125 research outputs found

    Finding detours is fixed-parameter tractable

    Get PDF
    We consider the following natural "above guarantee" parameterization of the classical Longest Path problem: For given vertices s and t of a graph G, and an integer k, the problem Longest Detour asks for an (s,t)-path in G that is at least k longer than a shortest (s,t)-path. Using insights into structural graph theory, we prove that Longest Detour is fixed-parameter tractable (FPT) on undirected graphs and actually even admits a single-exponential algorithm, that is, one of running time exp(O(k)) poly(n). This matches (up to the base of the exponential) the best algorithms for finding a path of length at least k. Furthermore, we study the related problem Exact Detour that asks whether a graph G contains an (s,t)-path that is exactly k longer than a shortest (s,t)-path. For this problem, we obtain a randomized algorithm with running time about 2.746^k, and a deterministic algorithm with running time about 6.745^k, showing that this problem is FPT as well. Our algorithms for Exact Detour apply to both undirected and directed graphs.Comment: Extended abstract appears at ICALP 201

    Polynomial kernelization for removing induced claws and diamonds

    Full text link
    A graph is called (claw,diamond)-free if it contains neither a claw (a K1,3K_{1,3}) nor a diamond (a K4K_4 with an edge removed) as an induced subgraph. Equivalently, (claw,diamond)-free graphs can be characterized as line graphs of triangle-free graphs, or as linear dominoes, i.e., graphs in which every vertex is in at most two maximal cliques and every edge is in exactly one maximal clique. In this paper we consider the parameterized complexity of the (claw,diamond)-free Edge Deletion problem, where given a graph GG and a parameter kk, the question is whether one can remove at most kk edges from GG to obtain a (claw,diamond)-free graph. Our main result is that this problem admits a polynomial kernel. We complement this finding by proving that, even on instances with maximum degree 66, the problem is NP-complete and cannot be solved in time 2o(k)⋅∣V(G)∣O(1)2^{o(k)}\cdot |V(G)|^{O(1)} unless the Exponential Time Hypothesis fai

    A 2k2k-Vertex Kernel for Maximum Internal Spanning Tree

    Full text link
    We consider the parameterized version of the maximum internal spanning tree problem, which, given an nn-vertex graph and a parameter kk, asks for a spanning tree with at least kk internal vertices. Fomin et al. [J. Comput. System Sci., 79:1-6] crafted a very ingenious reduction rule, and showed that a simple application of this rule is sufficient to yield a 3k3k-vertex kernel. Here we propose a novel way to use the same reduction rule, resulting in an improved 2k2k-vertex kernel. Our algorithm applies first a greedy procedure consisting of a sequence of local exchange operations, which ends with a local-optimal spanning tree, and then uses this special tree to find a reducible structure. As a corollary of our kernel, we obtain a deterministic algorithm for the problem running in time 4k⋅nO(1)4^k \cdot n^{O(1)}

    Separate, measure and conquer: faster polynomial-space algorithms for Max 2-CSP and counting dominating sets

    Get PDF
    We show a method resulting in the improvement of several polynomial-space, exponential-time algorithms. The method capitalizes on the existence of small balanced separators for sparse graphs, which can be exploited for branching to disconnect an instance into independent components. For this algorithm design paradigm, the challenge to date has been to obtain improvements in worst-case analyses of algorithms, compared with algorithms that are analyzed with advanced methods, such as Measure and Conquer. Our contribution is the design of a general method to integrate the advantage from the separator-branching into Measure and Conquer, for an improved running time analysis. We illustrate the method with improved algorithms for Max (r,2) -CSP and #Dominating Set. For Max (r,2) -CSP instances with domain size r and m constraints, the running time improves from r m/6 to r m/7.5 for cubic instances and from r 0.19⋅m to r 0.18⋅m for general instances, omitting subexponential factors. For #Dominating Set instances with n vertices, the running time improves from 1.4143 n to 1.2458 n for cubic instances and from 1.5673 n to 1.5183 n for general instances. It is likely that other algorithms relying on local transformations can be improved using our method, which exploits a non-local property of graphs

    Unit Interval Editing is Fixed-Parameter Tractable

    Full text link
    Given a graph~GG and integers k1k_1, k2k_2, and~k3k_3, the unit interval editing problem asks whether GG can be transformed into a unit interval graph by at most k1k_1 vertex deletions, k2k_2 edge deletions, and k3k_3 edge additions. We give an algorithm solving this problem in time 2O(klog⁡k)⋅(n+m)2^{O(k\log k)}\cdot (n+m), where k:=k1+k2+k3k := k_1 + k_2 + k_3, and n,mn, m denote respectively the numbers of vertices and edges of GG. Therefore, it is fixed-parameter tractable parameterized by the total number of allowed operations. Our algorithm implies the fixed-parameter tractability of the unit interval edge deletion problem, for which we also present a more efficient algorithm running in time O(4k⋅(n+m))O(4^k \cdot (n + m)). Another result is an O(6k⋅(n+m))O(6^k \cdot (n + m))-time algorithm for the unit interval vertex deletion problem, significantly improving the algorithm of van 't Hof and Villanger, which runs in time O(6k⋅n6)O(6^k \cdot n^6).Comment: An extended abstract of this paper has appeared in the proceedings of ICALP 2015. Update: The proof of Lemma 4.2 has been completely rewritten; an appendix is provided for a brief overview of related graph classe

    Computing Time-Optimal Clearing Strategies for Pursuit-Evasion Problems with Linear Programming

    Get PDF
    This paper addresses and solves the problem of finding optimal clearing strategies for a team of robots in an environment given as a graph. The graph-clear model is used in which sweeping of locations, and their recontamination by intruders, is modelled over a surveillance graph. Optimization of strategies is carried out for shortest total travel distance and time taken by the robot team and under constraints of clearing costs of locations. The physical constraints of access and timely movements by the robots are also accounted for, as well as the ability of the robots to prevent recontamination of already cleared areas. The main result of the paper is that this complex problem can be reduced to a computable LP problem. To further reduce complexity, an algorithm is presented for the case when graph clear strategies are a priori available by using other methods, for instance by model checking

    On Directed Feedback Vertex Set parameterized by treewidth

    Get PDF
    We study the Directed Feedback Vertex Set problem parameterized by the treewidth of the input graph. We prove that unless the Exponential Time Hypothesis fails, the problem cannot be solved in time 2o(tlog⁡t)⋅nO(1)2^{o(t\log t)}\cdot n^{\mathcal{O}(1)} on general directed graphs, where tt is the treewidth of the underlying undirected graph. This is matched by a dynamic programming algorithm with running time 2O(tlog⁡t)⋅nO(1)2^{\mathcal{O}(t\log t)}\cdot n^{\mathcal{O}(1)}. On the other hand, we show that if the input digraph is planar, then the running time can be improved to 2O(t)⋅nO(1)2^{\mathcal{O}(t)}\cdot n^{\mathcal{O}(1)}.Comment: 20

    The Firefighter Problem: A Structural Analysis

    Get PDF
    We consider the complexity of the firefighter problem where b>=1 firefighters are available at each time step. This problem is proved NP-complete even on trees of degree at most three and budget one (Finbow et al.,2007) and on trees of bounded degree b+3 for any fixed budget b>=2 (Bazgan et al.,2012). In this paper, we provide further insight into the complexity landscape of the problem by showing that the pathwidth and the maximum degree of the input graph govern its complexity. More precisely, we first prove that the problem is NP-complete even on trees of pathwidth at most three for any fixed budget b>=1. We then show that the problem turns out to be fixed parameter-tractable with respect to the combined parameter "pathwidth" and "maximum degree" of the input graph

    Exploring Graphs with Time Constraints by Unreliable Collections of Mobile Robots

    Get PDF
    A graph environment must be explored by a collection of mobile robots. Some of the robots, a priori unknown, may turn out to be unreliable. The graph is weighted and each node is assigned a deadline. The exploration is successful if each node of the graph is visited before its deadline by a reliable robot. The edge weight corresponds to the time needed by a robot to traverse the edge. Given the number of robots which may crash, is it possible to design an algorithm, which will always guarantee the exploration, independently of the choice of the subset of unreliable robots by the adversary? We find the optimal time, during which the graph may be explored. Our approach permits to find the maximal number of robots, which may turn out to be unreliable, and the graph is still guaranteed to be explored. We concentrate on line graphs and rings, for which we give positive results. We start with the case of the collections involving only reliable robots. We give algorithms finding optimal times needed for exploration when the robots are assigned to fixed initial positions as well as when such starting positions may be determined by the algorithm. We extend our consideration to the case when some number of robots may be unreliable. Our most surprising result is that solving the line exploration problem with robots at given positions, which may involve crash-faulty ones, is NP-hard. The same problem has polynomial solutions for a ring and for the case when the initial robots' positions on the line are arbitrary. The exploration problem is shown to be NP-hard for star graphs, even when the team consists of only two reliable robots
    • 

    corecore