4,598 research outputs found

    Beyond Bidimensionality: Parameterized Subexponential Algorithms on Directed Graphs

    Get PDF
    We develop two different methods to achieve subexponential time parameterized algorithms for problems on sparse directed graphs. We exemplify our approaches with two well studied problems. For the first problem, {\sc kk-Leaf Out-Branching}, which is to find an oriented spanning tree with at least kk leaves, we obtain an algorithm solving the problem in time 2O(klogk)n+nO(1)2^{O(\sqrt{k} \log k)} n+ n^{O(1)} on directed graphs whose underlying undirected graph excludes some fixed graph HH as a minor. For the special case when the input directed graph is planar, the running time can be improved to 2O(k)n+nO(1)2^{O(\sqrt{k})}n + n^{O(1)}. The second example is a generalization of the {\sc Directed Hamiltonian Path} problem, namely {\sc kk-Internal Out-Branching}, which is to find an oriented spanning tree with at least kk internal vertices. We obtain an algorithm solving the problem in time 2O(klogk)+nO(1)2^{O(\sqrt{k} \log k)} + n^{O(1)} on directed graphs whose underlying undirected graph excludes some fixed apex graph HH as a minor. Finally, we observe that for any ϵ>0\epsilon>0, the {\sc kk-Directed Path} problem is solvable in time O((1+ϵ)knf(ϵ))O((1+\epsilon)^k n^{f(\epsilon)}), where ff is some function of \ve. Our methods are based on non-trivial combinations of obstruction theorems for undirected graphs, kernelization, problem specific combinatorial structures and a layering technique similar to the one employed by Baker to obtain PTAS for planar graphs

    Solving Problems on Graphs of High Rank-Width

    Full text link
    A modulator of a graph G to a specified graph class H is a set of vertices whose deletion puts G into H. The cardinality of a modulator to various tractable graph classes has long been used as a structural parameter which can be exploited to obtain FPT algorithms for a range of hard problems. Here we investigate what happens when a graph contains a modulator which is large but "well-structured" (in the sense of having bounded rank-width). Can such modulators still be exploited to obtain efficient algorithms? And is it even possible to find such modulators efficiently? We first show that the parameters derived from such well-structured modulators are strictly more general than the cardinality of modulators and rank-width itself. Then, we develop an FPT algorithm for finding such well-structured modulators to any graph class which can be characterized by a finite set of forbidden induced subgraphs. We proceed by showing how well-structured modulators can be used to obtain efficient parameterized algorithms for Minimum Vertex Cover and Maximum Clique. Finally, we use well-structured modulators to develop an algorithmic meta-theorem for deciding problems expressible in Monadic Second Order (MSO) logic, and prove that this result is tight in the sense that it cannot be generalized to LinEMSO problems.Comment: Accepted at WADS 201

    Neutrino mass from higher than d=5 effective operators in SUSY, and its test at the LHC

    Full text link
    We discuss neutrino masses from higher than d=5 effective operators in a supersymmetric framework, where we explicitly demonstrate which operators could be the leading contribution to neutrino mass in the MSSM and NMSSM. As an example, we focus on the d=7 operator L L H_u H_u H_d H_u, for which we systematically derive all tree-level decompositions. We argue that many of these lead to a linear or inverse see-saw scenario with two extra neutral fermions, where the lepton number violating term is naturally suppressed by a heavy mass scale when the extra mediators are integrated out. We choose one example, for which we discuss possible implementations of the neutrino flavor structure. In addition, we show that the heavy mediators, in this case SU(2) doublet fermions, may indeed be observable at the LHC, since they can be produced by Drell-Yan processes and lead to displaced vertices when they decay. However, the direct observation of lepton number violating processes is on the edge at LHC.Comment: 24 pages, 5 figures, 6 table

    Solving Connectivity Problems Parameterized by Treedepth in Single-Exponential Time and Polynomial Space

    Get PDF
    A breakthrough result of Cygan et al. (FOCS 2011) showed that connectivity problems parameterized by treewidth can be solved much faster than the previously best known time ?^*(2^{?(twlog tw)}). Using their inspired Cut&Count technique, they obtained ?^*(?^tw) time algorithms for many such problems. Moreover, they proved these running times to be optimal assuming the Strong Exponential-Time Hypothesis. Unfortunately, like other dynamic programming algorithms on tree decompositions, these algorithms also require exponential space, and this is widely believed to be unavoidable. In contrast, for the slightly larger parameter called treedepth, there are already several examples of matching the time bounds obtained for treewidth, but using only polynomial space. Nevertheless, this has remained open for connectivity problems. In the present work, we close this knowledge gap by applying the Cut&Count technique to graphs of small treedepth. While the general idea is unchanged, we have to design novel procedures for counting consistently cut solution candidates using only polynomial space. Concretely, we obtain time ?^*(3^d) and polynomial space for Connected Vertex Cover, Feedback Vertex Set, and Steiner Tree on graphs of treedepth d. Similarly, we obtain time ?^*(4^d) and polynomial space for Connected Dominating Set and Connected Odd Cycle Transversal
    corecore