481 research outputs found
From Gap-ETH to FPT-Inapproximability: Clique, Dominating Set, and More
We consider questions that arise from the intersection between the areas of
polynomial-time approximation algorithms, subexponential-time algorithms, and
fixed-parameter tractable algorithms. The questions, which have been asked
several times (e.g., [Marx08, FGMS12, DF13]), are whether there is a
non-trivial FPT-approximation algorithm for the Maximum Clique (Clique) and
Minimum Dominating Set (DomSet) problems parameterized by the size of the
optimal solution. In particular, letting be the optimum and be
the size of the input, is there an algorithm that runs in
time and outputs a solution of size
, for any functions and that are independent of (for
Clique, we want )?
In this paper, we show that both Clique and DomSet admit no non-trivial
FPT-approximation algorithm, i.e., there is no
-FPT-approximation algorithm for Clique and no
-FPT-approximation algorithm for DomSet, for any function
(e.g., this holds even if is the Ackermann function). In fact, our results
imply something even stronger: The best way to solve Clique and DomSet, even
approximately, is to essentially enumerate all possibilities. Our results hold
under the Gap Exponential Time Hypothesis (Gap-ETH) [Dinur16, MR16], which
states that no -time algorithm can distinguish between a satisfiable
3SAT formula and one which is not even -satisfiable for some
constant .
Besides Clique and DomSet, we also rule out non-trivial FPT-approximation for
Maximum Balanced Biclique, Maximum Subgraphs with Hereditary Properties, and
Maximum Induced Matching in bipartite graphs. Additionally, we rule out
-FPT-approximation algorithm for Densest -Subgraph although this
ratio does not yet match the trivial -approximation algorithm.Comment: 43 pages. To appear in FOCS'1
The Computational Complexity of the Game of Set and its Theoretical Applications
The game of SET is a popular card game in which the objective is to form Sets
using cards from a special deck. In this paper we study single- and multi-round
variations of this game from the computational complexity point of view and
establish interesting connections with other classical computational problems.
Specifically, we first show that a natural generalization of the problem of
finding a single Set, parameterized by the size of the sought Set is W-hard;
our reduction applies also to a natural parameterization of Perfect
Multi-Dimensional Matching, a result which may be of independent interest.
Second, we observe that a version of the game where one seeks to find the
largest possible number of disjoint Sets from a given set of cards is a special
case of 3-Set Packing; we establish that this restriction remains NP-complete.
Similarly, the version where one seeks to find the smallest number of disjoint
Sets that overlap all possible Sets is shown to be NP-complete, through a close
connection to the Independent Edge Dominating Set problem. Finally, we study a
2-player version of the game, for which we show a close connection to Arc
Kayles, as well as fixed-parameter tractability when parameterized by the
number of rounds played
Fixed-parameter tractability of multicut parameterized by the size of the cutset
Given an undirected graph , a collection of
pairs of vertices, and an integer , the Edge Multicut problem ask if there
is a set of at most edges such that the removal of disconnects
every from the corresponding . Vertex Multicut is the analogous
problem where is a set of at most vertices. Our main result is that
both problems can be solved in time , i.e.,
fixed-parameter tractable parameterized by the size of the cutset in the
solution. By contrast, it is unlikely that an algorithm with running time of
the form exists for the directed version of the problem, as
we show it to be W[1]-hard parameterized by the size of the cutset
Parameterized complexity of DPLL search procedures
We study the performance of DPLL algorithms on parameterized problems. In particular, we investigate how difficult it is to decide whether small solutions exist for satisfiability and other combinatorial problems. For this purpose we develop a Prover-Delayer game which models the running time of DPLL procedures and we establish an information-theoretic method to obtain lower bounds to the running time of parameterized DPLL procedures. We illustrate this technique by showing lower bounds to the parameterized pigeonhole principle and to the ordering principle. As our main application we study the DPLL procedure for the problem of deciding whether a graph has a small clique. We show that proving the absence of a k-clique requires n steps for a non-trivial distribution of graphs close to the critical threshold. For the restricted case of tree-like Parameterized Resolution, this result answers a question asked in [11] of understanding the Resolution complexity of this family of formulas
Audit Games with Multiple Defender Resources
Modern organizations (e.g., hospitals, social networks, government agencies)
rely heavily on audit to detect and punish insiders who inappropriately access
and disclose confidential information. Recent work on audit games models the
strategic interaction between an auditor with a single audit resource and
auditees as a Stackelberg game, augmenting associated well-studied security
games with a configurable punishment parameter. We significantly generalize
this audit game model to account for multiple audit resources where each
resource is restricted to audit a subset of all potential violations, thus
enabling application to practical auditing scenarios. We provide an FPTAS that
computes an approximately optimal solution to the resulting non-convex
optimization problem. The main technical novelty is in the design and
correctness proof of an optimization transformation that enables the
construction of this FPTAS. In addition, we experimentally demonstrate that
this transformation significantly speeds up computation of solutions for a
class of audit games and security games
- …