Greed Is Slow on Sparse Graphs of Oriented Valued Constraints
Abstract
Greedy local search is especially popular for solving valued constraint satisfaction problems (s). Since any method will be slow for some s, we ask: what is the simplest on which greedy local search is slow? We construct a on Boolean variables for which greedy local search takes steps to find the unique peak. Our is simple in two ways. First, it is very sparse: its constraint graph has pathwidth and maximum degree . This is the simplest on which some local search could be slow. Second, it is “oriented” – there is an ordering on the variables such that later variables are conditionally-independent of earlier ones. Being oriented allows many non-greedy local search methods to find the unique peak in a quadratic number of steps. Thus, we conclude that – among local search methods – greed is particularly slow.
Keywords and phrases:
valued constraint satisfaction problem, local search, algorithm analysis, constraint graphsCopyright and License:
2012 ACM Subject Classification:
Theory of computation Constraint and logic programmingAcknowledgements:
We want to thank Martin C. Cooper for his comments which greatly improved the quality of our writing and Melle van Marle for his insightful discussions.Editors:
Maria Garcia de la BandaSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
We cannot hope for a polynomial time algorithm to solve arbitrary combinatorial optimization problems. But we still need to try to do something to solve these hard problems. Given that many hard problems can be defined as finding an assignment that maximizes some pseudo-Boolean function – that we call a fitness function – many turn to local search as a heuristic method [1]. Local search methods start at an initial assignment, then apply a fixed update rule to select a better adjacent assignment to move to until no further improvement is possible. Such a sequence of adjacent improving assignments is called an ascent. One of the most popular update rules is to always select the adjacent assignment that increases fitness by the largest amount, that is, to follow the steepest ascent– this update rule defines greedy local search [22]. Since greed is just one of many possible update rules, a natural question arises: is greed good? Or more specifically: is greedy local search fast or slow compared to other local search methods?
Since no local search method will be able to solve all instances of hard combinatorial optimization problems in a polynomial number of steps, we need a more nuanced criterium for what makes a local search method fast or slow. We find this nuance in looking at the performance of our methods on subsets of instances of differing simplicity instead of on all instances. Now, if a method cannot solve particularly simple sets of instances in a polynomial number of steps – at least when compared to other similar methods – then we call it slow.
To define our set of all instances and refine that to simple instances, we turn to valued constraint satisfaction problems (s). In the language of constraint programming, finding the maximum of a pseudo-Boolean function is the same as solving a Boolean . Given that even binary Boolean s can express both -hard and -complete problems [3, 11], we define – in Section 2 – our set of all instances as the set of all binary Boolean s. Each binary can be interpreted as defining a constraint graph with an edge between any two variables that share a constraint. This allows us to use the sparsity of the resulting graphs as a measure of simplicity: we focus on sets of instances of bounded degree and of bounded treewidth or – more restrictively – pathwidth.
In terms of degree, Elsässer and Tscheuschner [8] showed that binary Boolean s are -complete under tight reductions even if the constraints are restricted to . The tight -reduction means that there are degree instances where all ascents are exponential – including the steepest ascent taken by greedy local search. Monien and Tscheuschner [17] constructed a family of instances of degree for which they claim all ascents are exponential. Finally, all ascents are quadratic when the constraint graph has maximum degree (Theorem 5.6 in Kaznatcheev [13]). Taken together, this only leaves open the question of efficiency of greedy local search for binary Boolean s of degree .
Treewidth as a sparsity parameter has a more complicated – and perhaps more interesting – relationship to the efficiency of local search. There exists a polynomial time non-local search algorithm for finding not just a local maximum but the global maximum for s of bounded treewidth [2, 4]. Thus, binary Boolean s of bounded treewidth are not hard for . Unlike bounded degree, bounded treewidth instances really are a class of simple instances. But the existence of a polynomial-time non-local search algorithm for solving bounded treewidth s, does not mean that local search will be efficient at finding even a local peak. Cohen et al. [5] have already shown that greedy local search requires an exponential number of steps for Boolean s of pathwidth . The simplest set of instances on which greedy local search fails was subsequently lowered to pathwidth [15]. Recently, Kaznatcheev and Vazquez Alferez [16] showed that an old construction of Hopfield networks by Haken and Luby [9] provides a binary Boolean of pathwidth on which greedy local search takes an exponential number of steps. Since Kaznatcheev, Cohen and Jeavons [14] have shown that all local search methods will take at most a quadratic number of steps on tree-structured binary Boolean s (i.e., treewidth ), this leaves only the case of treewidth as open for the question of whether greedy local search is fast or slow.
There are partial results for these two open questions on degree and treewidth – mostly focused on all or some ascents, rather than steepest ascents – but they cannot be further extended. Poljak [18] showed that if the instance is allowed only constraints then for degree instances, all ascents are quadratic. However, Poljak’s [18] technique of rewriting degree constrain graphs by instances with small weights cannot extend to arbitrary binary constraints. There are degree -instances that require exponentially large weights (Example 5.10 in Kaznatcheev [13]) and, in their Example 7.2, Kaznatcheev, Cohen and Jeavons [14] gave an explicit family of instances with max degree where some ascents are exponential. Similarly, the encouragement-path proof techniques for showing that all local search methods are efficient on s of treewidth [14] cannot be extended to treewidth . Specifically, Kaznatcheev, Cohen and Jeavons [14]’s Example 7.2 not only has maximum degree but also pathwidth . However, although some ascents are exponentially long in this family of instances, the steepest ascents are all short and greedy local search can find the peak in a linear number of steps. More generally, Kaznatcheev and van Marle [15] optimistically conjectured that on any family of -instances of pathwidth , greedy local search will take at most a polynomial number of steps.
In this paper, we resolve these two open questions on the efficiency of greedy local search for -instances of degree and treewidth .111 In parallel work to ours, van Marle [21] developed a similar construction of exponential steepest ascent. His construction has the same constraint graph – with degree and pathwidth – but slightly different weights. The key difference is a much more involved proof of exponential steepest ascents: van Marle [21] shows how to simulate a particular prior construction of some exponential ascent as a steepest ascent on a “padded” instance. This is similar to the prior approaches taken by Cohen et al. [5] and Kazntcheev and van Marle [15]. In contrast, we focus on how to compose individual gadget’s fitness landscapes and their steepest (partial) ascents rather than introducing new subgadgets for simulating whole ascents. We find our approach simpler, and think that future work can more easily generalize our approach to other local search methods. In Section 3, we construct -instances on Boolean variables with binary constraints and unary constraints with a constraint graph of maximum degree and pathwidth (Proposition 3). In Section 4, we show that greedy local search takes steps to solve these simple -instances (Theorem 6). We construct as a path of gadgets with consecutive gadgets joined by a single binary constraint. Our proof of long steepest ascents is by induction on the number of gadgets in the path. We show that the steepest ascent first flips bits only in the first gadget until it flips the variable that participates in the binary constraint linking to . When this linking variable flips to this gives us the inductive hypothesis of and when it flips to , it gives the inductive hypothesis of . The constraint weights in the gadget are chosen in such a way that after this linking variable is flipped, the next potential flip in increases fitness by a lower amount than the flips in . Thus the steepest ascent continues in the part of the corresponding to the inductive hypothesis for steps, until it reaches the local peak of the sub-instance and finally allows flips to continue in that eventually result in the linking variable flipping back, repeating the recursive process for a second time.
We also show that our -instances are what Kaznatcheev and Vazquez Alferez [16] defined as “oriented” (Proposition 4). This means that the exponential running time of greedy local search on our instances stands in stark contrast to many other non-greedy local search methods that Kaznatcheev and Vazquez Alferez [16] have shown to take a quadratic or fewer steps to solve oriented s. From this we conclude that among local search methods, greed is particularly slow.
2 Background
Given some finite set of variable indexes with size ,222Most often this is , but in our construction of in Section 3 it will be . an assignment is a -dimensional Boolean vector . For every , refers to the th entry of . To refer to a substring with variable indexes , we write the partial assignment . To complete a partial assignment, we write to mean that for and free otherwise. When assignments are sufficiently short we give and explicitly, for example, refers to an assignment to variables where the second variable is set to . If we want to change just the assignment at index to a value then we will write . Two assignments are adjacent if they differ on a single variable. Or more formally: are adjacent if there exists an index such that , where .
A fitness landscape is any pseudo-Boolean function together with the above notion of adjacent assignments. Given any , the sublandscape on given background is the function restricted to inputs . An assignment is called a local peak in a fitness landscape if for all adjacent to . A sequence of assignments is called an ascent in the fitness landscape if and are adjacent for all , , and is a local peak. An ascent is called a steepest ascent, if for all and all assignments adjacent to it is the case that . Any local search method (that only takes increasing steps) follows an ascent. Greedy local search follows a steepest ascent.
A binary Boolean valued constraint satisfaction problem () on Boolean variables with indexes in is a set of constraints . Each constraint is a weight with an associated scope of size . We say that is a unary constraint if , and a binary constraint if . Overloading notation, the set of constraint implements a pseudo-Boolean function that we call the fitness function:
| (1) |
Solving means finding an assignment , that maximizes the fitness function . 333 One could also consider a -instance as a set of constraints where each is a binary function. This formulation is equivalent to our formulation above because an arbitrary constraint with scope can be expressed as a polynomial. For example, take : The second equality groups alike monomials. One can convert from the formulation to the formulation by summing alike monomial terms across all the constraints. That is, the constant terms are aggregated into , all the (i.e., coefficients appearing before ) aggregate into , and (i.e., coefficient appearing before ). It takes linear time to covert from to (see Theorem 3.4 in Kaznatcheev, Cohen and Jeavons [14]).
When discussing graph-theoretical properties of , we treat the scopes of binary constraints as edges. So and is the set of scopes of the binary constraints of . For each variable index , we define the neighbourhood as the set of variable indexes in that appear in a constraint with . In this paper, we measure the simplicity of a -instance by the maximum degree and by the pathwidth of its constraint graph. Given a graph , the pathwidth of is the minimum possible width of a path decomposition of . A path decomposition of is a sequence of sets where for with the following three properties:
-
1.
Every vertex is in at least one set .
-
2.
For every edge there exists an such that contains both and .
-
3.
For every vertex , if then for all such that .
The width of a path decomposition is defined as . We refer the reader to [6] for more details and for the definition of treewidth, and to [7] for standard graph terminology.
It is often useful to see how the value of the fitness function changes when a single variable is modified. In particular, we denote with the fitness change associated with changing variable to given some background assignment . It is easy to see that , and the value of depends only on the assignment to variables with indexes in . We use this to overload to partial assignments: if we consider to be well defined.
We say that has preferred assignment in background if and preferred assignment in background if .
Definition 1.
Given two indexes we say that sign-depends on in background assignment when . If there is no background assignment such that sign-depends on then we say that does not sign depend on . If for all we have that does not sign-depend on then we say that is sign independent.
In other words, Definition 1 tells us that if sign-depends on , the preferred assignment of variable depends on the assignment to variable .
Definition 2 (Kaznatcheev and Vazquez Alferez [16]).
A -instance is oriented if for every pair of indexes we have that either does not sign-depend on or does not sign depend on . If a -instance is oriented and sign depends on we assign a direction from to to the edge (i.e. we orient the edge, hence the name).
The constraint graphs of oriented s have no directed cycles [16]. Thus, if is any assignment to the first variables of a topological ordering of the variables of an oriented constraint graph, then is sign-independent given background . In other words, if is oriented, there is an ordering on the variables such that later variables are conditionally-independent of earlier ones. This implies that the fitness landscape of is single peaked on every sublandscape [16]. Depending on the research community, such landscapes are known as semismooth fitness landscapes [12, 16], completely unimodal pseudo-Boolean functions [10], or acyclic unique-sink orientations of the hypercube [19, 20]. Given that fitness landscapes implemented by oriented s are single-peaked, we use to denote the peak of the landscape implemented by the oriented -instance .
3 Construction of
Given two parameters , in this section, we construct the -instances and on variables and, in Section 4, show that they both have a steepest ascent of length . We construct the as a path of gadgets where each gadget is defined on variables . For notational convenience, we define . Note that the two s are exactly the same except on the th gadget where has and has . We will present the construction of the gadgets in two stages. First, we will define the scopes of all the constraints to get the constraint graph and show that these constraint graphs are very sparse (Proposition 3). Second, we will assign weights to the constraints and show that the s are oriented (Proposition 4).
Both the and gadgets have all six unary constraints and the same six binary constraints with scopes , , , , , . Finally, we connect adjacent gadgets with a single binary constraint with scope . The constraint graph of along with the connections to the adjacent gadgets at and are shown in Figure 1. It is not hard to check based on the above definition that the constraint graphs of are sparse:
Proposition 3.
The constraint graph of has maximum degree and pathwidth .
Proof.
The constraint graph of each is a cycle so every vertex has degree .
To create we add a single edge between consecutive gadgets, this raises the maximum degree to .
For the pathwidth:
() Path decomposition for and adjacent variables:
, , , , , .
() Contracting , and shows is a minor of .
We define the weights of the constraints sequentially using parameters , , and . Since and are the same except for the unary on , we use for all the weights except for (Equation 14) and (Equation 16):
| (2) | ||||||
| (3) | ||||||
| (4) | ||||||
| (5) | ||||||
| (6) | ||||||
| (7) | ||||||
| (8) | ||||||
| (9) | ||||||
| (10) | ||||||
| (11) | ||||||
| (12) | ||||||
| (13) | ||||||
| (14) | ||||||
| (15) | ||||||
| (16) |
The above weights are shown on the constraint graph in Figure 1. This structure of weights has three important features that ensure the is oriented, that let us recurse on smaller , and that help us control the steepest ascent. We have set the above weights in such a way that the following three properties hold in :
-
(a)
all the unaries are negative,
-
(b)
the magnitude of each variable’s unary is greater than the binary constraint from that variable to a variable in the gadget with higher second index (or than the sum of the two binaries in the case of ), and
-
(c)
the sum of the weights of any subset of “incoming” binaries on a variable (i.e., binary constraint to that variable from a variable in the gadget with lower second index) is either non-positive or greater than the magnitude of the unary (or the sum of the unary and any negative “outgoing” binaries in the case of ).
These three properties ensure that the resulting is oriented:
Proposition 4.
and are oriented.
| ( , ) | |||||||
|---|---|---|---|---|---|---|---|
Proof.
First we prove that are oriented as in Figure 1. Note that are cycles and every vertex has degree . We will denote by and the two neighbors of an arbitrary variable . Table 1 shows the fitness change for all possible assignments to and . The cells of Table 1 are colored according to the sign of . It suffices to check Table 1 against Definition 2: The sign of is always positive, and the sign of is always negative, regardless of the assignment to and , so does not sign depend on either or in .
On the other hand, for the rows where and the two columns where are negative whilst the two columns corresponding to are positive. This means that and sign-depend, respectively, on and ; but do not sign-depend, respectively, on and . Finally, from the fact that the row with has different signs on the two columns where , and also different signs on the two columns where we can see that sign-depends on and in .
Second, to show that are oriented, it suffices to show that for the preferred assignment to is independent of the assignment to . This is equivalent to showing that the sign of the last row in Table 1 does not change if we add to each column, which is obviously true. This is sufficient to show the statement of the proposition.
To show the additional property that the orientation of the edge is as it appears in Figure 1, we must show that sign-depends on the assignment to . But this can be seen from the fact that the first row of our table is equivalent to having in the background, and the second row is equivalent to having . Since the first and second rows have different signs the sign-dependence follows. The weight of in Equation 16 is set so that we have the next two properties:
-
(d)
If we fix then the sublandscape spanned by is the same as the landscape implemented by , and
-
(e)
if we fix then the sublandscape spanned by is the same as the landscape implemented by .
This allows us to analyze ascents on inductively because when is fixed to or we can use the analysis from our inductive hypothesis of or , respectively. It also makes it very easy to check for the peaks of our landscapes:
Proposition 5.
The semismooth fitness landscapes of , , , and have their unique fitness peaks at , , , and , respectively.444 For convenience, when we specify an assignment the variables are ordered from left to right by decreasing first index and, to break ties, by increasing second index. For example, for the assignment sets and all other variables to .
Proof.
By property (a), all the unaries in and are negative, so the all zero assignment is a local peak. Since the landscapes are semismooth from Proposition 4, this is also the unique global peak.
For , is conditionally-independent of all other variables and has , so the preferred assignment is . With set to , the preferred assignments for and are also ; and based on those, the preferred assignments for and are also . This leaves which, conditional on , prefers . Overall, this gives .
Since , property (d) implies that . Finally, the difference in increase of Equations 8 and 13 from the other weights ensures that:
-
(f)
steps from assignments to and from to increase fitness by exactly , and
-
(g)
all other fitness increasing steps increase fitness by at least .
As we will see in the next section, these “small” steps allow us to control in what order each block of variables appears in the steps of the steepest ascent. Combined with properties (d) and (e) this lets us show the exponential steepest ascent by induction on .
4 Exponential steepest ascent in the landscape of
We can now show that it takes a large number of steps to go from the assignment to the peak in the semismooth fitness landscape implemented by (and vice versa for the landscape implemented by ):
Theorem 6.
Both the steepest ascents starting from in the fitness landscape of and from in the fitness landscape of have length , where each step increases fitness by at least .
Proof.
Our proof is by induction on the number of gadgets . We will show that by adding the gadget , steepest ascents of length in the landscape of will convert to steepest ascents of length in the landscape of . To do this, we will look at all the ascents that take us from to in the landscape of the gadget and vice-versa for the gadget . All of these ascents are in Figure 2(a) for and in Figure 2(b) for . Each arrow in Figure 2 is labeled by the fitness increase from flipping the appropriate bit. The steepest ascent is bolded.
As we can see from the figures, although there exists a minimal ascent of length five between these two assignments that does not flip the variable, this is not the steepest ascent. Instead, the steepest ascent from to in the fitness landscape of (and vice-versa for ) takes seven steps and flips twice (at step ④ and ⑦).
This double flip of is what creates the recursion in that forces the steepest ascent in to trigger twice as many ascents in . Specifically, although the first four steps of the steepest ascent in the landscape of increase fitness by a large amount , step ⑤ increases fitness by only . Thus, the steepest ascent in the sublandscape spanned by “pauses” after step ④ and lets the steepest ascents in take over with steps that increase fitness by an amount .
With this intuition in mind, look at the steepest ascent in the fitness landscape of starting from . For brevity, define the (partial) assignments as the peaks of :
| (17) | ||||
| (18) |
Now we can rewrite our starting assignment as and note that the first four flips are entirely in :
| (19) |
where the variables that can flip are underlined and the variable that will be flipped by steepest ascent is bolded. For step ① there is only one choice to flip. On the subsequent two steps (②,③) the first of the two s is chosen by steepest ascent because they increase fitness by and (which are both ) while flipping the second to a would increase fitness by only .
Step ④ is the most interesting. It flips since that increases fitness by . In so doing, this flip transforms the landscape for variables on from the one implemented by to the one implemented by . In the landscape of , is no longer the peak, and hence it is underlined. Furthermore is bolded because, by construction, all fitness increasing flips of variables in increase fitness by and so steepest ascent will flip variables in instead of the flip that only increases fitness by :
| (20) |
Once all the steps in are taken, steepest ascent can return to , where the only remaining fitness-increasing step is the small step at that increases fitness by only . This step subsequently opens two more steps in :
| (21) |
As with the first four steps in Equation 19, the most interesting step is the final step (⑦). It flips from to . In so doing, this flip transforms the landscape for variables on from the one implemented by to the one implemented by . Thus, “undoing” step ④. In the landscape of , is no longer the peak, and hence underlined and bolded. Steepest ascent finishes with all remaining steps in :
| (22) |
Similar to the steepest ascent in Equations 19, 20, 21, and 22, the steepest ascent in the fitness landscape of starting from the assignment has the following steps:
| (23) | |||
| (24) | |||
| (25) | |||
| (26) |
Finally, both the steepest ascent in the fitness landscape of starting from the assignment (Equations 19, 20, 21, and 22) and the steepest ascent in the fitness landscape of starting from the assignment (Equations 23, 24, 25, and 26) have lengths of steps. The recurrence of and is solved by .
Combining Theorem 6 with that greedy local search follows steepest ascents, and using the facts that our instances are very sparse by Proposition 3, and that they are oriented by Proposition 4, we conclude that greed is slow on sparse graphs of oriented valued constraints:
Theorem 7.
Greedy local search can take steps to find the unique local optimum in oriented binary Boolean -instances on variables with unary constraints and binary constraints, maximum degree and pathwidth .
5 Discussion
There are two important structural features of our construction: that it is sparse (Proposition 3) and that is is oriented (Proposition 4). Sparseness resolves in the negative the two open questions on the efficiency of greedy local search for -instances of degree and treewidth . Given that all ascents are short for s of degree [13] and treewidth [14], the family of instances that are hard for greedy local search belong to the simplest class of instances where some local search has the possibility to fail. That is an oriented (Proposition 4), reminds us that this failure of greedy local search is not due to the popular suspect of “bad” local peaks blocking the way to a hard to find global peak. Oriented s only produce semismooth fitness landscapes that are single peaked on each sublandscape [16]: there are no “bad” local peaks in this family of instances, there is the single global peak. Further, in semismooth fitness landscapes, there is always a short ascent of Hamming distance from any initial assignments to unique peak [10, 12]. A short ascents is always available in , but greed stops us from find it.
Many other local search heuristics do not lose their way on oriented s. In contrast to Theorem 6, consider how a local search method that chooses improving steps at random – known as random ascent – behaves on starting from any assignment. Since there are variables, any improving bit flip has a probability of at least of being chosen as the next step. Thus, if then after an expected number of at most steps, it will be flipped to . Given the oriented constraints, it cannot be flipped back for the rest of the run. Next, if – at this point in the run – the current assignment has or then in an expected number of about steps, and will also be flipped to . Given the oriented constraints and that the only in-edge to these variables is from which is now fixed to , and will not be flipped back for the rest of the run. This logic continues for and , then , then and all other remaining variables following the arrows of the oriented constraints (i.e., in the topological order of the oriented ). This simple argument gives us a bound of on the expected number of steps for random ascent to find the peak.
The behavior of inadvertently fixing variables to their optimal state in the topological order of an oriented is a feature of many local search methods, not just random ascent. Kaznatcheev and Vazquez Alferez [16] give a more careful analysis of random ascent on general oriented binary Boolean s. Applying their bound yields an expected number of at most steps to solve . For the task of solving general oriented s they give quadratic bounds on the number of steps taken by, random ascent, simulated annealing, Zadeh’s simplex rule, the Kerninghan-Lin heuristic, and various other local search methods. Thus, not only does greedy local search require an exponential number of steps on oriented s of maximum degree and pathwidth , but lots of other local search methods can solve these instances in quadratic time. We conclude that, among local search methods, greed is slow.
References
- [1] Emile Aarts and Jan Karel Lenstra, editors. Local Search in Combinatorial Optimization. Princeton University Press, Princeton, NJ, USA, 2003.
- [2] Umberto Bertelè and Francesco Brioschi. On non-serial dynamic programming. Journal of Combinatorial Theory, Series A, 14(2):137–148, 1973. doi:10.1016/0097-3165(73)90016-2.
- [3] Michaela Borzechowski. The complexity class polynomial local search (pls) and pls-complete problems. Bachelor’s thesis, Freie Universitat Berlin, 2016. URL: https://www.mi.fu-berlin.de/inf/groups/ag-ti/theses/download/Borzechowski16.pdf.
- [4] Clément Carbonnel, Miguel Romero, and Stanislav Živný. The complexity of general-valued constraint satisfaction problems seen from the other side. SIAM Journal on Computing, 51(1):19–69, 2022. doi:10.1137/19M1250121.
- [5] David A Cohen, Martin C Cooper, Artem Kaznatcheev, and Mark Wallace. Steepest ascent can be exponential in bounded treewidth problems. Operations Research Letters, 48:217–224, 2020. doi:10.1016/j.orl.2020.02.010.
- [6] Marek Cygan, Fedor V Fomin, ukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized algorithms. Springer International Publishing, 2015. doi:10.1007/978-3-319-21275-3.
- [7] Reinhard Diestel. Graph Theory. Springer Publishing Company, Incorporated, 5th edition, 2017.
- [8] Robert Elsässer and Tobias Tscheuschner. Settling the complexity of local max-cut (almost) completely. In International Colloquium on Automata, Languages, and Programming, pages 171–182. Springer, 2011. doi:10.1007/978-3-642-22006-7_15.
- [9] Armin Haken and Michael Luby. Steepest descent can take exponential time for symmetric connection networks. Complex Syst., 2(2):191–196, April 1988. URL: http://www.complex-systems.com/abstracts/v02_i02_a03.html.
- [10] Peter L Hammer, Bruno Simeone, Th M Liebling, and Dominique de Werra. From linear separability to unimodality: A hierarchy of pseudo-boolean functions. SIAM Journal on Discrete Mathematics, 1(2):174–184, 1988. doi:10.1137/0401019.
- [11] David S. Johnson, Christos H. Papadimitriou, and Mihalis Yannakakis. How easy is local search? Journal of Computer and System Sciences, 37(1):79–100, 1988. doi:10.1016/0022-0000(88)90046-3.
- [12] Artem Kaznatcheev. Computational complexity as an ultimate constraint on evolution. Genetics, 212(1):245–265, 2019. doi:10.1534/genetics.119.302000.
- [13] Artem Kaznatcheev. Algorithmic Biology of Evolution and Ecology. PhD thesis, University of Oxford, 2020.
- [14] Artem Kaznatcheev, David A Cohen, and Peter Jeavons. Representing fitness landscapes by valued constraints to understand the complexity of local search. Journal of Artificial Intelligence Research, 69:1077–1102, 2020. doi:10.1613/jair.1.12156.
- [15] Artem Kaznatcheev and Melle van Marle. Exponential steepest ascent from valued constraint graphs of pathwidth four. In 30th International Conference on Principles and Practice of Constraint Programming (CP 2024), pages 17:1–17:16, 2024. doi:10.4230/LIPIcs.CP.2024.17.
- [16] Artem Kaznatcheev and Sofia Vazquez Alferez. When is local search both effective and efficient?, 2024. doi:10.48550/arXiv.2410.02634.
- [17] Burkhard Monien and Tobias Tscheuschner. On the power of nodes of degree four in the local max-cut problem. In Algorithms and Complexity: 7th International Conference, CIAC 2010, Rome, Italy, May 26-28, 2010. Proceedings 7, pages 264–275. Springer, 2010. doi:10.1007/978-3-642-13073-1_24.
- [18] Svatopluk Poljak. Integer linear programs and local search for max-cut. SIAM Journal on Computing, 24(4):822–839, 1995. doi:10.1137/S0097539793245350.
- [19] Ingo A Schurr. Unique sink orientations of cubes. PhD thesis, ETH Zurich, 2004.
- [20] Tibor Szabó and Emo Welzl. Unique sink orientations of cubes. In Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pages 547–555. IEEE, 2001. doi:10.1109/SFCS.2001.959931.
- [21] Melle van Marle. Complexity of greedy local search for constraint satisfaction. Master’s thesis, Utrecht University, 2025.
- [22] David P. Williamson and David B. Shmoys. Greedy Algorithms and Local Search, pages 27–56. Cambridge University Press, 2011.
