Results 11  20
of
435
Subexponential parameterized algorithms
 Computer Science Review
"... We give a review of a series of techniques and results on the design of subexponential parameterized algorithms for graph problems. The design of such algorithms usually consists of two main steps: first find a branch (or tree) decomposition of the input graph whose width is bounded by a sublinear ..."
Abstract

Cited by 36 (17 self)
 Add to MetaCart
We give a review of a series of techniques and results on the design of subexponential parameterized algorithms for graph problems. The design of such algorithms usually consists of two main steps: first find a branch (or tree) decomposition of the input graph whose width is bounded by a sublinear function of the parameter and, second, use this decomposition to solve the problem in time that is single exponential to this bound. The main tool for the first step is Bidimensionality Theory. Here we present the potential, but also the boundaries, of this theory. For the second step, we describe recent techniques, associating the analysis of subexponential algorithms to combinatorial bounds related to Catalan numbers. As a result, we have 2 O( √ k) · n O(1) time algorithms for a wide variety of parameterized problems on graphs, where n is the size of the graph and k is the parameter. 1
Reflections on multivariate algorithmics and problem parameterization
 PROC. 27TH STACS
, 2010
"... Research on parameterized algorithmics for NPhard problems has steadily grown over the last years. We survey and discuss how parameterized complexity analysis naturally develops into the field of multivariate algorithmics. Correspondingly, we describe how to perform a systematic investigation and e ..."
Abstract

Cited by 36 (21 self)
 Add to MetaCart
(Show Context)
Research on parameterized algorithmics for NPhard problems has steadily grown over the last years. We survey and discuss how parameterized complexity analysis naturally develops into the field of multivariate algorithmics. Correspondingly, we describe how to perform a systematic investigation and exploitation of the “parameter space” of computationally hard problems.
A Multivariate Complexity Analysis of Determining Possible Winners Given Incomplete Votes
"... The POSSIBLE WINNER problem asks whether some distinguished candidate may become the winner of an election when the given incomplete votes are extended into complete ones in a favorable way. POSSIBLE WINNER is NPcomplete for common voting rules such as Borda, many other positional scoring rules, Bu ..."
Abstract

Cited by 34 (8 self)
 Add to MetaCart
The POSSIBLE WINNER problem asks whether some distinguished candidate may become the winner of an election when the given incomplete votes are extended into complete ones in a favorable way. POSSIBLE WINNER is NPcomplete for common voting rules such as Borda, many other positional scoring rules, Bucklin, Copeland etc. We investigate how three different parameterizations influence the computational complexity of POSSIBLE WINNER for a number of voting rules. We show fixedparameter tractability results with respect to the parameter “number of candidates ” but intractability results with respect to the parameter “number of votes”. Finally, we derive fixedparameter tractability results with respect to the parameter “total number of undetermined candidate pairs ” and identify an interesting polynomialtime solvable special case for Borda. 1
Multimode Control Attacks on Elections
"... In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections—attempts to improve the election outcome by such actions as adding/deleting candidates or voters. That work has led to many results on how algorithms can be used to find attacks on elections and how complexi ..."
Abstract

Cited by 34 (12 self)
 Add to MetaCart
(Show Context)
In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections—attempts to improve the election outcome by such actions as adding/deleting candidates or voters. That work has led to many results on how algorithms can be used to find attacks on elections and how complexitytheoretic hardness results can be used as shields against attacks. However, all the work in this line has assumed that the attacker employs just a single type of attack. In this paper, we model and study the case in which the attacker launches a multipronged (i.e., multimode) attack. We do so to more realistically capture the richness of reallife settings. For example, an attacker might simultaneously try to suppress some voters, attract new voters into the election, and introduce a spoiler candidate. Our model provides a unified framework for such varied attacks, and by constructing polynomialtime multiprong attack algorithms we prove that for various election systems even such concerted, flexible attacks can be perfectly planned in deterministic polynomial time. 1
A quadratic kernel for feedback vertex set
 in Proc. 20th SODA, ACM/SIAM, 2009
"... We prove that given an undirected graph G on n vertices and an integer k, one can compute in polynomial time in n a graph G ′ with at most 5k 2 +k vertices and an integer k ′ such that G has a feedback vertex set of size at most k iff G ′ has a feedback vertex set of size at most k ′. This result im ..."
Abstract

Cited by 33 (3 self)
 Add to MetaCart
(Show Context)
We prove that given an undirected graph G on n vertices and an integer k, one can compute in polynomial time in n a graph G ′ with at most 5k 2 +k vertices and an integer k ′ such that G has a feedback vertex set of size at most k iff G ′ has a feedback vertex set of size at most k ′. This result improves a previous O(k 11) kernel of Burrage et al. [6], and a more recent cubic kernel of Bodlaender [3]. This problem was communicated by Fellows in [5]. 1
Fixedparameter tractability of multicut parameterized by the size of the cutset
, 2011
"... Given an undirected graph G, a collection {(s1, t1),...,(sk, tk)} of pairs of vertices, and an integer p, the EDGE MULTICUT problem ask if there is a set S of at most p edges such that the removal of S disconnects every si from the corresponding ti. VERTEX MULTICUT is the analogous problem where S i ..."
Abstract

Cited by 33 (5 self)
 Add to MetaCart
Given an undirected graph G, a collection {(s1, t1),...,(sk, tk)} of pairs of vertices, and an integer p, the EDGE MULTICUT problem ask if there is a set S of at most p edges such that the removal of S disconnects every si from the corresponding ti. VERTEX MULTICUT is the analogous problem where S is a set of at most p vertices. Our main result is that both problems can be solved in time 2O(p3) · nO(1), i.e., fixedparameter tractable parameterized by the size p of the cutset in the solution. By contrast, it is unlikely that an algorithm with running time of the form f (p) · nO(1) exists for the directed version of the problem, as we show it to be W[1]hard parameterized by the size of the cutset.
Linear problem kernels for NPhard problems on planar graphs
 In Proc. 34th ICALP, volume 4596 of LNCS
, 2007
"... Abstract. We develop a generic framework for deriving linearsize problem kernels for NPhard problems on planar graphs. We demonstrate the usefulness of our framework in several concrete case studies, giving new kernelization results for Connected Vertex Cover, Minimum Edge Dominating Set, Maximum ..."
Abstract

Cited by 32 (5 self)
 Add to MetaCart
(Show Context)
Abstract. We develop a generic framework for deriving linearsize problem kernels for NPhard problems on planar graphs. We demonstrate the usefulness of our framework in several concrete case studies, giving new kernelization results for Connected Vertex Cover, Minimum Edge Dominating Set, Maximum Triangle Packing, and Efficient Dominating Set on planar graphs. On the route to these results, we present effective, problemspecific data reduction rules that are useful in any approach attacking the computational intractability of these problems. 1
Parameterized computational complexity of Dodgson and Young elections
, 2007
"... Abstract. We show that, other than for standard complexity theory with known NPcompleteness results, the computational complexity of the Dodgson and Young election systems is completely different from a parameterized complexity point of view. That is, on the one hand, we present an efficient fixed ..."
Abstract

Cited by 32 (9 self)
 Add to MetaCart
(Show Context)
Abstract. We show that, other than for standard complexity theory with known NPcompleteness results, the computational complexity of the Dodgson and Young election systems is completely different from a parameterized complexity point of view. That is, on the one hand, we present an efficient fixedparameter algorithm for determining a Condorcet winner in Dodgson elections by a minimum number of switches in the votes. On the other hand, we prove that the corresponding problem for Young elections, where one has to delete votes instead of performing switches, is W[2]complete. In addition, we study Dodgson elections that allow ties between the candidates and give fixedparameter tractability as well as W[2]hardness results depending on the cost model for switching ties. 1
Fixedparameter algorithms for artificial intelligence, constraint satisfaction, and database problems
, 2007
"... We survey the parameterized complexity of problems that arise in artificial intelligence, database theory and automated reasoning. In particular, we consider various parameterizations of the constraint satisfaction problem, the evaluation problem of Boolean conjunctive database queries and the propo ..."
Abstract

Cited by 31 (10 self)
 Add to MetaCart
We survey the parameterized complexity of problems that arise in artificial intelligence, database theory and automated reasoning. In particular, we consider various parameterizations of the constraint satisfaction problem, the evaluation problem of Boolean conjunctive database queries and the propositional satisfiability problem. Furthermore, we survey parameterized algorithms for problems arising in the context of the stable model semantics of logic programs, for a number of other problems of nonmonotonic reasoning, and for the computation of cores in data exchange.
Tractable Hypergraph Properties for Constraint Satisfaction and Conjunctive Queries
, 2010
"... An important question in the study of constraint satisfaction problems (CSP) is understanding how the graph or hypergraph describing the incidence structure of the constraints influences the complexity of the problem. For binary CSP instances (i.e., where each constraint involves only two variables ..."
Abstract

Cited by 31 (4 self)
 Add to MetaCart
An important question in the study of constraint satisfaction problems (CSP) is understanding how the graph or hypergraph describing the incidence structure of the constraints influences the complexity of the problem. For binary CSP instances (i.e., where each constraint involves only two variables), the situation is well understood: the complexity of the problem essentially depends on the treewidth of the graph of the constraints [19, 24]. However, this is not the correct answer if constraints with unbounded number of variables are allowed, and in particular, for CSP instances arising from query evaluation problems in database theory. Formally, if H is a class of hypergraphs, then let CSP(H) be CSP restricted to instances whose hypergraph is in H. Our goal is to characterize those classes of hypergraphs for which CSP(H) is polynomialtime solvable or fixedparameter tractable, parameterized by the number of variables. In the applications related to database query evaluation, we usually assume that the number of variables is much smaller than the size of the instance, thus parameterization by the number of variables is a meaningful question. The most general known property of H that makes CSP(H) polynomialtime solvable is bounded fractional hypertree width. Here we introduce a new hypergraph measure called submodular width, and show that bounded submodular width of H (which is a strictly more general property than bounded fractional hypertree width) implies that CSP(H) is fixedparameter tractable. In a matching hardness result, we show that if H has unbounded submodular width, then CSP(H) is not fixedparameter tractable (and hence not polynomialtime solvable), unless the Exponential Time Hypothesis (ETH) fails. The algorithmic result uses tree decompositions in a novel way: instead of using a single decomposition depending on the hypergraph, the instance is split into a set of