A residual-based message passing algorithm for constraint satisfaction problems
Abstract
Message passing algorithms, whose iterative nature captures well complicated interactions among interconnected variables in complex systems and extracts information from the fixed point of iterated messages, provide a powerful toolkit in tackling hard computational tasks in optimization, inference, and learning problems. In the context of constraint satisfaction problems (CSPs), when a control parameter (such as constraint density) is tuned, multiple threshold phenomena emerge, signaling fundamental structural transitions in their solution space. Finding solutions around these transition points is exceedingly challenging for algorithm design, where message passing algorithms suffer from a large message fluctuation far from convergence. Here we introduce a residual-based updating step into message passing algorithms, in which messages varying large between consecutive steps are given high priority in the updating process. For the specific example of model RB, a typical prototype of random CSPs with growing domains, we show that our algorithm improves the convergence of message updating and increases the success probability in finding solutions around the satisfiability threshold with a low computational cost. Our approach to message passing algorithms should be of value for exploring their power in developing algorithms to find ground-state solutions and understand the detailed structure of solution space of hard optimization problems.
I Introduction
The difficulty in understanding complex systems manifests not only in finding a proper description of their interaction topology, but also in quantifying the collective and cooperative behaviors among their constituents at multiple scales Newman-AIP-2012 . Message passing algorithms prove to be an efficient tool in tackling hard computational problems formulated in graphical models Koller.Friedman-2009 , which is a simple description of complex interacted systems. In a typical algorithmic procedure, one defines messages on the connections of basic units in a graphical representation, derives iterative equations of messages to account for the propagation of correlation among variables, and extracts information on problem solutions through messages after a sufficiently large number of updating steps. Among the main roots of the message passing algorithms are coding theory in information theory research Richardson.Urbanke-2008 and statistical physics of disordered systems Mezard.Montanari-2009 . Message passing algorithms have been heavily explored in optimization problems Garey.Johnson-1979 ; Zhou-2015 , inference problems Zdeborova.Krzakala-AdvInPhys-2016 , learning problems Braunstein.Zecchina-PRL-2006 ; Mezard-PRE-2017 , and so on. Different frameworks of message passing algorithms are based on mean-field theory at a certain level of approximation, whose typical examples encompass the belief propagation (BP) algorithm Mezard.Parisi-EPJB-2001 , the survey propagation algorithm Mezard.Parisi.Zecchina-Science-2002 , the cluster variational algorithm Kikuchi-PRB-1951 ; Pelizzola-JPhysA-2005 , and so on.
Constraint satisfaction problems (CSPs) Garey.Johnson-1979 are among the most typical computational tasks in complex systems research. A typical instance of CSPs can be formulated as a bipartite graph with two types of nodes denoting constraints and variables respectively and edges only between constraints and variables. In a random setting, edges can be established from a null graph with only nodes by connecting a given constraint node with multiple variable nodes chosen among the variable node set with a uniform probability. A basic computational question for CSPs is to find the existence and the number of assignments to variables which satisfy all the constraints in a given instance. CSPs are heavily discussed in computational complexity theory in theoretical computer science Garey.Johnson-1979 , as many prototype NP-hard problems can be formulated as CSPs. In the language of statistical physics, satisfiability and optimization problems can be understood as the energy landscapes of configurations of a physical system with continuous or discrete states, while their global optima correspond to the ground-state energy of landscapes. Thus we can adopt statistical mechanical frameworks, such as the mean-field theory of spin glasses Mezard.Montanari-2009 , to estimate the energy and the entropy of their ground-state solutions. Typical CSPs studied with the spin glass theory are the random -satisfiability (-SAT) problem Krzakala.etal-PNAS-2007 ; Montanari.RicciTersenghi.Semerjian-JStatMech-2008 , the minimum vertex cover problem Weigt.Hartmann-PRL-2000 ; Weight.Zhou-PRE-2006 , and the -coloring problem Zdeborova.Krzakala-PRE-2007 . These problems focus on random CSPs with fixed domains, whose size of variables is independent of the variable number (that is, 2, 2, and as given integers, respectively). Yet many practical problems, such as the Latin square problem, the -queens problem and so on, can be transformed into random CSPs with growing domains. Among the models for these CSPs, model RB (revised B) proposed in Xu-JAIR-2000 is a popular one, whose domain size grows polynomially with the variable number .
Spin glass mean-field theory on satisfiability problems shows that fundamental structural transitions exist in the geometric organization of ground-state configurations. Taking the random -SAT () problem Krzakala.etal-PNAS-2007 as an example, with an increase in constraint densities (ratio of constraint number to variable number), there are clustering, condensation, and SAT/UNSAT phase transitions separated by multiple thresholds, where drastic changes in the numbers and sizes of the clusters of ground-state configurations take place. Furthermore, there is a deep connection between these solution space phase transitions and the algorithmic performance in finding solutions. Specifically, around these thresholds, messages in mean-field theory often show large fluctuations, rendering impossible the convergence of messages from which a typical message passing algorithm can extract information. Meanwhile, each mean-field theory has an approximation at some level on the organization of the solution space. For example, for the BP algorithm Mezard.Parisi-EPJB-2001 , solutions are assumed to be organized in a single cluster, or a pure state. When a level of approximation fails, there are often two choices: whether we generalize the current mean-field assumption to a theoretical framework with a more complicated and computationally demanding form, or we introduce modifications at an algorithmic level to achieve better performance by leveraging the existing form of message passing algorithm.
Our focus in this paper is to suppress the fluctuation of iterative messages around thresholds, a critical problem for message-passing-based algorithms, thus to improve the performance of existing BP algorithm for solving CSPs at the algorithmic level. Our main contribution here is to define residuals in the message updating process, based on which the existing BP algorithm is further modified. We show that, for a specific CSP model RB, compared with its usual BP algorithm, our modification of the algorithm can significantly improve the convergence of the updated messages and increase the probability of finding ground-state solutions around the satisfiability thresholds at a lower computational cost.
The layout of the paper is as follows. In Section , we briefly introduce the concept and some known results of model RB, which is a typical CSP with growing domains. Section presents the maximal residual BP (MRBP) algorithm, which modifies the current BP algorithm based on residuals in the process of updating messages. In Section , we illustrate and analyze the numerical results of our algorithm. In Section , we conclude the paper with some discussions.
II Model RB: an example of constraint satisfaction problems
Over the past few decades, studies on CSPs mainly focus on the initial standard CSP models, named A, B, C and D Smith-AI-1996 ; Gent-C-2001 ; Prosser-AI-1996 . However, it has been proved by Achlioptas et al. that the random instances generated by the four standard models have trivial asymptotic insolubility with an increase in the problem size Achlioptas-C-2001 . Therefore, in order to overcome this defect, various improved models from different perspectives in numerous efforts have been proposed successively Xu-JAIR-2000 ; Molloy-SIAMJC-2003 ; Frieze-RSA-2006 ; Smith-TCS-2001 ; Gao-JAIR-2007 . Model RB, proposed by Xu and Li to avoid the trivial unsatisfiability of model B Xu-JAIR-2000 , is a modification on the domain size of variables and the number of constraints of model B without special restrictions on the constraint structure.
Model RB consists of a set of variables and a set of constraints with , where is a constant. Each variable () has a nonempty domain of ( is a constant) possible values. Each constraint () involves () different variables, and there is a set of incompatible assignments which specifies the disallowable combinations of values for the variables. More precisely, we generate a random instance of model RB with the following two steps.
- Step 1.
-
To construct a single constraint, we randomly select () distinct variables out of the variables, and then randomly select exactly ( is the constraint tightness) different incompatible assignments out of possible ones as the set to restrict the values of these variables.
- Step 2.
-
We repeat the above step to obtain independent constraints and their corresponding sets .
A random instance of model RB is simply the conjunction of the above randomly selected constraints.
Let be the probability that a random instance is satisfied. It is shown in Ref. Xu-JAIR-2000 that
Theorem 1
Let . If , are two constants and , then
(1) |
Theorem 2
Let . If , are two constants and , then
(2) |
The two theorems show that model RB exhibits a sharp threshold of satisfiability at the critical values and , as and are two control parameters of the problem. Nevertheless, we cannot rigorously determine the exact value of satisfiability threshold for some random CSPs with fixed domains Achlioptas-Nature-2005 ; Mertens-RSA-2006 . It has been theoretically proved that almost all instances of model RB have no tree-like resolution proofs of less than exponential size Xu-TCS-2006 . In other words, these random instances of model RB in the transition region are extremely difficult to solve. Numerical results, using complete and incomplete search algorithms, have confirmed the exact satisfiability thresholds and the hardness of forced and unforced satisfiable instances Xu-AI-2007 . Although model RB shows an asymptotic phase transition phenomenon, it is still very challenging to find solutions of a random instance, and the size of the problem has been restricted to Cai-AI-2011 . Therefore, benchmarks based on model RB are widely used in various kinds of algorithm competitions such as CSP, SAT, pseudo-Boolean and so on, and these results have verified the intrinsic computational hardness of these benchmarks.
Both analytical and algorithmic studies have been carried out on model RB. On the analytical side, Fan and Shen defined a large class of random CSP models --CSP which unified several related models including model RB Fan-AI-2012 ; Shen-JCO-2016 . Later, it was proved that the restriction on can be weaker, which can simplify the generation of random instances Zhou-JCO-2015 . In order to study the transition behaviors of model RB due to finite-size effects, Zhao et al. use finite-size scaling analysis to bound the width of the transition region Zhao-IPL-2011 . On the algorithmic side, statistical physics concepts and methods, especially the replica method and the cavity method in spin glass mean-field theory, have played a very significant role in constructing solutions for random CSPs Olivier-TCS-2001 ; Marino-NC-2016 . Zhao et al. proposed two different types of message passing algorithms guided by BP to solve random CSPs with large domains like model RB Zhao-JSTAT-2011 . Subsequently, Zhao et al. proposed a reinforced BP algorithm, which can effectively force the BP equations to converge to a solution of model RB by introducing an external field with a certain probability Zhao-PRE-2012 . Moreover, it was shown that the solutions of model RB are grouped in disconnected clusters before the theoretical satisfiability phase transition threshold Zhao-PRE-2012 . Recently, Zhao et al. proposed three kinds of BP decimation algorithms, which improved the performance of BP algorithms by improving the updating method of BP iterative equation Zhao-JSTAT-2021 .
III Maximal residual belief propagation algorithm
Here we propose the MRBP algorithm, which combines modifications in the updating process based on residuals with the usual BP algorithm. We first lay down the general procedure of the BP algorithm and the relevant equations, then we define the residuals of messages in the updating process and present our algorithm in detail.
For , model RB is NP-complete. Therefore, we take the binary case () of model RB as the tested problem. Model RB with can be reduced to the case of in polynomial time.
III.1 Belief propagation algorithm

An instance of binary model RB admits a natural factor graph representation, as shown in figure 1. A factor graph is a bipartite undirected graph, in which one type of nodes represents the variables (denoted by ) and the other type of nodes represents the constrains (denoted by ). An edge connects a constraint node and a variable node if and only if contains . The average degree of each variable node in the graph is . Locally such a graph is tree-like: the typical size of a loop in the graph scales like for large .
An instance of model RB can be treated as a statistical mechanical system with interacting variables with discrete states and an interaction topology in the form of a factor graph. In a random instance of binary model RB, we let (, ) be an assignment to the variables. We further let be an assignment to the two variables involved in the constraint (). We define the energy of the constraint as if and if . The total energy of an assignment , denoted as , is the sum of energy terms on all the constraints, which is the number of unsatisfied constraints computed following
(3) |
Based on the locally tree-like property of the factor graph representation of model RB, we derive the framework of BP algorithm Mezard.Montanari-2009 . Associated with each edge there are two cavity messages and passing in opposite directions. See figure 1 for an example. Specifically, is the probability that the constraint is satisfied if the variable takes the value , and is the probability that the variable takes the value in the absence of the constraint . Let and denote the set of messages passed along all the edges in the factor graph at time . According to the cavity method in disordered systems of statistical physics Mezard.Montanari-2009 ; Zhao-JSTAT-2011 , the self-consistent BP equations of cavity messages can be derived as
(4) | |||||
(5) |
Here and are both normalization factors, the set of constraints adjacent to the variable removing , and the set of variables adjacent to the constraint removing .
In a typical procedure of the BP algorithm, messages on the edges in the factor graph of a given problem instance are uniformly initialized at random in . A message iteration process is carried out, in which messages are updated following the self-consistent equations (4) and (5). After a sufficiently long iterative process, the messages may converge to a fixed point. The convergence criterion can be measured by a precision parameter (): when the maximal absolute difference between two consecutive steps of the messages on all edges of a factor graph is smaller than , we can say that the message updating process converges. With the fixed point of messages, statistical mechanical properties of model RB in an average sense can be extracted, such as energy and entropy of ground-state solutions, and so on.
To find a solution configuration of a given problem instance, we adopt the BP decimation (BPD) algorithm, which assigns values to variables one by one based on the marginal probability after message updating. In order to find a solution configuration of the problem, we can assign the value of each variable based on its marginal probability distribution. This is the basic procedure of the BPD algorithm. With the fixed point of messages for all edges , the marginal probability of a variable is computed following
(6) |
In a decimation step, the variable with the largest marginal probability is selected to be assigned to its corresponding most biased component. In the decimation procedure, we iteratively switch between a variable fixing process and a message updating process after a graph simplification process upon fixing variables.
III.2 Maximal residual belief propagation algorithm


The convergence of messages in the BP iterative equations affects the performance of the algorithm. However, the BP equations usually do not converge when the control parameter approaches the theoretical satisfiability threshold. The core idea of this work is the introduction of the residuals for messages. We modify the message updating process, as we dynamically update the passing messages between the constraints and the variables based on the maximal residual in BP iterative equations, to improve the convergence and the performance of BP algorithm. The residuals of messages measure the relative difference sent from constraints to variables between two consecutive steps during the iteration of messages. If we consider all the messages in the BP algorithm as a time series are with , the residual on an edge at time is defined as
(7) |
A large residual indicates a large fluctuation of the message , thus the messages at these steps are far from the value after convergence of the whole message passing algorithm, if there is one.
Based on the residual on each edge at a time step, the MRBP algorithm dynamically adjusts the order of updating messages according to the real-time status of the messages, in which the messages connected to the edge with the largest residual are prioritized to update. See figure 2 for an example. At time , we select the edge with the largest residual. We first adopt equation to compute the messages sent from the variables and associated with the constraint node to the neighboring constraint nodes connected to and except (denoted by ), as indexed by the number 1 in figure 2. We need to reduce the greediness of the algorithm to achieve better performance. Hence, the updating messages are considered from the point of view of node rather than edge . Therefore, we use equation to calculate the messages sent from the nodes and connected to to simultaneously. Then, we follow equation to update the messages that the constraint nodes send to the variables connected to the constraints except and , as indexed by the number 2 in figure 2. In order to avoid falling into the local optimum in the iteration process, we mark the edge with the largest residual after the messages updating, and the residuals on unmarked edges are recalculated. The selection of the current edge with largest residual and the recalculation of residuals on unmarked edges are carried out iteratively until all edges are marked to ensure that messages on all edges are updated during the BP iteration process. In this way, the messages between constraints and variables are constantly updated till they converge to a fixed point or the maximal number of iterations is reached.
During the decimation process of the BPD algorithm, we iteratively fix variables with values until we have an assignment for all variables. Once a variable in a factor graph is assigned with a certain value, variables in the factor graph are divided into three different types, as illustrated in figure 3.
-
•
Type A: The variables that have been assigned with some values.
-
•
Type B: The variables not assigned with values, yet connected to the same constraints with the assigned ones.
-
•
Type C: Others.
The MRBP algorithm are detailed in the following pseudocode.
MRBP algorithm
Input: A factor graph of a random instance generated by model RB, maximal iterations used in the subroutines MRBP-UPDATE and MRBP-UPDATE∗, and a precision parameter .
Output: A solution or ‘UNCONVERGED’.
- Step 1
-
At :
- 1.1
-
Run the subroutine MRBP-UPDATE.
- 1.2
-
For each variable , compute the marginal probability by equation .
- 1.3
-
Select the variable with the highest marginal probability from the variables, and assign it to its most biased value .
- Step 2
-
From to :
- 2.1
-
Run the subroutine MRBP-UPDATE∗.
- 2.2
-
For each free (unfixed) variable , compute the marginal probability by equation .
- 2.3
-
Select the variable with the highest marginal probability from the free variables, and assign it to its most biased value .
- 2.4
-
Check the energy function for the variables with assigned values according to equation . If , break the loop and output ‘UNCONVERGED’.
- Step 3
-
If the assignment of the variables satisfy the constraints simultaneously, output as a solution of the instance, otherwise output ‘UNCONVERGED’.
The subroutine MRBP-UPDATE is to update the messages on edges of a factor graph until a fixed point or a maximal number of iteration steps.
Subroutine MRBP-UPDATE:
- Step 1
-
At : for each edge , randomly initialize .
- Step 2
-
For the constraints from to :
- 2.1
-
For each edge with , use equation to obtain . In the case of , set for any .
- 2.2
-
Use equation to calculate .
- Step 3
-
From to :
- 3.1
-
For each edge , calculate the residual using equation . Select the edge with the largest residual among all edges and mark it.
- 3.2
-
For , use equation to calculate , where . Update using equation , where .
- 3.3
-
For each edge , if holds, break the loop and set . Otherwise go to 3.1 until all edges are marked.
- 3.4
-
If , output ‘UNCONVERGED’.
The subroutine MRBP-UPDATE∗ is to obtain the fixed point of message updating in the decimation process, during which some variables have already been assigned with certain values.
Subroutine MRBP-UPDATE∗:
- Step 1
-
At :
-
•
For variables of Type A: skip;
-
•
For variables of Type B: if the assignment of the variable and the value of the fixed variable satisfy the corresponding constraint , set ; otherwise, set ;
-
•
For variables of Type C: uniformly initialize the values of at random.
-
•
- Step 2
-
For the constraints from to :
- 2.1
-
For each edge , where .
-
•
For variables of Type A and Type B: skip;
-
•
For variables of Type C: use equation to obtain . In the case of , set for any .
-
•
- 2.2
-
Update .
-
•
For variables of Type A: skip;
-
•
For variables of Type B: let ;
-
•
For variables of Type C: use equation to update .
-
•
- Step 3
-
From to :
- 3.1
-
Compute the residual .
-
•
For variables of Type A and Type B: skip;
-
•
For variables of Type C: for each edge , calculate the residual using equation . Select the edge with the largest residual among all unmarked edges and mark it.
-
•
- 3.2
-
For , use equation to calculate , where . Update using equation , where .
- 3.3
-
Determine whether the iterative equations converge or not.
-
•
For variables of Type A and Type B: skip;
-
•
For variables of Type C: for each edge , if holds, break the loop and set . Otherwise go to 3.1 until all edges are marked.
-
•
- 3.4
-
If , output ‘UNCONVERGED’.
IV Results
20 | 0.8 | 3 | 11 | 180 | |
---|---|---|---|---|---|
40 | 0.8 | 3 | 19 | 443 | |
60 | 0.8 | 3 | 26 | 737 | |
80 | 0.8 | 3 | 33 | 1052 |



Here we test our MRBP algorithm based on residuals and show that it not only reduces the fluctuation of the messages, but also significantly improves the convergence of the BP iterative equations. Hence, it can effectively construct a solution of a random instance generated by model RB when approaching the satisfiability threshold.
As a representative parameter set to generate random instances of binary model RB, we take and . We should mention that, on random instances with other values of parameters of and , we can obtain similar results on the algorithmic performance around thresholds. In Table 1, for different problem sizes , corresponding quantities and thresholds are shown. In the MRBP algorithm, we take and .
As the first part of our results, we consider the performance of the MRBP algorithm. The fraction of successful runs over random instances, which are generated by binary model RB for , is shown in figure 4. It is observed that almost all instances are satisfiable when the constraint tightness . The MRBP algorithm can construct a solution efficiently when . However, the algorithm fails with probability tending to 1 when . Therefore, the algorithm shows a good performance when approaches the theoretical satisfiability threshold . Unfortunately, the algorithm fails in the extreme hard region, which may be closely related to the structural transition of the solution space. It is worth noting that the performance of the MRBP algorithm is almost independent of the problem size .
In the decimation process of the MRBP algorithm, we measure the entropy of the selected variable at each time step for different problem size . We define the entropy of the decimated variable at as
(8) |
In figure 5, the results of the entropy in function of for and are presented. For a given , the entropy curve shows a concave shape with a minimum at , where half of the variables are fixed with certain values. For and , the entropy is always less than the maximum in the case of each variable is evaluated with equal probability from its domain, which guarantees that the MRBP algorithm can select a polarized variable among the remaining free variables to fix.
We then consider the mean degree of freedom of the variables in the decimation procedure of the BPD algorithm, which is defined as
(9) |
In figure 6, the relationship between the mean degree of freedom and the constraint tightness for is reported. It is shown that, with the increase of constraint tightness , monotonously decreases to . Therefore, we suspect that as increases, some variables are frozen at certain assignments, which prevents the MRBP algorithm from escaping from the locally optimal solution. Further improving the performance of the algorithm involves studying in more detail on the structural evolution of the solution space of model RB.




As the second part of our results, we present a comparison between the usual BP algorithm (algorithm in Ref. Zhao-JSTAT-2011 ) and the MRBP algorithm. Figure 7 shows their performance comparison in terms of message convergence and solving power. It can be seen from figure 7 (a), for most instances, if BP algorithm converges, it can usually construct a solution of the instance. However, this is not the case for the MRBP algorithm. As shown in figure 7 (b), when , if the MRBP algorithm converges, it almost always finds the solution of the instance. Howerver, when , the assignment obtained after the algorithm has converged may not be the solution of the instance. In other words, compared with the algorithm in Ref. Zhao-JSTAT-2011 , although the convergence of the MRBP algorithm has been greatly improved, the constructed assignment may not be a solution of the instance. As we can see from figure 7 (c), the convergence of the MRBP algorithm is significantly better than the algorithm in Ref. Zhao-JSTAT-2011 . For the MRBP algorithm, the number of convergent instances decreases first and then increases with an increase in . Moreover, the convergence is the worst at , where the probability of the MRBP algorithm finding a solution of a random instance is extremely low. In figure (d), the MRBP algorithm shows consistently a higher success probability in finding ground-state solutions. It is obvious that the MRBP algorithm not only improves the convergence of BP iterative equations, but also greatly improves the efficiency of finding solutions.
We also compare the solving efficiency of the MRBP algorithm with three related algorithms based on BP (i.e. ABP algorithm with , SBP algorithm with and VABP algorithm) in Ref. Zhao-JSTAT-2021 and algorithm 3 in Ref. Zhao-JSTAT-2011 . The results on 50 random instances generated by binary model RB for are shown in figure 8, which illustrate that the MPBP algorithm can find a solution of the problem with a high probability when approaching satisfiability phase transition region.
Furthermore, from the perspective of computational cost, we compare the average number of iterations required at each time step for the decimated variable if BP equations converge. In figure 9, the diagram of average iterations is shown for at , where the five algorithms can construct a solution of a random instance with probability . We can see that, the number of iterations required by the MRBP algorithm in early decimation process is much lower than that of ABP algorithm with , SBP algorithm with , VABP algorithm in Ref. Zhao-JSTAT-2021 and algorithm 3 in Ref. Zhao-JSTAT-2011 . After approximately of the variables are fixed, the iterations required by the five algorithms are drastically reduced. Therefore, compared with other novel related algorithms, the MRBP algorithm greatly improves the convergence of message passing algorithms.
Finally, we analyze the time complexity of the MRBP algorithm. The typical time complexity of BP algorithms is as is the size of edges in a graph instance. In our modification on BP algorithms, there are extra message updating steps after each iteration of messages on all edges. Thus the complexity of the running time scales as , in which is simply the size of edges in model RB here. In figure 10, we show the running time of the MRBP algorithm in function of for . We can see that the running time increases sharply when is close to the satisfiability threshold, a common phenomenon for search algorithms approaching thresholds in CSPs.
Summing the above results together, for the problem of model RB, the MRBP algorithm greatly improves the convergence of BP iterative equations and shows significantly higher probabilities in finding solutions approaching the satisfiability threshold with a large reduction of iterations in computational cost.
V Conclusion
In this paper, we propose an improved message passing algorithm based on residuals of messages to solve CSPs. The residual of messages is to quantify the fluctuation of messages as a time series between two consecutive time steps. As a modification to the usual message updating process, those messages with the maximal residuals are given higher priority in the updating process. We test our MRBP algorithm on model RB, a random CSP with growing domains, which has an exact satisfiability threshold by previous analytical study. Numerical results show that our algorithm outperforms the BP algorithm with a better convergence of the message updating, a higher probability in constructing a solution for the problem, and a lower computational cost.
To explore the potential implication of residuals on optimization problems and message passing algorithms, several lines of research can be carried out as future work. The first one is to combine our algorithm with a detailed description of the landscape of hard optimization problems to develop better problem-solving algorithms. The second one is to extend our algorithm to combinatorial optimization and CSPs with fixed domains, such as the minimum vertex cover problem and the -SAT problem, which have a more complex and yet a more refined picture of solution space structure of ground-states configurations. At the same time, the idea of residuals of messages can be introduced into message passing algorithms in contexts other than sparse graphs, such as the approximated message passing algorithms on dense graphs, cluster variational message passing algorithms on lattice structures, and so on.
Acknowledgements
J.-H. Zhao is supported by Guangdong Major Project of Basic and Applied Basic Research No. 2020B0301030008, Science and Technology Program of Guangzhou No. 2019050001, the Chinese Academy of Sciences Grant QYZDJ-SSW-SYS018, and the National Natural Science Foundation of China (Grant No. 12171479). C.-Y. Zhao is supported by the National Natural Science Foundation of China (Grant Nos. 11301339 and 11491240108).
References
- (1) Newman M E J 2012 Resource Letter CS-1: Complex Systems Am. J. Phys. 79 800-10
- (2) Koller D and Friedman N 2009 Probabilistic Graphical Models: Principles and Techniques (Cambridge: The MIT Press)
- (3) Richardson T and Urbanke R 2008 Modern Coding Theory (Cambridge: Cambridge University Press)
- (4) Mézard M and Montanari A 2009 Information, Physics, and Computation (Oxford: Oxford University Press)
- (5) Garey M and Johnson D S 1979 Computers and Intractability: A Guide to the Theory of NP-Completeness (San Francisco: W H Freeman & Co)
- (6) Zhou H-J 2015 Spin Glasses and Message Passing (Beijing: Scientific Press)
- (7) Zdeborová L and Krzakala F 2016 Statistical physics of inference: thresholds and algorithms Adv. Phys. 65 453-552
- (8) Braunstein A and Zecchina R 2006 Learning by Message Passing in Networks of Discrete Synapses, Phys. Rev. Lett. 96 030201
- (9) Mézard M 2017 Mean-field message-passing equations in the Hopfield model and its generalizations Phys. Rev. E 95 022117
- (10) Mézard M and Parisi G 2001 The Bethe lattice spin glass revisited Eur. Phys. J. B 20 217-33
- (11) Mézard M, Parisi G and Zecchina R 2002 Analytic and algorithmic solution of random satisfiability problems Science 297 812-5
- (12) Kikuchi R 1951 A theory of cooperative phenomena Phys. Rev. 81 988-1003
- (13) Pelizzola A 2005 Cluster variation method in statistical physics and probabilistic graphical models J. Phys. A: Math. Gen. 38 R309-39
- (14) Krzakala K, Montanari A, Ricci-Tersenghi F, Semerjian G and Zdeborová L 2007 Gibbs states and the set of solutions of random constraint satisfaction problems Proc. Natl. Acad. Sci. USA 104 10318-23
- (15) Montanari A, Ricci-Tersenghi F and Semerjian G 2008 Clusters of solutions and replica symmetry breaking in random -satisfiability J. Stat. Mech. 2008 P04004
- (16) Weigt M and Hartmann A K 2000 Number of Guards Needed by a Museum: A Phase Transition in Vertex Covering of Random Graphs Phys. Rev. Lett. 84 6118-21
- (17) Weigt M and Zhou H-J 2006 Message passing for vertex covers Phys. Rev. E 74 046110
- (18) Zdeborová L and Krzakala F 2007 Phase transitions in the coloring of random graphs Phys. Rev. E 76 031131
- (19) Xu K and Li W 2000 Exact Phase Transitions in Random Constraint Satisfaction Problems J. Artif. Intell. Res. 12 93-103
- (20) Smith B M and Dyer M E 1996 Locating the phase transition in binary constraint satisfaction problems Artif. Intell. 81 155-81
- (21) Gent I P, Macintyre E, Prosser P, Smith B M and Walsh T 2001 Random constraint satisfaction: Flaws and structure Constraints 6 345-72
- (22) Prosser P 1996 An empirical study of phase transitions in binary constraint satisfaction problems Artif. Intell. 81 81-109
- (23) Achlioptas D, Molloy M S O, Kirousis L M, Stamatiou Y C, Kranakis E and Krizanc D 2001 Random constraint satisfaction: A more accurate picture Constraints 6 329-44
- (24) Molloy M 2003 Models for random constraint satisfaction problems SIAM J. Comput. 32 935-49
- (25) Frieze A and Molloy M 2006 The satisfiability threshold for randomly generated binary constraint satisfaction problems Random Struct. Algor. 28 323-39
- (26) Smith B M 2001 Constructing an asymptotic phase transition in random binary constraint satisfaction problems Theor. Comput. Sci. 265 265-83
- (27) Gao Y and Culberson J 2007 Consistency and random constraint satisfaction models J. Artif. Intell. Res. 28 517-57
- (28) Achlioptas D, Naor A and Peres Y 2005 Rigorous location of phase transitions in hard optimization problems Nature 435 759-64
- (29) Mertens S, Mézard M and Zecchina R 2006 Threshold values of random -SAT from the cavity method Random Struct. Algor. 28 340-73
- (30) Xu K and Li W 2006 Many hard examples in exact phase transitions Theor. Comput. Sci. 355 291-302
- (31) Xu K, Boussemart F, Hemery F and Lecoutre C 2007 Random constraint satisfaction: Easy generation of hard (satisfiable) instances Artif. Intell. 171 514-34
- (32) Cai S-W, Su K-L and Sattar A 2011 Local search with edge weighting and configuration checking heuristics for minimum vertex cover Artif. Intell. 175 1672-96
- (33) Fan Y and Shen J 2012 A general model and thresholds for random constraint satisfaction problems Artif. Intell. 193 1-17
- (34) Shen J and Ren Y-F 2016 Bounding the scaling window of random constraint satisfaction problems J. Comb. Optim. 31 786-801
- (35) Zhou G-Y, Gao Z-S and Liu J 2015 On the constraint length of random -CSP J. Comb. Optim. 30 188-200
- (36) Zhao C-Y and Zheng Z-M 2011 Threshold behaviors of a random constraint satisfaction problem with exact phase transitions Inform. Process. Lett. 111 985-8
- (37) Olivier C M, Monasson Rémi and Riccardo Z 2001 Statistical mechanics methods and phase transitions in optimization problems Theor. Comput. Sci. 265 3-67
- (38) Marino R, Parisi G and Ricci-Tersenghi F 2016 The backtracking survey propagation algorithm for solving random K-SAT problems Nat. Commun. 7 12996
- (39) Zhao C-Y, Zhou H-J, Zheng Z-M and Xu K 2011 A message-passing approach to random constraint satisfaction problems with growing domains J. Stat. Mech. 2011 P02019
- (40) Zhao C-Y, Zhang P, Zheng Z-M and Xu K 2012 Analytical and belief-propagation studies of random constraint satisfaction problems with growing domains Phys. Rev. E 85 016106
- (41) Zhao C-Y and Fu Y-R 2021 Belief propagation guided decimation algorithms for random constraint satisfaction problems with growing domains J. Stat. Mech. 2021 033408