Algorithmica最新文献

筛选
英文 中文
Finding Optimal Solutions with Neighborly Help 在邻居的帮助下找到最佳解决方案
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-03-06 DOI: 10.1007/s00453-023-01204-1
Elisabet Burjons, Fabian Frei, Edith Hemaspaandra, Dennis Komm, David Wehner
{"title":"Finding Optimal Solutions with Neighborly Help","authors":"Elisabet Burjons,&nbsp;Fabian Frei,&nbsp;Edith Hemaspaandra,&nbsp;Dennis Komm,&nbsp;David Wehner","doi":"10.1007/s00453-023-01204-1","DOIUrl":"10.1007/s00453-023-01204-1","url":null,"abstract":"<div><p>Can we efficiently compute optimal solutions to instances of a hard problem from optimal solutions to neighbor instances, that is, instances with one local modification? For example, can we efficiently compute an optimal coloring for a graph from optimal colorings for all one-edge-deleted subgraphs? Studying such questions not only gives detailed insight into the structure of the problem itself, but also into the complexity of related problems, most notably, graph theory’s core notion of critical graphs (e.g., graphs whose chromatic number decreases under deletion of an arbitrary edge) and the complexity-theoretic notion of minimality problems (also called criticality problems, e.g., recognizing graphs that become 3-colorable when an arbitrary edge is deleted). We focus on two prototypical graph problems, colorability and vertex cover. For example, we show that it is <span>(text {NP})</span>-hard to compute an optimal coloring for a graph from optimal colorings for <i>all</i> its one-vertex-deleted subgraphs, and that this remains true even when optimal solutions for <i>all</i> one-edge-deleted subgraphs are given. In contrast, computing an optimal coloring from all (or even just two) one-edge-added supergraphs is in <span>(text {P})</span>. We observe that vertex cover exhibits a remarkably different behavior, demonstrating the power of our model to delineate problems from each other more precisely on a structural level. Moreover, we provide a number of new complexity results for minimality and criticality problems. For example, we prove that <span>Minimal</span>-3-<span>UnColorability</span> is complete for <span>(text {DP})</span> (differences of <span>(text {NP})</span> sets), which was previously known only for the more amenable case of deleting vertices rather than edges. For vertex cover, we show that recognizing <span>(beta )</span>-vertex-critical graphs is complete for <span>(Theta _2^text {p})</span> (parallel access to <span>(text {NP})</span>), obtaining the first completeness result for a criticality problem for this class.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1921 - 1947"},"PeriodicalIF":0.9,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01204-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140055369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface of the Special Issue Dedicated to Selected Papers from IWOCA 2022 IWOCA 2022 论文选特刊序言
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-03-05 DOI: 10.1007/s00453-024-01225-4
Cristina Bazgan, Henning Fernau
{"title":"Preface of the Special Issue Dedicated to Selected Papers from IWOCA 2022","authors":"Cristina Bazgan,&nbsp;Henning Fernau","doi":"10.1007/s00453-024-01225-4","DOIUrl":"10.1007/s00453-024-01225-4","url":null,"abstract":"","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 3","pages":"695 - 696"},"PeriodicalIF":0.9,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140078949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stable Matchings, One-Sided Ties, and Approximate Popularity 稳定配对、单边纽带和近似受欢迎程度
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-03-02 DOI: 10.1007/s00453-024-01215-6
Telikepalli Kavitha
{"title":"Stable Matchings, One-Sided Ties, and Approximate Popularity","authors":"Telikepalli Kavitha","doi":"10.1007/s00453-024-01215-6","DOIUrl":"10.1007/s00453-024-01215-6","url":null,"abstract":"<div><p>We consider a matching problem in a bipartite graph <span>(G = (A cup B, E))</span> where vertices in <i>A</i> rank their neighbors in a strict order of preference while vertices in <i>B</i> are allowed to have <i>weak</i> rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in <i>G</i> and are easy to find, however popular matchings need not exist in <i>G</i> and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is <i>low unpopularity factor</i>. We show that when each tie in <i>G</i> has length at most <i>k</i>, there always exists a stable matching whose unpopularity factor is at most <i>k</i> and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a <i>near-popular</i> stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in <i>B</i> have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most <i>k</i>, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor <i>within</i> the set of maximum matchings is at most 2<i>k</i>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1888 - 1920"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140016673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editor’s Note: Special Issue with GECCO 2021 编者按:GECCO 2021 特刊
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-03-02 DOI: 10.1007/s00453-024-01217-4
{"title":"Editor’s Note: Special Issue with GECCO 2021","authors":"","doi":"10.1007/s00453-024-01217-4","DOIUrl":"10.1007/s00453-024-01217-4","url":null,"abstract":"","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"2067 - 2067"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142409442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimal Roman Dominating Functions: Extensions and Enumeration 最小罗马支配函数:扩展与枚举
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-02-14 DOI: 10.1007/s00453-024-01211-w
Faisal N. Abu-Khzam, Henning Fernau, Kevin Mann
{"title":"Minimal Roman Dominating Functions: Extensions and Enumeration","authors":"Faisal N. Abu-Khzam,&nbsp;Henning Fernau,&nbsp;Kevin Mann","doi":"10.1007/s00453-024-01211-w","DOIUrl":"10.1007/s00453-024-01211-w","url":null,"abstract":"<div><p>Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for <span>Extension Roman Domination</span>: Given a graph <span>(G=(V,E))</span> and a function <span>(f:Vrightarrow {0,1,2})</span>, is there a minimal Roman dominating function <span>(tilde{f})</span> with <span>(fle tilde{f})</span>? Here, <span>(le )</span> lifts <span>(0&lt; 1&lt; 2)</span> pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of <span>(mathcal {O}(1.9332^n))</span> for graphs of order <i>n</i>; this is complemented by a lower bound example of <span>(Omega (1.7441^n))</span>.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1862 - 1887"},"PeriodicalIF":0.9,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01211-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Time Complexity of Consensus Under Oblivious Message Adversaries 忽略信息对手情况下达成共识的时间复杂性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-02-13 DOI: 10.1007/s00453-024-01209-4
Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, Ulrich Schmid
{"title":"The Time Complexity of Consensus Under Oblivious Message Adversaries","authors":"Kyrill Winkler,&nbsp;Ami Paz,&nbsp;Hugo Rincon Galeana,&nbsp;Stefan Schmid,&nbsp;Ulrich Schmid","doi":"10.1007/s00453-024-01209-4","DOIUrl":"10.1007/s00453-024-01209-4","url":null,"abstract":"<div><p>We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs <span>(textbf{D})</span> arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set <span>(textbf{D})</span>, we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1830 - 1861"},"PeriodicalIF":0.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01209-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sublinear Time Eigenvalue Approximation via Random Sampling 通过随机抽样实现次线性时间特征值逼近
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-02-12 DOI: 10.1007/s00453-024-01208-5
Rajarshi Bhattacharjee, Gregory Dexter, Petros Drineas, Cameron Musco, Archan Ray
{"title":"Sublinear Time Eigenvalue Approximation via Random Sampling","authors":"Rajarshi Bhattacharjee,&nbsp;Gregory Dexter,&nbsp;Petros Drineas,&nbsp;Cameron Musco,&nbsp;Archan Ray","doi":"10.1007/s00453-024-01208-5","DOIUrl":"10.1007/s00453-024-01208-5","url":null,"abstract":"<div><p>We study the problem of approximating the eigenspectrum of a symmetric matrix <span>(textbf{A} in mathbb {R}^{n times n})</span> with bounded entries (i.e., <span>(Vert textbf{A}Vert _{infty } le 1)</span>). We present a simple sublinear time algorithm that approximates all eigenvalues of <span>(textbf{A})</span> up to additive error <span>(pm epsilon n)</span> using those of a randomly sampled <span>({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) )</span> principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of <span>(pm epsilon sqrt{text {nnz}(textbf{A})})</span> and <span>(pm epsilon Vert textbf{A}Vert _F)</span> when the rows of <span>(textbf{A})</span> can be sampled with probabilities proportional to their sparsities or their squared <span>(ell _2)</span> norms respectively. Here <span>(text {nnz}(textbf{A}))</span> is the number of non-zero entries in <span>(textbf{A})</span> and <span>(Vert textbf{A}Vert _F)</span> is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of <span>(textbf{A})</span>. We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1764 - 1829"},"PeriodicalIF":0.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139751014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Parameterized Intractability of Determinant Maximization 论确定性最大化的参数化难解性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-02-03 DOI: 10.1007/s00453-023-01205-0
Naoto Ohsaka
{"title":"On the Parameterized Intractability of Determinant Maximization","authors":"Naoto Ohsaka","doi":"10.1007/s00453-023-01205-0","DOIUrl":"10.1007/s00453-023-01205-0","url":null,"abstract":"<div><p>In the <span>Determinant Maximization</span> problem, given an <span>(n times n)</span> positive semi-definite matrix <span>({textbf {A}} )</span> in <span>(mathbb {Q}^{n times n})</span> and an integer <i>k</i>, we are required to find a <span>(k times k)</span> principal submatrix of <span>({textbf {A}} )</span> having the maximum determinant. This problem is known to be <span>NP</span>-hard and further proven to be <span>W</span>[1]-hard with respect to <i>k</i> by Koutis (Inf Process Lett 100:8–13, 2006); i.e., a <span>(f(k)n^{{{,mathrm{mathcal {O}},}}(1)})</span>-time algorithm is unlikely to exist for any computable function <i>f</i>. However, there is still room to explore its parameterized complexity in the <i>restricted case</i>, in the hope of overcoming the general-case parameterized intractability. In this study, we rule out the fixed-parameter tractability of <span>Determinant Maximization</span> even if an input matrix is extremely sparse or low rank, or an approximate solution is acceptable. We first prove that <span>Determinant Maximization</span> is <span>NP</span>-hard and <span>W</span>[1]-hard even if an input matrix is an <i>arrowhead matrix</i>; i.e., the underlying graph formed by nonzero entries is a star, implying that the structural sparsity is not helpful. By contrast, <span>Determinant Maximization</span> is known to be solvable in polynomial time on <i>tridiagonal matrices</i> (Al-Thani and Lee, in: LAGOS, 2021). Thereafter, we demonstrate the <span>W</span>[1]-hardness with respect to the <i>rank</i> <i>r</i> of an input matrix. Our result is stronger than Koutis’ result in the sense that any <span>(k times k)</span> principal submatrix is singular whenever <span>(k &gt; r)</span>. We finally give evidence that it is <span>W</span>[1]-hard to approximate <span>Determinant Maximization</span> parameterized by <i>k</i> within a factor of <span>(2^{-csqrt{k}})</span> for some universal constant <span>(c &gt; 0)</span>. Our hardness result is conditional on the <i>Parameterized Inapproximability Hypothesis</i> posed by Lokshtanov et al. (in: SODA, 2020), which asserts that a gap version of <span>Binary Constraint Satisfaction Problem</span> is <span>W</span>[1]-hard. To complement this result, we develop an <span>(varepsilon )</span>-additive approximation algorithm that runs in <span>(varepsilon ^{-r^2} cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)})</span> time for the rank <i>r</i> of an input matrix, provided that the diagonal entries are bounded.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1731 - 1763"},"PeriodicalIF":0.9,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01205-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139678586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of High-Dimensional Grids by Finite State Machines 用有限状态机探索高维网格
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-01-29 DOI: 10.1007/s00453-024-01207-6
Stefan Dobrev, Lata Narayanan, Jaroslav Opatrny, Denis Pankratov
{"title":"Exploration of High-Dimensional Grids by Finite State Machines","authors":"Stefan Dobrev,&nbsp;Lata Narayanan,&nbsp;Jaroslav Opatrny,&nbsp;Denis Pankratov","doi":"10.1007/s00453-024-01207-6","DOIUrl":"10.1007/s00453-024-01207-6","url":null,"abstract":"<div><p>We consider the problem of finding a “treasure” at an unknown point of an <i>n</i>-dimensional infinite grid, <span>(nge 3)</span>, by initially collocated finite automaton (FA) agents. Recently, the problem has been well characterized for 2 dimensions for deterministic as well as randomized FA agents, both in synchronous and semi-synchronous models (Brandt et al. in Proceedings of 32nd International Symposium on Distributed Computing (DISC) LIPCS 121:13:1–13:17, 2018; Emek et al. in Theor Comput Sci 608:255–267, 2015). It has been conjectured that <span>(n+1)</span> randomized FA agents are necessary to solve this problem in the <i>n</i>-dimensional grid (Cohen et al. in Proceedings of the 28th SODA, SODA ’17, pp 207–224, 2017). In this paper we disprove the conjecture in a strong sense: we show that <i>three</i> randomized synchronous FA agents suffice to explore an <i>n</i>-dimensional grid for <i>any</i> <i>n</i>. Our algorithm is optimal in terms of the number of the agents. Our key insight is that a constant number of FA agents can, by their positions and movements, implement a stack, which can store the path being explored. We also show how to implement our algorithm using: four randomized semi-synchronous FA agents; four deterministic synchronous FA agents; or five deterministic semi-synchronous FA agents. We give a different, no-stack algorithm that uses 4 deterministic semi-synchronous FA agents for the 3-dimensional grid. This is provably optimal in the number of agents and the exploration cost, and surprisingly, matches the result for 2 dimensions. For <span>(nge 4)</span>, the time complexity of the stack-based algorithms mentioned above is exponential in distance <i>D</i> of the treasure from the starting point of the agents. We show that in the deterministic case, one additional finite automaton agent brings the time down to a polynomial. We also show that any algorithm using 3 synchronous deterministic FA agents in 3 dimensions must travel beyond <span>(Omega (D^{3/2}))</span> from the origin. Finally, we show that all the above algorithms can be generalized to unoriented grids. More specifically, six deterministic semi-synchronous FA agents are sufficient to locate the treasure in an unoriented <i>n</i>-dimensional grid.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1700 - 1729"},"PeriodicalIF":0.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139589836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved FPT Algorithms for Deletion to Forest-Like Structures 改进的森林类结构删除 FPT 算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-01-27 DOI: 10.1007/s00453-023-01206-z
Kishen N. Gowda, Aditya Lonkar, Fahad Panolan, Vraj Patel, Saket Saurabh
{"title":"Improved FPT Algorithms for Deletion to Forest-Like Structures","authors":"Kishen N. Gowda,&nbsp;Aditya Lonkar,&nbsp;Fahad Panolan,&nbsp;Vraj Patel,&nbsp;Saket Saurabh","doi":"10.1007/s00453-023-01206-z","DOIUrl":"10.1007/s00453-023-01206-z","url":null,"abstract":"<div><p>The <span>Feedback Vertex Set</span> problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph <i>G</i> and a non-negative integer <i>k</i>, the objective is to test whether there exists a subset <span>(Ssubseteq V(G))</span> of size at most <i>k</i> such that <span>(G-S)</span> is a forest. After a long line of improvement, recently, Li and Nederlof [TALG, 2022] designed a randomized algorithm for the problem running in time <span>({mathcal {O}}^{star }(2.7^k)^{*})</span>. In the Parameterized Complexity literature, several problems around <span>Feedback Vertex Set</span> have been studied. \u0000Some of these include <span>Independent Feedback Vertex Set</span> (where the set <i>S</i> should be an independent set in <i>G</i>), <span>Almost Forest Deletion</span> and <span>Pseudoforest Deletion</span>. In <span>Pseudoforest Deletion</span>, each connected component in <span>(G-S)</span> has at most one cycle in it. However, in <span>Almost Forest Deletion</span>, the input is a graph <i>G</i> and non-negative integers <span>(k,ell in {{mathbb {N}}})</span>, and the objective is to test whether there exists a vertex subset <i>S</i> of size at most <i>k</i>, such that <span>(G-S)</span> is <span>(ell )</span> edges away from a forest. In this paper, using the methodology of Li and Nederlof [TALG, 2022], we obtain the current fastest algorithms for all these problems. In particular we obtain the following randomized algorithms. </p><ol>\u0000 <li>\u0000 <span>1.</span>\u0000 \u0000 <p><span>Independent Feedback Vertex Set</span> can be solved in time <span>({mathcal {O}}^{star }(2.7^k))</span>.</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>2.</span>\u0000 \u0000 <p><span>Pseudo Forest Deletion</span> can be solved in time <span>({mathcal {O}}^{star }(2.85^k))</span>.</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>3.</span>\u0000 \u0000 <p><span>Almost Forest Deletion</span> can be solved in time <span>({mathcal {O}}^{star }(min {2.85^k cdot 8.54^ell ,2.7^k cdot 36.61^ell ,3^k cdot 1.78^ell }))</span>.</p>\u0000 \u0000 </li>\u0000 </ol></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1657 - 1699"},"PeriodicalIF":0.9,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139589721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信