-
Bipartizing (Pseudo-)Disk Graphs: Approximation with a Ratio Better than 3
Authors:
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Jie Xue,
Meirav Zehavi
Abstract:
In a disk graph, every vertex corresponds to a disk in $\mathbb{R}^2$ and two vertices are connected by an edge whenever the two corresponding disks intersect. Disk graphs form an important class of geometric intersection graphs, which generalizes both planar graphs and unit-disk graphs. We study a fundamental optimization problem in algorithmic graph theory, Bipartization (also known as Odd Cycle…
▽ More
In a disk graph, every vertex corresponds to a disk in $\mathbb{R}^2$ and two vertices are connected by an edge whenever the two corresponding disks intersect. Disk graphs form an important class of geometric intersection graphs, which generalizes both planar graphs and unit-disk graphs. We study a fundamental optimization problem in algorithmic graph theory, Bipartization (also known as Odd Cycle Transversal), on the class of disk graphs. The goal of Bipartization is to delete a minimum number of vertices from the input graph such that the resulting graph is bipartite. A folklore (polynomial-time) $3$-approximation algorithm for Bipartization on disk graphs follows from the classical framework of Goemans and Williamson [Combinatorica'98] for cycle-hitting problems. For over two decades, this result has remained the best known approximation for the problem (in fact, even for Bipartization on unit-disk graphs). In this paper, we achieve the first improvement upon this result, by giving a $(3-α)$-approximation algorithm for Bipartization on disk graphs, for some constant $α>0$. Our algorithm directly generalizes to the broader class of pseudo-disk graphs. Furthermore, our algorithm is robust in the sense that it does not require a geometric realization of the input graph to be given.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
When far is better: The Chamberlin-Courant approach to obnoxious committee selection
Authors:
Sushmita Gupta,
Tanmay Inamdar,
Pallavi Jain,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh
Abstract:
Classical work on metric space based committee selection problem interprets distance as ``near is better''. In this work, motivated by real-life situations, we interpret distance as ``far is better''. Formally stated, we initiate the study of ``obnoxious'' committee scoring rules when the voters' preferences are expressed via a metric space. To this end, we propose a model where large distances im…
▽ More
Classical work on metric space based committee selection problem interprets distance as ``near is better''. In this work, motivated by real-life situations, we interpret distance as ``far is better''. Formally stated, we initiate the study of ``obnoxious'' committee scoring rules when the voters' preferences are expressed via a metric space. To this end, we propose a model where large distances imply high satisfaction and study the egalitarian avatar of the well-known Chamberlin-Courant voting rule and some of its generalizations. For a given integer value $1 \le λ\le k$, the committee size k, a voter derives satisfaction from only the $λ$-th favorite committee member; the goal is to maximize the satisfaction of the least satisfied voter. For the special case of $λ= 1$, this yields the egalitarian Chamberlin-Courant rule. In this paper, we consider general metric space and the special case of a $d$-dimensional Euclidean space.
We show that when $λ$ is $1$ and $k$, the problem is polynomial-time solvable in $\mathbb{R}^2$ and general metric space, respectively. However, for $λ= k-1$, it is NP-hard even in $\mathbb{R}^2$. Thus, we have ``double-dichotomy'' in $\mathbb{R}^2$ with respect to the value of λ, where the extreme cases are solvable in polynomial time but an intermediate case is NP-hard. Furthermore, this phenomenon appears to be ``tight'' for $\mathbb{R}^2$ because the problem is NP-hard for general metric space, even for $λ=1$. Consequently, we are motivated to explore the problem in the realm of (parameterized) approximation algorithms and obtain positive results. Interestingly, we note that this generalization of Chamberlin-Courant rules encodes practical constraints that are relevant to solutions for certain facility locations.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Solving Quantified Boolean Formulas with Few Existential Variables
Authors:
Leif Eriksson,
Victor Lagerkvist,
George Osipov,
Sebastian Ordyniak,
Fahad Panolan,
Mateusz Rychlicki
Abstract:
The quantified Boolean formula (QBF) problem is an important decision problem generally viewed as the archetype for PSPACE-completeness. Many problems of central interest in AI are in general not included in NP, e.g., planning, model checking, and non-monotonic reasoning, and for such problems QBF has successfully been used as a modelling tool. However, solvers for QBF are not as advanced as state…
▽ More
The quantified Boolean formula (QBF) problem is an important decision problem generally viewed as the archetype for PSPACE-completeness. Many problems of central interest in AI are in general not included in NP, e.g., planning, model checking, and non-monotonic reasoning, and for such problems QBF has successfully been used as a modelling tool. However, solvers for QBF are not as advanced as state of the art SAT solvers, which has prevented QBF from becoming a universal modelling language for PSPACE-complete problems. A theoretical explanation is that QBF (as well as many other PSPACE-complete problems) lacks natural parameters} guaranteeing fixed-parameter tractability (FPT).
In this paper we tackle this problem and consider a simple but overlooked parameter: the number of existentially quantified variables. This natural parameter is virtually unexplored in the literature which one might find surprising given the general scarcity of FPT algorithms for QBF. Via this parameterization we then develop a novel FPT algorithm applicable to QBF instances in conjunctive normal form (CNF) of bounded clause length. We complement this by a W[1]-hardness result for QBF in CNF of unbounded clause length as well as sharper lower bounds for the bounded arity case under the (strong) exponential-time hypothesis.
△ Less
Submitted 10 May, 2024;
originally announced May 2024.
-
Parameterized Algorithms for Minimum Sum Vertex Cover
Authors:
Shubhada Aute,
Fahad Panolan
Abstract:
Minimum sum vertex cover of an $n$-vertex graph $G$ is a bijection $φ: V(G) \to [n]$ that minimizes the cost $\sum_{\{u,v\} \in E(G)} \min \{φ(u), φ(v) \}$. Finding a minimum sum vertex cover of a graph (the MSVC problem) is NP-hard. MSVC is studied well in the realm of approximation algorithms. The best-known approximation factor in polynomial time for the problem is $16/9$ [Bansal, Batra, Farhad…
▽ More
Minimum sum vertex cover of an $n$-vertex graph $G$ is a bijection $φ: V(G) \to [n]$ that minimizes the cost $\sum_{\{u,v\} \in E(G)} \min \{φ(u), φ(v) \}$. Finding a minimum sum vertex cover of a graph (the MSVC problem) is NP-hard. MSVC is studied well in the realm of approximation algorithms. The best-known approximation factor in polynomial time for the problem is $16/9$ [Bansal, Batra, Farhadi, and Tetali, SODA 2021]. Recently, Stankovic [APPROX/RANDOM 2022] proved that achieving an approximation ratio better than $1.014$ for MSVC is NP-hard, assuming the Unique Games Conjecture. We study the MSVC problem from the perspective of parameterized algorithms. The parameters we consider are the size of a minimum vertex cover and the size of a minimum clique modulator of the input graph. We obtain the following results.
1. MSVC can be solved in $2^{2^{O(k)}} n^{O(1)}$ time, where $k$ is the size of a minimum vertex cover.
2. MSVC can be solved in $f(k)\cdot n^{O(1)}$ time for some computable function $f$, where $k$ is the size of a minimum clique modulator.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
Shortest Path with Positive Disjunctive Constraints -- a Parameterized Perspective
Authors:
Susobhan Bandopadhyay,
Suman Banerjee,
Diptapriyo Majumdar,
Fahad Panolan
Abstract:
We study the SHORTEST PATH problem with positive disjunctive constraints from the perspective of parameterized complexity. For positive disjunctive constraints, there are certain pair of edges such that any feasible solution must contain at least one edge from every such pair. In this paper, we initiate the study of SHORTEST PATH problem subject to some positive disjunctive constraints the classic…
▽ More
We study the SHORTEST PATH problem with positive disjunctive constraints from the perspective of parameterized complexity. For positive disjunctive constraints, there are certain pair of edges such that any feasible solution must contain at least one edge from every such pair. In this paper, we initiate the study of SHORTEST PATH problem subject to some positive disjunctive constraints the classical version is known to be NP-Complete. Formally, given an undirected graph G = (V, E) with a forcing graph H = (E, F) such that the vertex set of H is same as the edge set of G. The goal is to find a set S of at most k edges from G such that S forms a vertex cover in H and there is a path from s to t in the subgraph of G induced by the edge set S. In this paper, we consider two natural parameterizations for this problem. One natural parameter is the solution size, i.e. k for which we provide a kernel with O(k^5) vertices when both G and H are general graphs. Additionally, when either G or H (but not both) belongs to some special graph classes, we provied kernelization results with O(k^3) vertices . The other natural parameter we consider is structural properties of H, i.e. the size of a vertex deletion set of H to some special graph classes. We provide some fixed-parameter tractability results for those structural parameterizations.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Meta-theorems for Parameterized Streaming Algorithms
Authors:
Daniel Lokshtanov,
Pranabendu Misra,
Fahad Panolan,
M. S. Ramanujan,
Saket Saurabh,
Meirav Zehavi
Abstract:
The streaming model was introduced to parameterized complexity independently by Fafianie and Kratsch [MFCS14] and by Chitnis, Cormode, Hajiaghayi and Monemizadeh [SODA15]. Subsequently, it was broadened by Chitnis, Cormode, Esfandiari, Hajiaghayi and Monemizadeh [SPAA15] and by Chitnis, Cormode, Esfandiari, Hajiaghayi, McGregor, Monemizadeh and Vorotnikova [SODA16]. Despite its strong motivation,…
▽ More
The streaming model was introduced to parameterized complexity independently by Fafianie and Kratsch [MFCS14] and by Chitnis, Cormode, Hajiaghayi and Monemizadeh [SODA15]. Subsequently, it was broadened by Chitnis, Cormode, Esfandiari, Hajiaghayi and Monemizadeh [SPAA15] and by Chitnis, Cormode, Esfandiari, Hajiaghayi, McGregor, Monemizadeh and Vorotnikova [SODA16]. Despite its strong motivation, the applicability of the streaming model to central problems in parameterized complexity has remained, for almost a decade, quite limited. Indeed, due to simple $Ω(n)$-space lower bounds for many of these problems, the $k^{O(1)}\cdot {\rm polylog}(n)$-space requirement in the model is too strict.
Thus, we explore {\em semi-streaming} algorithms for parameterized graph problems, and present the first systematic study of this topic. Crucially, we aim to construct succinct representations of the input on which optimal post-processing time complexity can be achieved.
- We devise meta-theorems specifically designed for parameterized streaming and demonstrate their applicability by obtaining the first $k^{O(1)}\cdot n\cdot {\rm polylog}(n)$-space streaming algorithms for well-studied problems such as Feedback Vertex Set on Tournaments, Cluster Vertex Deletion, Proper Interval Vertex Deletion and Block Vertex Deletion. In the process, we demonstrate a fundamental connection between semi-streaming algorithms for recognizing graphs in a graph class H and semi-streaming algorithms for the problem of vertex deletion into H.
- We present an algorithmic machinery for obtaining streaming algorithms for cut problems and exemplify this by giving the first $k^{O(1)}\cdot n\cdot {\rm polylog}(n)$-space streaming algorithms for Graph Bipartitization, Multiway Cut and Subset Feedback Vertex Set.
△ Less
Submitted 3 August, 2023;
originally announced August 2023.
-
Efficient Approximation for Subgraph-Hitting Problems in Sparse Graphs and Geometric Intersection Graphs
Authors:
Zdeněk Dvořák,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Jie Xue,
Meirav Zehavi
Abstract:
We investigate a fundamental vertex-deletion problem called (Induced) Subgraph Hitting: given a graph $G$ and a set $\mathcal{F}$ of forbidden graphs, the goal is to compute a minimum-sized set $S$ of vertices of $G$ such that $G-S$ does not contain any graph in $\mathcal{F}$ as an (induced) subgraph. This is a generic problem that encompasses many well-known problems that were extensively studied…
▽ More
We investigate a fundamental vertex-deletion problem called (Induced) Subgraph Hitting: given a graph $G$ and a set $\mathcal{F}$ of forbidden graphs, the goal is to compute a minimum-sized set $S$ of vertices of $G$ such that $G-S$ does not contain any graph in $\mathcal{F}$ as an (induced) subgraph. This is a generic problem that encompasses many well-known problems that were extensively studied on their own, particularly (but not only) from the perspectives of both approximation and parameterization.
In this paper, we study the approximability of the problem on a large variety of graph classes. Our first result is a linear-time $(1+\varepsilon)$-approximation reduction from (Induced) Subgraph Hitting on any graph class $\mathcal{G}$ of bounded expansion to the same problem on bounded degree graphs within $\mathcal{G}$. This directly yields linear-size $(1+\varepsilon)$-approximation lossy kernels for the problems on any bounded-expansion graph classes. Our second result is a linear-time approximation scheme for (Induced) Subgraph Hitting on any graph class $\mathcal{G}$ of polynomial expansion, based on the local-search framework of Har-Peled and Quanrud [SICOMP 2017]. This approximation scheme can be applied to a more general family of problems that aim to hit all subgraphs satisfying a certain property $π$ that is efficiently testable and has bounded diameter. Both of our results have applications to Subgraph Hitting (not induced) on wide classes of geometric intersection graphs, resulting in linear-size lossy kernels and (near-)linear time approximation schemes for the problem.
△ Less
Submitted 3 December, 2023; v1 submitted 26 April, 2023;
originally announced April 2023.
-
A Framework for Approximation Schemes on Disk Graphs
Authors:
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Jie Xue,
Meirav Zehavi
Abstract:
We initiate a systematic study of approximation schemes for fundamental optimization problems on disk graphs, a common generalization of both planar graphs and unit-disk graphs. Our main contribution is a general framework for designing efficient polynomial-time approximation schemes (EPTASes) for vertex-deletion problems on disk graphs, which results in EPTASes for many problems including Vertex…
▽ More
We initiate a systematic study of approximation schemes for fundamental optimization problems on disk graphs, a common generalization of both planar graphs and unit-disk graphs. Our main contribution is a general framework for designing efficient polynomial-time approximation schemes (EPTASes) for vertex-deletion problems on disk graphs, which results in EPTASes for many problems including Vertex Cover, Feedback Vertex Set, Small Cycle Hitting (in particular, Triangle Hitting), $P_k$-Hitting for $k\in\{3,4,5\}$, Path Deletion, Pathwidth $1$-Deletion, Component Order Connectivity, Bounded Degree Deletion, Pseudoforest Deletion, Finite-Type Component Deletion, etc. All EPTASes obtained using our framework are robust in the sense that they do not require a realization of the input graph. To the best of our knowledge, prior to this work, the only problems known to admit (E)PTASes on disk graphs are Maximum Clique, Independent Set, Dominating set, and Vertex Cover, among which the existing PTAS [Erlebach et al., SICOMP'05] and EPTAS [Leeuwen, SWAT'06] for Vertex Cover require a realization of the input disk graph (while ours does not).
The core of our framework is a reduction for a broad class of (approximation) vertex-deletion problems from (general) disk graphs to disk graphs of bounded local radius, which is a new invariant of disk graphs introduced in this work. Disk graphs of bounded local radius can be viewed as a mild generalization of planar graphs, which preserves certain nice properties of planar graphs. Specifically, we prove that disk graphs of bounded local radius admit the Excluded Grid Minor property and have locally bounded treewidth. This allows existing techniques for designing approximation schemes on planar graphs (e.g., bidimensionality and Baker's technique) to be directly applied to disk graphs of bounded local radius.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
Boolean and $\mathbb{F}_p$-Matrix Factorization: From Theory to Practice
Authors:
Fedor Fomin,
Fahad Panolan,
Anurag Patil,
Adil Tanveer
Abstract:
Boolean Matrix Factorization (BMF) aims to find an approximation of a given binary matrix as the Boolean product of two low-rank binary matrices. Binary data is ubiquitous in many fields, and representing data by binary matrices is common in medicine, natural language processing, bioinformatics, computer graphics, among many others. Unfortunately, BMF is computationally hard and heuristic algorith…
▽ More
Boolean Matrix Factorization (BMF) aims to find an approximation of a given binary matrix as the Boolean product of two low-rank binary matrices. Binary data is ubiquitous in many fields, and representing data by binary matrices is common in medicine, natural language processing, bioinformatics, computer graphics, among many others. Unfortunately, BMF is computationally hard and heuristic algorithms are used to compute Boolean factorizations. Very recently, the theoretical breakthrough was obtained independently by two research groups. Ban et al. (SODA 2019) and Fomin et al. (Trans. Algorithms 2020) show that BMF admits an efficient polynomial-time approximation scheme (EPTAS). However, despite the theoretical importance, the high double-exponential dependence of the running times from the rank makes these algorithms unimplementable in practice. The primary research question motivating our work is whether the theoretical advances on BMF could lead to practical algorithms.
The main conceptional contribution of our work is the following. While EPTAS for BMF is a purely theoretical advance, the general approach behind these algorithms could serve as the basis in designing better heuristics. We also use this strategy to develop new algorithms for related $\mathbb{F}_p$-Matrix Factorization. Here, given a matrix $A$ over a finite field GF($p$) where $p$ is a prime, and an integer $r$, our objective is to find a matrix $B$ over the same field with GF($p$)-rank at most $r$ minimizing some norm of $A-B$. Our empirical research on synthetic and real-world data demonstrates the advantage of the new algorithms over previous works on BMF and $\mathbb{F}_p$-Matrix Factorization.
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
Partial Vertex Cover on Graphs of Bounded Degeneracy
Authors:
Fahad Panolan,
Hannane Yaghoubizade
Abstract:
In the Partial Vertex Cover (PVC) problem, we are given an $n$-vertex graph $G$ and a positive integer $k$, and the objective is to find a vertex subset $S$ of size $k$ maximizing the number of edges with at least one end-point in $S$. This problem is W[1]-hard on general graphs, but admits a parameterized subexponential time algorithm with running time $2^{O(\sqrt{k})}n^{O(1)}$ on planar and apex…
▽ More
In the Partial Vertex Cover (PVC) problem, we are given an $n$-vertex graph $G$ and a positive integer $k$, and the objective is to find a vertex subset $S$ of size $k$ maximizing the number of edges with at least one end-point in $S$. This problem is W[1]-hard on general graphs, but admits a parameterized subexponential time algorithm with running time $2^{O(\sqrt{k})}n^{O(1)}$ on planar and apex-minor free graphs [Fomin et al. (FSTTCS 2009, IPL 2011)], and a $k^{O(k)}n^{O(1)}$ time algorithm on bounded degeneracy graphs [Amini et al. (FSTTCS 2009, JCSS 2011)]. Graphs of bounded degeneracy contain many sparse graph classes like planar graphs, $H$-minor free graphs, and bounded tree-width graphs. In this work, we prove the following results:
1) There is an algorithm for PVC with running time $2^{O(k)}n^{O(1)}$ on graphs of bounded degeneracy which is an improvement on the previous $k^{O(k)}n^{O(1)}$ time algorithm by Amini et al.
2) PVC admits a polynomial compression on graphs of bounded degeneracy, resolving an open problem posed by Amini et al.
△ Less
Submitted 11 January, 2022;
originally announced January 2022.
-
Deleting, Eliminating and Decomposing to Hereditary Classes Are All FPT-Equivalent
Authors:
Akanksha Agrawal,
Lawqueen Kanesh,
Daniel Lokshtanov,
Fahad Panolan,
M. S. Ramanujan,
Saket Saurabh,
Meirav Zehavi
Abstract:
For a graph class ${\cal H}$, the graph parameters elimination distance to ${\cal H}$ (denoted by ${\bf ed}_{\cal H}$) [Bulian and Dawar, Algorithmica, 2016], and ${\cal H}$-treewidth (denoted by ${\bf tw}_{\cal H}$) [Eiben et al. JCSS, 2021] aim to minimize the treedepth and treewidth, respectively, of the "torso" of the graph induced on a modulator to the graph class ${\cal H}$. Here, the torso…
▽ More
For a graph class ${\cal H}$, the graph parameters elimination distance to ${\cal H}$ (denoted by ${\bf ed}_{\cal H}$) [Bulian and Dawar, Algorithmica, 2016], and ${\cal H}$-treewidth (denoted by ${\bf tw}_{\cal H}$) [Eiben et al. JCSS, 2021] aim to minimize the treedepth and treewidth, respectively, of the "torso" of the graph induced on a modulator to the graph class ${\cal H}$. Here, the torso of a vertex set $S$ in a graph $G$ is the graph with vertex set $S$ and an edge between two vertices $u, v \in S$ if there is a path between $u$ and $v$ in $G$ whose internal vertices all lie outside $S$.
In this paper, we show that from the perspective of (non-uniform) fixed-parameter tractability (FPT), the three parameters described above give equally powerful parameterizations for every hereditary graph class ${\cal H}$ that satisfies mild additional conditions. In fact, we show that for every hereditary graph class ${\cal H}$ satisfying mild additional conditions, with the exception of ${\bf tw}_{\cal H}$ parameterized by ${\bf ed}_{\cal H}$, for every pair of these parameters, computing one parameterized by itself or any of the others is FPT-equivalent to the standard vertex-deletion (to ${\cal H}$) problem. As an example, we prove that an FPT algorithm for the vertex-deletion problem implies a non-uniform FPT algorithm for computing ${\bf ed}_{\cal H}$ and ${\bf tw}_{\cal H}$.
The conclusions of non-uniform FPT algorithms being somewhat unsatisfactory, we essentially prove that if ${\cal H}$ is hereditary, union-closed, CMSO-definable, and (a) the canonical equivalence relation (or any refinement thereof) for membership in the class can be efficiently computed, or (b) the class admits a "strong irrelevant vertex rule", then there exists a uniform FPT algorithm for ${\bf ed}_{\cal H}$.
△ Less
Submitted 6 January, 2022; v1 submitted 20 April, 2021;
originally announced April 2021.
-
Gerrymandering on graphs: Computational complexity and parameterized algorithms
Authors:
Sushmita Gupta,
Pallavi Jain,
Fahad Panolan,
Sanjukta Roy,
Saket Saurabh
Abstract:
Partitioning a region into districts to favor a particular candidate or a party is commonly known as gerrymandering. In this paper, we investigate the gerrymandering problem in graph theoretic setting as proposed by Cohen-Zemach et al. [AAMAS 2018]. Our contributions in this article are two-fold, conceptual and computational. We first resolve the open question posed by Ito et al. [AAMAS 2019] abou…
▽ More
Partitioning a region into districts to favor a particular candidate or a party is commonly known as gerrymandering. In this paper, we investigate the gerrymandering problem in graph theoretic setting as proposed by Cohen-Zemach et al. [AAMAS 2018]. Our contributions in this article are two-fold, conceptual and computational. We first resolve the open question posed by Ito et al. [AAMAS 2019] about the computational complexity of the problem when the input graph is a path. Next, we propose a generalization of their model, where the input consists of a graph on $n$ vertices representing the set of voters, a set of $m$ candidates $\mathcal{C}$, a weight function $w_v: \mathcal{C}\rightarrow {\mathbb Z}^+$ for each voter $v\in V(G)$ representing the preference of the voter over the candidates, a distinguished candidate $p\in \mathcal{C}$, and a positive integer $k$. The objective is to decide if one can partition the vertex set into $k$ pairwise disjoint connected sets (districts) s.t $p$ wins more districts than any other candidate. The problem is known to be NPC even if $k=2$, $m=2$, and $G$ is either a complete bipartite graph (in fact $K_{2,n}$) or a complete graph. This means that in search for FPT algorithms we need to either focus on the parameter $n$, or subclasses of forest. Circumventing these intractable results, we give a deterministic and a randomized algorithms for the problem on paths running in times $2.619^{k}(n+m)^{O(1)}$ and $2^{k}(n+m)^{O(1)}$, respectively. Additionally, we prove that the problem on general graphs is solvable in time $2^n (n+m)^{O(1)}$. Our algorithmic results use sophisticated technical tools such as representative set family and Fast Fourier transform based polynomial multiplication, and their (possibly first) application to problems arising in social choice theory and/or game theory may be of independent interest to the community.
△ Less
Submitted 25 May, 2021; v1 submitted 19 February, 2021;
originally announced February 2021.
-
Diverse Collections in Matroids and Graphs
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Fahad Panolan,
Geevarghese Philip,
Saket Saurabh
Abstract:
We investigate the parameterized complexity of finding diverse sets of solutions to three fundamental combinatorial problems, two from the theory of matroids and the third from graph theory. The input to the Weighted Diverse Bases problem consists of a matroid $M$, a weight function $ω:E(M)\to\mathbb{N}$, and integers $k\geq 1, d\geq 0$. The task is to decide if there is a collection of $k$ bases…
▽ More
We investigate the parameterized complexity of finding diverse sets of solutions to three fundamental combinatorial problems, two from the theory of matroids and the third from graph theory. The input to the Weighted Diverse Bases problem consists of a matroid $M$, a weight function $ω:E(M)\to\mathbb{N}$, and integers $k\geq 1, d\geq 0$. The task is to decide if there is a collection of $k$ bases $B_{1}, \dotsc, B_{k}$ of $M$ such that the weight of the symmetric difference of any pair of these bases is at least $d$. This is a diverse variant of the classical matroid base packing problem. The input to the Weighted Diverse Common Independent Sets problem consists of two matroids $M_{1},M_{2}$ defined on the same ground set $E$, a weight function $ω:E\to\mathbb{N}$, and integers $k\geq 1, d\geq 0$. The task is to decide if there is a collection of $k$ common independent sets $I_{1}, \dotsc, I_{k}$ of $M_{1}$ and $M_{2}$ such that the weight of the symmetric difference of any pair of these sets is at least $d$. This is motivated by the classical weighted matroid intersection problem. The input to the Diverse Perfect Matchings problem consists of a graph $G$ and integers $k\geq 1, d\geq 0$. The task is to decide if $G$ contains $k$ perfect matchings $M_{1},\dotsc,M_{k}$ such that the symmetric difference of any two of these matchings is at least $d$.
We show that Weighted Diverse Bases and Weighted Diverse Common Independent Sets are both NP-hard, and derive fixed-parameter tractable (FPT) algorithms for all three problems with $(k,d)$ as the parameter.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
EPTAS for $k$-means Clustering of Affine Subspaces
Authors:
Eduard Eiben,
Fedor V. Fomin,
Petr A. Golovach,
William Lochet,
Fahad Panolan,
Kirill Simonov
Abstract:
We consider a generalization of the fundamental $k$-means clustering for data with incomplete or corrupted entries. When data objects are represented by points in $\mathbb{R}^d$, a data point is said to be incomplete when some of its entries are missing or unspecified. An incomplete data point with at most $Δ$ unspecified entries corresponds to an axis-parallel affine subspace of dimension at most…
▽ More
We consider a generalization of the fundamental $k$-means clustering for data with incomplete or corrupted entries. When data objects are represented by points in $\mathbb{R}^d$, a data point is said to be incomplete when some of its entries are missing or unspecified. An incomplete data point with at most $Δ$ unspecified entries corresponds to an axis-parallel affine subspace of dimension at most $Δ$, called a $Δ$-point. Thus we seek a partition of $n$ input $Δ$-points into $k$ clusters minimizing the $k$-means objective. For $Δ=0$, when all coordinates of each point are specified, this is the usual $k$-means clustering. We give an algorithm that finds an $(1+ ε)$-approximate solution in time $f(k,ε, Δ) \cdot n^2 \cdot d$ for some function $f$ of $k,ε$, and $Δ$ only.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Improved FPT Algorithms for Deletion to Forest-like Structures
Authors:
Kishen N. Gowda,
Aditya Lonkar,
Fahad Panolan,
Vraj Patel,
Saket Saurabh
Abstract:
The Feedback Vertex Set problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph $G$ and a non-negative integer $k$, the objective is to test whether there exists a subset $S\subseteq V(G)$ of size at most $k$ such that $G-S$ is a forest. After a long line of improvement, recently, Li and Nederlof [SODA, 2020] designed a r…
▽ More
The Feedback Vertex Set problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph $G$ and a non-negative integer $k$, the objective is to test whether there exists a subset $S\subseteq V(G)$ of size at most $k$ such that $G-S$ is a forest. After a long line of improvement, recently, Li and Nederlof [SODA, 2020] designed a randomized algorithm for the problem running in time $\mathcal{O}^{\star}(2.7^k)$. In the Parameterized Complexity literature, several problems around Feedback Vertex Set have been studied. Some of these include Independent Feedback Vertex Set (where the set $S$ should be an independent set in $G$), Almost Forest Deletion and Pseudoforest Deletion. In Pseudoforest Deletion, each connected component in $G-S$ has at most one cycle in it. However, in Almost Forest Deletion, the input is a graph $G$ and non-negative integers $k,\ell \in \mathbb{N}$, and the objective is to test whether there exists a vertex subset $S$ of size at most $k$, such that $G-S$ is $\ell$ edges away from a forest. In this paper, using the methodology of Li and Nederlof [SODA, 2020], we obtain the current fastest algorithms for all these problems. In particular we obtain following randomized algorithms.
1) Independent Feedback Vertex Set can be solved in time $\mathcal{O}^{\star}(2.7^k)$.
2) Pseudo Forest Deletion can be solved in time $\mathcal{O}^{\star}(2.85^k)$.
3) Almost Forest Deletion can be solved in $\mathcal{O}^{\star}(\min\{2.85^k \cdot 8.54^\ell,2.7^k \cdot 36.61^\ell,3^k \cdot 1.78^\ell\})$.
△ Less
Submitted 26 September, 2020;
originally announced September 2020.
-
ETH-Tight Algorithms for Long Path and Cycle on Unit Disk Graphs
Authors:
Fedor V. Fomin,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Meirav Zehavi
Abstract:
We present an algorithm for the extensively studied Long Path and Long Cycle problems on unit disk graphs that runs in time $2^{O(\sqrt{k})}(n+m)$. Under the Exponential Time Hypothesis, Long Path and Long Cycle on unit disk graphs cannot be solved in time $2^{o(\sqrt{k})}(n+m)^{O(1)}$ [de Berg et al., STOC 2018], hence our algorithm is optimal. Besides the $2^{O(\sqrt{k})}(n+m)^{O(1)}$-time algor…
▽ More
We present an algorithm for the extensively studied Long Path and Long Cycle problems on unit disk graphs that runs in time $2^{O(\sqrt{k})}(n+m)$. Under the Exponential Time Hypothesis, Long Path and Long Cycle on unit disk graphs cannot be solved in time $2^{o(\sqrt{k})}(n+m)^{O(1)}$ [de Berg et al., STOC 2018], hence our algorithm is optimal. Besides the $2^{O(\sqrt{k})}(n+m)^{O(1)}$-time algorithm for the (arguably) much simpler Vertex Cover problem by de Berg et al. [STOC 2018] (which easily follows from the existence of a $2k$-vertex kernel for the problem), this is the only known ETH-optimal fixed-parameter tractable algorithm on UDGs. Previously, Long Path and Long Cycle on unit disk graphs were only known to be solvable in time $2^{O(\sqrt{k}\log k)}(n+m)$. This algorithm involved the introduction of a new type of a tree decomposition, entailing the design of a very tedious dynamic programming procedure. Our algorithm is substantially simpler: we completely avoid the use of this new type of tree decomposition. Instead, we use a marking procedure to reduce the problem to (a weighted version of) itself on a standard tree decomposition of width $O(\sqrt{k})$.
△ Less
Submitted 2 March, 2020;
originally announced March 2020.
-
Structural Parameterizations with Modulator Oblivion
Authors:
Ashwin Jacob,
Fahad Panolan,
Venkatesh Raman,
Vibha Sahlot
Abstract:
It is known that problems like Vertex Cover, Feedback Vertex Set and Odd Cycle Transversal are polynomial time solvable in the class of chordal graphs. We consider these problems in a graph that has at most $k$ vertices whose deletion results in a chordal graph, when parameterized by $k$. While this investigation fits naturally into the recent trend of what are called `structural parameterizations…
▽ More
It is known that problems like Vertex Cover, Feedback Vertex Set and Odd Cycle Transversal are polynomial time solvable in the class of chordal graphs. We consider these problems in a graph that has at most $k$ vertices whose deletion results in a chordal graph, when parameterized by $k$. While this investigation fits naturally into the recent trend of what are called `structural parameterizations', here we assume that the deletion set is not given.
One method to solve them is to compute a $k$-sized or an approximate ($f(k)$ sized, for a function $f$) chordal vertex deletion set and then use the structural properties of the graph to design an algorithm. This method leads to at least $k^{\mathcal{O}(k)}n^{\mathcal{O}(1)}$ running time when we use the known parameterized or approximation algorithms for finding a $k$-sized chordal deletion set on an $n$ vertex graph.
In this work, we design $2^{\mathcal{O}(k)}n^{\mathcal{O}(1)}$ time algorithms for these problems. Our algorithms do not compute a chordal vertex deletion set (or even an approximate solution). Instead, we construct a tree decomposition of the given graph in time $2^{\mathcal{O}(k)}n^{\mathcal{O}(1)}$ where each bag is a union of four cliques and $\mathcal{O}(k)$ vertices. We then apply standard dynamic programming algorithms over this special tree decomposition. This special tree decomposition can be of independent interest.
Our algorithms are adaptive (robust) in the sense that given an integer $k$, they detect whether the graph has a chordal vertex deletion set of size at most $k$ or output the special tree decomposition and solve the problem.
We also show lower bounds for the problems we deal with under the Strong Exponential Time Hypothesis (SETH).
△ Less
Submitted 23 February, 2020;
originally announced February 2020.
-
Manipulating Districts to Win Elections: Fine-Grained Complexity
Authors:
Eduard Eiben,
Fedor V. Fomin,
Fahad Panolan,
Kirill Simonov
Abstract:
Gerrymandering is a practice of manipulating district boundaries and locations in order to achieve a political advantage for a particular party. Lewenberg, Lev, and Rosenschein [AAMAS 2017] initiated the algorithmic study of a geographically-based manipulation problem, where voters must vote at the ballot box closest to them. In this variant of gerrymandering, for a given set of possible locations…
▽ More
Gerrymandering is a practice of manipulating district boundaries and locations in order to achieve a political advantage for a particular party. Lewenberg, Lev, and Rosenschein [AAMAS 2017] initiated the algorithmic study of a geographically-based manipulation problem, where voters must vote at the ballot box closest to them. In this variant of gerrymandering, for a given set of possible locations of ballot boxes and known political preferences of $n$ voters, the task is to identify locations for $k$ boxes out of $m$ possible locations to guarantee victory of a certain party in at least $l$ districts. Here integers $k$ and $l$ are some selected parameter.
It is known that the problem is NP-complete already for 4 political parties and prior to our work only heuristic algorithms for this problem were developed. We initiate the rigorous study of the gerrymandering problem from the perspectives of parameterized and fine-grained complexity and provide asymptotically matching lower and upper bounds on its computational complexity. We prove that the problem is W[1]-hard parameterized by $k+n$ and that it does not admit an $f(n,k)\cdot m^{o(\sqrt{k})}$ algorithm for any function $f$ of $k$ and $n$ only, unless Exponential Time Hypothesis (ETH) fails. Our lower bounds hold already for $2$ parties. On the other hand, we give an algorithm that solves the problem for a constant number of parties in time $(m+n)^{O(\sqrt{k})}$.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
On the Parameterized Complexity of Reconfiguration of Connected Dominating Sets
Authors:
Daniel Lokshtanov,
Amer E. Mouawad,
Fahad Panolan,
Sebastian Siebertz
Abstract:
In a reconfiguration version of an optimization problem $\mathcal{Q}$ the input is an instance of $\mathcal{Q}$ and two feasible solutions $S$ and $T$. The objective is to determine whether there exists a step-by-step transformation between $S$ and $T$ such that all intermediate steps also constitute feasible solutions. In this work, we study the parameterized complexity of the \textsc{Connected D…
▽ More
In a reconfiguration version of an optimization problem $\mathcal{Q}$ the input is an instance of $\mathcal{Q}$ and two feasible solutions $S$ and $T$. The objective is to determine whether there exists a step-by-step transformation between $S$ and $T$ such that all intermediate steps also constitute feasible solutions. In this work, we study the parameterized complexity of the \textsc{Connected Dominating Set Reconfiguration} problem (\textsc{CDS-R)}. It was shown in previous work that the \textsc{Dominating Set Reconfiguration} problem (\textsc{DS-R}) parameterized by $k$, the maximum allowed size of a dominating set in a reconfiguration sequence, is fixed-parameter tractable on all graphs that exclude a biclique $K_{d,d}$ as a subgraph, for some constant $d \geq 1$. We show that the additional connectivity constraint makes the problem much harder, namely, that \textsc{CDS-R} is \textsf{W}$[1]$-hard parameterized by $k+\ell$, the maximum allowed size of a dominating set plus the length of the reconfiguration sequence, already on $5$-degenerate graphs. On the positive side, we show that \textsc{CDS-R} parameterized by $k$ is fixed-parameter tractable, and in fact admits a polynomial kernel on planar graphs.
△ Less
Submitted 1 October, 2019;
originally announced October 2019.
-
Refined Complexity of PCA with Outliers
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Fahad Panolan,
Kirill Simonov
Abstract:
Principal component analysis (PCA) is one of the most fundamental procedures in exploratory data analysis and is the basic step in applications ranging from quantitative finance and bioinformatics to image analysis and neuroscience. However, it is well-documented that the applicability of PCA in many real scenarios could be constrained by an "immune deficiency" to outliers such as corrupted observ…
▽ More
Principal component analysis (PCA) is one of the most fundamental procedures in exploratory data analysis and is the basic step in applications ranging from quantitative finance and bioinformatics to image analysis and neuroscience. However, it is well-documented that the applicability of PCA in many real scenarios could be constrained by an "immune deficiency" to outliers such as corrupted observations. We consider the following algorithmic question about the PCA with outliers. For a set of $n$ points in $\mathbb{R}^{d}$, how to learn a subset of points, say 1% of the total number of points, such that the remaining part of the points is best fit into some unknown $r$-dimensional subspace? We provide a rigorous algorithmic analysis of the problem. We show that the problem is solvable in time $n^{O(d^2)}$. In particular, for constant dimension the problem is solvable in polynomial time. We complement the algorithmic result by the lower bound, showing that unless Exponential Time Hypothesis fails, in time $f(d)n^{o(d)}$, for any function $f$ of $d$, it is impossible not only to solve the problem exactly but even to approximate it within a constant factor.
△ Less
Submitted 10 May, 2019;
originally announced May 2019.
-
Low-rank binary matrix approximation in column-sum norm
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Fahad Panolan,
Kirill Simonov
Abstract:
We consider $\ell_1$-Rank-$r$ Approximation over GF(2), where for a binary $m\times n$ matrix ${\bf A}$ and a positive integer $r$, one seeks a binary matrix ${\bf B}$ of rank at most $r$, minimizing the column-sum norm $||{\bf A} -{\bf B}||_1$. We show that for every $\varepsilon\in (0, 1)$, there is a randomized $(1+\varepsilon)$-approximation algorithm for $\ell_1$-Rank-$r$ Approximation over G…
▽ More
We consider $\ell_1$-Rank-$r$ Approximation over GF(2), where for a binary $m\times n$ matrix ${\bf A}$ and a positive integer $r$, one seeks a binary matrix ${\bf B}$ of rank at most $r$, minimizing the column-sum norm $||{\bf A} -{\bf B}||_1$. We show that for every $\varepsilon\in (0, 1)$, there is a randomized $(1+\varepsilon)$-approximation algorithm for $\ell_1$-Rank-$r$ Approximation over GF(2) of running time $m^{O(1)}n^{O(2^{4r}\cdot \varepsilon^{-4})}$. This is the first polynomial time approximation scheme (PTAS) for this problem.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.
-
Hitting Topological Minors is FPT
Authors:
Fedor V. Fomin,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Meirav Zehavi
Abstract:
In the Topological Minor Deletion (TM-Deletion) problem input consists of an undirected graph $G$, a family of undirected graphs ${\cal F}$ and an integer $k$. The task is to determine whether $G$ contains a set of vertices $S$ of size at most $k$, such that the graph $G\setminus S$ obtained from $G$ by removing the vertices of $S$, contains no graph from ${\cal F}$ as a topological minor. We give…
▽ More
In the Topological Minor Deletion (TM-Deletion) problem input consists of an undirected graph $G$, a family of undirected graphs ${\cal F}$ and an integer $k$. The task is to determine whether $G$ contains a set of vertices $S$ of size at most $k$, such that the graph $G\setminus S$ obtained from $G$ by removing the vertices of $S$, contains no graph from ${\cal F}$ as a topological minor. We give an algorithm for TM-Deletionwith running time $f(h^\star,k)\cdot |V(G)|^{4}$. Here $h^\star$ is the maximum size of a graph in ${\cal F}$ and $f$ is a computable function of $h^\star$ and $k$. This is the first fixed parameter tractable algorithm (FPT) for the problem. In fact, even for the restricted case of planar inputs the first FPT algorithm was found only recently by Golovach et al. [SODA 2020]. For this case we improve upon the algorithm of Golovach et al. [SODA 2020] by designing an FPT algorithm with explicit dependence on $k$ and $h^\star$.
△ Less
Submitted 7 January, 2020; v1 submitted 5 April, 2019;
originally announced April 2019.
-
Decomposition of Map Graphs with Applications
Authors:
Fedor V. Fomin,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Meirav Zehavi
Abstract:
Bidimensionality is the most common technique to design subexponential-time parameterized algorithms on special classes of graphs, particularly planar graphs. The core engine behind it is a combinatorial lemma of Robertson, Seymour and Thomas that states that every planar graph either has a $\sqrt{k}\times \sqrt{k}$-grid as a minor, or its treewidth is $O(\sqrt{k})$. However, bidimensionality theo…
▽ More
Bidimensionality is the most common technique to design subexponential-time parameterized algorithms on special classes of graphs, particularly planar graphs. The core engine behind it is a combinatorial lemma of Robertson, Seymour and Thomas that states that every planar graph either has a $\sqrt{k}\times \sqrt{k}$-grid as a minor, or its treewidth is $O(\sqrt{k})$. However, bidimensionality theory cannot be extended directly to several well-known classes of geometric graphs. Nevertheless, a relaxation of this lemma has been proven useful for unit disk graphs. Inspired by this, we prove a new decomposition lemma for map graphs. Informally, our lemma states the following. For any map graph $G$, there exists a collection $(U_1,\ldots,U_t)$ of cliques of $G$ with the following property: $G$ either contains a $\sqrt{k}\times \sqrt{k}$-grid as a minor, or it admits a tree decomposition where every bag is the union of $O(\sqrt{k})$ of the cliques in the above collection. The new lemma appears to be a handy tool in the design of subexponential parameterized algorithms on map graphs. We demonstrate its usability by designing algorithms on map graphs with running time $2^{O({\sqrt{k}\log{k}})} \cdot n^{O(1)}$ for the Connected Planar $\cal F$-Deletion problem (that encompasses problems such as Feedback Vertex Set and Vertex Cover). Obtaining subexponential algorithms for Longest Cycle/Path and Cycle Packing is more challenging. We have to construct tree decompositions with more powerful properties and to prove sublinear bounds on the number of ways an optimum solution could "cross" bags in these decompositions.
For Longest Cycle/Path, these are the first subexponential-time parameterized algorithms on map graphs. For Feedback Vertex Set and Cycle Packing, we improve upon known $2^{O({k^{0.75}\log{k}})} \cdot n^{O(1)}$-time algorithms on map graphs.
△ Less
Submitted 4 March, 2019;
originally announced March 2019.
-
Going Far From Degeneracy
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Meirav Zehavi
Abstract:
An undirected graph G is d-degenerate if every subgraph of G has a vertex of degree at most d. By the classical theorem of Erdős and Gallai from 1959, every graph of degeneracy d>1 contains a cycle of length at least d+1. The proof of Erdős and Gallai is constructive and can be turned into a polynomial time algorithm constructing a cycle of length at least d+1. But can we decide in polynomial time…
▽ More
An undirected graph G is d-degenerate if every subgraph of G has a vertex of degree at most d. By the classical theorem of Erdős and Gallai from 1959, every graph of degeneracy d>1 contains a cycle of length at least d+1. The proof of Erdős and Gallai is constructive and can be turned into a polynomial time algorithm constructing a cycle of length at least d+1. But can we decide in polynomial time whether a graph contains a cycle of length at least d+2? An easy reduction from Hamiltonian Cycle provides a negative answer to this question: deciding whether a graph has a cycle of length at least d+2 is NP-complete. Surprisingly, the complexity of the problem changes drastically when the input graph is 2-connected. In this case we prove that deciding whether G contains a cycle of length at least d+k can be done in time 2^{O(k)}|V(G)|^{O(1)}. In other words, deciding whether a 2-connected n-vertex G contains a cycle of length at least d+log n can be done in polynomial time.
Similar algorithmic results hold for long paths in graphs. We observe that deciding whether a graph has a path of length at least d+1 is NP-complete. However, we prove that if graph G is connected, then deciding whether G contains a path of length at least d+k can be done in time 2^{O(k)}n^{O(1)}. We complement these results by showing that the choice of degeneracy as the `above guarantee parameterization' is optimal in the following sense: For any ε>0 it is NP-complete to decide whether a connected (2-connected) graph of degeneracy d has a path (cycle) of length at least (1+ε)d.
△ Less
Submitted 14 February, 2019; v1 submitted 7 February, 2019;
originally announced February 2019.
-
Target Set Selection parameterized by vertex cover and more
Authors:
Suman Banerjee,
Rogers Mathew,
Fahad Panolan
Abstract:
Given a simple, undirected graph $G$ with a threshold function $τ:V(G) \rightarrow \mathbb{N}$, the \textsc{Target Set Selection} (TSS) problem is about choosing a minimum cardinality set, say $S \subseteq V(G)$, such that starting a diffusion process with $S$ as its seed set will eventually result in activating all the nodes in $G$. For any non-negative integer $i$, we say a set…
▽ More
Given a simple, undirected graph $G$ with a threshold function $τ:V(G) \rightarrow \mathbb{N}$, the \textsc{Target Set Selection} (TSS) problem is about choosing a minimum cardinality set, say $S \subseteq V(G)$, such that starting a diffusion process with $S$ as its seed set will eventually result in activating all the nodes in $G$. For any non-negative integer $i$, we say a set $T\subseteq V(G)$ is a "degree-$i$ modulator" of $G$ if the degree of any vertex in the graph $G-T$ is at most $i$. Degree-$0$ modulators of a graph are precisely its vertex covers. Consider a graph $G$ on $n$ vertices and $m$ edges. We have the following results on the TSS problem:
-> It was shown by Nichterlein et al. [Social Network Analysis and Mining, 2013] that it is possible to compute an optimal-sized target set in $O(2^{(2^{t}+1)t}\cdot m)$ time, where $t$ denotes the cardinality of a minimum degree-$0$ modulator of $G$. We improve this result by designing an algorithm running in time $2^{O(t\log t)}n^{O(1)}$.
-> We design a $2^{2^{O(t)}}n^{O(1)}$ time algorithm to compute an optimal target set for $G$, where $t$ is the size of a minimum degree-$1$ modulator of $G$.
△ Less
Submitted 16 May, 2021; v1 submitted 4 December, 2018;
originally announced December 2018.
-
A 2-Approximation Algorithm for Feedback Vertex Set in Tournaments
Authors:
Daniel Lokshtanov,
Pranabendu Misra,
Joydeep Mukherjee,
Geevarghese Philip,
Fahad Panolan,
Saket Saurabh
Abstract:
A {\em tournament} is a directed graph $T$ such that every pair of vertices is connected by an arc. A {\em feedback vertex set} is a set $S$ of vertices in $T$ such that $T - S$ is acyclic. We consider the {\sc Feedback Vertex Set} problem in tournaments. Here the input is a tournament $T$ and a weight function $w : V(T) \rightarrow \mathbb{N}$ and the task is to find a feedback vertex set $S$ in…
▽ More
A {\em tournament} is a directed graph $T$ such that every pair of vertices is connected by an arc. A {\em feedback vertex set} is a set $S$ of vertices in $T$ such that $T - S$ is acyclic. We consider the {\sc Feedback Vertex Set} problem in tournaments. Here the input is a tournament $T$ and a weight function $w : V(T) \rightarrow \mathbb{N}$ and the task is to find a feedback vertex set $S$ in $T$ minimizing $w(S) = \sum_{v \in S} w(v)$. We give the first polynomial time factor $2$ approximation algorithm for this problem. Assuming the Unique Games conjecture, this is the best possible approximation ratio achievable in polynomial time.
△ Less
Submitted 22 September, 2018;
originally announced September 2018.
-
Approximation Schemes for Low-Rank Binary Matrix Approximation Problems
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh
Abstract:
We provide a randomized linear time approximation scheme for a generic problem about clustering of binary vectors subject to additional constrains. The new constrained clustering problem encompasses a number of problems and by solving it, we obtain the first linear time-approximation schemes for a number of well-studied fundamental problems concerning clustering of binary vectors and low-rank appr…
▽ More
We provide a randomized linear time approximation scheme for a generic problem about clustering of binary vectors subject to additional constrains. The new constrained clustering problem encompasses a number of problems and by solving it, we obtain the first linear time-approximation schemes for a number of well-studied fundamental problems concerning clustering of binary vectors and low-rank approximation of binary matrices. Among the problems solvable by our approach are \textsc{Low GF(2)-Rank Approximation}, \textsc{Low Boolean-Rank Approximation}, and various versions of \textsc{Binary Clustering}. For example, for \textsc{Low GF(2)-Rank Approximation} problem, where for an $m\times n$ binary matrix $A$ and integer $r>0$, we seek for a binary matrix $B$ of $GF_2$ rank at most $r$ such that $\ell_0$ norm of matrix $A-B$ is minimum, our algorithm, for any $ε>0$ in time $ f(r,ε)\cdot n\cdot m$, where $f$ is some computable function, outputs a $(1+ε)$-approximate solution with probability at least $(1-\frac{1}{e})$. Our approximation algorithms substantially improve the running times and approximation factors of previous works. We also give (deterministic) PTASes for these problems running in time $n^{f(r)\frac{1}{ε^2}\log \frac{1}ε}$, where $f$ is some function depending on the problem. Our algorithm for the constrained clustering problem is based on a novel sampling lemma, which is interesting in its own.
△ Less
Submitted 18 July, 2018;
originally announced July 2018.
-
Parameterized Low-Rank Binary Matrix Approximation
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Fahad Panolan
Abstract:
We provide a number of algorithmic results for the following family of problems: For a given binary m\times n matrix A and integer k, decide whether there is a "simple" binary matrix B which differs from A in at most k entries. For an integer r, the "simplicity" of B is characterized as follows.
- Binary r-Means: Matrix B has at most r different columns. This problem is known to be NP-complete a…
▽ More
We provide a number of algorithmic results for the following family of problems: For a given binary m\times n matrix A and integer k, decide whether there is a "simple" binary matrix B which differs from A in at most k entries. For an integer r, the "simplicity" of B is characterized as follows.
- Binary r-Means: Matrix B has at most r different columns. This problem is known to be NP-complete already for r=2. We show that the problem is solvable in time 2^{O(k\log k)}\cdot(nm)^{O(1)} and thus is fixed-parameter tractable parameterized by k. We prove that the problem admits a polynomial kernel when parameterized by r and k but it has no polynomial kernel when parameterized by k only unless NP\subseteq coNP/poly. We also complement these result by showing that when being parameterized by r and k, the problem admits an algorithm of running time 2^{O(r\cdot \sqrt{k\log{(k+r)}})}(nm)^{O(1)}, which is subexponential in k for r\in O(k^{1/2 -ε}) for any ε>0.
- Low GF(2)-Rank Approximation: Matrix B is of GF(2)-rank at most r. This problem is known to be NP-complete already for r=1. It also known to be W[1]-hard when parameterized by k. Interestingly, when parameterized by r and k, the problem is not only fixed-parameter tractable, but it is solvable in time 2^{O(r^{ 3/2}\cdot \sqrt{k\log{k}})}(nm)^{O(1)}, which is subexponential in k.
- Low Boolean-Rank Approximation: Matrix B is of Boolean rank at most r. The problem is known to be NP-complete for k=0 as well as for r=1. We show that it is solvable in subexponential in k time 2^{O(r2^r\cdot \sqrt{k\log k})}(nm)^{O(1)}.
△ Less
Submitted 16 March, 2018;
originally announced March 2018.
-
Complexity of the Steiner Network Problem with Respect to the Number of Terminals
Authors:
Eduard Eiben,
Dušan Knop,
Fahad Panolan,
Ondřej Suchý
Abstract:
In the Directed Steiner Network problem we are given an arc-weighted digraph $G$, a set of terminals $T \subseteq V(G)$, and an (unweighted) directed request graph $R$ with $V(R)=T$. Our task is to output a subgraph $G' \subseteq G$ of the minimum cost such that there is a directed path from $s$ to $t$ in $G'$ for all $st \in A(R)$.
It is known that the problem can be solved in time…
▽ More
In the Directed Steiner Network problem we are given an arc-weighted digraph $G$, a set of terminals $T \subseteq V(G)$, and an (unweighted) directed request graph $R$ with $V(R)=T$. Our task is to output a subgraph $G' \subseteq G$ of the minimum cost such that there is a directed path from $s$ to $t$ in $G'$ for all $st \in A(R)$.
It is known that the problem can be solved in time $|V(G)|^{O(|A(R)|)}$ [Feldman&Ruhl, SIAM J. Comput. 2006] and cannot be solved in time $|V(G)|^{o(|A(R)|)}$ even if $G$ is planar, unless Exponential-Time Hypothesis (ETH) fails [Chitnis et al., SODA 2014]. However, as this reduction (and other reductions showing hardness of the problem) only shows that the problem cannot be solved in time $|V(G)|^{o(|T|)}$ unless ETH fails, there is a significant gap in the complexity with respect to $|T|$ in the exponent.
We show that Directed Steiner Network is solvable in time $f(R)\cdot |V(G)|^{O(c_g \cdot |T|)}$, where $c_g$ is a constant depending solely on the genus of $G$ and $f$ is a computable function. We complement this result by showing that there is no $f(R)\cdot |V(G)|^{o(|T|^2/ \log |T|)}$ algorithm for any function $f$ for the problem on general graphs, unless ETH fails.
△ Less
Submitted 22 February, 2018;
originally announced February 2018.
-
Lossy Kernels for Connected Dominating Set on Sparse Graphs
Authors:
Eduard Eiben,
Mithilesh Kumar,
Amer E. Mouawad,
Fahad Panolan,
Sebastian Siebertz
Abstract:
For $α> 1$, an $α$-approximate (bi-)kernel is a polynomial-time algorithm that takes as input an instance $(I, k)$ of a problem $\mathcal{Q}$ and outputs an instance $(I',k')$ (of a problem $\mathcal{Q}'$) of size bounded by a function of $k$ such that, for every $c\geq 1$, a $c$-approximate solution for the new instance can be turned into a $(c\cdotα)$-approximate solution of the original instanc…
▽ More
For $α> 1$, an $α$-approximate (bi-)kernel is a polynomial-time algorithm that takes as input an instance $(I, k)$ of a problem $\mathcal{Q}$ and outputs an instance $(I',k')$ (of a problem $\mathcal{Q}'$) of size bounded by a function of $k$ such that, for every $c\geq 1$, a $c$-approximate solution for the new instance can be turned into a $(c\cdotα)$-approximate solution of the original instance in polynomial time. This framework of lossy kernelization was recently introduced by Lokshtanov et al. We study Connected Dominating Set (and its distance-$r$ variant) parameterized by solution size on sparse graph classes like biclique-free graphs, classes of bounded expansion, and nowhere dense classes. We prove that for every $α>1$, Connected Dominating Set admits a polynomial-size $α$-approximate (bi-)kernel on all the aforementioned classes. Our results are in sharp contrast to the kernelization complexity of Connected Dominating Set, which is known to not admit a polynomial kernel even on $2$-degenerate graphs and graphs of bounded expansion, unless $\textsf{NP} \subseteq \textsf{coNP/poly}$. We complement our results by the following conditional lower bound. We show that if a class $\mathcal{C}$ is somewhere dense and closed under taking subgraphs, then for some value of $r\in\mathbb{N}$ there cannot exist an $α$-approximate bi-kernel for the (Connected) Distance-$r$ Dominating Set problem on $\mathcal{C}$ for any $α>1$ (assuming the Gap Exponential Time Hypothesis).
△ Less
Submitted 22 February, 2018; v1 submitted 28 June, 2017;
originally announced June 2017.
-
Rank Vertex Cover as a Natural Problem for Algebraic Compression
Authors:
Syed Mohammad Meesum,
Fahad Panolan,
Saket Saurabh,
Meirav Zehavi
Abstract:
The question of the existence of a polynomial kernelization of the Vertex Cover Above LP problem has been a longstanding, notorious open problem in Parameterized Complexity. Five years ago, the breakthrough work by Kratsch and Wahlstrom on representative sets has finally answered this question in the affirmative [FOCS 2012]. In this paper, we present an alternative, algebraic compression of the Ve…
▽ More
The question of the existence of a polynomial kernelization of the Vertex Cover Above LP problem has been a longstanding, notorious open problem in Parameterized Complexity. Five years ago, the breakthrough work by Kratsch and Wahlstrom on representative sets has finally answered this question in the affirmative [FOCS 2012]. In this paper, we present an alternative, algebraic compression of the Vertex Cover Above LP problem into the Rank Vertex Cover problem. Here, the input consists of a graph G, a parameter k, and a bijection between V (G) and the set of columns of a representation of a matriod M, and the objective is to find a vertex cover whose rank is upper bounded by k.
△ Less
Submitted 10 May, 2017; v1 submitted 8 May, 2017;
originally announced May 2017.
-
Covering Small Independent Sets and Separators with Applications to Parameterized Algorithms
Authors:
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Roohani Sharma,
Meirav Zehavi
Abstract:
We present two new combinatorial tools for the design of parameterized algorithms. The first is a simple linear time randomized algorithm that given as input a $d$-degenerate graph $G$ and an integer $k$, outputs an independent set $Y$, such that for every independent set $X$ in $G$ of size at most $k$, the probability that $X$ is a subset of $Y$ is at least…
▽ More
We present two new combinatorial tools for the design of parameterized algorithms. The first is a simple linear time randomized algorithm that given as input a $d$-degenerate graph $G$ and an integer $k$, outputs an independent set $Y$, such that for every independent set $X$ in $G$ of size at most $k$, the probability that $X$ is a subset of $Y$ is at least $\left({(d+1)k \choose k} \cdot k(d+1)\right)^{-1}$.The second is a new (deterministic) polynomial time graph sparsification procedure that given a graph $G$, a set $T = \{\{s_1, t_1\}, \{s_2, t_2\}, \ldots, \{s_\ell, t_\ell\}\}$ of terminal pairs and an integer $k$, returns an induced subgraph $G^\star$ of $G$ that maintains all the inclusion minimal multicuts of $G$ of size at most $k$, and does not contain any $(k+2)$-vertex connected set of size $2^{{\cal O}(k)}$. In particular, $G^\star$ excludes a clique of size $2^{{\cal O}(k)}$ as a topological minor. Put together, our new tools yield new randomized fixed parameter tractable (FPT) algorithms for Stable $s$-$t$ Separator, Stable Odd Cycle Transversal and Stable Multicut on general graphs, and for Stable Directed Feedback Vertex Set on $d$-degenerate graphs, resolving two problems left open by Marx et al. [ACM Transactions on Algorithms, 2013]. All of our algorithms can be derandomized at the cost of a small overhead in the running time.
△ Less
Submitted 3 May, 2017;
originally announced May 2017.
-
Finding, Hitting and Packing Cycles in Subexponential Time on Unit Disk Graphs
Authors:
Fedor V. Fomin,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh,
Meirav Zehavi
Abstract:
We give algorithms with running time $2^{O({\sqrt{k}\log{k}})} \cdot n^{O(1)}$ for the following problems. Given an $n$-vertex unit disk graph $G$ and an integer $k$, decide whether $G$ contains (1) a path on exactly/at least $k$ vertices, (2) a cycle on exactly $k$ vertices, (3) a cycle on at least $k$ vertices, (4) a feedback vertex set of size at most $k$, and (5) a set of $k$ pairwise vertex-d…
▽ More
We give algorithms with running time $2^{O({\sqrt{k}\log{k}})} \cdot n^{O(1)}$ for the following problems. Given an $n$-vertex unit disk graph $G$ and an integer $k$, decide whether $G$ contains (1) a path on exactly/at least $k$ vertices, (2) a cycle on exactly $k$ vertices, (3) a cycle on at least $k$ vertices, (4) a feedback vertex set of size at most $k$, and (5) a set of $k$ pairwise vertex-disjoint cycles. For the first three problems, no subexponential time parameterized algorithms were previously known. For the remaining two problems, our algorithms significantly outperform the previously best known parameterized algorithms that run in time $2^{O(k^{0.75}\log{k})} \cdot n^{O(1)}$. Our algorithms are based on a new kind of tree decompositions of unit disk graphs where the separators can have size up to $k^{O(1)}$ and there exists a solution that crosses every separator at most $O(\sqrt{k})$ times. The running times of our algorithms are optimal up to the $\log{k}$ factor in the exponent, assuming the Exponential Time Hypothesis.
△ Less
Submitted 24 April, 2017;
originally announced April 2017.
-
Simultaneous Feedback Edge Set: A Parameterized Perspective
Authors:
Akanksha Agrawal,
Fahad Panolan,
Saket Saurabh,
Meirav Zehavi
Abstract:
In this paper we consider Simultaneous Feedback Edge Set (Sim-FES) problem. In this problem, the input is an $n$-vertex graph $G$, an integer $k$ and a coloring function ${\sf col}: E(G) \rightarrow 2^{[α]}$ and the objective is to check whether there is an edge subset $S$ of cardinality at most $k$ in $G$ such that for all $i \in [α]$, $G_i - S$ is acyclic. Here,…
▽ More
In this paper we consider Simultaneous Feedback Edge Set (Sim-FES) problem. In this problem, the input is an $n$-vertex graph $G$, an integer $k$ and a coloring function ${\sf col}: E(G) \rightarrow 2^{[α]}$ and the objective is to check whether there is an edge subset $S$ of cardinality at most $k$ in $G$ such that for all $i \in [α]$, $G_i - S$ is acyclic. Here, $G_i=(V(G), \{e\in E(G) \mid i \in {\sf col}(e)\})$ and $[α]=\{1,\ldots,α\}$. When $α=1$, the problem is polynomial time solvable. We show that for $α=3$ Sim-FES is NP-hard by giving a reduction from Vertex Cover on cubic graphs. The same reduction shows that the problem does not admit an algorithm of running time $O(2^{o(k)}n^{O(1)})$ unless ETH fails. This hardness result is complimented by an FPT algorithm for Sim-FES running in time $O(2^{ωkα+α\log k} n^{O(1)})$, where $ω$ is the exponent in the running time of matrix multiplication. The same algorithm gives a polynomial time algorithm for the case when $α=2$. We also give a kernel for Sim-FES with $(kα)^{O(α)}$ vertices. Finally, we consider the problem Maximum Simultaneous Acyclic Subgraph. Here, the input is a graph $G$, an integer $q$ and, a coloring function ${\sf col}: E(G) \rightarrow 2^{[α]}$. The question is whether there is a edge subset $F$ of cardinality at least $q$ in $G$ such that for all $i\in [α]$, $G[F_i]$ is acyclic. Here, $F_i=\{e \in F \mid i \in \textsf{col}(e)\}$. We give an FPT algorithm for running in time $O(2^{ωq α}n^{O(1)})$.
△ Less
Submitted 23 November, 2016;
originally announced November 2016.
-
On the Optimality of Pseudo-polynomial Algorithms for Integer Programming
Authors:
Fedor V. Fomin,
Fahad Panolan,
M. S. Ramanujan,
Saket Saurabh
Abstract:
In the classic Integer Programming (IP) problem, the objective is to decide whether, for a given $m \times n$ matrix $A$ and an $m$-vector $b=(b_1,\dots, b_m)$, there is a non-negative integer $n$-vector $x$ such that $Ax=b$. Solving (IP) is an important step in numerous algorithms and it is important to obtain an understanding of the precise complexity of this problem as a function of natural par…
▽ More
In the classic Integer Programming (IP) problem, the objective is to decide whether, for a given $m \times n$ matrix $A$ and an $m$-vector $b=(b_1,\dots, b_m)$, there is a non-negative integer $n$-vector $x$ such that $Ax=b$. Solving (IP) is an important step in numerous algorithms and it is important to obtain an understanding of the precise complexity of this problem as a function of natural parameters of the input.
The classic pseudo-polynomial time algorithm of Papadimitriou [J. ACM 1981] for instances of (IP) with a constant number of constraints was only recently improved upon by Eisenbrand and Weismantel [SODA 2018] and Jansen and Rohwedder [ArXiv 2018]. We continue this line of work and show that under the Exponential Time Hypothesis (ETH), the algorithm of Jansen and Rohwedder is nearly optimal. We also show that when the matrix $A$ is assumed to be non-negative, a component of Papadimitriou's original algorithm is already nearly optimal under ETH.
This motivates us to pick up the line of research initiated by Cunningham and Geelen [IPCO 2007] who studied the complexity of solving (IP) with non-negative matrices in which the number of constraints may be unbounded, but the branch-width of the column-matroid corresponding to the constraint matrix is a constant. We prove a lower bound on the complexity of solving (IP) for such instances and obtain optimal results with respect to a closely related parameter, path-width. Specifically, we prove matching upper and lower bounds for (IP) when the path-width of the corresponding column-matroid is a constant.
△ Less
Submitted 17 July, 2018; v1 submitted 18 July, 2016;
originally announced July 2016.
-
Lossy Kernelization
Authors:
Daniel Lokshtanov,
Fahad Panolan,
M. S. Ramanujan,
Saket Saurabh
Abstract:
In this paper we propose a new framework for analyzing the performance of preprocessing algorithms. Our framework builds on the notion of kernelization from parameterized complexity. However, as opposed to the original notion of kernelization, our definitions combine well with approximation algorithms and heuristics. The key new definition is that of a polynomial size $α$-approximate kernel. Loose…
▽ More
In this paper we propose a new framework for analyzing the performance of preprocessing algorithms. Our framework builds on the notion of kernelization from parameterized complexity. However, as opposed to the original notion of kernelization, our definitions combine well with approximation algorithms and heuristics. The key new definition is that of a polynomial size $α$-approximate kernel. Loosely speaking, a polynomial size $α$-approximate kernel is a polynomial time pre-processing algorithm that takes as input an instance $(I,k)$ to a parameterized problem, and outputs another instance $(I',k')$ to the same problem, such that $|I'|+k' \leq k^{O(1)}$. Additionally, for every $c \geq 1$, a $c$-approximate solution $s'$ to the pre-processed instance $(I',k')$ can be turned in polynomial time into a $(c \cdot α)$-approximate solution $s$ to the original instance $(I,k)$.
Our main technical contribution are $α$-approximate kernels of polynomial size for three problems, namely Connected Vertex Cover, Disjoint Cycle Packing and Disjoint Factors. These problems are known not to admit any polynomial size kernels unless $NP \subseteq coNP/poly$. Our approximate kernels simultaneously beat both the lower bounds on the (normal) kernel size, and the hardness of approximation lower bounds for all three problems. On the negative side we prove that Longest Path parameterized by the length of the path and Set Cover parameterized by the universe size do not admit even an $α$-approximate kernel of polynomial size, for any $α\geq 1$, unless $NP \subseteq coNP/poly$. In order to prove this lower bound we need to combine in a non-trivial way the techniques used for showing kernelization lower bounds with the methods for showing hardness of approximation
△ Less
Submitted 4 November, 2016; v1 submitted 14 April, 2016;
originally announced April 2016.
-
Parameterized Algorithms on Perfect Graphs for deletion to $(r,\ell)$-graphs
Authors:
Sudeshna Kolay,
Fahad Panolan,
Venkatesh Raman,
Saket Saurabh
Abstract:
For fixed integers $r,\ell \geq 0$, a graph $G$ is called an {\em $(r,\ell)$-graph} if the vertex set $V(G)$ can be partitioned into $r$ independent sets and $\ell$ cliques. The class of $(r, \ell)$ graphs generalizes $r$-colourable graphs (when $\ell =0)$ and hence not surprisingly, determining whether a given graph is an $(r, \ell)$-graph is \NP-hard even when $r \geq 3$ or $\ell \geq 3$ in gene…
▽ More
For fixed integers $r,\ell \geq 0$, a graph $G$ is called an {\em $(r,\ell)$-graph} if the vertex set $V(G)$ can be partitioned into $r$ independent sets and $\ell$ cliques. The class of $(r, \ell)$ graphs generalizes $r$-colourable graphs (when $\ell =0)$ and hence not surprisingly, determining whether a given graph is an $(r, \ell)$-graph is \NP-hard even when $r \geq 3$ or $\ell \geq 3$ in general graphs.
When $r$ and $\ell$ are part of the input, then the recognition problem is NP-hard even if the input graph is a perfect graph (where the {\sc Chromatic Number} problem is solvable in polynomial time). It is also known to be fixed-parameter tractable (FPT) on perfect graphs when parameterized by $r$ and $\ell$. I.e. there is an $f(r+\ell) \cdot n^{\Oh(1)}$ algorithm on perfect graphs on $n$ vertices where $f$ is some (exponential) function of $r$ and $\ell$.
In this paper, we consider the parameterized complexity of the following problem, which we call {\sc Vertex Partization}. Given a perfect graph $G$ and positive integers $r,\ell,k$ decide whether there exists a set $S\subseteq V(G)$ of size at most $k$ such that the deletion of $S$ from $G$ results in an $(r,\ell)$-graph. We obtain the following results: \begin{enumerate} \item {\sc Vertex Partization} on perfect graphs is FPT when parameterized by $k+r+\ell$. \item The problem does not admit any polynomial sized kernel when parameterized by $k+r+\ell$. In other words, in polynomial time, the input graph can not be compressed to an equivalent instance of size polynomial in $k+r+\ell$. In fact, our result holds even when $k=0$.
\item When $r,\ell$ are universal constants, then {\sc Vertex Partization} on perfect graphs, parameterized by $k$, has a polynomial sized kernel. \end{enumerate}
△ Less
Submitted 14 December, 2015;
originally announced December 2015.
-
Parameterized Algorithms for Deletion to (r,l)-graphs
Authors:
Sudeshna Kolay,
Fahad Panolan
Abstract:
For fixed integers $r,\ell \geq 0$, a graph $G$ is called an {\em $(r,\ell)$-graph} if the vertex set $V(G)$ can be partitioned into $r$ independent sets and $\ell$ cliques. This brings us to the following natural parameterized questions: {\sc Vertex $(r,\ell)$-Partization} and {\sc Edge $(r,\ell)$-Partization}. An input to these problems consist of a graph $G$ and a positive integer $k$ and the o…
▽ More
For fixed integers $r,\ell \geq 0$, a graph $G$ is called an {\em $(r,\ell)$-graph} if the vertex set $V(G)$ can be partitioned into $r$ independent sets and $\ell$ cliques. This brings us to the following natural parameterized questions: {\sc Vertex $(r,\ell)$-Partization} and {\sc Edge $(r,\ell)$-Partization}. An input to these problems consist of a graph $G$ and a positive integer $k$ and the objective is to decide whether there exists a set $S\subseteq V(G)$ ($S\subseteq E(G)$) such that the deletion of $S$ from $G$ results in an $(r,\ell)$-graph. These problems generalize well studied problems such as {\sc Odd Cycle Transversal}, {\sc Edge Odd Cycle Transversal}, {\sc Split Vertex Deletion} and {\sc Split Edge Deletion}. We do not hope to get parameterized algorithms for either {\sc Vertex $(r,\ell)$-Partization} or {\sc Edge $(r,\ell)$-Partization} when either of $r$ or $\ell$ is at least $3$ as the recognition problem itself is NP-complete. This leaves the case of $r,\ell \in \{1,2\}$. We almost complete the parameterized complexity dichotomy for these problems. Only the parameterized complexity of {\sc Edge $(2,2)$-Partization} remains open. We also give an approximation algorithm and a Turing kernelization for {\sc Vertex $(r,\ell)$-Partization}. We use an interesting finite forbidden induced graph characterization, for a class of graphs known as $(r,\ell)$-split graphs, properly containing the class of $(r,\ell)$-graphs. This approach to obtain approximation algorithms could be of an independent interest.
△ Less
Submitted 30 April, 2015;
originally announced April 2015.
-
Reconfiguration on sparse graphs
Authors:
Daniel Lokshtanov,
Amer E. Mouawad,
Fahad Panolan,
M. S. Ramanujan,
Saket Saurabh
Abstract:
A vertex-subset graph problem Q defines which subsets of the vertices of an input graph are feasible solutions. A reconfiguration variant of a vertex-subset problem asks, given two feasible solutions S and T of size k, whether it is possible to transform S into T by a sequence of vertex additions and deletions such that each intermediate set is also a feasible solution of size bounded by k. We stu…
▽ More
A vertex-subset graph problem Q defines which subsets of the vertices of an input graph are feasible solutions. A reconfiguration variant of a vertex-subset problem asks, given two feasible solutions S and T of size k, whether it is possible to transform S into T by a sequence of vertex additions and deletions such that each intermediate set is also a feasible solution of size bounded by k. We study reconfiguration variants of two classical vertex-subset problems, namely Independent Set and Dominating Set. We denote the former by ISR and the latter by DSR. Both ISR and DSR are PSPACE-complete on graphs of bounded bandwidth and W[1]-hard parameterized by k on general graphs. We show that ISR is fixed-parameter tractable parameterized by k when the input graph is of bounded degeneracy or nowhere-dense. As a corollary, we answer positively an open question concerning the parameterized complexity of the problem on graphs of bounded treewidth. Moreover, our techniques generalize recent results showing that ISR is fixed-parameter tractable on planar graphs and graphs of bounded degree. For DSR, we show the problem fixed-parameter tractable parameterized by k when the input graph does not contain large bicliques, a class of graphs which includes graphs of bounded degeneracy and nowhere-dense graphs.
△ Less
Submitted 17 February, 2015;
originally announced February 2015.
-
Finding Even Subgraphs Even Faster
Authors:
Prachi Goyal,
Pranabendu Misra,
Fahad Panolan,
Geevarghese Philip,
Saket Saurabh
Abstract:
Problems of the following kind have been the focus of much recent research in the realm of parameterized complexity: Given an input graph (digraph) on $n$ vertices and a positive integer parameter $k$, find if there exist $k$ edges (arcs) whose deletion results in a graph that satisfies some specified parity constraints. In particular, when the objective is to obtain a connected graph in which all…
▽ More
Problems of the following kind have been the focus of much recent research in the realm of parameterized complexity: Given an input graph (digraph) on $n$ vertices and a positive integer parameter $k$, find if there exist $k$ edges (arcs) whose deletion results in a graph that satisfies some specified parity constraints. In particular, when the objective is to obtain a connected graph in which all the vertices have even degrees---where the resulting graph is \emph{Eulerian}---the problem is called Undirected Eulerian Edge Deletion. The corresponding problem in digraphs where the resulting graph should be strongly connected and every vertex should have the same in-degree as its out-degree is called Directed Eulerian Edge Deletion. Cygan et al. [\emph{Algorithmica, 2014}] showed that these problems are fixed parameter tractable (FPT), and gave algorithms with the running time $2^{O(k \log k)}n^{O(1)}$. They also asked, as an open problem, whether there exist FPT algorithms which solve these problems in time $2^{O(k)}n^{O(1)}$. In this paper we answer their question in the affirmative: using the technique of computing \emph{representative families of co-graphic matroids} we design algorithms which solve these problems in time $2^{O(k)}n^{O(1)}$. The crucial insight we bring to these problems is to view the solution as an independent set of a co-graphic matroid. We believe that this view-point/approach will be useful in other problems where one of the constraints that need to be satisfied is that of connectivity.
△ Less
Submitted 17 September, 2014;
originally announced September 2014.
-
Deterministic Truncation of Linear Matroids
Authors:
Daniel Lokshtanov,
Pranabendu Misra,
Fahad Panolan,
Saket Saurabh
Abstract:
Let $M=(E,{\cal I})$ be a matroid. A {\em $k$-truncation} of $M$ is a matroid {$M'=(E,{\cal I}')$} such that for any $A\subseteq E$, $A\in {\cal I}'$ if and only if $|A|\leq k$ and $A\in {\cal I}$. Given a linear representation of $M$ we consider the problem of finding a linear representation of the $k$-truncation of this matroid. This problem can be abstracted out to the following problem on matr…
▽ More
Let $M=(E,{\cal I})$ be a matroid. A {\em $k$-truncation} of $M$ is a matroid {$M'=(E,{\cal I}')$} such that for any $A\subseteq E$, $A\in {\cal I}'$ if and only if $|A|\leq k$ and $A\in {\cal I}$. Given a linear representation of $M$ we consider the problem of finding a linear representation of the $k$-truncation of this matroid. This problem can be abstracted out to the following problem on matrices. Let $M$ be a $n\times m$ matrix over a field $\mathbb{F}$. A {\em rank $k$-truncation} of the matrix $M$ is a $k\times m$ matrix $M_k$ (over $\mathbb{F}$ or a related field) such that for every subset $I\subseteq \{1,\ldots,m\}$ of size at most $k$, the set of columns corresponding to $I$ in $M$ has rank $|I|$ if and only of the corresponding set of columns in $M_k$ has rank $|I|$. Finding rank $k$-truncation of matrices is a common way to obtain a linear representation of $k$-truncation of linear matroids, which has many algorithmic applications. A common way to compute a rank $k$-truncation of a $n \times m$ matrix is to multiply the matrix with a random $k\times n$ matrix (with the entries from a field of an appropriate size), yielding a simple randomized algorithm. So a natural question is whether it possible to obtain a rank $k$-truncations of a matrix, {\em deterministically}. In this paper we settle this question for matrices over any finite field or the field of rationals ($\mathbb Q$). We show that given a matrix $M$ over a field $\mathbb{F}$ we can compute a $k$-truncation $M_k$ over the ring $\mathbb{F}[X]$ in deterministic polynomial time.
△ Less
Submitted 17 April, 2014;
originally announced April 2014.
-
Representative Sets of Product Families
Authors:
Fedor V. Fomin,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh
Abstract:
A subfamily ${\cal F}'$ of a set family ${\cal F}$ is said to $q$-{\em represent} ${\cal F}$ if for every $A \in {\cal F}$ and $B$ of size $q$ such that $A \cap B = \emptyset$ there exists a set $A' \in {\cal F}'$ such that $A' \cap B = \emptyset$. In this paper, we consider the efficient computation of $q$-representative sets for {\em product} families ${\cal F}$. A family ${\cal F}$ is a product…
▽ More
A subfamily ${\cal F}'$ of a set family ${\cal F}$ is said to $q$-{\em represent} ${\cal F}$ if for every $A \in {\cal F}$ and $B$ of size $q$ such that $A \cap B = \emptyset$ there exists a set $A' \in {\cal F}'$ such that $A' \cap B = \emptyset$. In this paper, we consider the efficient computation of $q$-representative sets for {\em product} families ${\cal F}$. A family ${\cal F}$ is a product family if there exist families ${\cal A}$ and ${\cal B}$ such that ${\cal F} = \{A \cup B~:~A \in {\cal A}, B \in {\cal B}, A \cap B = \emptyset\}$. Our main technical contribution is an algorithm which given ${\cal A}$, ${\cal B}$ and $q$ computes a $q$-representative family ${\cal F}'$ of ${\cal F}$. The running time of our algorithm is sublinear in $|{\cal F}|$ for many choices of ${\cal A}$, ${\cal B}$ and $q$ which occur naturally in several dynamic programming algorithms. We also give an algorithm for the computation of $q$-representative sets for product families ${\cal F}$ in the more general setting where $q$-representation also involves independence in a matroid in addition to disjointness. This algorithm considerably outperforms the naive approach where one first computes ${\cal F}$ from ${\cal A}$ and ${\cal B}$, and then computes the $q$-representative family ${\cal F}'$ from ${\cal F}$.
We give two applications of our new algorithms for computing $q$-representative sets for product families. The first is a $3.8408^{k}n^{O(1)}$ deterministic algorithm for the Multilinear Monomial Detection ($k$-MlD) problem. The second is a significant improvement of deterministic dynamic programming algorithms for "connectivity problems" on graphs of bounded treewidth.
△ Less
Submitted 17 February, 2014;
originally announced February 2014.
-
Efficient Computation of Representative Sets with Applications in Parameterized and Exact Algorithms
Authors:
Fedor V. Fomin,
Daniel Lokshtanov,
Fahad Panolan,
Saket Saurabh
Abstract:
We give two algorithms computing representative families of linear and uniform matroids and demonstrate how to use representative families for designing single-exponential parameterized and exact exponential time algorithms. The applications of our approach include
- LONGEST DIRECTED CYCLE
- MINIMUM EQUIVALENT GRAPH (MEG)
- Algorithms on graphs of bounded treewidth
-k-PATH, k-TREE, and mor…
▽ More
We give two algorithms computing representative families of linear and uniform matroids and demonstrate how to use representative families for designing single-exponential parameterized and exact exponential time algorithms. The applications of our approach include
- LONGEST DIRECTED CYCLE
- MINIMUM EQUIVALENT GRAPH (MEG)
- Algorithms on graphs of bounded treewidth
-k-PATH, k-TREE, and more generally, k-SUBGRAPH ISOMORPHISM, where the k-vertex pattern graph is of constant treewidth.
△ Less
Submitted 22 February, 2016; v1 submitted 16 April, 2013;
originally announced April 2013.