We consider the EDGE EDITING TO A CONNECTED GRAPH OF GIVEN DEGREES problem that asks, given a graph G, non-negative integers d,k and a function delta: V(G) ->{1,...,d}, whether it is possible to obtain a connected ...
详细信息
We consider the EDGE EDITING TO A CONNECTED GRAPH OF GIVEN DEGREES problem that asks, given a graph G, non-negative integers d,k and a function delta: V(G) ->{1,...,d}, whether it is possible to obtain a connected graph G' from G such that the degree of v is delta(v) for every vertex v by at most kedge editing operations. As the problem is NP-complete even if delta(v) = 2, we are interested in the parameterized complexity and show that Edge Editing to a Connected Graph of Given Degrees admits a polynomial kernel when parameterized by d + k. For the special case delta(v) = d, i.e., when the aim is to obtain a connected d-regular graph, the problem is shown to be fixed parameter tractable when parameterized by k only. (C) 2017 Elsevier Inc. All rights reserved.
A central problem in parameterized algorithms is to obtain algorithms with running time f(k) center dot n(O(1)) such that f is as slow growing a function of the parameter k as possible. In particular, a large number o...
详细信息
A central problem in parameterized algorithms is to obtain algorithms with running time f(k) center dot n(O(1)) such that f is as slow growing a function of the parameter k as possible. In particular, a large number of basic parameterized problems admit parameterized algorithms where f (k) is single-exponential, that is, c(k) for some constant c, which makes aiming for such a running time a natural goal for other problems as well. However, there are still plenty of problems where the f(k) appearing in the best-known running time is worse than single-exponential and it remained "slightly superexponential" even after serious attempts to bring it down. A natural question to ask is whether the f (k) appearing in the running time of the best-known algorithms is optimal for any of _ these problems. In this paper, we examine parameterized problems where f(k) is k(O(k)) = 2(O(k log k)) in the best-known running time, and for a number of such problems we show that the dependence on k in the running time cannot be improved to single-exponential. More precisely we prove the following tight lower bounds, for four natural problems, arising from three different domains: (1) In the CLOSEST STRING problem, given strings S-1,..., s(t) over an alphabet Sigma of length L each, and an integer d, the question is whether there exists a string s over E of length L, such that its hamming distance from each of the strings s,, 1 <= i <= t, is at most d. The pattern matching problem CLOSEST STRING is known to be solvable in times 2(O(d log d)) center dot n(O(1)) and 2(O(d log vertical bar Sigma vertical bar)) center dot n(O(1)). We show that there are no 2(O(d log d)) center dot n(O(1)) or 2(O(d log vertical bar Sigma vertical bar)) time algorithms, unless the Exponential Time Hypothesis (ETH) fails. (2) The graph embedding problem DISTORTION, that is, deciding whether a graph G has a metric embedding into the integers with distortion at most d can be solved in time 2(O(d log d)) center dot n
A preference system I is an undirected graph where vertices have preferences over their neighbors, and I admits a master list if all preferences can be derived from a single ordering over all vertices. We study the pr...
详细信息
A preference system I is an undirected graph where vertices have preferences over their neighbors, and I admits a master list if all preferences can be derived from a single ordering over all vertices. We study the problem of deciding whether a given preference system I is close to admitting a master list based on three different distance measures. We determine the computational complexity of the following questions: can I be modified by (i) k swaps in the preferences, (ii) k edge deletions, or (iii) k vertex deletions so that the resulting instance admits a master list? We investigate these problems in detail from the viewpoint of parameterized complexity and of approximation. We also present two applications related to stable and popular matchings.
In the 4-PATH VERTEX COVER problem, the input is an undirected graph G and an integer k. The goal is to decide whether there is a set S of vertices of size at most k such that every path with 4 vertices in G contains ...
详细信息
In the 4-PATH VERTEX COVER problem, the input is an undirected graph G and an integer k. The goal is to decide whether there is a set S of vertices of size at most k such that every path with 4 vertices in G contains at least one vertex of S. In this paper we give a parameterized algorithm for 4-PATH VERTEX COVER whose time complexity is 2.619(k). n(O)(1), where n denotes the number of vertices of the input graph. (C) 2020 Elsevier B.V. All rights reserved.
In this paper we continue our study of graph modification problems defined by reducing the rank of the adjacency matrix of the given graph, and extend our results from undirected graphs to modifying the rank of skew-a...
详细信息
In this paper we continue our study of graph modification problems defined by reducing the rank of the adjacency matrix of the given graph, and extend our results from undirected graphs to modifying the rank of skew-adjacency matrix of oriented graphs. An instance of a graph modification problem takes as input a graph G and a positive integer k, and the objective is to either delete k vertices/edges or edit k edges so that the resulting graph belongs to a particular family of graphs. Given a fixed positive integer r, we define as the family of oriented graphs where for each , the rank of the skew-adjacency matrix of G is at most r. Using the family we do algorithmic study, both in classical and parameterized complexity, of the following graph modification problems: -Rank Vertex Deletion, -Rank Edge Deletion. We first show that both the problems are NP-Complete. Then we show that these problems are fixed parameter tractable (FPT) by designing an algorithm with running time for -Rank Vertex Deletion, and an algorithm for -Rank Edge Deletion running in time . In addition to our FPT results we design polynomial kernels for these problems. Our main structural result, which is the fulcrum of all our algorithmic results, is that for a fixed integer r the size of any "reduced graph" in is upper bounded by . This result is of independent interest and generalizes a similar result of Kotlov and Lovasz regarding reduced oriented graphs of rank r.
The question if a given partial solution to a problem can be extended reasonably occurs in many algorithmic approaches for optimization problems. For instance, when enumerating minimal vertex covers of a graph G = (V,...
详细信息
The question if a given partial solution to a problem can be extended reasonably occurs in many algorithmic approaches for optimization problems. For instance, when enumerating minimal vertex covers of a graph G = (V, E), one usually arrives at the problem to decide for a vertex set U subset of V (pre-solution), if there exists a minimal vertex cover S (i.e., a vertex cover S subset of V such that no proper subset of S is a vertex cover) with U subset of S (minimal extension of U). We propose a general, partial-order based formulation of such extension problems which allows to model parameterization and approximation aspects of extension, and also highlights relationships between extension tasks for different specific problems. As examples, we study a number of specific problems which can be expressed and related in this framework. In particular, we discuss extension variants of the problems dominating set and feedback vertex/edge set. All these problems are shown to be NP-complete even when restricted to bipartite graphs of bounded degree, with the exception of our extension version of feedback edge set on undirected graphs which is shown to be solvable in polynomial time. For the extension variants of dominating and feedback vertex set, we also show NP-completeness for the restriction to planar graphs of bounded degree. As non-graph problem, we also study an extension version of the bin packing problem. We further consider the parameterized complexity of all these extension variants, where the parameter is a measure of the pre-solution as defined by our framework. (c) 2021 Elsevier B.V. All rights reserved.
A fundamental theorem of Whitney from 1933 asserts that 2-connected graphs G and H are 2-isomorphic, or equivalently, their cycle matroids are isomorphic if and only if G can be transformed into H by a series of opera...
详细信息
A fundamental theorem of Whitney from 1933 asserts that 2-connected graphs G and H are 2-isomorphic, or equivalently, their cycle matroids are isomorphic if and only if G can be transformed into H by a series of operations called Whitney switches. In this paper we consider the quantitative question arising from Whitney's theorem: Given two 2-isomorphic graphs, can we transform one into another by applying at most k Whitney switches? This problem is already NP-complete for cycles, and we investigate its parameterized complexity. We show that the problem admits a kernel of size O(k) and thus is fixed-parameter tractable when parameterized by k
We investigate the parameterized complexity of the graph editing problem called EDITING TO A GRAPH WITH A GIVEN DEGREE SEQUENCE Where the aim iS to obtain a graph With a given degree sequence sigma by at most k vertex...
详细信息
We investigate the parameterized complexity of the graph editing problem called EDITING TO A GRAPH WITH A GIVEN DEGREE SEQUENCE Where the aim iS to obtain a graph With a given degree sequence sigma by at most k vertex deletions, edge deletions and edge additions. We show that the problem is W[1]-hard when parameterized by k for any combination of the allowed editing operations. From the positive side, we show that the problem can be solved in time 2 04 *+42)n2logn for n-vertex graphs, where Delta* = max sigma, i.e., the problem is FAT when parameterized by k + A*. We also show that EDITING TO A GRAPH. WITH A GIVEN DEGREE SEQUENCE has a polynomial kernel when parameterized by k + Delta* if only edge additions are allowed, and there is no polynomial kernel unless NP subset of co-NP/poly for all other combinations of the allowed editing operations. (C) 2016 Published by Elsevier B.V.
The THRESHOLD DOMINATING SET problem is that of determining for a graph G = (V,E) whether there is a subset V' subset of or equal to V of size k, such that for each vertex v is an element of V there are at least r...
详细信息
The THRESHOLD DOMINATING SET problem is that of determining for a graph G = (V,E) whether there is a subset V' subset of or equal to V of size k, such that for each vertex v is an element of V there are at least r elements of the closed neighborhood N[v] that belong to V'. We consider the complexity of the problem parameterized by the pair (k,r). It is trivial to observe that this is hard for W[2]. It can also be easily shown to belong to a natural extension W*[2] of W[2] defined in terms of circuit families of depth bounded by a function of the parameter. We prove membership in W[2] and thus W[2]-completeness. Using this as a starting point, we prove that W*[2] = W[2]. (C) 1998-Elsevier Science B.V. All rights reserved.
We study the Cutwidth problem, where the input is a graph G, and the objective is find a linear layout of the vertices that minimizes the maximum number of edges intersected by any vertical line inserted between two c...
详细信息
We study the Cutwidth problem, where the input is a graph G, and the objective is find a linear layout of the vertices that minimizes the maximum number of edges intersected by any vertical line inserted between two consecutive vertices. We give an algorithm for Cutwidth with running time O(2 (k) n (O(1))). Here k is the size of a minimum vertex cover of the input graph G, and n is the number of vertices in G. Our algorithm gives an O(2 (n/2) n (O(1))) time algorithm for Cutwidth on bipartite graphs as a corollary. This is the first non-trivial exact exponential time algorithm for Cutwidth on a graph class where the problem remains NP-complete. Additionally, we show that Cutwidth parameterized by the size of the minimum vertex cover of the input graph does not admit a polynomial kernel unless NPaS dagger coNP/poly. Our kernelization lower bound contrasts with the recent results of Bodlaender et al. (ICALP, Springer, Berlin, 2011;SWAT, Springer, Berlin, 2012) that both Treewidth and Pathwidth parameterized by vertex cover do admit polynomial kernels.
暂无评论