-
Pack and Measure: An Effective Approach for Influence Propagation in Social Networks
Authors:
Faisal N. Abu-Khzam,
Ghinwa Bou Matar,
Sergio Thoumi
Abstract:
The Influence Maximization problem under the Independent Cascade model (IC) is considered. The problem asks for a minimal set of vertices to serve as "seed set" from which a maximum influence propagation is expected. New seed-set selection methods are introduced based on the notions of a $d$-packing and vertex centrality. In particular, we focus on selecting seed-vertices that are far apart and wh…
▽ More
The Influence Maximization problem under the Independent Cascade model (IC) is considered. The problem asks for a minimal set of vertices to serve as "seed set" from which a maximum influence propagation is expected. New seed-set selection methods are introduced based on the notions of a $d$-packing and vertex centrality. In particular, we focus on selecting seed-vertices that are far apart and whose influence-values are the highest in their local communities. Our best results are achieved via an initial computation of a $d$-Packing followed by selecting either vertices of high degree or high centrality in their respective closed neighborhoods. This overall "Pack and Measure" approach proves highly effective as a seed selection method.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.
-
A Linear Kernel for Planar Vector Domination
Authors:
Mahabba El Sahili,
Faisal N. Abu-Khzam
Abstract:
Given a graph $G$, an integer $k\geq 0$, and a non-negative integral function $f:V(G) \rightarrow \mathcal{N}$, the {\sc Vector Domination} problem asks whether a set $S$ of vertices, of cardinality $k$ or less, exists in $G$ so that every vertex $v \in V(G)-S$ has at least $f(v)$ neighbors in $S$. The problem generalizes several domination problems and it has also been shown to generalize Bounded…
▽ More
Given a graph $G$, an integer $k\geq 0$, and a non-negative integral function $f:V(G) \rightarrow \mathcal{N}$, the {\sc Vector Domination} problem asks whether a set $S$ of vertices, of cardinality $k$ or less, exists in $G$ so that every vertex $v \in V(G)-S$ has at least $f(v)$ neighbors in $S$. The problem generalizes several domination problems and it has also been shown to generalize Bounded-Degree Vertex Deletion. In this paper, the parameterized version of Vector Domination is studied when the input graph is planar. A linear problem kernel is presented.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Roman Census: Enumerating and Counting Roman Dominating Functions on Graph Classes
Authors:
Faisal N. Abu-Khzam,
Henning Fernau,
Kevin Mann
Abstract:
The concept of Roman domination has recently been studied concerning enumerating and counting (WG 2022). It has been shown that minimal Roman dominating functions can be enumerated with polynomial delay, contrasting what is known about minimal dominating sets. The running time of the algorithm could be estimated as $\mathcal{O}(1.9332^n)$ on general graphs of order $n$. In this paper, we focus on…
▽ More
The concept of Roman domination has recently been studied concerning enumerating and counting (WG 2022). It has been shown that minimal Roman dominating functions can be enumerated with polynomial delay, contrasting what is known about minimal dominating sets. The running time of the algorithm could be estimated as $\mathcal{O}(1.9332^n)$ on general graphs of order $n$. In this paper, we focus on special graph classes. More specifically, for chordal graphs, we present an enumeration algorithm running in time $\mathcal{O}(1.8940^n)$. For interval graphs, we can lower this time further to $\mathcal{O}(1.7321^n)$. Interestingly, this also matches (exactly) the known lower bound. We can also provide a matching lower and upper bound for forests, which is (incidentally) the same, namely $\mathcal{O}(\sqrt{3}^n)$. Furthermore, we show an enumeration algorithm running in time $\mathcal{O}(1.4656^n)$ for split graphs and for cobipartite graphs. Our approach also allows to give concrete formulas for counting minimal Roman dominating functions on special graph families like paths.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Minimal Roman Dominating Functions: Extensions and Enumeration
Authors:
Faisal N. Abu-Khzam,
Henning Fernau,
Kevin Mann
Abstract:
Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman domination functions with polynomial delay and polynomial space. Recall that the existence of a similar…
▽ More
Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman domination functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for Extension Roman Domination: Given a graph $G = (V,E)$ and a function $f:V\to\{0,1,2\}$, is there a minimal Roman domination function $\Tilde{f}$ with $f\leq \Tilde{f}$? Here, $\leq$ lifts $0< 1< 2$ pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of $\Oh(\RomanUpperbound^n)$ for graphs of order n; this is complemented by a lower bound example of $Ω(\RomanLowerbound^n)$.
△ Less
Submitted 10 April, 2022;
originally announced April 2022.
-
A Multi-Objective Degree-Based Network Anonymization Approach
Authors:
Ola N. Halawi,
Faisal N. Abu-Khzam
Abstract:
Enormous amounts of data collected from social networks or other online platforms are being published for the sake of statistics, marketing, and research, among other objectives. The consequent privacy and data security concerns have motivated the work on degree-based data anonymization. We propose and study a new multi-objective anonymization approach that generalizes the known degree anonymizati…
▽ More
Enormous amounts of data collected from social networks or other online platforms are being published for the sake of statistics, marketing, and research, among other objectives. The consequent privacy and data security concerns have motivated the work on degree-based data anonymization. We propose and study a new multi-objective anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our suggested model guarantees a convenient privacy level based on modifying the degrees in a way that respects some given local restrictions, per node, such that the total modifications at the global level (in the whole graph/network) are bounded by some given value. The corresponding multi-objective graph realization approach is solved using Integer Linear Programming to obtain the best possible solutions. Our experimental studies provide empirical evidence of the effectiveness of the new approach; by specifically showing that the introduced anonymization algorithm has a negligible effect on the way nodes are clustered, thereby preserving valuable network information while significantly improving data privacy.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
A Note on the Maximum Number of Minimal Connected Dominating Sets in a Graph
Authors:
Faisal N. Abu-Khzam
Abstract:
We prove constructively that the maximum possible number of minimal connected dominating sets in a connected undirected graph of order $n$ is in $Ω(1.489^n)$. This improves the previously known lower bound of $Ω(1.4422^n)$ and reduces the gap between lower and upper bounds for input-sensitive enumeration of minimal connected dominating sets in general graphs as well as some special graph classes.
We prove constructively that the maximum possible number of minimal connected dominating sets in a connected undirected graph of order $n$ is in $Ω(1.489^n)$. This improves the previously known lower bound of $Ω(1.4422^n)$ and reduces the gap between lower and upper bounds for input-sensitive enumeration of minimal connected dominating sets in general graphs as well as some special graph classes.
△ Less
Submitted 10 November, 2021;
originally announced November 2021.
-
An Improved Fixed-Parameter Algorithm for 2-Club Cluster Edge Deletion
Authors:
Faisal N. Abu-Khzam,
Norma Makarem,
Maryam Shehab
Abstract:
A 2-club is a graph of diameter at most two. In the decision version of the parametrized {\sc 2-Club Cluster Edge Deletion} problem, an undirected graph $G$ is given along with an integer $k\geq 0$ as parameter, and the question is whether $G$ can be transformed into a disjoint union of 2-clubs by deleting at most $k$ edges. A simple fixed-parameter algorithm solves the problem in…
▽ More
A 2-club is a graph of diameter at most two. In the decision version of the parametrized {\sc 2-Club Cluster Edge Deletion} problem, an undirected graph $G$ is given along with an integer $k\geq 0$ as parameter, and the question is whether $G$ can be transformed into a disjoint union of 2-clubs by deleting at most $k$ edges. A simple fixed-parameter algorithm solves the problem in $\mathcal{O}^*(3^k)$, and a decade-old algorithm was claimed to have an improved running time of $\mathcal{O}^*(2.74^k)$ via a sophisticated case analysis. Unfortunately, this latter algorithm suffers from a flawed branching scenario. In this paper, an improved fixed-parameter algorithm is presented with a running time in $\mathcal{O}^*(2.695^k)$.
△ Less
Submitted 2 July, 2021;
originally announced July 2021.
-
Graph Minors Meet Machine Learning: the Power of Obstructions
Authors:
Faisal N. Abu-Khzam,
Mohamed Mahmoud Abd El-Wahab,
Noureldin Yosri
Abstract:
Computational intractability has for decades motivated the development of a plethora of methodologies that mainly aimed at a quality-time trade-off. The use of Machine Learning techniques has finally emerged as one of the possible tools to obtain approximate solutions to ${\cal NP}$-hard combinatorial optimization problems. In a recent article, Dai et al. introduced a method for computing such app…
▽ More
Computational intractability has for decades motivated the development of a plethora of methodologies that mainly aimed at a quality-time trade-off. The use of Machine Learning techniques has finally emerged as one of the possible tools to obtain approximate solutions to ${\cal NP}$-hard combinatorial optimization problems. In a recent article, Dai et al. introduced a method for computing such approximate solutions for instances of the Vertex Cover problem. In this paper we consider the effectiveness of selecting a proper training strategy by considering special problem instances called "obstructions" that we believe carry some intrinsic properties of the problem itself. Capitalizing on the recent work of Dai et al. on the Vertex Cover problem, and using the same case study as well as 19 other problem instances, we show the utility of using obstructions for training neural networks. Experiments show that training with obstructions results in a huge reduction in number of iterations needed for convergence, thus gaining a substantial reduction in the time needed for training the model.
△ Less
Submitted 8 June, 2020;
originally announced June 2020.
-
Cluster Editing with Vertex Splitting
Authors:
Faisal N. Abu-Khzam,
Emmanuel Arrighi,
Matthias Bentert,
Pål Grønås Drange,
Judith Egan,
Serge Gaspers,
Alexis Shaw,
Peter Shaw,
Blair D. Sullivan,
Petra Wolf
Abstract:
Cluster Editing, also known as Correlation Clustering, is a well-studied graph modification problem. In this problem, one is given a graph and the task is to perform up to $k$ edge additions or deletions to transform it into a cluster graph, i.e., a graph consisting of a disjoint union of cliques. However, in real-world networks, clusters are often overlap**. For example in social networks, a pe…
▽ More
Cluster Editing, also known as Correlation Clustering, is a well-studied graph modification problem. In this problem, one is given a graph and the task is to perform up to $k$ edge additions or deletions to transform it into a cluster graph, i.e., a graph consisting of a disjoint union of cliques. However, in real-world networks, clusters are often overlap**. For example in social networks, a person might belong to several communities - e.g. those corresponding to work, school, or neighborhood. Other strong motivations come from biological network analysis and from language networks. Trying to cluster words with similar usage in the latter can be confounded by homonyms, that is, words with multiple meanings like "bat." In this paper, we introduce a new variant of Cluster Editing whereby a vertex can be split into two or more vertices. First used in the context of graph drawing, this operation allows a vertex $v$ to be replaced by two vertices whose combined neighborhood is the neighborhood of $v$ (and thus $v$ can belong to more than one cluster). We call the new problem Cluster Editing with Vertex Splitting and we initiate the study of it. We show that it is NP-complete and fixed-parameter tractable when parameterized by the total number $k$ of allowed vertex-splitting and edge-editing operations. In particular, we obtain an $O(2^{9k log k} + n + m)$-time algorithm and a $6k$-vertex kernel.
△ Less
Submitted 2 November, 2023; v1 submitted 1 January, 2019;
originally announced January 2019.
-
A Dynamically Turbo-Charged Greedy Heuristic for Graph Coloring
Authors:
Faisal N. Abu-Khzam,
Bachir M. Chahine
Abstract:
We introduce a dynamic version of the graph coloring problem and prove its fixed-parameter tractability with respect to the edit-parameter. This is used to present a {\em turbo-charged} heuristic for the problem that works by combining the turbo-charging technique with other standard heuristic tools, including greedy coloring. The recently introduced turbo-charging idea is further enhanced in this…
▽ More
We introduce a dynamic version of the graph coloring problem and prove its fixed-parameter tractability with respect to the edit-parameter. This is used to present a {\em turbo-charged} heuristic for the problem that works by combining the turbo-charging technique with other standard heuristic tools, including greedy coloring. The recently introduced turbo-charging idea is further enhanced in this paper by introducing a dynamic version of the so called {\em moment of regret} and {\em rollback points}. Experiments comparing our turbo-charging algorithm to other heuristics demonstrate its effectiveness. Our algorithm often produced results that were either exact or better than all the other available heuristics.
△ Less
Submitted 24 February, 2019; v1 submitted 28 December, 2018;
originally announced December 2018.
-
Partitioning a graph into degenerate subgraphs
Authors:
Faisal N. Abu-Khzam,
Carl Feghali,
Pinar Heggernes
Abstract:
Let $G = (V, E)$ be a connected graph with maximum degree $k\geq 3$ distinct from $K_{k+1}$. Given integers $s \geq 2$ and $p_1,\ldots,p_s\geq 0$, $G$ is said to be $(p_1, \dots, p_s)$-partitionable if there exists a partition of $V$ into sets~$V_1,\ldots,V_s$ such that $G[V_i]$ is $p_i$-degenerate for $i\in\{1,\ldots,s\}$. In this paper, we prove that we can find a $(p_1, \dots, p_s)$-partition o…
▽ More
Let $G = (V, E)$ be a connected graph with maximum degree $k\geq 3$ distinct from $K_{k+1}$. Given integers $s \geq 2$ and $p_1,\ldots,p_s\geq 0$, $G$ is said to be $(p_1, \dots, p_s)$-partitionable if there exists a partition of $V$ into sets~$V_1,\ldots,V_s$ such that $G[V_i]$ is $p_i$-degenerate for $i\in\{1,\ldots,s\}$. In this paper, we prove that we can find a $(p_1, \dots, p_s)$-partition of $G$ in $O(|V| + |E|)$-time whenever $1\geq p_1, \dots, p_s \geq 0$ and $p_1 + \dots + p_s \geq k - s$. This generalizes a result of Bonamy et al. (MFCS, 2017) and can be viewed as an algorithmic extension of Brooks' theorem and several results on vertex arboricity of graphs of bounded maximum degree.
We also prove that deciding whether $G$ is $(p, q)$-partitionable is $\mathbb{NP}$-complete for every $k \geq 5$ and pairs of non-negative integers $(p, q)$ such that $(p, q) \not = (1, 1)$ and $p + q = k - 3$. This resolves an open problem of Bonamy et al. (manuscript, 2017). Combined with results of Borodin, Kostochka and Toft (\emph{Discrete Mathematics}, 2000), Yang and Yuan (\emph{Discrete Mathematics}, 2006) and Wu, Yuan and Zhao (\emph{Journal of Mathematical Study}, 1996), it also settles the complexity of deciding whether a graph with bounded maximum degree can be partitioned into two subgraphs of prescribed degeneracy.
△ Less
Submitted 7 August, 2019; v1 submitted 12 March, 2018;
originally announced March 2018.
-
Concise Fuzzy Planar Embedding of Graphs: a Dimensionality Reduction Approach
Authors:
Faisal N. Abu-Khzam,
Rana H. Mouawi,
Amer Hajj Ahmad,
Sergio Thoumi
Abstract:
The enormous amount of data to be represented using large graphs exceeds in some cases the resources of a conventional computer. Edges in particular can take up a considerable amount of memory as compared to the number of nodes. However, rigorous edge storage might not always be essential to be able to draw the needed conclusions. A similar problem takes records with many variables and attempts to…
▽ More
The enormous amount of data to be represented using large graphs exceeds in some cases the resources of a conventional computer. Edges in particular can take up a considerable amount of memory as compared to the number of nodes. However, rigorous edge storage might not always be essential to be able to draw the needed conclusions. A similar problem takes records with many variables and attempts to extract the most discernible features. It is said that the ``dimension'' of this data is reduced. Following an approach with the same objective in mind, we can map a graph representation to a $k$-dimensional space and answer queries of neighboring nodes mainly by measuring Euclidean distances. The accuracy of our answers would decrease but would be compensated for by fuzzy logic which gives an idea about the likelihood of error. This method allows for reasonable representation in memory while maintaining a fair amount of useful information, and allows for concise embedding in $k$-dimensional Euclidean space as well as solving some problems without having to decompress the graph. Of particular interest is the case where $k=2$. Promising highly accurate experimental results are obtained and reported.
△ Less
Submitted 15 December, 2023; v1 submitted 8 March, 2018;
originally announced March 2018.
-
On the Complexity of Multi-Parameterized Cluster Editing
Authors:
Faisal N. Abu-Khzam
Abstract:
The Cluster Editing problem seeks a transformation of a given undirected graph into a disjoint union of cliques via a minimum number of edge additions or deletions. A multi-parameterized version of the problem is studied, featuring a number of input parameters that bound the amount of both edge-additions and deletions per single vertex, as well as the size of a clique-cluster. We show that the pro…
▽ More
The Cluster Editing problem seeks a transformation of a given undirected graph into a disjoint union of cliques via a minimum number of edge additions or deletions. A multi-parameterized version of the problem is studied, featuring a number of input parameters that bound the amount of both edge-additions and deletions per single vertex, as well as the size of a clique-cluster. We show that the problem remains NP-hard even when only one edge can be deleted and at most two edges can be added per vertex. However, the new formulation allows us to solve Cluster Editing (exactly) in polynomial time when the number of edge-edit operations per vertex is smaller than half the minimum cluster size. In other words, Correlation Clustering can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. As a byproduct, we obtain a kernelization algorithm that delivers linear-size kernels when the two edge-edit bounds are small constants.
△ Less
Submitted 30 November, 2015;
originally announced November 2015.
-
Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-Hoc Networks
Authors:
Faisal N. Abu-Khzam,
Christine Markarian,
Friedhelm Meyer auf der Heide,
Michael Schubert
Abstract:
We consider the problem of dominating set-based virtual backbone used for routing in asymmetric wireless ad-hoc networks. These networks have non-uniform transmission ranges and are modeled using the well-established disk graphs. The corresponding graph theoretic problem seeks a strongly connected dominating-absorbent set of minimum cardinality in a digraph. A subset of nodes in a digraph is a str…
▽ More
We consider the problem of dominating set-based virtual backbone used for routing in asymmetric wireless ad-hoc networks. These networks have non-uniform transmission ranges and are modeled using the well-established disk graphs. The corresponding graph theoretic problem seeks a strongly connected dominating-absorbent set of minimum cardinality in a digraph. A subset of nodes in a digraph is a strongly connected dominating-absorbent set if the subgraph induced by these nodes is strongly connected and each node in the graph is either in the set or has both an in-neighbor and an out-neighbor in it. Distributed algorithms for this problem are of practical significance due to the dynamic nature of ad-hoc networks. We present a first distributed approximation algorithm, with a constant approximation factor and O(Diam) running time, where Diam is the diameter of the graph. Moreover we present a simple heuristic algorithm and conduct an extensive simulation study showing that our heuristic outperforms previously known approaches for the problem.
△ Less
Submitted 7 October, 2015;
originally announced October 2015.
-
On the Complexity of Various Parameterizations of Common Induced Subgraph Isomorphism
Authors:
Faisal N. Abu-Khzam,
Édouard Bonnet,
Florian Sikora
Abstract:
In the Maximum Common Induced Subgraph problem (henceforth MCIS), given two graphs $G_1$ and $G_2$, one looks for a graph with the maximum number of vertices being both an induced subgraph of $G_1$ and $G_2$. MCIS is among the most studied classical NP-hard problems. It remains NP-hard on many graph classes including forests. In this paper, we study the parameterized complexity of MCIS. As a gener…
▽ More
In the Maximum Common Induced Subgraph problem (henceforth MCIS), given two graphs $G_1$ and $G_2$, one looks for a graph with the maximum number of vertices being both an induced subgraph of $G_1$ and $G_2$. MCIS is among the most studied classical NP-hard problems. It remains NP-hard on many graph classes including forests. In this paper, we study the parameterized complexity of MCIS. As a generalization of \textsc{Clique}, it is W[1]-hard parameterized by the size of the solution. Being NP-hard even on forests, most structural parameterizations are intractable. One has to go as far as parameterizing by the size of the minimum vertex cover to get some tractability. Indeed, when parameterized by $k := \text{vc}(G_1)+\text{vc}(G_2)$ the sum of the vertex cover number of the two input graphs, the problem was shown to be fixed-parameter tractable, with an algorithm running in time $2^{O(k \log k)}$. We complement this result by showing that, unless the ETH fails, it cannot be solved in time $2^{o(k \log k)}$. This kind of tight lower bound has been shown for a few problems and parameters but, to the best of our knowledge, not for the vertex cover number. We also show that MCIS does not have a polynomial kernel when parameterized by $k$, unless $NP \subseteq \mathsf{coNP}/poly$. Finally, we study MCIS and its connected variant MCCIS on some special graph classes and with respect to other structural parameters.
△ Less
Submitted 22 February, 2017; v1 submitted 3 December, 2014;
originally announced December 2014.
-
Data Reductions and Combinatorial Bounds for Improved Approximation Algorithms
Authors:
Faisal N. Abu-Khzam,
Cristina Bazgan,
Morgan Chopin,
Henning Fernau
Abstract:
Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of reduction rules and combinatorial insights. We will expose in this paper a similar strategy for obtaining polynomial-time approximation algorithms. Our method features the use of approximation-preserving reductions, akin to the notion of parameterized reductions. We exemplify this method to obta…
▽ More
Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of reduction rules and combinatorial insights. We will expose in this paper a similar strategy for obtaining polynomial-time approximation algorithms. Our method features the use of approximation-preserving reductions, akin to the notion of parameterized reductions. We exemplify this method to obtain the currently best approximation algorithms for \textsc{Harmless Set}, \textsc{Differential} and \textsc{Multiple Nonblocker}, all of them can be considered in the context of securing networks or information propagation.
△ Less
Submitted 12 September, 2014;
originally announced September 2014.
-
A Hybrid Graph Representation for Exact Graph Algorithms
Authors:
Faisal N. Abu-Khzam,
Karim A. Jahed,
Amer E. Mouawad
Abstract:
Many exact search algorithms for NP-hard graph problems adopt the old Davis-Putman branch-and-reduce paradigm. The performance of these algorithms often suffers from the increasing number of graph modifications, such as vertex/edge deletions, that reduce the problem instance and have to be "taken back" frequently during the search process. We investigate practical implementation-based aspects of e…
▽ More
Many exact search algorithms for NP-hard graph problems adopt the old Davis-Putman branch-and-reduce paradigm. The performance of these algorithms often suffers from the increasing number of graph modifications, such as vertex/edge deletions, that reduce the problem instance and have to be "taken back" frequently during the search process. We investigate practical implementation-based aspects of exact graph algorithms by providing a simple hybrid graph representation that trades space for time to address the said take-back challenge. Experiments on three well studied problems show consistent significant improvements over classical methods.
△ Less
Submitted 25 April, 2014;
originally announced April 2014.
-
Partitioning a Graph into Disjoint Cliques and a Triangle-free Graph
Authors:
Faisal N. Abu-Khzam,
Carl Feghali,
Haiko Müller
Abstract:
A graph $G = (V, E)$ is \emph{partitionable} if there exists a partition $\{A, B\}$ of $V$ such that $A$ induces a disjoint union of cliques and $B$ induces a triangle-free graph. In this paper we investigate the computational complexity of deciding whether a graph is partitionable. The problem is known to be $\NP$-complete on arbitrary graphs. Here it is proved that if a graph $G$ is bull-free, p…
▽ More
A graph $G = (V, E)$ is \emph{partitionable} if there exists a partition $\{A, B\}$ of $V$ such that $A$ induces a disjoint union of cliques and $B$ induces a triangle-free graph. In this paper we investigate the computational complexity of deciding whether a graph is partitionable. The problem is known to be $\NP$-complete on arbitrary graphs. Here it is proved that if a graph $G$ is bull-free, planar, perfect, $K_4$-free or does not contain certain holes then deciding whether $G$ is partitionable is $\NP$-complete. This answers an open question posed by Thomass{é}, Trotignon and Vuškovi{ć}. In contrast a finite list of forbidden induced subgraphs is given for partitionable cographs.
△ Less
Submitted 4 January, 2015; v1 submitted 24 March, 2014;
originally announced March 2014.
-
NP-hardness results for partitioning graphs into disjoint cliques and a triangle-free subgraph
Authors:
Carl Feghali,
Faisal N. Abu-Khzam,
Haiko Müller
Abstract:
This paper investigates the computational complexity of deciding whether the vertices of a graph can be partitioned into a disjoint union of cliques and a triangle-free subgraph. This problem is known to be $\NP$-complete on arbitrary graphs. We show that this problem remains $\NP$-complete even when restricted to planar graphs and perfect graphs.
This paper investigates the computational complexity of deciding whether the vertices of a graph can be partitioned into a disjoint union of cliques and a triangle-free subgraph. This problem is known to be $\NP$-complete on arbitrary graphs. We show that this problem remains $\NP$-complete even when restricted to planar graphs and perfect graphs.
△ Less
Submitted 8 April, 2014; v1 submitted 20 March, 2014;
originally announced March 2014.
-
An Easy-to-use Scalable Framework for Parallel Recursive Backtracking
Authors:
Faisal N. Abu-Khzam,
Khuzaima Daudjee,
Amer E. Mouawad,
Naomi Nishimura
Abstract:
Supercomputers are equipped with an increasingly large number of cores to use computational power as a way of solving problems that are otherwise intractable. Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. Many parallel algorithms can scale to only hundreds of cores. The limiting fa…
▽ More
Supercomputers are equipped with an increasingly large number of cores to use computational power as a way of solving problems that are otherwise intractable. Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. Many parallel algorithms can scale to only hundreds of cores. The limiting factors of such algorithms are usually communication overhead and poor load balancing. Solving NP-hard graph problems to optimality using exact algorithms is an example of an area in which there has so far been limited success in obtaining large scale parallelism. Many of these algorithms use recursive backtracking as their core solution paradigm. In this paper, we propose a lightweight, easy-to-use, scalable framework for transforming almost any recursive backtracking algorithm into a parallel one. Our framework incurs minimal communication overhead and guarantees a load-balancing strategy that is implicit, i.e., does not require any problem-specific knowledge. The key idea behind this framework is the use of an indexed search tree approach that is oblivious to the problem being solved. We test our framework with parallel implementations of algorithms for the well-known Vertex Cover and Dominating Set problems. On sufficiently hard instances, experimental results show linear speedups for thousands of cores, reducing running times from days to just a few minutes.
△ Less
Submitted 29 December, 2013;
originally announced December 2013.