4,598 research outputs found
Beyond Bidimensionality: Parameterized Subexponential Algorithms on Directed Graphs
We develop two different methods to achieve subexponential time parameterized
algorithms for problems on sparse directed graphs. We exemplify our approaches
with two well studied problems.
For the first problem, {\sc -Leaf Out-Branching}, which is to find an
oriented spanning tree with at least leaves, we obtain an algorithm solving
the problem in time on directed graphs
whose underlying undirected graph excludes some fixed graph as a minor. For
the special case when the input directed graph is planar, the running time can
be improved to . The second example is a
generalization of the {\sc Directed Hamiltonian Path} problem, namely {\sc
-Internal Out-Branching}, which is to find an oriented spanning tree with at
least internal vertices. We obtain an algorithm solving the problem in time
on directed graphs whose underlying
undirected graph excludes some fixed apex graph as a minor. Finally, we
observe that for any , the {\sc -Directed Path} problem is
solvable in time , where is some
function of \ve.
Our methods are based on non-trivial combinations of obstruction theorems for
undirected graphs, kernelization, problem specific combinatorial structures and
a layering technique similar to the one employed by Baker to obtain PTAS for
planar graphs
Solving Problems on Graphs of High Rank-Width
A modulator of a graph G to a specified graph class H is a set of vertices
whose deletion puts G into H. The cardinality of a modulator to various
tractable graph classes has long been used as a structural parameter which can
be exploited to obtain FPT algorithms for a range of hard problems. Here we
investigate what happens when a graph contains a modulator which is large but
"well-structured" (in the sense of having bounded rank-width). Can such
modulators still be exploited to obtain efficient algorithms? And is it even
possible to find such modulators efficiently?
We first show that the parameters derived from such well-structured
modulators are strictly more general than the cardinality of modulators and
rank-width itself. Then, we develop an FPT algorithm for finding such
well-structured modulators to any graph class which can be characterized by a
finite set of forbidden induced subgraphs. We proceed by showing how
well-structured modulators can be used to obtain efficient parameterized
algorithms for Minimum Vertex Cover and Maximum Clique. Finally, we use
well-structured modulators to develop an algorithmic meta-theorem for deciding
problems expressible in Monadic Second Order (MSO) logic, and prove that this
result is tight in the sense that it cannot be generalized to LinEMSO problems.Comment: Accepted at WADS 201
Neutrino mass from higher than d=5 effective operators in SUSY, and its test at the LHC
We discuss neutrino masses from higher than d=5 effective operators in a
supersymmetric framework, where we explicitly demonstrate which operators could
be the leading contribution to neutrino mass in the MSSM and NMSSM. As an
example, we focus on the d=7 operator L L H_u H_u H_d H_u, for which we
systematically derive all tree-level decompositions. We argue that many of
these lead to a linear or inverse see-saw scenario with two extra neutral
fermions, where the lepton number violating term is naturally suppressed by a
heavy mass scale when the extra mediators are integrated out. We choose one
example, for which we discuss possible implementations of the neutrino flavor
structure. In addition, we show that the heavy mediators, in this case SU(2)
doublet fermions, may indeed be observable at the LHC, since they can be
produced by Drell-Yan processes and lead to displaced vertices when they decay.
However, the direct observation of lepton number violating processes is on the
edge at LHC.Comment: 24 pages, 5 figures, 6 table
Solving Connectivity Problems Parameterized by Treedepth in Single-Exponential Time and Polynomial Space
A breakthrough result of Cygan et al. (FOCS 2011) showed that connectivity problems parameterized by treewidth can be solved much faster than the previously best known time ?^*(2^{?(twlog tw)}). Using their inspired Cut&Count technique, they obtained ?^*(?^tw) time algorithms for many such problems. Moreover, they proved these running times to be optimal assuming the Strong Exponential-Time Hypothesis. Unfortunately, like other dynamic programming algorithms on tree decompositions, these algorithms also require exponential space, and this is widely believed to be unavoidable. In contrast, for the slightly larger parameter called treedepth, there are already several examples of matching the time bounds obtained for treewidth, but using only polynomial space. Nevertheless, this has remained open for connectivity problems.
In the present work, we close this knowledge gap by applying the Cut&Count technique to graphs of small treedepth. While the general idea is unchanged, we have to design novel procedures for counting consistently cut solution candidates using only polynomial space. Concretely, we obtain time ?^*(3^d) and polynomial space for Connected Vertex Cover, Feedback Vertex Set, and Steiner Tree on graphs of treedepth d. Similarly, we obtain time ?^*(4^d) and polynomial space for Connected Dominating Set and Connected Odd Cycle Transversal
- …