The 3-Decomposition Conjecture: A SAT-Based Approach with Specialized Propagators
Abstract
We investigate the 3-decomposition conjecture, which states that every connected cubic graph can be decomposed into a spanning tree, a collection of cycles, and a matching. Using a SAT-based approach enhanced with specialized propagators, we verify the conjecture for all relevant graphs up to 28 vertices. Our method extends the Satisfiability Modulo Symmetries (SMS) framework with specialized propagators that exploit theoretical properties of minimal counterexamples (counterexamples with the minimal number of vertices), enabling efficient pruning. We demonstrate that graphs containing certain substructures cannot be minimal counterexamples to the conjecture, allowing us to exclude these patterns during the search dynamically. Our experimental results quantify the impact of different propagator configurations and forbidden subgraph constraints on solving efficiency, showing significant performance improvements when leveraging these techniques. The approach scales effectively to graphs of 28 vertices. Our work illustrates how combining SAT solving with specialized constraint propagation techniques can successfully address challenging combinatorial problems in contemporary graph theory.
Keywords and phrases:
SAT, Symmetry Breaking, Subgraphs, Propagators, CombinatoricsCopyright and License:
2012 ACM Subject Classification:
Theory of computation Constraint and logic programming ; Mathematics of computing Graph theory ; Theory of computation Logic and verification ; Mathematics of computing Combinatorics ; Theory of computation Automated reasoning ; Mathematics of computing Graph algorithmsFunding:
The project leading to this publication has received funding from the European Union’s Horizon 2020 research and innovation programme under the grant agreement No. 101034440 ††margin: and was supported by the Austrian Science Fund (FWF) within the project 10.55776/P36688.Editors:
Maria Garcia de la BandaSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Over the last few years, computational methods have played an important role in mathematical discovery. On the one hand, machine-learning guided heuristic search has successfully established new results on the existence of certain combinatorial objects [22, 23]. On the other hand, for non-existence or optimality results (like what is the smallest object with a certain property), where the search space must be explored rigorously, constraint-based methods have been successful [5, 7, 8, 14, 17, 25].
In this paper, we tackle the 3-Decomposition Conjecture (3DC) with constraint-based methods. The conjecture, formulated by Hoffmann-Ostenhof [6] in 2009, is an open problem in discrete mathematics that attracted a lot of research interest [9]. The conjecture states that every connected cubic graph (each vertex has exactly three neighbors) can be partitioned into three edge-disjoint subgraphs: a spanning tree, a collection of cycles, and a matching. Figure 1 shows several small cubic graphs with the 3-decomposition indicated by colors: green edges represent the spanning tree, red edges the cycles, and blue edges the matching. The conjecture has been verified for connected cubic graphs that are planar, Hamiltonian, traceable, claw-free, or 4-chordal, and for connected cubic graphs of treewidth [4, 15, 2, 19, 1]. However, these results on special cases only cover a small fraction of all connected cubic graphs for which, despite considerable efforts, the conjecture remains open.
Our main results are as follows.
-
(1)
We verify the 3DC for all connected cubic graphs up to 28 vertices with constraint-based methods.
-
(2)
We systematically compute a list of graphs with up to 18 vertices such that a minimal counterexample to the 3DC cannot contain any graph from the list as a subgraph.
-
(3)
We make an experimental study on how much the use of the graphs from (2) speeds up the search for a 3DC counterexample.
Result (1) is a significant improvement over the known bound of which was established by listing all connected cubic graphs up to vertices, modulo isomorphism, and checking for each of them whether it has a 3-decomposition [4]. There are such graphs [11]; hence, this generate-and-test approach is feasible. However, for larger , this becomes quickly infeasible as we have , , , and . Our approach circumvents this obstacle by integrating search and test with a combination of SAT encodings with specialized propagators.
Result (2) yields a complete list of all reducible templates, a specific type of subcubic graphs, up to index and order , from which we deduce the list of subgraphs that a minimal counterexample to the 3DC cannot contain. Some reducible templates have already been identified by Bachtler et al. [4], but our search yields new instances. Observe that Result (2) has a direct effect on Result (1): if we know the forbidden subgraphs, then we can use them to prune the search tree for a 3DC counterexample and thus make the search for (1) more efficient. While Result (1) confirms the conjecture for a finite number of graphs (modulo isomorphism), Result (2) applies to minimal counterexamples of any size, i.e., to an infinite number of graphs (modulo isomorphism), hence can be considered stronger from a mathematical point of view.
Excluding subgraphs during the search requires repeated subgraph testing, known to be NP-complete. We efficiently accomplish this by tightly integrating the Glasgow Subgraph Solver [21] into our method. However, as these tests are frequent, they become computationally costly. Hence, we face a tradeoff: when is the subgraph testing too costly to outweigh the speedup achieved by search space pruning? Result (3) gives a systematic insight into this question. We provide rigorous experimental data that allows us to pinpoint a good balance between the two conflicting factors. Our analysis shows that incorporating forbidden subgraph constraints derived from smaller cases can drastically reduce search times for larger cases. We report on the specific performance improvements for graphs of various sizes.
Our work illustrates how SAT and CP techniques can be combined to tackle challenging combinatorial problems. Our dynamic forbidden subgraph approach naturally extends to many graph conjecture verification tasks where “minimality” can be meaningfully defined. Rather than pre-computing constraints, our method discovers forbidden patterns during the search process itself, creating increasingly powerful pruning rules as exploration progresses. This approach is directly applicable to coloring problems, extremal graph theory conjectures, and Ramsey-type problems, where minimal counterexamples must satisfy specific structural properties. The key insight is that local patterns discovered in one search branch can inform constraints for the entire remaining search space. This “learn-as-you-go” paradigm is particularly valuable for problems where theoretical analysis alone cannot easily identify all forbidden patterns, potentially transforming how we approach computational verification across combinatorial mathematics.
2 Preliminaries
For positive integers , we write , and .
CNF formulas.
A literal is a (propositional) variable or a negated variable . A clause is a disjunction of a finite set of literals. A formula in conjunctive normal form (CNF) or clausal normal form is a conjunction of a finite set of clauses.
Simple graphs.
A simple graph is a graph without parallel edges or self-loops. In this paper, the term graphs refers to simple graphs unless otherwise specified. A simple graph consists of a set of vertices and a set of edges; we denote the edge between vertices by or, equivalently, . We thus write to denote a graph, where is the vertex set and the edge set. Two vertices are adjacent if . The degree of a vertex , denoted as , is the number of vertices in that it is adjacent to. For , a -regular graph is a graph where each vertex has exactly degree . A -regular graph is also called a cubic graph. A graph where each vertex has at most neighbors is a subcubic graph. A graph is connected if there is a path between any distinct pair of vertices. A cycle is a connected -regular graph. A matching is a graph where no two edges share a common vertex. A graph is a tree if there is a unique path between any pair of distinct vertices. A graph is a spanning tree of a graph if is a tree, , and . A graph is a subgraph of if there is an injective mapping such that for any , if then . is an induced subgraph of if the mapping above additionally satisfies that for any , if . If two graphs are induced subgraphs of each other, then we say the two graphs are isomorphic, and we call the witnessing mappings isomorphisms. Given , the subgraph of induced by is the graph , where and . The adjacency matrix of a graph with is the -matrix where the element at row and column , denoted by , is if and only if . Let denote the propositional edge variable for the possible edge between vertices and . If , then the possible edge is present; otherwise, the possible edge is absent.
SAT modulo symmetries (SMS).
SMS [18] is a framework that augments a CDCL (conflict-driven clause learning) SAT solver [10, 20]. The framework is specifically designed for enumerating graphs that satisfy given properties expressed in the form of a formula in propositional logic. Usually, properties of graphs that we take into consideration are invariant under isomorphisms, and SMS benefits from only considering one adjacency matrix out of the numerous different adjacency matrices that represent the same graph (modulo isomorphism). SMS implements this idea by connecting a CDCL SAT solver to an external propagator, which checks from time to time whether the current assignment can be extended to a lexicographically minimal (canonical) matrix (more precisely, only those copies are kept that are when considering the rows of the adjacency matrix concatenated into a single vector), and gives feedback to the CDCL solver in the form of symmetry breaking clauses accordingly. This synergy between the CDCL solver and the external propagator is not restricted to generating canonical matrices. In fact, customized external propagators can be added to learn clauses and trim the search tree to suit the specific task at hand. As of today, SMS has incorporated many commonly sought-after functionalities, such as generating graphs of certain connectivity, graphs without certain subgraphs, and so on. It is possible to specify a partition of the vertex set and restrict the symmetry breaking to those permutations that preserve the partition. For a full description of SMS, we refer to the original work where the framework was introduced [18].
Partially defined graphs.
The notion of partially defined graphs was introduced in the context of SMS [17] to capture the combinatorial object represented by a partial truth assignment over the edge variables of a graph. A partially defined graph is a graph where some edges are undefined in the sense that their presence in the graph is open. Formally, a partially defined graph is a graph whose edge set is split into disjoint sets and , the sets of defined edges and defined non-edges, respectively. is fully defined if for any such that .
Partially defined subgraphs occur naturally in the process of SAT solving, and many graph properties can already be shown when we only know for sure some edges exist (or do not exist) in a given graph, e.g., the existence of certain (induced) subgraphs. Thus, the benefits of considering partially defined graphs during SAT-based graph enumeration are at least twofold. First, if we can falsify the desired property in a partially defined graph, then we can block the corresponding branch of the search tree early on and speed up the search. Second, properties that are not in the class NP are usually hard to express concisely in CNF, and therefore can introduce enormous time overhead for the solver due to the large size of the formula. An external propagator, therefore, serves as a way to circumvent the clumsy encoding because it only gives the clauses for the desired properties to the solver when these clauses become useful in blocking the search path.
3 Verifying the conjecture up to
Let’s first give a formal statement of the conjecture.
Conjecture 1 (3-Decomposition Conjecture, 3DC).
Every connected cubic graph can be decomposed into a spanning tree , a collection of cycles , and a (possibly empty) matching .
We verify the conjecture for all connected cubic graphs with vertices up to . We achieve this by performing an exhaustive search for counterexamples to the conjecture through all cubic graphs with vertices, starting with and increasing by each time since all cubic graphs have an even number of vertices, until we reach . Thus, we can safely assume that if a counterexample is found, it is a minimal counterexample. Given a fixed , we give the following CNF formula to SMS, augmented with specialized propagators.
describes the constraints for a graph with vertices to be cubic. The summation sign here represents a cardinality constraint, which specifies how many variables in a given set are set to true. We express cardinality constraints using cardinality networks [3]. The CNF formula and the propagators together ensure that SMS outputs all and only counterexamples, i.e., cubic graphs with vertices that are without a 3-decomposition. This way, if SMS outputs no graphs, then we know that the conjecture holds for all graphs with vertices. For larger cases, a timeout of one day is set. When this timeout is reached, the solving stops and various cubes, which are sets of literals that represent subproblems split from the original problem [13], are generated. We then restart the solver with each cube as a set of assumptions. We do this iteratively until all cubes are solved before the timeout. This process is visualized in Figure 2.
3.1 Propagators
As is shown in Figure 2, we use in total four external propagators in combination with the CDCL SAT solver. The propagator that checks whether the current graph has a 3-decomposition is only activated for checking fully defined graphs, and is enclosed in dashed lines in the figure. The other three propagators are activated for checking partially defined graphs, to which fully defined graphs also belong, and are enclosed in solid lines. The minimality check, shown in blue, is the default propagator in SMS and is responsible for filtering out non-canonical adjacency matrices as early as possible in the process of generation. The other three propagators are either modified or newly added to SMS, and we will now explain them in detail.
Forbidden (partial) subgraphs check.
The forbidden (partial) subgraph check, shown in green in Figure 2, uses the Glasgow Subgraph Solver (GSS) to forbid the generation of graphs containing certain subgraphs. This functionality has already been realized in previous iterations of SMS [16]. We modified it to allow partially-defined graphs to be forbidden as subgraphs. Recall that a graph is a subgraph of if there is an injective mapping such that for any , if then . If is a subgraph to be forbidden, then when the forbidden subgraphs check detects such a mapping , it sends the clause to the SAT solver.
For our purposes, we define a relation similar to the subgraph relation for partially defined graphs. Given two partially defined graphs and , we say that is a partial subgraph of if there is a mapping such that for any we have that if and if . Note that a fully defined graph can also be seen as a simple graph with . Given two fully defined graphs and , the subgraph relations differ when they are seen as simple graphs and when they are seen as partially defined graphs. In fact, is a partial subgraph of if and only if is an induced subgraph of . The reason for this definition is that we want it to be the case that is a partial subgraph of witnessed by if and only if given any way to assign the undefined edges in to derive , there is a way to assign the undefined edges in to derive , such that is an induced subgraph of witnessed by . If is a partial subgraph to be forbidden, then when the forbidden partial subgraphs check detects such a mapping , it sends the clause to the SAT solver.
Spanning tree check and 3-decomposability check.
The two red propagators in Figure 2 are new additions to SMS, and both are specifically designed to filter out graphs that have a 3-decomposition. Both propagators are based on the following Theorem 2.
Theorem 2.
Let be a counterexample to the 3-decomposition conjecture, and be a spanning tree of it. Then there is an edge in that connects a vertex of degree and another of degree in . In other words,
Proof.
Assume the contrary. Let be a simple graph such that and . By definition, for all , we have . Since we assume that for all , either or , it follows that or . This means that is a union of a 2-regular graph and a 1-regular graph, and therefore, we have a 3-decomposition. This contradicts our assumption. Therefore, . Given a spanning tree , define the formula
states that if all edges of the spanning tree are present in the graph, then at least one edge that connects a vertex of the tree of degree one and another of degree two must also be present in the graph. The spanning tree check works with partially defined graphs. Given a partially defined graph , it searches for a spanning tree consisting of defined edges. If it finds one, and , it sends the solver the formula ; otherwise, it does nothing. The 3-decomposition check works only with fully defined graphs, and searches for a 3-decomposition for a fully defined graph exhaustively. If it finds a decomposition (note that it is necessary that due to Theorem 2), then it sends to the solver ; otherwise, it does nothing.
3.2 Results
We implemented the approach with the four propagators as mentioned above and verified the conjecture for every even . The time spent in each is shown in Table 1111The computational tasks throughout the paper were carried out on a Sun Grid Engine (SGE) cluster consisting of heterogeneous machines running Ubuntu 18.04.6 LTS. The cluster contains nodes with the following architectures: 2× Intel Xeon E5540 with 2.53 GHz Quad Core, 2× Intel Xeon E5649 with 2.53 GHz 6-core, 2× Intel Xeon E5-2630 v2 with 2.60GHz 6-core, 2× Intel Xeon E5-2640 v4 with 2.40GHz 10-core and 2× AMD EPYC 7402 with 2.80GHz 24-core. All relevant scripts and code can be found at https://doi.org/10.5281/zenodo.15623903. . The frequency for the minimality check for all cases in the table is the default value of . In Table 2, we provide statistics of the propagators for the bigger cases. In figure 3, we compare the time spent in solving the middle cases with the minimality check invoked with different frequencies. As we can see, in general, the time first decreases and then increases as we invoke the minimality check more seldom, but the difference is not significant.
Theorem 3.
The 3DC holds for all connected cubic graphs up to vertices.
4 Search for forbidden (partial) subgraphs
In this section, we search for patterns that cannot appear in a minimal counterexample to the conjecture. This is useful because if we know certain patterns cannot appear in a counterexample, we can close off the search branch once we detect the subgraph in the partially defined graphs and thereby shorten the search time. We search for particular pairs of patterns called reducible extensions, which are pairs of subcubic graphs and with , such that if we have a counterexample containing , then we can always obtain a smaller counterexample by replacing with . This way, cannot appear as a subgraph in a minimal counterexample to the 3-decomposition conjecture.
We start with reviewing some existing concepts and definitions that we built our concepts on. In particular, we introduce the concept of templates, reducible extensions, and reducible templates, and a sufficient condition for automatically testing whether a pair of subcubic graphs belongs to the latter. Then, we show that the said condition can be relaxed. Finally, we implement a search procedure using both the relaxed condition and SMS and obtain all reducible templates up to a certain size measure.
4.1 Templates, replacement, coloring, and possible behaviors
In this section, we review some useful definitions and theorems from Bachtler et al. [4]. Some of the definitions have been slightly modified to better formulate the concepts we work with.
Templates.
A template is a graph whose vertex set is partitioned into a set of inner vertices and a set of outer vertices , such that all inner vertices have 3 neighbors and all outer vertices have 1 neighbor. For any , we write to denote the unique vertex in that is adjacent to. The order of a template is defined as its number of vertices, and the index of a template is its number of outer vertices. Let and be two templates with . Let be a cubic graph. We say template is in or contains as a template if there exists a mapping such that for any , we have if , then and if and only if . We call such a mapping a witness.
Intuitively, a template is intended as a representation of “a piece of” a cubic graph where the inner vertices together with the edges among them form an induced subgraph of the entire graph, and the outer vertices correspond to all the other vertices that the vertices in this induced subgraph are adjacent to. We have defined what it means to be “a piece of” a cubic graph, and now we define what it means to replace one piece of a cubic graph with another.
Replacement.
Suppose contains as a template. Then we can replace in with and get where and . When it is not necessary to spell out the mapping , we also write for . A pair of templates with is called an -transformation. Transformations are called extensions if . The order and index of an extension is defined as the order and index of .
Figure 4 contains an example for the concepts of template and replacement. To reformulate the goal mentioned at the beginning of this section, we want to find pairs of templates and such that if we have a counterexample containing , then we can always obtain a smaller counterexample by replacing with . Now, we rigorously define such pairs of templates in the notion of reducible extensions.
Reducible extensions.
An -extension is 3-compatible if for every cubic graph with a 3-decomposition and for every extension of , also has a 3-decomposition. Given a -reduction, a mapping is called permissible if implies for all . A 3-compatible -extension is called a reducible extension if, for any connected cubic graph containing as a template witnessed by a permissible mapping for , we have that is also a connected cubic graph. Such a template is called reducible. The reason why we can forbid reducible templates in our search for counterexamples to the 3DC is formally stated in the following Theorem 4.
Theorem 4.
Let be a reducible extension and be a connected cubic graph that contains witnessed by a permissible mapping for . Then cannot be a minimal counterexample to the 3-decomposition conjecture.
Theorem 4 states why reducible extensions are useful, but we still lack a way to compute them, since a template can appear in infinitely many cubic graphs and thus it is impossible to test if two templates stand in the relation of reducible extensions by enumerating all cubic graphs they appear in. This problem is solved in Bachtler et al. in the following way. First, note the following proposition that allows us to filter out reducible extensions from -compatible extensions.
Proposition 5.
Let be a 3-compatible extension. If is connected, then is a reducible extension.
Now, our task is shifted to finding -compatible extensions. Bachtler et al. introduced a sufficient condition for -compatible extension that only requires analysing the structure of the templates themselves. The idea is that even though a template can appear in infinitely many cubic graphs, there are only finitely many ways a template can be decomposed as a part of a -decomposition. We call these ways possible behaviors of . So if for each the possible behavior of , there is a corresponding possible behavior of , such that the -decomposition still holds after replacement, then we can safely say that is a -compatible extension. This reasoning is rigorously formulated in Proposition 6, Corollary 7, and Theorem 8. We write RGB for the set . A 3-coloring of a graph is a mapping . A 3-decomposition can be seen as a 3-coloring, where the green edges represent the edges of the spanning tree, the red edges the cycles, and the blue edges the matching. We have the following proposition.
Proposition 6.
A 3-coloring of a cubic graph is a 3-decomposition if and only if
-
1.
The list of colors of the 3 incident edges of every vertex are either (green, green, green), (blue, green, green), and (green, red, red), and
-
2.
the green edges form a spanning tree over the cubic graph.
Proposition 6 gives us the following corollary.
Corollary 7.
Given a template and a 3-coloring over , the following conditions are necessary for the coloring to be a 3-decomposition over some cubic supergraph of , restricted to .
-
1.
The list of colors of the 3 incident edges of every are either [green, green, green], [blue, green, green] or [red, red, green], modulo reordering.
-
2.
The green edges form a spanning forest, and each tree in the spanning forest contains at least one vertex from .
Possible behaviors.
We call any 3-coloring of that satisfies the conditions in Corollary 7 a possible behavior of . Let be two templates with and . For any , write for the color of the unique edge incident to in the coloring . For a possible behavior of , define a partition of in which two vertices in are in the same equivalence class if they are in the same tree of the spanning forest given .
Theorem 8.
Let and be templates with and . is a 3-compatible extension if for any possible behavior of , there is a possible behavior of satisfying the following conditions.
-
1.
For any , .
-
2.
.
4.2 Relaxing the Conditions
In this section, we show that the condition in Theorem 8 can be further relaxed. The key observation is as follows. Given templates and with and and a possible behavior of , can still be a 3-compatible extension even if does not have a possible behavior such that . In fact, only needs to have a corresponding possible behavior for each of the possibilities that the rest of the spanning tree can be. We introduce Lemmas 9 and 11 that set the foundation for Definition 12, in which we rigorously characterize the description above. Then, we end this section with the relaxed condition and proof of its validity. Due to space limits, the proofs for this section are shown in Appendix A.
Lemma 9.
Given two trees and with , the combined graph is a tree if and only if .
Definition 10.
Let be a finite collection of sets. is mergeable if there exists a permutation of such that for each , .
Lemma 11.
Let be a set of vertices and a set of trees such that and for distinct . Define the combined graph . Then is a tree if and only if is mergebale.
Definition 12.
Given a partition of a set , we write to denote the set of partitions of such that is mergeable.
Theorem 13.
Let and be templates with and . is a 3-compatible extension if for any possible behavior of and partition , there is a possible behavior of satisfying the following conditions.
-
1.
For any , if ; if and only if .
-
2.
.
Theorem 13 and Proposition 5 give the criterion by which we search for reducible extensions using a C++ program. The program itself and the related toolchain will be explained in Section 4.4. An example of applying Theorem 13 to affirm a reducible extension is shown in Figure 6.
4.3 Converting reducible extensions to forbidden (partial) subgraphs
In this section, we explain how to convert reducible extensions into forbidden subgraphs and partial subgraphs. Recall that templates are intended as a representation of “a piece of” a graph where the inner vertices together with the edges among them form an induced subgraph of the entire graph, and the outer vertices correspond to all the other vertices that the vertices in this induced subgraph are adjacent to. The restriction that each outer vertex is adjacent to a unique inner vertex and none of the outer vertices allows us to consider fewer cases when enumeration such “pieces of a graph”, but this also means that we need to consider the possibility that multiple outer vertices can represent the same vertex in the entire graph. We now describe in detail how a reducible extension is converted to a set of forbidden subgraphs and forbidden partial subgraphs, respectively.
For any template , let be the partition of such that two outer vertices are in the same equivalence class if and only if the inner vertices that they are uniquely adjacent to are the same. Define to be the set obtained by removing singletons from , and write to denote . For both cases, we start with a reducible extension with . Note that if distinct are in the same equivalence class of and is a graph containing where and correspond to the same vertex in , then is not a simple graph, since it might contain parallel edges. In other words, the existence of the (partial) subgraph obtained by mapping and to the same vertex in a minimal counterexample is not ruled out by .
To deduce the set of forbidden subgraphs from , we enumerate all partitions of such that if distinct are in the same equivalence class in , then and are not in the same equivalence class of . For each , we construct a simple graph where and .
To deduce the set of forbidden partial subgraphs from , we enumerate all partitions of such that if distinct are in the same equivalent class in , then and are not in the same equivalent class of . For each , we construct a partially defined graph where , , and .
We implement a toolchain for computing forbidden (partial) subgraphs and explain it in detail in the next section. For now, we give two examples for the set of forbidden (partial) subgraphs we obtain from newly discovered reducible extensions in Figure 7.
4.4 Computing reducible templates
In this section, we explain the toolchain we built for computing reducible extensions. The toolchain is visualized in Figure 8. It is run iteratively, each time searching for reducible extensions of a fixed pair of order and index. The precise sequence in which the iterations are carried out is shown in Table 3. The reason for this sequence is to get reducible templates with as few vertices and edges as possible. In total, three tools are used.
The first tool is SMS with the minimality check and the forbidden (partial) subgraph check activated. We set SMS to enumerate all graphs with vertices and give SMS the following CNF formula.
Here we postulate that vertices are the outer vertices and the rest are inner vertices. states the conditions for a graph to be a template with index and order .
The second tool is a reducible extensions finder, which is a separate C++ program that takes in templates and finds reducible extensions according to Theorem 13. Here, smaller templates that are connected (see Proposition 5) and that are not the bigger graph for any reducible extensions found in previous iterations (shortened as left-overs in the figure) are used as candidates for the smaller template, and the templates generated by SMS are used as candidates for the bigger graph.
The last tool is a converter that converts reducible extensions found into forbidden (partial) subgraphs, which we have explained in Section 4.3.
By running this setup, we can determine all reducible templates we were looking for, and we arrive at the following main result of this section.
Theorem 14.
The numbers of reducible templates of various indices and orders up to index and order are as shown in Table 3.
Figure 9 shows the newly discovered reducible extensions up to order .
|
|
|||||
5 Speeding up the search with forbidden (partial) subgraphs
In this section, we test the effectiveness of forbidding (partial) subgraphs on shortening the search time for . We first gather all forbidden subgraphs (forbidden partial subgraphs, respectively) and order them in ascending order of the number of vertices. We then take the first forbidden (partial) subgraphs in the ordered list for and forbid them during our search. We also set the frequency at which the forbidden (partial) subgraphs check is called to . The forbidden (partial) subgraph check is called once per freq many edge variable decisions probabilistically. The time spent in search in each case is shown in Figure 10. The figure tells us the following.
-
1.
Forbidding (partial) subgraphs generally reduces the search time, with the effect stronger as increases.
-
2.
The search time first decreases, then increases as the number of forbidden (partial) subgraphs grows. For subgraphs, the optimal number to forbid is around , and for partial subgraphs is .
-
3.
Fixing the number of forbidden structures, the search with subgraphs forbidden is, in general, faster than the search with partial subgraphs forbidden. This is the result of two competing forces. On the one hand, partial subgraphs are more concise, with a forbidden partial subgraph more likely to rule out a partial assignment than a forbidden subgraph. On the other hand, partial subgraphs are represented as edge-labeled graphs in the Glasgow Subgraph Solver, which might lead to longer subgraph isomorphism testing times compared to unlabeled graphs. Apparently, the latter force overpowers the former in practice.
-
4.
Except for with forbidden partial subgraphs, where the frequent call of the forbidden partial subgraph propagators visibly drags down the search speed, there is no uniform pattern between search time and the frequencies of subgraph isomorphism testing. This might be because, while subgraph isomorphism testing is time-consuming, frequent testing allows for earlier pruning of the search tree.
6 Conclusion and future work
In this work, we developed a SAT-based method enhanced by constraint programming techniques to verify the 3-Decomposition Conjecture for connected cubic graphs up to 28 vertices. We combined specialized propagators with forbidden subgraph checks to effectively prune the search space and reduce computation time. Our experiments provided clear insights into the trade-offs between the cost of constraint propagation and the benefits of early search pruning.
For future research, implementing a systematic and automated feature to gather and verify proofs and certificates generated by different tools in the SMS framework would be interesting. We explain here how it could work with respect to the tool chain presented in this paper.
The SMS uses CaDiCaL as the SAT solver, which is amenable to the production of DRAT [12]. To take into account the learned clauses produced by various specialized propagators, we can first run SMS with the propagators while collecting all learned clauses and then run CaDiCaL a second time with proof logging, feeding it the original formula together with all the recorded learned clauses. The DRAT proof produced this way can then be independently checked using verified proof checkers like DRAT-trim [24].
Besides generating a DRAT proof for the SAT solving process, we also need to verify that the propagators work the way intended and learn correct clauses. This is also doable given the SMS framework. The propagators are essentially approximation algorithms for NP problems and are reliable when the answer is “yes” – they only learn clauses under that condition. Hence, a certificate can be generated each time a clause is learned, and these can be checked with a separate program. Note that NP certificates are simple to verify. Specifically for the tool chain in this paper, the minimality check can produce “nc-certificates” (see [18]); the forbidden (partial) subgraph check can output the mapping that witnesses subgraph isomorphism; the spanning tree check can output the spanning tree found that has ; the 3-decompositon check can output 3-decompositions. In general, each propagator used in SMS can be equipped with a certificate-generating option and an accompanying verifier for verifying the certificates it produces.
Realizing a systematic way of verification for the SMS framework requires significant engineering that we leave for future work.
References
- [1] Elham Aboomahigir, Milad Ahanjideh, and Saieed Akbari. Decomposing claw-free subcubic graphs and 4-chordal subcubic graphs. Discret. Appl. Math., 296:52–55, 2021. doi:10.1016/J.DAM.2020.01.016.
- [2] Saieed Akbari, Tommy R. Jensen, and Mark H. Siggers. Decompositions of graphs into trees, forests, and regular subgraphs. Discret. Math., 338(8):1322–1327, 2015. doi:10.1016/J.DISC.2015.02.021.
- [3] Roberto Asín, Robert Nieuwenhuis, Albert Oliveras, and Enric Rodríguez-Carbonell. Cardinality networks and their applications. In Oliver Kullmann, editor, Theory and Applications of Satisfiability Testing - SAT 2009, 12th International Conference, SAT 2009, Swansea, UK, June 30 - July 3, 2009. Proceedings, volume 5584 of Lecture Notes in Computer Science, pages 167–180. Springer, 2009. doi:10.1007/978-3-642-02777-2_18.
- [4] Oliver Bachtler and Irene Heinrich. Reductions for the 3-decomposition conjecture. Procedia Computer Science, 223:96–103, 2023. XII Latin-American Algorithms, Graphs and Optimization Symposium (LAGOS 2023). doi:10.1016/j.procs.2023.08.218.
- [5] Curtis Bright, Kevin K. H. Cheung, Brett Stevens, Ilias S. Kotsireas, and Vijay Ganesh. A sat-based resolution of Lam’s problem. In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2-9, 2021, pages 3669–3676. AAAI Press, 2021. doi:10.1609/AAAI.V35I5.16483.
- [6] Peter J. Cameron. Research problems from the BCC22. Discrete Mathematics, 311(13):1074–1083, 2011. Selected Papers from the 22nd British Combinatorial Conference. doi:10.1016/j.disc.2011.02.024.
- [7] Michael Codish, Michael Frank, Avraham Itzhakov, and Alice Miller. Computing the Ramsey number R(4, 3, 3) using abstraction and symmetry breaking. Constraints An Int. J., 21(3):375–393, 2016. doi:10.1007/S10601-016-9240-3.
- [8] Michael Codish, Alice Miller, Patrick Prosser, and Peter J. Stuckey. Constraints for symmetry breaking in graph representation. Constraints, 24(1):1–24, 2019. doi:10.1007/s10601-018-9294-5.
- [9] Genghua Fan and Chuixiang Zhou. Hoffmann-Ostenhof’s 3-decomposition conjecture. Discrete Mathematics, 348(7):114454, 2025. doi:10.1016/j.disc.2025.114454.
- [10] Johannes K. Fichte, Markus Hecher, Daniel Le Berre, and Stefan Szeider. The silent (r)evolution of SAT. Communications of the ACM, 66(6):64–72, June 2023. doi:10.1145/3560469.
- [11] The OEIS Foundation. Number of connected cubic unlabeled graphs with nodes. https://oeis.org/A002851.
- [12] Marijn Heule, Warren Hunt, Matt Kaufmann, and Nathan Wetzler. Efficient, verified checking of propositional proofs. In Mauricio Ayala-Rincón and César A. Muñoz, editors, Interactive Theorem Proving, pages 269–284, Cham, 2017. Springer International Publishing.
- [13] Marijn J. H. Heule, Oliver Kullmann, and Armin Biere. Cube-and-conquer for satisfiability. In Youssef Hamadi and Lakhdar Sais, editors, Handbook of Parallel Constraint Reasoning, pages 31–59. Springer, 2018. doi:10.1007/978-3-319-63516-3_2.
- [14] Marijn J. H. Heule, Oliver Kullmann, and Victor W. Marek. Solving and verifying the Boolean Pythagorean Triples problem via cube-and-conquer. In Nadia Creignou and Daniel Le Berre, editors, Theory and Applications of Satisfiability Testing - SAT 2016 - 19th International Conference, Bordeaux, France, July 5-8, 2016, Proceedings, volume 9710 of Lecture Notes in Computer Science, pages 228–245. Springer, 2016. doi:10.1007/978-3-319-40970-2_15.
- [15] Arthur Hoffmann-Ostenhof, Tomáš Kaiser, and Kenta Ozeki. Decomposing planar cubic graphs. Journal of Graph Theory, 88(4):631–640, 2018. doi:10.1002/jgt.22234.
- [16] Markus Kirchweger, Tomáš Peitl, and Stefan Szeider. Co-certificate learning with SAT modulo symmetries. In Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China, pages 1944–1953. ijcai.org, 2023. Main Track. doi:10.24963/IJCAI.2023/216.
- [17] Markus Kirchweger and Stefan Szeider. SAT modulo symmetries for graph generation. In 27th International Conference on Principles and Practice of Constraint Programming (CP 2021), LIPIcs, pages 39:1–39:17. Dagstuhl, 2021. doi:10.4230/LIPIcs.CP.2021.34.
- [18] Markus Kirchweger and Stefan Szeider. SAT modulo symmetries for graph generation and enumeration. ACM Trans. Comput. Log., 25(3):1–30, 2024. doi:10.1145/3670405.
- [19] Panpan Li and Wenzhong Liu. Decompositions of cubic traceable graphs. Discuss. Math. Graph Theory, 40(1):35–49, 2020. doi:10.7151/DMGT.2132.
- [20] João P. Marques-Silva, Inês Lynce, and Sharad Malik. Conflict-driven clause learning SAT solvers. In Armin Biere, Marijn Heule, Hans van Maaren, and Toby Walsh, editors, Handbook of Satisfiability, pages 131–153. IOS Press, 2009. doi:10.3233/978-1-58603-929-5-131.
- [21] Ciaran McCreesh, Patrick Prosser, and James Trimble. The Glasgow subgraph solver: Using constraint programming to tackle hard subgraph isomorphism problem variants. In Fabio Gadducci and Timo Kehrer, editors, Graph Transformation - 13th International Conference, ICGT 2020, Held as Part of STAF 2020, Bergen, Norway, June 25-26, 2020, Proceedings, volume 12150 of Lecture Notes in Computer Science, pages 316–324. Springer Verlag, 2020. doi:10.1007/978-3-030-51372-6_19.
- [22] Bernardino Romera-Paredes et al. Mathematical discoveries from program search with large language models. Nature, 625(7995):468–475, 2024. doi:10.1038/S41586-023-06924-6.
- [23] Trieu H. Trinh, Yuhuai Wu, Quoc V. Le, He He, and Thang Luong. Solving olympiad geometry without human demonstrations. Nature, 625(7995):476–482, 2024. doi:10.1038/S41586-023-06747-5.
- [24] Nathan Wetzler, Marijn J. H. Heule, and Warren A. Hunt. DRAT-trim: Efficient checking and trimming using expressive clausal proofs. In Theory and Applications of Satisfiability Testing – SAT 2014, volume 8561 of Lecture Notes in Computer Science, pages 422–429. Springer Verlag, 2014. doi:10.1007/978-3-319-09284-3_31.
- [25] Tianwei Zhang and Stefan Szeider. Searching for smallest universal graphs and tournaments with SAT. In Roland H. C. Yap, editor, 29th International Conference on Principles and Practice of Constraint Programming, CP 2023, August 27-31, 2023, Toronto, Canada, volume 280 of LIPIcs, pages 39:1–39:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.CP.2023.39.
Appendix A Proofs for Section 4.2
Proof of Lemma 9.
Proof.
We distinguish the following three cases. Suppose . Then is clearly a forest consisting of two disconnected trees. Suppose , then there exists distinct . Since and are trees, it follows that there is a unique path between and in both and . Given that , these two paths are distinct and therefore together form a cycle. Suppose . It suffices to show that for any distinct , there is a unique path between and . Without loss of generality, assume . We distinguish the following two cases.
-
1.
. Since is separating in , any path between and consists of a path between and in and a path between and in . Since both of the latter exist and are unique, it follows that there is a unique path between and in .
-
2.
. Then there exists a unique path between and in . Suppose there is a different path between and in . Then this path must contain at least one edge from and therefore a vertex . This means that this path consists of a path between and and a path between and . Since is separating in , it follows that is on both paths, and therefore is visited twice on the path. Contradiction.
Proof of Lemma 11.
Proof.
We prove the statement from both directions.
-
1.
Suppose is mergeable and is witnessing permutation of . Then we can show by induction on that is a tree. The base case where is true by definition. The induction step is valid because of Lemma 9. This means that in particular is a tree.
-
2.
Suppose is a tree. We show by induction on the size of non-empty that if is a tree, then is mergeable. The base case where is trivially true. Define . For the induction step, we first show that if is a tree and , then there is such that . Since is connected, it follows that for all . Now assume the contrary, that is, for all . We will see this assumption allows us to find a cycle in , which contradicts the premise that is a tree. To illustrate this, we build sequences and where for all . Start with any , and let . Given and , pick such that and . According to the pigeonhole principle, there exists , such that . Now we can obtain a cycle in by concatenating the unique path from to in , the unique path from to in ,…, the unique path from to in and the unique path from to in . So far, we have established that if is a tree and , then there is such that . This means that is a tree. By the induction hypothesis, there is a mapping that witness the fact that is mergable. Now it is easy to see that defined as for all and witnesses the fact that is mergable. Now we have established with induction that if is a tree, then is mergeable. In particular, if is a tree, then is mergeable.
Proof of Theorem 13.
Proof.
Suppose is a subgraph of a connected cubic graph with a 3-decomposition . Then is a possible behavior of . Note that the green edges of form a spanning forest in . Let be the partition of that the green edges of in induce. Since is a 3-decomposition, it follows that . Now, suppose is a possible behavior of that satisfies the conditions above. It suffices to show that
is a 3-decomposition of , i.e., it satisfies the conditions in Proposition 6. The first condition is satisfied due to Condition 1 of Corollary 7 and Condition 1 of Theorem 13. The second condition is satisfied because .
