisfiable. For some set of variables X, denotes the set of all possible assignments to X.
In this paper we are interested in proof systems as introduced in [20]. Formally, a proof system for a language L is a polynomial-time computable function f with . If , then w is called f-proof of . In order to compare proof systems we need the notion of simulations. Let f and g be proof systems for language L. We say that f simulates g, if for any g-proof w there exists an f-proof with and . If we can compute in polynomial time from w, we say that f p-simulates g. Two proof systems are (p-)equivalent if they (p-)simulate each other.
For the language UNSAT of unsatisfiable CNFs, resolution is arguably the most studied proof system. It operates on Boolean formulas in CNF and has only one rule. This resolution rule can derive from and with arbitrary clauses C, D and variable x. A resolution refutation of a CNF is a derivation of the empty clause □. We sometimes add a weakening rule that enables us to derive from C for arbitrary clauses C and D. However, it is well-known that any resolution refutation that uses weakening can be efficiently transformed into a resolution refutation without weakening.
The Proof System MICE for #SAT
In this section we recall the proof system for #SAT from [24] and show some basic properties of the system.
A claim is a triple where F is a propositional formula in CNF, V is a set of variables, A is an assignment with and . For such a claim, let . The claim is correct if .
Claims will be the lines in our proof systems for model counting. Semantically, they describe that the formula F under the partial assignment A has exactly c models. The partial assignment A is sometimes also referred to as the assumption. What is perhaps a bit mysterious at this point is the role of the variable set V. We will get to this shortly.
The rules of are Exactly One Model (1-Mod), Composition (Comp), Join (Join) and Extension (Ext). They are specified in Fig. 1. We give some intuition on the rules. The axiom rule (1-Mod) states that if a complete assignment A satisfies a formula F, then F has exactly one model under A.
With (Comp) we can sum up model counts of a formula F under different partial assignments in order to weaken the assumption to a partial assignment A. This is only sound if the solutions of F under assumptions form a disjoint partition of the full solution space of F under A. That this is indeed the case can be verified with an independent proof, e.g. in propositional resolution. This proof is called an absence of models statement. We want to emphasize that the rule (Comp) can be applied with , i.e. we can derive any claim if is unsatisfiable. In particular, we can derive for any unsatisfiable formula φ with a single application of (Comp).
The (Join) rule allows us to multiply the model counts of two formulas that are completely independent restricted to the assumptions. Finally, with (Ext), we can extend simultaneously all models, i.e. we enlarge the formula and assumption without changing the count.
is a claim if is derived by one of (1-Mod), (Join), (Ext) or
if the claim I is derived by (Comp) and ρ is the resolution refutation for the respective absence of models statement.
A proof of a formula φ is a trace where is (or contains in case of (Comp)) the claim for some .
In [24] it is shown that is a sound and complete proof system for #SAT.
For measuring the proof size, we use two natural options. notates the size of π which is the total number of claims plus the number of clauses in resolution proofs in the absence of models statements. counts only the number of claims a proof has which is exactly the number of inference steps that the proof needs.
In a correct claim the count c is uniquely determined by the formula F, set of variables V and assumption A. Therefore, we often omit c and refer to the claim as . To ease notation we will usually just write a proof as sequence of claims and do not explicitly record the used absence of models statements. We just assume that whenever we use (Comp), the necessary resolution refutation is part of the proof.
If a formula F is satisfied by the partial assignment A, we can set the remaining variables arbitrarily. Therefore, the component has exactly models under assumption A. The following construction shows that we can efficiently derive the corresponding claim in .
If some assumption A satisfies an arbitrary formula F with, there is aderivation of the claimwithand.
Let . For every we derive and with (1-Mod). This is possible since every assignment satisfies the empty formula. With (Comp) we get using the absence of models statement . We use (Join) of and , then (Join) of the result and , and so on. The requirements (J-1), (J-2) and (J-3) are satisfied. In this way we get . We use (Ext) to obtain . It is easy to see that all requirements (E-1) to (E-5) are satisfied. For (E-4), we use that A satisfies F. In total we use steps to derive I and we have n absence of models statements with 3 clauses each. □
We investigate some properties that any claim in a proof has to fulfill. We assume that any proof has no redundant claims, i.e. in the corresponding proof dag, there is a path from any node to the final claim. We also observe that for all inference rules, the derived F and V never shrink. This leads to the following two observations:
Ifis derived fromin atrace (not necessarily in one step), thenand.
Therefore, any claimin aproof of φ fulfillsand.
From Definition 3.1 it is not obvious how F and V are related. Intuitively, one might be tempted to set for any claim . However, this would make the proof system exponentially weaker as we will see later. Lemma 3.6 will show that we can at least assume for every claim. To show this we need the following lemma:
For any claimand any variable x, if, then literals x andcannot both occur in F.
Suppose there exists such an x. Since is not redundant, there is a path to the final claim. Thus, there have to be claims and directly adjacent in the path with , and , . Now is directly derived from in one step. We argue that this is not possible:
It is impossible with (1-Mod), since this rule uses no previous claim.
It is impossible with (Comp), since .
It is impossible with (Join). Assume otherwise that is joined with some . Because of we have . Then , contradicting condition (J-3).
It is impossible with (Ext). Otherwise x has to be in because of (E-2) and per construction. Then satisfies a clause in since both literals x and occur in (because ). Thus condition (E-5) fails.
This leads to a contradiction. As a result, such an x can not exist. □
Let a formula φ and aproof π for φ be given. Then there is aproofsatisfyingfor any claimsuch thatand.
Let with . Because of Lemma 3.5, for any , we can assume that there is no variable that occurs in both polarities in . Let be the assignment that does not satisfy any clause in , i.e. if x is in we assign and vice versa. For every claim , exists and it is unique. We define with the unique defined above. Note that and have no variables in common and are therefore consistent. The resulting claim on the right side satisfies the requirement we want to achieve.
We show by induction that is a valid trace for all . In the base case the empty trace is valid. For the induction step we assume that we have already derived . In particular, we have derived for every claim I we used to derive . We consider the different rules from which could be derived.
Exactly One Model. is derived with (1-Mod). We can derive with (1-Mod) as well.
(O-1). since ((O-1) for ) and .
(O-2). satisfies , since satisfies ((O-2) for ).
Composition. is derived with (Comp) of claims with and for . Let ρ be the absence of models statement ((C-3) for ) that refutes For let with , since does only depend on and and is therefore equal to . To derive we can use (Comp) of :
(C-1). assign the same variables and are pairwise inconsistent, since assign the same variables and are pairwise inconsistent ((C-1) for ).
(C-2). For every we have ((C-2) for ) and in particular .
(C-3). We need an absence of models statement that refutes For this we do at most resolution steps to remove all literals from and . Note that this is possible, since for any , only can appear in per construction of . It remains exactly the formula that is refuted by ρ as all variables from are removed.
Join. is derived using (Join) of claims and with . First, we show
The inclusion ⊆ follows directly. To show the other direction ⊇, assume and . Because of (J-3) for is . Thus, and therefore, .
Using this we can prove For that it is sufficient to show that both sides assign the same variables and that they are consistent.
We show that . With the definitions of α and we get . Applying simple set operations and the equation from above, this is equal to . This is exactly per definition.
To show consistency of , and , we show that every pair is consistent. and are consistent: Otherwise suppose and for some literal x. Per construction is , and therefore, , . Furthermore, . As a result, and x occurs in both polarities in leading to a contradiction to Lemma 3.5. and are consistent: Assume and for some variable x. W.l.o.g. let . Then, leading to and . Analogously we get that and are consistent.
To derive we can use (Join) of and :
(J-1). and are consistent because of (J-1) for . We showed already that and are consistent. and are consistent, because they have no variables in common. Otherwise let x be a variable with and . Per construction is , and and thus, . This contradicts (J-3) for . The same argument shows that and are consistent.
As a result, and are consistent.
(J-2). First we show For the sake of contradiction, assume there is a variable x with and . Per construction is and and thus which contradicts (J-3) for . Analogously we get . Furthermore, for because of (J-2) for . Using this, we get for .
(J-3). The requirement is always fulfilled if the two joined claims satisfy .
Extension. is derived using (Ext) of with . Then we can also derive from with (Ext):
(E-1). , is fulfilled, since and because of (E-1) for .
(E-2). We have to show . For this, let x be an arbitrary variable with . If , then because of (E-2) for . Otherwise if , and thus per construction of .
(E-3). We have to show that . For this we use which follows from (E-3) for . Furthermore, by using and , we receive Next, we prove For this we show that both assign the same variables and then that every variable is assigned equally.
To show that both sides assign the same variables, the direction ⊆ follows with . For the other direction ⊇, let implying . Thus, we have to show that . If , then and thus, because of (E-2) for . If , then , since .
In order to show that and are consistent, assume and let . Then we have leading to . , are consistent: Assume and let . Then , , . Because of (E-5) for , and in particular does not satisfy any . Since there is a clause in that contains literal , .
Using those three properties from above we get
(E-4). satisfies , since satisfies (E-4) for .
(E-5). does not satisfy C for any as the restricted assignment has no variables in .
This completes the induction. Since , is a valid proof for φ with the claimed property. The number of claims does not change. The number of clauses in the refutation does only increase in the (Comp) case and at most by a factor of . □
In the following we always assume for any claim . With this requirement, the conditions of the inference rules can be simplified.
If we requirefor every claim, the following simplifications for therules apply:
We can simplify the absence of models statement in the requirement (C-3) to be a refutation of.
We can remove condition (J-3) for (Join).
We can remove condition (E-5) for (Ext).
However, imposing the stronger condition for every claim would make the proof system exponentially weaker as we illustrate with the next proposition.
There is a family of formulassuch that for both measuresandholds:
has polynomial-sizeproofs and
ifis required for all claims, the shortestproof ofhas exponential size.
Consider the family of formulas that only have one clause First we show that has a proof of size for every n. With the construction of Proposition 3.3 we derive We apply (Comp) to the one claim which results in Then, we use (Comp) of and which results in Similarly we apply (Comp) to every pair of claims and and finally get In total we need steps to derive all and n applications of (Comp) to combine these claims.
Next, we show that any proof with the additional requirement has size . Note that the construction from Proposition 3.3 does not work under this additional requirement.
We show that the claim does not help for the proof. If we use (Join) on together with any claim I, the result is I. Similarly, if we derive I with (Ext) from , we can derive I with (1-Mod) without . If we apply (Comp) on claim together with some other claims, (C-1) implies that all used claims have to be . Thus, (Comp) would result in . Therefore, we can assume is not in the proof at all.
Thus, the only component we can use is . Assume I is derived with (Join) from and . Condition (J-2) implies and in particular because of (J-1). Therefore, and the usage of (Join) is redundant. Let be derived from with (Ext). Because of (E-3) we have and hence . Hence, the rules (Join) and (Ext) achieve nothing and we can assume that they do not appear in the proof.
As a result, the proof can only use rules (1-Mod) and (Comp). Such a proof needs applications of (1-Mod) as has models. □
A Simplified Proof System MICE’ for #SAT
We now adapt to a new proof system that is as strong as and only uses claims with components satisfying . Therefore, we can drop the explicit mentioning of the variable set V and only need to specify the formula F. This makes the resulting proof system more intuitive and easier to investigate for lower bounds.
The rules of are Axiom (Ax), Composition (Comp’), Join (Join’) and Extension (Ext’). They are specified in Fig. 2.
Inference rules for .
The intuition for the rules (Comp’) and (Join’) are very similar to (Comp) and (Join) from . The (Ax) rule enables us to derive the claim which is trivially true. (Ext’) is also similar to (Ext) with one important difference: If we use (Ext) in , the assumption has to assign all variables that are added to the claim. As a result, we extend one model of the original claim to one new model. In (Ext’) however, this is not necessarily the case. As long as the new assumption satisfies all added clauses, we are allowed to leave new introduced variables unassigned in the assumption. Like this we extend every model of the original claim to a set of new models, one for every possible assignment of these unassigned variables.
(Adapted Proof System ).
A claim is a triple with . For such a claim, let . The claim is correct if . The rules of are (Ax), (Comp’), (Join’) and (Ext’). The notions of traces and proofs are defined analogously as for . Furthermore, we use the same two measures for the proof size and .
As in the proof system we often omit the count c of claims and assume that no redundant claims exist in proofs, i.e. all claims are connected to the final claim.
We prove that all four derivation rules are sound, i.e. for every derived claim holds . In doing so, we will also provide some intuition on the semantic meaning of the rules.
The inference rules ofare sound.
To prove the soundness of every rule, we associate every claim with the set . With this interpretation, we can specify how every rule modifies these models. This way, we can show that the resulting model count is indeed correct for every rule.
The soundness of (Ax) is obvious, since .
To show soundness of (Comp’), let be derived with (Comp’) from correct claims . Then we have where ⊎ denotes the disjoint union. This split of A into those is possible since (C-2). The sets on the right side of the equation are pairwise disjoint because of (C-1). The last set is empty, otherwise there would not exist an absence of models statement (C-3). Thus, Using the correctness of all used claims we get Next, we show soundness of (Join’). For this, let be derived with (Join’) from correct claims and . We show that We will prove both subset relations separately in the following.
For ⊆, let be given. Per definition, α satisfies and in particular has to satisfy . Because of , has to satisfy and therefore, . Analogously, we get . Since , we can choose and to see the relation.
For the other direction ⊇, we first have to show that any fixed and are consistent. Because of (J-2) ensuring for both , we know that they could only be inconsistent in variables in . With (J-1) which states that and are consistent, we can conclude that and are consistent. We know that satisfies per construction. As a result, satisfies and is therefore in .
The model count for the derived claim follows directly with the correctness of both used claims, Finally we have to show that (Ext’) is sound. Assume is derived with (Ext’) from the correct claim . We show Similarly to the previous case, we prove both inclusions separately.
For ⊆, let be given. Per definition, γ satisfies . This split is possible because of (E-1) and (E-2). We can define , . Then we have and get the inclusion.
For ⊇, we fix some , and define . As α has to contain the assignment according to , we have that γ satisfies A. With (E-3) follows that γ satisfies . Since is a model of , γ satisfies as well. As a result, γ satisfies and is therefore in .
The corresponding model count follows immediately with the correctness of , As we have shown with the easy semantic arguments above, all rules of are sound. □
Let claimand a modelbe given.
If I is derived with (Comp’) using claims, then there exists exactly onesuch that.
If I is derived with (Join’) using claimsand, then for bothwe have.
If I is derived with (Ext’) using claim, then.
We introduce an additional rule (SA) which is similar to the construction in Proposition 3.3.
(Satisfying Assumption Rule).
Under the condition (S-1): A satisfies F, we allow to derive
This rule is sound and does not make proofs much shorter. Therefore, when constructing proofs, we sometimes use this additional rule as it makes proofs more intuitive and easier to understand.
(SA) is sound. Further, if formula φ has aproof π that can use the additional rule (SA), then there exists aproofof φ withand.
Assume that we applied (SA) in π to derive claim . Then we can derive I without (SA) with two steps in the following way. We use (Ax) to get and then (Ext’) to derive I. It is easy to see that conditions (E-1) and (E-2) are fulfilled. (E-3) follows directly from (S-1). The resulting counts are the same since . Since we can simulate (SA) with the other sound rules, (SA) is sound as well. If we replace all applications of (SA) like this, then the proof size increases at most by one, as we need (Ax) only once in the proof. □
To justify our definition of we have to show that it is indeed a proof system for #SAT.
is a sound and complete proof system for #SAT.
The soundness of follows directly from the soundness of the inference rules as shown in Lemma 4.2.
Next, we show that is complete. For this, let an arbitrary formula φ be given. We can derive for every with (SA). For all these models together there is an absence of models statement. Therefore, we can derive with (Comp’) from all claims . Note that for unsatisfiable formulas we can derive the final claim with a single application of (Comp’).
In proof systems, it is also necessary that proofs can be verified in polynomial time. This is possible in since all conditions (C-1), (C-2), (C-3), (J-1), (J-2), (E-1), (E-2) and (E-3) are easy to check in polynomial time. □
Next, we show some basic properties of .
Let claimbe used to derive(not necessarily in one step). Then
,
if, thenand.
Because every rule does not decrease the formula F, the first property is obvious.
Let be a path in this derivation. It is easy to check that for all four inference rules of we have for . We can restrict both sides and get Therefore, From the second property follows. □
Using these properties, we can show that the new proof system is polynomially equivalent to . Note that this result is true for both measures of proof size and . To prove this equivalence, we show both simulations separately.
First we show that is at least as strong as . This simulation is the more important one for this paper as it implies that lower bounds for do also apply for .
p-simulates.
Let be a proof of a given formula φ. We assume that for all claims in π which is justified by Lemma 3.6. We will show that for the sequence is a correct proof of φ.
For this we first prove by induction that is a proof trace for every . In the base case the empty trace is valid. For the induction step we assume we have already derived and in particular for all claims I we used to derive . We distinguish how is derived.
Exactly One Model. is derived with (1-Mod). Then we can derive with (SA) since A satisfies F ((O-2) for ) and in particular, satisfies F.
Composition. is derived with (Comp) using absence of models statement ρ and claims for with and . Note that some might be duplicates. We can derive with (Comp’) of claims after removing all duplicates:
(C-1). assign the same variables, since assign the same variables ((C-1) for ). The new assumptions are pairwise inconsistent as we removed all duplicates.
(C-2). follows from ((C-2) for ).
(C-3). There is an absence of models statement ρ ((C-3) for ) which is a refutation of where we used our assumption . ρ can be adapted to a refutation of since we can just remove the variables that are not in from every clause in ρ and get a valid resolution proof where some resolutions might get weakening steps.
Join. is derived with (Join) using claims and , with . For let and . We can apply (Join’) to and :
(J-1). and are consistent since and are consistent ((J-1) for ).
(J-2). From requirement for every claim follows . Furthermore, for is ((J-2) for ). Thus, also .
The resulting claim is . We will show that The direction ⊆ follows directly. For the other direction ⊇ we assume that x is in the right set and show that x is in the left set as well. W.l.o.g. let . If , then . So assume , then is . Our requirement implies . Per definition of a claim, and therefore, . Using (J-2) we get . Since and are consistent ((J-1) for ), we have .
Therefore, the (Join’) application results in the claim
Extension. is derived with (Ext) from claim with and . We can derive with (Ext’) of :
(E-1). follows from (E-1) for .
(E-2). since . Using this is equal to which we can transform to . Finally we can use ((E-3) for ) and get .
(E-3). satisfies since A satisfies ((E-4) for ).
This completes the induction. Therefore, is a valid trace. Since the final claim is we have that is a proof of φ. Per construction, and . The additional 1 is needed in order to use the (SA) rule to simulate (1-Mod). Apart from that, the number of claims and the number of clauses in the resolution refutations do not increase. □
Next we show that is not stronger than . Although this result is not needed for the lower bounds, it is nice to know how our new proof system relates to exactly.
p-simulates.
Let with be a proof of a given formula φ. We define and show that we can derive using with steps. We distinguish how is derived.
Axiom. is derived with (Ax). Then we can derive with (1-Mod).
(O-1) and (O-2) are fulfilled since and the empty assignment satisfies ∅.
Composition. is derived with (Comp’) using absence of models statement ρ and claims with for . Then we can derive with (Comp’) from .
(C-1) and (C-2) follow directly from (C-1) and (C-2) for as we do not modify the assumptions. For (C-3) we can simply use the absence of models statement ρ since it refutes
Join. is derived with (Join’) applied to and with . Then we can derive with (Join’) using and .
(J-1) follows directly from (J-1) for , as we do not modify the assumptions. (J-2) stating follows from (J-2) for .
Extension. is derived with (Ext’) from with .
We derive with the construction of Proposition 3.3. We can apply (Join) to I and .
As a result, we can derive from with a single step if is derived with (Ax), (Comp’) or (Join’). In particular, the resolution proof size of the absence of models statement in case of (Comp’) does not change. If is derived with (Ext’), we need one application of the construction of Proposition 3.3, one (Join) and one (Ext) and therefore in total steps.
Since , there is a proof of φ that has sizes and . □
Lower Bounds for MICE and MICE’
In this section we investigate the proof complexity of . Because of the equivalence of and (Proposition 4.8 and Proposition 4.9), all of the proof complexity results for below also apply to . For the analysis we use the two different measures of proof size.
First, we consider the proof size . For that, we can easily lift known lower bounds from propositional resolution and get families of formulas that require proofs of exponential size.
However, one could argue, that this is not the kind of hardness we are interested in. In the second part we get a stronger result by showing a lower bound for the number of inference steps , i.e. we ignore the sizes of the absence of models statements.
Lower Bounds for the Proof Size
In this subsection we only consider the proof size that counts the number of claims plus the length of all resolution refutations. If we use on unsatisfiable formulas, we have to prove that the formula has zero models. Hence, we can use as proof system for the language UNSAT as well. We show that is precisely as strong as resolution for unsatisfiable formulas.
is polynomially equivalent tofor unsatisfiable formulas.
Let φ be an arbitrary unsatisfiable formula.
We first show that is simulated by . Suppose is a resolution refutation of φ, then we can use as an absence of models statement and derive the final claim with a single application of (Comp’) of zero claims.
Next, we show that is simulated by . Let a refutation for φ be given with . We define with We show that is a valid resolution trace (with weakening steps). For this we use induction on m. In the base case for the trace only contains the clauses of φ and is therefore valid. For the induction step let be a valid resolution trace. If , there is nothing to show. Therefore, we can assume that . In particular, is not derived with (Ax). We distinguish how is derived.
is derived with (Comp’) from claims with using the absence of models statement ρ which is a resolution derivation In this derivation we can weaken every clause by . Thus is a resolution derivation of All clauses of (Observation 3.4) are already in . All clauses are in as well by induction hypothesis, since for all used claims to get the sum . Thus, the resolution derivation is correct.
is derived by (Join’) from claims and with . Since , w.l.o.g. . Therefore, we have already derived by induction hypothesis. Thus can be derived with a single weakening step.
is derived by (Ext’) from with . Since we have . Thus has already been derived. We can derive from by weakening since (E-3).
Since , the last claim is derived with (Comp’), (Join’) or (Ext’). Thus, contains the clause . As a result, is a resolution refutation of φ since it is a valid derivation of □. Furthermore, we see that . It is known that any refutation with resolution and weakening can be transformed into a refutation without weakening efficiently which proves the claim. □
Many hard families of formulas for resolution are known. One famous example is the pigeonhole formula family for which an exponential lower bound for resolution was first shown in [27]. With Theorem 5.1 we can conclude that these hard formulas for resolution are also hard for .
Anyproof π ofhas size.
We note that it is also quite straightforward to obtain exponential proof size lower bounds for satisfiable formulas in by forcing the system to refute some exponentially hard CNFs in absence of models statements.
Lower Bounds for the Number of Inference Steps
One could argue that unsatisfiable formulas such as are not particularly interesting for model counting. We also note that they have very simple proofs of just one step (as in the simulation of resolution by in Theorem 5.1) and that their hardness for stems solely from the fact that they are hard for resolution (and such resolution proofs need to be included as an absence of models statement). However, we would argue that this does not tell us much on the complexity of proofs.
We therefore now tighten our complexity measure and consider the proof size measure that only counts the number of inference steps which is exactly the number of claims a proof π has. This measure disregards the size of the accompanying resolution refutations and hence formulas such as become easy.
In our main result we present a family of formulas that is exponentially hard with respect to this sharper measure of counting inference steps. Such hard formulas need to have many models as the following upper bound shows.
Every formula φ has aproof π with.
The proof that we used to show the completeness in Theorem 4.6 needs one (Ax) step, applications of (Ext’), and one application of (Comp’). □
Therefore, to show exponential lower bounds to the number of steps we will need formulas with models. Next, we show that proofs for such formulas do not require claims with . In particular, we can assume that there are no such claims in the proofs.
Letand π be aproof of φ. Then there is aproofof φ that has no claim with countsuch thatand.
Assume that in π some claim is derived with (Comp’) from claims with and using some absence of models statement ρ. Because of Theorem 5.1 we can construct a resolution refutation of that has size . Therefore, we can derive I with (Comp’) from as well: (C-1) and (C-2) are still satisfied. For (C-3) we need an absence of models statement that refutes . For this we can first derive from F with and then apply ρ. Like this, we can remove claim . We repeat this for every claim with that is used for (Comp’). Afterwards, we remove all claims that became redundant. Let be the resulting proof.
Per construction, is a valid proof for φ. We will show that has no claims with . Assume otherwise claim I with is in . Since I is not redundant, there is a path to the final claim with . In this path there have to be claims with and with such that is directly derived from with one of the four rules.
Obviously this is not possible with (Ax).
Per construction, it is impossible with (Comp’), because otherwise would not be in .
It is not possible with (Join’) nor (Ext’) as would be a product with one factor leading to .
Hence, has no claim with . Furthermore, since we only removed claims. For every claim with that was used for (Comp’), we have to add a resolution proof of size leading to . □
Next, we introduce the family of formulas . They consist of variables and for and are satisfied exactly if for every pair .
The formula consists of the clauses for .
Anyproof π ofrequires size.
We start with some observations and lemmas and prove the lower bound at the end of this section.
The idea of the proof is the following: The final claim has a large count. In order to get a large count with a small number of steps, we have to use (Ext’) or (Join’) such that the previous counts get multiplied. However, we show that one factor of any such multiplication is always 1. As a result, the only way to increase the count is with (Comp’). We start with applications of (Ax) with count 1 and can only sum up those counts with (Comp’). As a result, we need an exponential number of summands.
hasmodels.
We can set arbitrarily for all and have a unique assignment for the remaining z variables to satisfy . □
For the following arguments we will only consider proofs of without redundant claims (i.e. all claims are connected to the final claim) and without claims with (this is possible by Lemma 5.4). Our next lemma states that if we have some clause in a claim, then all missing clauses have to be satisfied by the assumption.
Letbe an arbitrary claim in aproof of. If there aresuch that, then A has to satisfy every clauseforthat is not in F.
We fix variables such that and a clause for some . We consider only the path from to which has to exist, because otherwise is redundant. There have to be claims and directly adjacent in this path with , , , i.e. is the last claim in the path that does not contain C. is directly derived from with one of the four steps.
is obviously not derived with (Ax) nor (Comp’), since .
Assume is derived with (Join’) of and some . Since and is . In particular . Together with we get and where we used (J-2). Since and are consistent (J-1), , , have to be assigned in the same way in and . Because of Lemma 4.7 those variables have to be set in A as well and in particular with the same polarities.
Assume A does not satisfy C. Then, does not satisfy C either, since all variables of C are set as in A. Hence, has no models leading to which contradicts our assumption that there are no claims with count zero for satisfiable formulas (Lemma 5.4). Therefore, A has to satisfy C.
Assume, is derived with (Ext’) from . Then has to satisfy by condition (E-3). Because of Lemma 4.7, A has to assign , , in the same way as . Hence A satisfies C as well.
Therefore, can only be derived if A satisfies C leading to the lemma. □
The following lemma is similar in spirit. It shows that if all clauses are missing in a claim, then and have to be set in the assumption.
Let aproof ofbe given and letbe an arbitrary claim in the proof. If there aresuch thatand, then.
We fix indices such that and . Since we have for all . We consider only the path from to which has to exist, because otherwise is redundant. There have to be claims and directly adjacent in this path with for all and for at least one . That means, is the last claim in this path which contains none of the four clauses . Towards a contradiction, let us assume (the argument for is analogous). By Lemma 4.7, also and . The claim is directly derived from by one of the four rules.
is not derived with (Ax) nor (Comp’), since .
is not derived with (Join’). Assume otherwise, then is the result of (Join’) of with some other claim . Since and we have and in particular . Together with we get a contradiction with (J-2) because , but .
is not derived with (Ext’) from . Otherwise, has to satisfy by condition (E-3). Since does not contain any clause , has to satisfy all clauses that are in . By Lemma 5.8, has to satisfy all clauses that are not in as well. In order to satisfy all four clauses of , all three variables , and have to be set in , in particular which is a contradiction.
As a result, cannot be derived from which implies that our assumption was false. □
Using the previous two lemmas, we show that the two inference rules that multiply counts, i.e. (Join’) and (Ext’), do not affect the count at all for the formulas.
Let aproof ofbe given. If the proof contains a (Join’) of two claimsand, then.
Suppose otherwise, and .
Assume that all x variables occurring in are assigned in . Since , . In particular, there has to be a such that there is at least one model of and with and one with . Then we have and . As a result, has to satisfy all clauses that are in . Because of Lemma 5.8, has to satisfy the clauses that are not in as well. Thus, has to satisfy all four clauses , which is only possible if . This contradicts the choice of . Similarly, we also see that there is at least one x variable in .
Hence, we can fix and . Condition (J-2) implies , and in particular . Because of and we get and therefore also . The joined claim is with and for all k, implying . With Lemma 5.9 we get the contradiction .
Therefore, our assumption and was false. □
Using this lemma we can show, that w.l.o.g. any proof of does not use (Join’).
Let π be aproof of. Then there is aproofthat does not use (Join’) with.
Using π we construct a proof that does not use (Join’).
For this suppose that in π, the claim is derived with (Join’) of and . Because of Lemma 5.10 we can assume that . Thus, there is a unique assignment α such that , and satisfies . Then, we can apply (Ext’) to resulting in . We check the conditions to apply (Ext’).
(E-1). holds.
(E-2). We see that . In the last equation we used three facts:
is a direct consequence of .
follows from by (J-2) and the fact that and are consistent by (J-1).
. Assume otherwise that . Then by (J-2). Thus, contradicting the construction of α.
(E-3). satisfies as satisfies by construction.
Applying (Comp’) on the claim we get . In this way we can remove every (Join’) application with one application of each (Ext’) and (Comp’). Let be the resulting proof of that does not use (Join’). The number of claims in the proof increases at most by a factor of two. □
Let aproof ofbe given. Any claimin the proof that is derived with (Ext’) fromsatisfies.
Suppose . Since there is a variable with . Variable v occurs in some clause . Therefore, . A has to satisfy all clauses of that occur in because of (E-3). Furthermore, A has to satisfy all clauses of that do not occur in F as well due to Lemma 5.8. Since, , there is no . Therefore, A has to satisfy all four clauses . For this, , and have to be set in A. Since v occurs in , we have which contradicts the choice of v. □
Now we have all ingredients to finally prove that the formulas require proofs with an exponential number of steps.
Note that with Observation 5.7, Lemma 5.10 and Lemma 5.12 we can infer immediately that any tree-like proof of , i.e. any proof that uses every claim except the axiom at most one time, has at least size . However, in general (dag-like) proofs, any claim can be used multiple times. General dag-like might be exponentially stronger than the tree-like version. Therefore, the lower bound is not shown yet.
To prove the lower bound in the general case, let π be an arbitrary proof of . Let be a proof of that does not use (Join’) with which has to exist because of Lemma 5.11.
We consider an arbitrary fixed path κ in from the axiom to the final claim. Since does not use (Join’), we can only enlarge the formula with (Ext’). Because of Lemma 5.12, we have to assign all newly introduced variables when we use (Ext’), i.e. every variable is in at least one assumption in κ. The only rule that can remove variables from the assumption is (Comp’).
Since the final claim has the empty assumption, we have to remove all variables from the assumption in κ. Therefore, in κ there has to be at least one application of (Comp’) where we remove a variable from the assumption for some . Let be the claim that was used for the first such (Comp’) in κ to derive .
Let X be the set of all x variables: . We show Let be a variable that is removed from the assumption by applying (Comp’) to , i.e. . Suppose, there is a such that and in particular for all , implying . Let be the first claim in κ with and therefore . has to be derived with (Ext’). Because of condition (E-3), has to satisfy all clauses in . Furthermore, has to satisfy all clauses that are not in because of Lemma 5.8. Hence, has to satisfy for all . To do so, we have to assign all three variables , and in . In particular, we have . Since , Lemma 4.7 states . With this contradiction we see that such an with cannot exist.
Since , all variables in X were introduced and assigned in the assumption with (Ext’) in or previously in κ. Per construction there are no other (Comp’) applications before in κ that remove variables in X. Therefore, we have
We show that for every there is a path κ in with . Assume that for some fixed model α there is no such path. Since does not use (Join’) and , Corollary 4.3 implies that there is a path κ from axiom to the final claim, such that every claim in κ fulfills . In particular, If we restrict both sides on the variables in X and use , we get Since , all models have . Therefore, the right set has only one element which is , leading to . Hence, κ is a path with the claimed property for α.
Since has models, there are (at least) paths in and in particular claims . Because every model of assigns the x variables differently, all these claims are pairwise different. Therefore, has at least claims.
Finally, we see that the arbitrarily chosen proof π has size leading to the lower bound. □
Connection Between MICE’ and Decision DNNFs
In this section we show that there is a tight connection between proofs and decision DNNFs. That is, we show in Section 6.1. that we can extract a decision DNNF for some formula φ efficiently from a proof of φ. By exploiting this connection we immediately get further lower bounds for . Finally, in Section 6.2. we use this connection in order to provide an alternative proof that requires proofs of exponential size.
Let us first review the concept of DNNFs (Decomposable Negation Normal Form) and focus on the special case of decision DNNFs [21] which are widely used in knowledge compilation. Formally, a decision DNNF D with variables V is a directed acyclic graph with the following conditions. It has exactly one node with in-degree 0 which is called source. The nodes with outdegree 0 are labelled with 0 or 1 and are called sinks. All other nodes have out-degree 2 and are either decision nodes or And nodes. A decision node is labelled with a variable . One outgoing edge is labelled with 0 and the other with 1. On any path in D the variable x can be decided at most once. An And node is labelled with ∧ and has to satisfy the decomposability property. That is, the sets of variables that occur in the subcircuits of the two children have to be disjoint.
Let N be any node in D, then denotes the subcircuit of D with root N. Under a given assignment , D evaluates to which is defined recursively as follows.
Let N be a sink of D with label 0, then . If its label is 1, then .
Let N be a decision node deciding variable and let be the child node for , for . Then,
Let N be an And node with children and . Then, .
A decision DNNF represents some formula φ if D evaluates to 1 for exactly the models of φ. The size of a decision DNNF is the number of its nodes.
Efficient Extraction of a Decision DNNF from a MICE’ Proof
We will show, that we can extract decision DNNFs from proofs efficiently, i.e. the size of the resulting decision DNNF is not much larger than the number of steps.
Let φ be a formula withproof π with n steps. Then there exists a decision DNNF of size at mostrepresenting φ.
Let be a proof with for every . Our goal is to construct from π a decision DNNF for φ. W.l.o.g. the first claim of π is derived with (Ax) and all other claims are not derived with (Ax). We use the notation . Inductively, we construct a decision DNNF for every such that:
(IH1) evaluates to one on exactly all assignments from and
(IH2) contains only variables from .
For the base case , is derived with (Ax). Therefore, we set to a circuit that only contains one sink labelled with 1.
For the induction step we distinguish how is derived.
Join. is derived with (Join) of claims and . Per induction hypothesis, we have already derived decision DNNFs and representing and . We define to be an And gate with the two children and . Because of (J-2) we have . Together with (IH2) we get . Therefore, the And is indeed decomposable. Furthermore, (IH1) and (IH2) are satisfied: and where we used that , are consistent (J-1). Further, in the third step, we use that if there is some variable , then also (J-2).
Composition. is derived with (Comp) from claims . If , then only contains one node labelled with 0 and the induction hypothesis is fulfilled. Otherwise, let . (Remember, that all assumptions have the same set of variables because of (C-1)). We build a complete binary decision tree T with variables in V. For every claim for there is exactly one leaf in T that is consistent with the assumption of . We replace this leaf with the corresponding decision DNNF . Afterwards, we replace all remaining leaves with the 0 sink. Furthermore, we remove every decision gate where both decisions lead to the 0 sink node as long as such nodes exist. We set to be the resulting circuit. Note, that has at most n paths from the root to some claim and every such path has at most decision nodes.
Per construction, contains exactly the models of and contains only variables from .
Extension. is derived with (Ext) from . Then we can set . To see this, we use that satisfies by (E-3) and by (E-2): Therefore, .
This completes the induction. Since , computes . Thus, represents φ and is a decision DNNF by construction.
To estimate the size, we observe that every claim becomes a node in . Further, there are at most additional decision nodes for the (Comp’) constructions. We may also need one additional sink labelled with 0. In total, we get . □
As a direct consequence of Theorem 6.1, lower bounds for decision DNNFs also apply for .
If formula φ requires a decision DNNF of size d, then anyproof for φ has size at least.
However, the resulting lower bounds are only of interest if the formulas admit short CNF representations. Therefore, in order to obtain relevant lower bounds for , we need formulas that separate CNF from decision DNNFs. In fact, a few such formulas are known in the literature [4,5,11,12], which by Corollary 6.2 yield additional lower bounds.
An Alternative Proof of the Lower Bound
Here, we provide an alternative proof to our direct lower bound for (Theorem 5.6). By Corollary 6.2, to show the lower bound it suffices to show that require decision DNNFs of exponential size. In fact, we show the even stronger result, that all DNNFs for have exponential size.
For the DNNF size lower bound we use a technique from communication complexity similar to [12]. To do so, we have to introduce some notions from communication complexity. Let V be a set of variables. A (combinatorial) rectangle over V is a set such that there exists a partition and two sets of assignments , satisfying . A rectangle is called balanced if its underlying partition is balanced, i.e. . A finite set of balanced rectangles over variables is called rectangle cover of φ if .
The following result provides a powerful technique to prove lower bounds for DNNF size (and thus also for proof size).
Let C be a DNNF computing a function φ. Then, φ has a balanced rectangle cover of size at most.
Therefore, we only have to prove that any rectangle cover of has exponential size. For that, we show that any rectangle in such a cover cannot be too large.
Any balanced rectangle forhas size at mostfor large enough n.
Let n be large enough and R be a balanced rectangle from some arbitrary rectangle cover for . Let be the underlying balanced partition. We say that a pair is split if , and do not all occur in the same set or . Further, two pairs and intersect if .
First, we show that R contains at least pairs that are split. For that we distinguish two cases.
Case 1. Assume that both sets and contain at least different variables each. Then is split, if and . Thus, R has at least split pairs.
Case 2. Otherwise we assume that has w.l.o.g. at most different variables. Since has at least different variables, there are different variables that would need to be in such that does not contain a split pair. However, as R is balanced, we have . Therefore, these variables do not all fit in and for every such variable that is put in instead, we obtain a split pair . In this way, by making as large as allowed, we still get (for n large enough) split pairs.
Next, we have a closer look at these split pairs. Since every pair only intersects with at most other pairs, R has to contain at least split pairs that are pairwise-disjoint.
Let be one of these pairwise disjoint pairs. For the two variables and there are four possibilities to assign them. We can show that at most two of these assignments lie in our rectangle R. For that we distinguish two cases.
Case 1. and are in two different sets of and . W.l.o.g. we assume that , and . Then, the value of has to be fixed in R. Otherwise, R would contain two assignments that assign and in the same way but differently. As R contains only assignments that satisfy this is impossible because it contradicts .
Case 2. and are in the same set. W.l.o.g. we assume that and . Since is split, we have . With the same argument used in case 1, we see that the value of has to be constant in R. So there are at most two of the four assignments for and in R.
Now, we can finally argue about the maximum size R can have. As has models, it cannot be larger than that. However, for every pairwise-disjoint pair in R, the rectangle can only contain two of the four possible assignments. Therefore, . □
For we have to cover all models with rectangles which cannot be larger than . Therefore, any cover has at least size . With Theorem 6.3, we obtain the DNNF size lower bound.
Any DNNF computinghas size at leastfor large enough n.
Finally, by applying Theorem 6.1, we get the lower bound as well.
Anyproof ofhas size.
Conclusion
We performed a proof-complexity study of the #SAT proof system , exhibiting hard formulas, both in terms of unsatisfiable CNFs, where their complexity in matches their resolution complexity, and for highly satisfiable CNFs with many models. As Fichte et al. [24] show that proofs can be extracted from solver runs for [35], [25] and [30], this implies a number of hard instances for these #SAT solvers.
We believe that the ideas for the lower bound for our formula can be extended to show hardness of further CNFs with many models. A natural problem for future research is to construct stronger #SAT proof systems (and #SAT solvers) where formulas such as become easy.
It would also be interesting to determine the exact relations between the systems , and the two other #SAT proof systems (#SAT) [16], based on certified decision DNNFs, and CPOG [13].
Footnotes
Acknowledgements
An extended abstract of this work appeared in the proceedings of SAT’23 [7]. We thank an anonymous reviewer of SAT’23 for pointing out the connection between and decision DNNFs resulting in the alternative approach to obtain lower bounds for described in Section 6. We also thank an anonymous reviewer of this journal article for providing a proof sketch for the alternative lower bound argument in Section which they kindly allowed us to reproduce here.
Research was supported by a grant from the Carl Zeiss Foundation and DFG grant BE 4209/3-1.
References
1.
AtseriasA.FichteJ.K. and ThurleyM., Clause-learning algorithms with many restarts and bounded-width resolution, J. Artif. Intell. Res.40 (2011), 353–373. doi:10.1613/jair.3152.
2.
BacchusF.DalmaoS. and PitassiT., Algorithms and complexity results for #SAT and Bayesian inference, in: 44th Symposium on Foundations of Computer Science (FOCS 2003), Proceedings, Cambridge, MA, USA, 11–14 October 2003, IEEE Computer Society, 2003, pp. 340–351.
3.
BalutaT.ChuaZ.L.MeelK.S. and SaxenaP., Scalable quantitative verification for deep neural networks, in: 43rd IEEE/ACM International Conference on Software Engineering, ICSE 2021, Madrid, Spain, 22–30 May 2021, IEEE, 2021, pp. 312–323.
4.
BeameP.LiJ.RoyS. and SuciuD., Lower bounds for exact model counting and applications in probabilistic databases, in: Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence, UAI 2013, Bellevue, WA, USA, August 11–15, 2013NicholsonA.E. and SmythP., eds, AUAI Press, 2013.
5.
BeameP.LiJ.RoyS. and SuciuD., Lower bounds for exact model counting and applications in probabilistic databases, in: Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence, UAI 2013, Bellevue, WA, USA, August 11–15, 2013NicholsonA.E. and SmythP., eds, AUAI Press, 2013.
6.
BeyersdorffO. and BöhmB., Understanding the relative strength of QBF CDCL solvers and QBF resolution, in: 12th Innovations in Theoretical Computer Science Conference (ITCS 2021), Leibniz International Proceedings in Informatics (LIPIcs), Vol. 185, 2021, pp. 12:1–12:20.
7.
BeyersdorffO.HoffmannT. and SpachmannL.N., Proof complexity of propositional model counting, in: 26th International Conference on Theory and Applications of Satisfiability Testing (SAT)MahajanM. and SlivovskyF., eds, LIPIcs, Vol. 271, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023, pp. 2:1–2:18.
8.
BiereA.HeuleM.van MaarenH. and WalshT. (eds), Handbook of Satisfiability, in Frontiers in Artificial Intelligence and Applications, IOS Press, 2021.
9.
BöhmB. and BeyersdorffO., Lower bounds for QCDCL via formula gauge, in: Theory and Applications of Satisfiability Testing (SAT)LiC.-M. and ManyàF., eds, Springer International Publishing, Cham, 2021, pp. 47–63.
10.
BöhmB.PeitlT. and BeyersdorffO., QCDCL with cube learning or pure literal elimination – what is best? in: Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence (IJCAI)RaedtL.D., ed., ijcai.org, 2022, pp. 1781–1787.
11.
BovaS.CapelliF.MengelS. and SlivovskyF., Expander CNFs have Exponential DNNF Size, 2014, CoRR, http://arxiv.org/abs/1411.1995, arXiv:1411.1995.
12.
BovaS.CapelliF.MengelS. and SlivovskyF., Knowledge compilation meets communication complexity, in: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI)KambhampatiS., ed., IJCAI/AAAI Press, 2016, pp. 1008–1014.
13.
BryantR.E.NawrockiW.AvigadJ. and HeuleM.J.H., Certified knowledge compilation with application to verified model counting, in: 26th International Conference on Theory and Applications of Satisfiability Testing (SAT)MahajanM. and SlivovskyF., eds, LIPIcs, Vol. 271, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023, pp. 6:1–6:20.
14.
BussS. and NordströmJ., Proof complexity and SAT solving, in: Handbook of SatisfiabilityBiereA.HeuleM.van MaarenH. and WalshT., eds, Frontiers in Artificial Intelligence and Applications, IOS Press, 2021, pp. 233–350.
15.
BussS. and ThapenN., DRAT proofs, propagation redundancy, and extended resolution, in: Theory and Applications of Satisfiability Testing (SAT)JanotaM. and LynceI., eds, Lecture Notes in Computer Science, Vol. 11628, Springer, 2019, pp. 71–89.
16.
CapelliF., Knowledge compilation languages as proof systems, in: Theory and Applications of Satisfiability Testing (SAT)JanotaM. and LynceI., eds, Lecture Notes in Computer Science, Vol. 11628, Springer, 2019, pp. 90–99.
17.
CapelliF.LagniezJ. and MarquisP., Certifying top-down decision-DNNF compilers, in: Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI) 2021, AAAI Press, 2021, pp. 6244–6253.
18.
ChewL. and HeuleM.J.H., Relating existing powerful proof systems for QBF, in: 25th International Conference on Theory and Applications of Satisfiability Testing (SAT)MeelK.S. and StrichmanO., eds, LIPIcs, Vol. 236, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022, pp. 10:1–10:22.
19.
CookS.A., The complexity of theorem proving procedures, in: Proc. 3rd Annual ACM Symposium on Theory of Computing, 1971, pp. 151–158.
20.
CookS.A. and ReckhowR.A., The relative efficiency of propositional proof systems, J. Symb. Log.44(1) (1979), 36–50. doi:10.2307/2273702.
21.
DarwicheA., Decomposable negation normal form, J. ACM48(4) (2001), 608–647. doi:10.1145/502090.502091.
22.
Dueñas-OsorioL.MeelK.S.ParedesR. and VardiM.Y., Counting-based reliability estimation for power-transmission grids, in: Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, California, USA, February 4-9, 2017SinghS. and MarkovitchS., eds, AAAI Press, 2017, pp. 4488–4494.
23.
FichteJ.K.HecherM. and HamitiF., The model counting competition 2020, ACM J. Exp. Algorithmics26 (2021), 13:1–13:26. doi:10.1145/3459080.
24.
FichteJ.K.HecherM. and RolandV., Proofs for propositional model counting, in: 25th International Conference on Theory and Applications of Satisfiability Testing, SAT 2022, Haifa, Israel, August 2–5, 2022MeelK.S. and StrichmanO., eds, LIPIcs, Vol. 236, Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022, pp. 30:1–30:24.
25.
FichteJ.K.HecherM.ThierP. and WoltranS., Exploiting database management systems and treewidth for counting, in: Practical Aspects of Declarative Languages – 22nd International Symposium, PADL 2020, Proceedings, New Orleans, LA, USA, January 20–21, 2020KomendantskayaE. and LiuY.A., eds, Lecture Notes in Computer Science, Vol. 12007, Springer, 2020, pp. 151–167.
26.
GomesC.P.SabharwalA. and SelmanB., Model counting, in: Handbook of SatisfiabilityBiereA.HeuleM.van MaarenH. and WalshT., eds, Frontiers in Artificial Intelligence and Applications, Vol. 336, 2nd edn, IOS Press, 2021, pp. 993–1014.
27.
HakenA., The intractability of resolution, Theor. Comput. Sci.39 (1985), 297–308. doi:10.1016/0304-3975(85)90144-6.
28.
HeuleM.HuntW.A.Jr. and WetzlerN., Verifying refutations with extended resolution, in: Automated Deduction – CADE-24–24th International Conference on Automated Deduction, 2013, pp. 345–359. doi:10.1007/978-3-642-38574-2_24.
29.
HeuleM.J.H.SeidlM. and BiereA., Solution validation and extraction for QBF preprocessing, J. Autom. Reason.58(1) (2017), 97–125. doi:10.1007/s10817-016-9390-4.
30.
LagniezJ. and MarquisP., An improved decision-DNNF compiler, in: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19–25, 2017SierraC., ed., ijcai.org, 2017, pp. 667–673.
31.
LatourA.L.D.BabakiB.DriesA.KimmigA.den BroeckG.V. and NijssenS., Combining stochastic constraint optimization and probabilistic programming – from knowledge compilation to constraint solving, in: Principles and Practice of Constraint Programming – 23rd International Conference, CP 2017, Proceedings, Melbourne, VIC, Australia, August 28–September 1, 2017BeckJ.C., ed., Lecture Notes in Computer Science, Vol. 10416, Springer, 2017, pp. 495–511. doi:10.1007/978-3-319-66158-2_32.
32.
Marques SilvaJ.P.LynceI. and MalikS., Conflict-driven clause learning SAT solvers, in: Handbook of SatisfiabilityBiereA.HeuleM.van MaarenH. and WalshT., eds, Frontiers in Artificial Intelligence and Applications, IOS Press, 2021.
33.
PipatsrisawatK. and DarwicheA., On the power of clause-learning SAT solvers as resolution engines, Artif. Intell.175(2) (2011), 512–525. doi:10.1016/j.artint.2010.10.002.
34.
ShiW.ShihA.DarwicheA. and ChoiA., On tractable representations of binary neural networks, in: Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning, KR 2020, Rhodes, Greece, September 12–18, 2020CalvaneseD.ErdemE. and ThielscherM., eds, 2020, pp. 882–892.
35.
ThurleyM., sharpSAT – counting models with advanced component caching and implicit BCP, in: Theory and Applications of Satisfiability Testing – SAT 2006, 9th International Conference, Proceedings, Seattle, WA, USA, August 12–15, 2006BiereA. and GomesC.P., eds, Lecture Notes in Computer Science, Vol. 4121, Springer, 2006, pp. 424–429. doi:10.1007/11814948_38.
36.
TodaS., PP is as hard as the polynomial-time hierarchy, SIAM J. Comput.20(5) (1991), 865–877. doi:10.1137/0220053.
37.
VardiM.Y., Boolean satisfiability: Theory and engineering, Commun. ACM57(3) (2014), 5. doi:10.1145/2578043.
38.
VinyalsM., Hard examples for common variable decision heuristics, in: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), 2020.
39.
WetzlerN.HeuleM. and HuntW.A.Jr., DRAT-trim: Efficient checking and trimming using expressive clausal proofs, in: Theory and Applications of Satisfiability Testing (SAT)SinzC. and EglyU., eds, Lecture Notes in Computer Science, Vol. 8561, Springer, 2014, pp. 422–429.
40.
ZhaiE.ChenA.PiskacR.BalakrishnanM.TianB.SongB. and ZhangH., Check before you change: Preventing correlated failures in service updates, in: 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, February 25–27, 2020BhagwanR. and PorterG., eds, USENIX Association, 2020, pp. 575–589.