VOOZH about

URL: https://arxiv.org/html/2604.07496v1

⇱ SMT with Uninterpreted Functions and Monotonicity Constraints in Systems Biology


License: CC BY 4.0
arXiv:2604.07496v1 [cs.LO] 08 Apr 2026

Masaryk University, Czechiaxhuvar@fi.muni.cz Masaryk University, Czechiamartin.jonas@mail.muni.czhttps://orcid.org/0000-0003-4703-0795 Masaryk University, Czechiadaemontus@mail.muni.czhttps://orcid.org/0000-0003-1993-0331 \CopyrightOndřej Huvar and Martin Jonáš and Samuel Pastva\ccsdesc[100]Theory of computation Automated reasoning \EventEditorsJohn Q. Open and Joan R. Access \EventNoEds2 \EventLongTitle42nd Conference on Very Important Topics (CVIT 2016) \EventShortTitleCVIT 2016 \EventAcronymCVIT \EventYear2016 \EventDateDecember 24–27, 2016 \EventLocationLittle Whinging, United Kingdom \EventLogo \SeriesVolume42 \ArticleNo23

SMT with Uninterpreted Functions and Monotonicity Constraints in Systems Biology

Ondřej Huvar Martin Jonáš Samuel Pastva
Abstract

The theory of uninterpreted functions is a key modeling tool for systems with unknown or abstracted components. Some domains such as systems biology impose further restrictions regarding monotonicity on these components, requiring specific inputs to have a consistently positive or negative effect on the output. In this paper, we tackle the model inference problem for biological systems by applying the theory of uninterpreted functions with monotonicity constraints. We compare the performance of naive quantified encodings of the problem and the performance of the existing approach based on eager quantifier instantiation, which is based on the fact that a finite set of quantifier-free monotonicity lemmas is sufficient to encode the monotonicity of uninterpreted functions. Additionally, we consider a lazy variant of the approach that introduces the monotonicity lemmas on demand.

We evaluate the smt-based approach to model inference using a large collection of systems biology benchmarks. The results demonstrate that the instantiation-based encodings significantly outperform quantified encodings, which typically struggle with large function arities and complex instances. As the key result, we show that our approach based on smt with uninterpreted functions and monotonicity constraints significantly outperforms state-of-the-art domain-specific tools used in systems biology, such as the asp-based Bonesis and the bdd-based AEON.

keywords:
satisfiability modulo theories, uninterpreted function, monotonicity, boolean network, logic-based modeling
category:
\relatedversion

1 Introduction

The theory of uninterpreted functions is a key modeling tool for systems with unknown or abstracted components. Some domains, including systems biology, impose further monotonicity constraints on these components, requiring specific inputs to have a consistently positive or negative effect on the output. The monotonicity (or anti-monotonicity) of function arguments is a common constraint in models of physical—particularly biological—systems [kadelka2024meta] due to the mechanistic nature of their underlying processes. For instance, a single chemical reaction either produces or consumes a specific compound overall. Similarly, a catalyst or inhibitor either accelerates or slows down such a reaction. While there are rare cases of true non-monotonic influence in nature, monotonicity remains a standard assumption in dynamical models of physical systems [chevalier2025data, gerber2025reasoning, kadelka2024meta].

There are existing techniques for solving satisfiability over theories extended with uninterpreted functions subject to monotonicity constraints. A straightforward approach for dealing with these constraints relies on direct encoding using universally quantified formulas. More notably, Sofronie-Stokkermans et al. have proven that the extension of a theory with uninterpreted functions and monotonicity constraints is local [sofronie2007automated, sofronie2014ieee]. As a consequence, a fixed finite set of quantifier instances of monotonicity axioms is sufficient to encode the monotonicity. These instances can be derived directly from occurrences of uninterpreted function symbols in the input formula [sofronie2007automated].

This paper focuses on the use of uninterpreted functions with monotonicity constraints in logic-based discrete models, such as Boolean [kauffman1969homeostasis] and Thomas [thomas1991regulatory] networks. These frameworks are prominent in systems biology as predictive models of emergent phenomena [rozum2024boolean] and are widely applied to model gene regulation, cell-to-cell signaling, and metabolic pathways [kadelka2024meta, pastva2023repository]. They consist of discrete variables (binary in Boolean networks, multi-valued in Thomas networks) that represent the discretized concentrations of biochemical species. Each variable is governed by an update function, which maps the current system state to the variable’s level in the next time step.

  • Argument monotonicity of :

    • unrestricted in ;

    • anti-monotone in ;

    • monotone in ;

  • Argument monotonicity of :

    • monotone in and ;

  • Argument monotonicity of :

    • monotone in ;

  • State is a fixed-point;

  • State is a fixed-point;

  • State is a fixed-point.

(a) Influence graph of a hypothetical biological system with unknown update functions represented by , , and . Green arrows depict positive, red arrows negative, and gray arrows unrestricted regulations.

(b) Restrictions imposed on the biological system either through empirical observations (fixed points) or via mechanistic assumptions (argument monotonicity). All function arguments are required to be essential (i.e., influence the function’s output).

Figure 1: A simple example depicting an inference problem of a three-component system. It consists of three genes (, , and ) with integer domains and six expected regulations (dependencies) between said genes, some with monotonicity constraints. Finally, its long-term behavior is defined by three observations of fixed points.

A central challenge in logic-based modeling is model inference: the task of identifying a concrete model of the system that satisfies all empirical observations and mechanistic assumptions. While these constraints can vary, observations most frequently represent observed steady states (i.e., fixed points) of the system. Mechanistic assumptions, meanwhile, typically define the essentiality and monotonicity of regulations between variables, which together constitute the network’s influence graph.

Figure 1 depicts a simple inference problem. The system has three integer-valued variables: , , and . The precise update functions that compute the next state of the system are unknown, but it has been observed that is influenced by all three variables, with the effect of being negative and the effect of positive. Furthermore, is positively influenced by both and , while is positively influenced by . It has also been experimentally observed that the configurations , , and are fixed points of the system. For example, when the system is in the state , it must remain in in the next state. One admissible solution for this inference problem is given by:

This set of update functions clearly satisfies that is anti-monotone in and monotone in , and that and are monotone in all their arguments. Moreover, the update functions satisfy the observed fixed points:

  1. 1.

    For the state , the next state is , which is .

  2. 2.

    For the state , the next state is , which is .

  3. 3.

    For the state , the next state is , which is .

Contribution. We show that the model inference problem maps naturally to smt, with unknown update functions directly encoded as uninterpreted functions subject to additional constraints derived from fixed-point observations and the regulations of the influence graph. The mechanistic assumptions regarding regulatory monotonicity translate naturally into monotonicity constraints on these uninterpreted functions. Using the resulting smt problems, we compare the performance of naive quantified encodings against the previously proposed approach [sofronie2007automated] based on eager quantifier instantiation Additionally, we introduce a lazy variant of the instantiation approach that introduces monotonicity lemmas on demand.

We evaluate these smt-based approaches to model inference using a comprehensive suite of benchmarks from systems biology, comprising 8,381 and 465 instances derived from existing Boolean and integer-based models, respectively, as well as 144 large instances from biological datasets without a known ground-truth model. Our results demonstrate that the instantiation-based procedures significantly outperform the naive quantified encoding, particularly on complex or high-arity problems. As a key result, we show that our smt-based approach significantly outperforms state-of-the-art tools used in systems biology, such as the asp-based Bonesis and the bdd-based AEON. Moreover, unlike these tools, our approach enables the analysis of non-Boolean models.

Paper structure. The paper is structured as follows. Sections 2 and 3 briefly recall the logical preliminaries and monotonicity constraints in the context of smt. In Section 4, we describe the encoding of the inference problem using uninterpreted functions with monotonicity constraints. Section 5 covers existing approaches to solving such constraints and introduces the lazy instantiation-based algorithm. Finally, Section 6 presents the experimental evaluation, and Section 7 concludes the paper.

Related work. Several existing approaches tackle the model inference problem in the presence of monotonicity constraints without relying on smt with uninterpreted functions. While some of these address model inference through statistical methods or genetic programming [puvsnik2022review], a significant effort is dedicated toward model inference via automated reasoning. Across these methods, efficiently enforcing monotonicity remains a persistent challenge. The tool RE:IN [yordanov2016method, yordanov2023reasoning] encodes inference problems into smt without uninterpreted functions; to guarantee monotonicity, it restricts the search space to a limited, syntactically defined subset of update functions. Bonesis [chevalier2024bonesis, chevalier2025data] and Caspo [guziolowski2013exhaustively] support only Boolean models and rely on Answer Set Programming (asp) with exhaustive Disjunctive Normal Form (dnf) encodings. Since the size of a dnf encoding grows exponentially with function arity, Bonesis offers an optimization that limits the number of permitted dnf cubes, thereby trading completeness for scalability. Finally, AEON [benevs2022aeon, benevs2023boolean] is also limited to Boolean models and employs Binary Decision Diagrams (bdds) to exhaustively represent the function space. The bdd encoding—for each update function and for each combination of its input values—introduces one bdd variable representing the result of the function and imposes the monotonicity constraints directly at the bdd level. This induces an exponential blowup, restricting the tool’s applicability to functions of low arity. Notably, neither of these tools support integer-valued models.

2 Preliminaries

Let be a set. For a vector , we denote by the value at its -th position. For any vector , element , and index , we denote by the vector that agrees with at all positions except at position , where it has the value .

Let be a partially ordered set. The ordering is called total if for all , we have either or . For each and , a function is called monotone in the -th argument if for all and , we have that implies . The function is anti-monotone in the -th argument if the same assumptions imply .

We work in the context of standard first-order logic with equality. We briefly recall the notation and concepts that are important for this paper and refer the reader to standard textbooks on the topic for further details [Enderton72, BT18]. As is standard in smt, we consider only quantifier-free formulas, unless explicitly stated otherwise.

A signature is a set of function symbols and predicate symbols, denoted and , respectively. Each and has an associated arity, denoted and , respectively. The sets of (-)terms and (-)formulas are defined in the standard way. We denote by the set of all subterms of a formula .

A (-)structure is a pair consisting of a non-empty set (the domain) and a mapping that to each function symbol of arity assigns a function and to each predicate symbol of arity assigns a relation . The satisfaction relation between a structure and a formula is defined in the standard way. A (-)theory is a non-empty class of -structures. A formula is -satisfiable (or satisfiable modulo ) if it is satisfied by some structure . It is -unsatisfiable otherwise. A formula is -valid if it is satisfied by all structures in . A function symbol is called uninterpreted in the theory if the theory does not impose any restrictions on its interpretation. That is, if two -structures and differ only in the interpretation of , we have .

The examples in this paper are over the theory of linear integer arithmetic (), whose structures have the domain and the standard interpretation of arithmetic function and predicate symbols. However, the approach presented here is not limited to any particular theory . We only assume that we are working over a theory for which satisfiability of quantifier-free formulas is decidable.

3 Monotonicity Constraints

In this section, we formalize the monotonicity constraints. We first define a monotonicity specification, which states, for each uninterpreted function symbol, which of its formal parameters are monotone, which are anti-monotone, and which are unrestricted. We then define when a given formula is satisfiable in a given logical theory with respect to a given monotonicity specification. Our definition is compatible with other notions of monotonicity constraints appearing in the literature [sofronie2007automated].

In the rest of the section, let be a fixed theory over a signature that contains a binary predicate symbol corresponding to a total ordering relation111The encodings of monotonicity used later in the paper are correct even with weaker assumptions on the ordering. The quantified encoding works for arbitrary partial orderings and the encoding based on eager quantifier instantiation works for arbitrary lattices and bounded semilattices [sofronie2007automated, sofronie2014ieee].. Formally, there is a predicate symbol of arity such that for all structures , the interpretation of this symbol is a total ordering relation on .

Definition 3.1(Monotonicity specification).

Let be a function symbol of arity . A monotonicity specification for is a pair where and are respectively the indices of monotone and anti-monotone arguments of . A -structure satisfies the monotonicity specification , written , if:

  • is monotone in the -th argument for each ,

  • is anti-monotone in the -th argument for each .

A mapping that assigns a monotonicity specification to each uninterpreted function symbol is called a monotonicity specification for . The specification is satisfied by a structure , written , if for each uninterpreted function symbol , we have .

Definition 3.2.

A formula is satisfiable modulo the theory with monotonicity specification (or -satisfiable) if there is a -structure such that and .

As a notational shorthand, if the monotonicity specification is clear from the context, we write simply for the monotone indices of and for its anti-monotone indices.

Notably, this definition restricts the monotonicity specification only to uninterpreted function symbols. This is our intended use-case, and the algorithms used later in the paper rely on this assumption. The definition of a monotonicity specification could, in principle, be extended to support interpreted functions as well, but enforcing it would require different techniques.

Example 3.3.

Consider the theory with two uninterpreted function symbols and of arities 2 and 1, respectively. Further, consider the formula

Let be the following monotonicity specification:

i.e., the function is monotone in its first argument and anti-monotone in its second argument, and the function is monotone in its only argument. Then is not satisfiable modulo with the monotonicity specification . The monotonicity of in the first argument implies , and its anti-monotonicity in the second implies . Together, these imply . Consequently, the monotonicity of implies , which contradicts the last conjunct of .

Now consider a similar monotonicity specification , where is not constrained to be anti-monotone, i.e., . The formula is now satisfiable modulo with the monotonicity specification , because the model with , , , and for and otherwise satisfies both and the monotonicity specification . Note that the monotonicity specification does not constrain the behavior of in its second argument; the function can behave differently for each value of , but it must be monotone in for each fixed .

4 SMT Encoding of Logic-based Model Inference

We consider a standard variant of the logic-based model inference problem over a set of indexed variables, . Each variable has an associated domain , which is either Boolean () or a larger integer interval (e.g., ). Alternatively, the cases of or are also possible, but are very rare in practical biological applications, since concentrations of biochemical species often have a finite number of distinct levels. Models whose variables are restricted entirely to Boolean domains correspond to Boolean networks, while those containing non-Boolean but bounded variables are known as multi-valued (or Thomas) networks.

The model structure is constrained by a directed influence graph , where edges represent regulations (i.e., regulates if and only if ). This graph dictates the signature of the uninterpreted functions in our smt query: for each , we define an uninterpreted function representing its update function, with an arity and domain matching its regulators.

The inference problem imposes three types of constraints on these uninterpreted functions.222Here and in the rest of the section, we present the constraints as explicitly existentially quantified to avoid introducing fresh constant names for each constraint. However, the existentially quantified variables should be replaced by fresh constants symbols in the real application.

  • Monotonicity: As part of the input, the method assumes a monotonicity specification . This is directly expressed as a monotonicity specification from Definition 3.1.

  • Essentiality: A regulation may be declared essential, meaning the regulator must have an observable impact on . Assuming without loss of generality that is the first of regulators for , we encode essentiality as a constraint defined as:

  • Fixed-point observations: Finally, a fixed-point observation is a partial function assigning constant values to a subset of model variables, asserting the existence of a matching fixed-point in the model’s state space. Let be a set of such assignments where and . The variables that are not assigned by can be assigned arbitrarily. If denote the indices of the regulators of , the fixed-point constraint is defined as follows:

Finally, for each variable or uninterpreted function with a bounded domain, we introduce a constraint asserting these bounds. For Boolean variables, the encoding uses propositional variables instead of bounded integers. Values of propositional variables are naturally ordered by , which can be expressed in propositional logic.

We can also apply two key formula simplifications. First, for essential regulations where is Boolean, the quantified variables and are directly instantiated with the constants and . Second, in fixed-point constraints, we propagate the observation , substituting with the constant in all function applications. While straightforward, we observe that these optimizations can have a non-trivial impact on the overall performance.

Example 4.1.

Recall the inference problem that we described in Figure 1. Formally, it prescribes three uninterpreted functions , , and , with , , and . Furthermore, the problem carries a monotonicity specification such that , , and . Since each regulation here is expected to be essential, we consider six essentiality constraints:

To assert the expected fixed points , , and , we also consider the following fixed-point constraints. Here, we applied the aforementioned propagation of observed values. Because we have complete information about each fixed point, this entirely eliminates the existentially quantified variables:

Overall, the encoding of our inference problem is then the following formula with the monotonicity specification :

If we were to additionally require that the three system variables , , and have bounded domains (e.g., ), we must also introduce these bounds as separate constraints on every , , and that appear in , as well as on any existentially quantified atoms in the and constraints.

5 Solving SMT with Monotonicity Constraints

In this section, we discuss in detail two existing techniques for solving quantifier-free formulas with monotonicity constraints and introduce a lazy approach based on generation of monotonicity lemmas on demand.

5.1 Quantified Encoding

A straightforward approach is to translate each formula with a monotonicity specification into an equivalent formula by directly encoding the monotonicity specification as a quantified formula and defining .

In particular, the formula can be defined as , where

and is a vector of variables.

It is easy to see that the -models of that satisfy the monotonicity specification are exactly the -models of (without the monotonicity specification). In particular, the formula is -satisfiable if and only if is -satisfiable.

Example 5.1.

Consider again the formula and the monotonicity specification from Example 3.3. The corresponding formula for this monotonicity specification is

(1)
(2)
(3)
(4)
(5)

This formula precisely encodes the monotonicity specification and is -unsatisfiable. The corresponding formula for the specification does not contain the constraint and its corresponding row (4), which encodes the anti-monotonicity of the function in its second argument. Without this constraint, the formula is -satisfiable.

The downside of this approach is that the formula is necessarily quantified for non-trivial monotonicity specifications, even if the original formula is quantifier-free. Consequently, determining its satisfiability might require potentially expensive quantifier reasoning. Furthermore, while the satisfiability of quantifier-free formulas is decidable for many theories (such as the theory of uninterpreted functions, ), it is undecidable in general when quantifiers are introduced. For such theories, the above encoding does not yield a decision procedure for quantifier-free formulas with monotonicity constraints.

5.2 Eager Quantifier Instantiation

Monotonicity can also be expressed without explicit quantification while preserving satisfiability. In particular, only a finite set of quantifier instances, so-called monotonicity lemmas, are sufficient to encode the monotonicity specification. Moreover, the set of these monotonicity lemmas is fixed for each input formula and can be easily computed from it [sofronie2007automated]. However, this approach only works with the following equivalent definition of monotonicity that considers all arguments of each function symbol together.

Theorem 5.2.

For each -structure and monotonicity specification , it holds that if and only if each function symbol of arity satisfies where is defined as

(6)

This equivalent definition ensures that the monotonicity lemmas, which consist of all instances of (6) for all pairs of occurrences of in , are sufficient to precisely express the monotonicity specification for any given formula .

Theorem 5.3([sofronie2007automated, sofronie2014ieee]).

Let be a formula and a monotonicity specification. Then is -satisfiable if and only if the formula

is -satisfiable.

Theorem 5.3 yields a decision procedure SolveEager that for a given formula and a monotonicity specification computes and uses an smt solver for quantifier-free formulas over the theory . Note that in the worst case, the number of added monotonicity lemmas is quadratic with respect to the size of .

For practical usage of the decision procedure SolveEager, it is important to note that is not equivalent to the full encoding of the monotonicity specification ; it is merely equisatisfiable with it. However, the proof in the original paper [sofronie2007automated] shows how to algorithmically construct a -model of that satisfies the monotonicity specifications from an arbitrary -model of .

Example 5.4.

Consider again the formula and the monotonicity specification from Example 3.3. Because the set of function applications of is and of applications of is , the resulting formula is

(7)
(8)
(9)
(10)
(11)

The formula precisely encodes the monotonicity specification at the points where and are evaluated and is -unsatisfiable.

For the monotonicity specification , which does not enforce anti-monotonicity of in its second argument, the corresponding subformulas (8) and (9) are changed to

(12)
(13)

which are vacuously true in this case, and the resulting formula is -satisfiable. For example, any structure with , , , , , and is a model of . Such a model does not need to satisfy all the monotonicity constraints, as the functions can behave arbitrarily on points not mentioned by the formula. The proof of Theorem 5.3 yields the “globally monotonized” version of that interprets the function symbols as

5.3 Lazy Quantifier Instantiation

As noted earlier, the number of added monotonicity lemmas can be quadratic with respect to the size of . In many input instances, not all of these monotonicity lemmas are needed to decide unsatisfiability or to find a model for the formula. Therefore, we propose a lazy approach that starts by considering only the formula and then adds the constraints lazily, based on violations of the monotonicity specification. The algorithm is presented as Algorithm 1.

Algorithm 1 Lazy algorithm for solving satisfiability with monotonicity constraints.
1: procedure SolveLazy(input formula , monotonicity specification )
2:  
3:   while do
4:   
5:   
6:    if then
7:      return sat    
8:      
9:   return unsat

The correctness of Algorithm 1 follows directly from Theorem 5.3. In particular, if the algorithm returns sat, the model satisfies all instances of , meaning it satisfies . Thus, is satisfiable with the monotonicity specification by Theorem 5.3. On the other hand, the while loop maintains the invariant that . Therefore, if the algorithm returns unsat, the formula is not -satisfiable, which in turn means that is not -satisfiable, again by Theorem 5.3. Finally, the set of all possible monotonicity lemmas has size . Since at least one violated lemma is added in each iteration, the algorithm terminates in at most iterations.

6 Evaluation

To demonstrate the practical utility of using smt with monotonicity constraints for model inference, we perform an extensive evaluation on discrete models in systems biology, where monotonicity is a fundamental mechanistic assumption. Our evaluation focuses on inferring Boolean [kauffman1969homeostasis] and multi-valued [thomas1991regulatory] networks, two prominent classes of logic-based models [pastva2023repository, kadelka2024meta]. We have implemented our procedures within a tool powered by the Z3 smt solver [de2008z3]. To ensure reproducibility, the tool’s source code is hosted on GitHub333https://github.com/sybila/biodivine-algo-smt-inference/tree/artefact-sat-2026-submission, while all benchmark instances, test scripts, and complete experimental results are archived on Zenodo444https://doi.org/10.5281/zenodo.18920286.

6.1 Implementation and Tested Tools

We implemented our tool in Rust, utilizing the C bindings for the Z3 smt solver [de2008z3]. The tool implements four distinct smt encodings:

  • quantified-individual: Uses the standard encoding from Section 5.1, generating one quantified constraint per monotonic function argument.

  • quantified-aggregated: Applies Theorem 5.2 to generate one aggregated quantified constraint per uninterpreted function.

  • instantiated-eager: Directly implements the quantifier instantiation from Theorem 5.3.

  • instantiated-lazy: Extends the eager approach by lazily introducing monotonicity lemmas, as detailed in Section 5.3.

These encodings are exposed as a generic layer on top of the Z3 api and can be applied to any uninterpreted function over the Int and Bool sorts. We then use this framework to implement an inference method for discrete biological models (Section 4). For Boolean networks, the encoding relies directly on the Bool sort in Z3. Meanwhile, for multi-valued networks, the Int sort is used with additional bounds assertions.

For our evaluation, we compare against two state-of-the-art systems biology tools: Bonesis [chevalier2024bonesis, chevalier2025data] and AEON [benevs2022aeon, benevs2023boolean]. Bonesis utilizes Answer Set Programming (asp) to explicitly encode unknown functions via a Disjunctive Normal Form (dnf) representation, where the maximum number of cubes can be bounded by the user. AEON, conversely, employs Binary Decision Diagrams (bdds) to symbolically represent the entire solution space. Note that the bdd-based approach always computes all solutions and is inherently incapable of computing only a single solution. We omit Caspo [guziolowski2013exhaustively], which has been largely superseded by Bonesis, and RE:IN [yordanov2016method, yordanov2023reasoning], which does not support the full spectrum of monotonic functions.

6.2 Benchmark Instances

We evaluate our approach on three classes of benchmark instances. Two classes, bbm-boolean (8,381 instances) and bma-integer (465 instances), are derived from established models in the literature. The third, omnipath (144 instances), represents a real-world, data-driven inference task utilizing a biological dataset (308 genes, 7 fixed points) and a dense prior influence graph of known gene regulations (2,570 edges). A comprehensive description of the benchmark generation process is provided in our Zenodo artifact. Below, we briefly summarize the methodology for each class.

Biodivine Boolean Models

The Biodivine Boolean Models (bbm) repository [pastva2023repository] contains 285 Boolean models curated from the literature and systems biology databases, scaling up to 853 variables and 3,499 regulations. Most of these models include constant input variables representing environmental conditions. Since realistic inference tasks typically assume a fixed environment, we generated up to 128 unique random input configurations per model (exhaustively enumerating all combinations for models with 7 or fewer inputs). Treating each configuration as a distinct benchmark yielded 8,381 unique problem instances. We then computed the fixed points for each instance using AEON [benevs2022aeon], bounding the enumeration at fixed points (a limit hit by only one bbm model). The resulting inference task is to recover a model whose influence graph (including monotonicity and essentiality constraints) and fixed-point behavior are equivalent to the original.

Biomodel Analyzer

Biomodel Analyzer (bma) [bio-model-analyzer] is a framework for multi-valued biological modeling. We collected 18 publicly available bma models and applied the same environmental randomization procedure used for bbm, yielding 465 problem instances. Because these instances are multi-valued, their smt encodings require Int sorts bounded by their respective domain intervals. The maximum domain interval in this dataset is .

Omnipath

Because the bbm-boolean and bma-integer instances are derived from curated models, they are satisfiable by design and exhibit structurally sparse influence graphs. To test our approach on a more realistic and challenging scenario, we constructed an inference task using scRNA-seq observations from seven fully differentiated neural cell types [DiBella2021]. This strategy emulates the methodology of recent Boolean network inference case studies [chevalier2025data, herault2023novel]. We binarized the raw data using scBoolSeq [scboolseq] to extract seven partial Boolean fixed-point observations. We paired these observations with an influence graph of known gene regulations from the Omnipath database [omnipath], restricted to a 308-gene strongly connected subnetwork that covers all non-zero genes in the observations. Crucially, this prior network is dense, featuring a maximum function arity of 76. However, because we do not enforce regulation essentiality, the inferred models may be significantly sparser than the prior network. To simulate varying levels of partial observability, we randomly sub-sampled the fixed-point observations, generating 16 variations for each decile between and data retention. This process produced 144 benchmark instances, roughly of which are satisfiable.

6.3 Experiment Environment

We conducted all experiments on a workstation with a 32-core AMD Threadripper 2990WX cpu and 256 GB of ram. All measured times are wall-clock times. The recorded times include all initialization overhead, such as parsing the problem specification and generating the smt query (or the equivalent data structures for other tools). The tools were configured to output only the final sat/unsat verdict rather than printing the full inferred model. We applied a 10-minute timeout to each benchmark instance. Executions that timed out or crashed (primarily due to out-of-memory errors) were recorded as failures. Given the high number of benchmark instances, we evaluated up to 16 benchmarks in parallel.

Table 1: Summary of successfully solved instances across the three benchmark sets using each smt encoding (with a 10-minute timeout).
Solved problems
Benchmark set Size Quantified individual Quantified aggregated Instantiated eager Instantiated lazy
bbm-boolean 8381 8242 7456 8381 8381
bma-integer 465 0 0 465 417
omnipath 144 76 87 144 144

6.4 Comparison of SMT Encodings

We first evaluated each of the four implemented smt encodings using the three inference benchmark sets introduced in Section 6.2. The number of successfully solved instances for each method and benchmark set is summarized in Table 1. Both instantiation-based methods successfully completed all bbm-boolean and omnipath instances, with the instantiated-eager method also solving all bma-integer benchmarks. Detailed runtime distributions are shown in the cumulative plots in Figure 2, displaying the number of completed instances over time for each monotonicity encoding and benchmark set.

On the bbm-boolean benchmark set, both instantiation-based strategies were able to solve every instance in under 2 minutes. On the other hand, the quantifier-based strategies failed on 139 and 925 instances, respectively. To better visualize the performance gaps between the four methods, the plot in Figure 2(a) is truncated to focus on the most challenging benchmarks where the various approaches diverge most significantly. High-arity uninterpreted functions proved to be the primary bottleneck for the quantifier-based approaches. While quantified-individual failed on nearly half of the 307 instances where the maximum arity exceeded 12, quantified-aggregated successfully solved only a single instance where the maximum arity exceeded 11.

👁 Refer to caption
(a) bbm-boolean benchmarks.
👁 Refer to caption
(b) bma-integer benchmarks.
👁 Refer to caption
(c) omnipath benchmarks.
Figure 2: Cumulative plots comparing the performance of all four implemented smt approaches on the three benchmark sets. Each plot shows the number of successfully completed benchmark instances by each method (y-axis) before a specific time limit (x-axis). Only methods with at least one successfully solved instance are shown in each plot. The time axis is logarithmic in all plots. For the bbm-boolean plot, the y-axis is truncated to focus on the most challenging instances where the various approaches diverge most significantly.

On the bma-integer benchmarks, the instantiated-eager strategy clearly outperformed the other three approaches. It was the only method to successfully solve every instance, with all benchmarks completed within 4 minutes and the vast majority finished in under 5 seconds, as illustrated in Figure 2(b). The instantiation-lazy approach followed closely, solving 417 instances within the 10-minute timeout. In contrast, the quantifier-based methods did not solve any benchmark within the available time. This highlights the critical importance of instantiation-based strategies for effectively resolving integer-domain instances.

The performance on the omnipath benchmarks is illustrated in Figure 2(c). Both the instantiated-eager and instantiated-lazy strategies successfully solved every instance in under 5 seconds. This demonstrates that the instantiation-based approaches are also well-suited for real-world scenarios involving specifications with high-arity uninterpreted functions. Notably, instantiated-lazy outperformed instantiated-eager in most cases, highlighting the potential of the lazy approach on sizable, dense networks. In these scenarios, the eager strategy is forced to generate a large number of monotonicity lemmas that may not actually be necessary to enforce. By contrast, both the quantified-individual and quantified-aggregated methods failed to solve any satisfiable instance, though they performed well on unsatisfiable instances. Specifically, the quantified-aggregated variant resolved every unsatisfiable instance in under 3 seconds. While quantified-individual performed slightly worse, it still successfully resolved all but 11 unsatisfiable instances.

Table 2: Summary of successfully solved Boolean instances across the approaches compared in Section 6.5 (with a 10-minute timeout).
Benchmark set Instantiated lazy (smt) AEON Bonesis (default) Bonesis (16 cubes) Bonesis (8 cubes)
bbm 8381 5605 7342 8246 8248
omnipath 144 0 0 0 134

6.5 Comparison Against AEON and Bonesis

Finally, we compared our smt-based approach to AEON and Bonesis, two state-of-the-art systems biology tools. Since both of these tools are restricted to Boolean networks, we only consider the bbm-boolean and omnipath benchmark sets. In particular, we compare our best-performing encoding (instantiated-lazy) against AEON and three Bonesis configurations: the default with no restrictions on the number of allowed dnf cubes, and two versions where the number of dnf cubes is restricted to 16 and 8. Note that by restricting the maximum number of cubes, Bonesis trades completeness for scalability; however, we did not encounter any case where Bonesis returned an incorrect result. This is in line with the common expectation that biologically motivated update functions are often simple [kadelka2024meta]. However, it still means that Bonesis in this configuration can in specific complex instances miss a valid result.

The total number of successfully completed instances for each approach and benchmark set is summarized in Table 2. More details on runtime distributions are shown through the cumulative plots in Figure 3.

In particular, neither Bonesis nor AEON were able to complete all bbm-boolean instances. AEON was unable to complete any benchmark where the maximum function arity exceeded 5, failing on close to three thousand instances. This is an expected result, since AEON always solves the problem exhaustively, computing all satisfiable solutions at once using bdd encoding. Bonesis in its default configuration failed to solve over a thousand instances. On the other hand, the variants restricted to 16 and 8 dnf cubes performed much better, solving all but 135 and 133 instances, respectively. Notably, our instantiated-lazy strategy outperformed Bonesis on every single benchmark instance, even when the tool was restricted to only 8 dnf cubes. The performance of our instantiated-lazy strategy against the other tools on the bbm-boolean dataset is illustrated through the cumulative plot in Figure 3(a).

As for the omnipath benchmarks, AEON and the default configuration of Bonesis both failed to handle the high function arity, triggering internal errors during the encoding stage. Even when restricted to 16 dnf cubes, Bonesis still failed to successfully solve any instance. On the other hand, when restricted to 8 dnf cubes, it was able to complete the majority of the instances. However, there is an order-of-magnitude difference in computation times between our instantiated-lazy strategy and Bonesis with 8 dnf cubes. This difference is illustrated in Figure 3(b).

👁 Refer to caption
(a) bbm-boolean benchmarks.
👁 Refer to caption
(b) omnipath benchmarks.
Figure 3: Cumulative plots comparing the performance of the instantiated-lazy strategy against AEON and three configurations of Bonesis on the two Boolean benchmark sets. Each plot shows the number of successfully completed benchmark instances by each method (y-axis) before a specific time limit (x-axis). Only methods with at least one successful benchmark are shown in each plot. The time axis is logarithmic in all plots.

7 Conclusion

In this paper, we empirically evaluate the viability of smt when applied to the inference of logic-based models in systems biology. We identify function argument monotonicity as a critical challenge in the encoding of practical inference problems, demonstrating that naive quantified encodings of monotonicity frequently fail on real-world instances. We then evaluate two approaches based on quantifier instantiation, showing that they significantly outperform the naive quantified encoding. More importantly, switching to an instantiation-based encoding allows the smt approach to outperform current state-of-the-art automated reasoning tools in systems biology (namely Bonesis and AEON). Furthermore, it enables reasoning over integer-based systems, a capability that neither of these existing tools supports.

For future work, we aim to extend the inference problem encoding with additional biologically motivated constraints, such as requirements regarding trap spaces. Another promising direction is incorporating the uncertainty of biological observations as soft constraints within the framework of smt with optimization.

References

BETA