-
Residue Domination in Bounded-Treewidth Graphs
Authors:
Jakob Greilhuber,
Philipp Schepper,
Philip Wellnitz
Abstract:
For the vertex selection problem $(σ,ρ)$-DomSet one is given two fixed sets $σ$ and $ρ$ of integers and the task is to decide whether we can select vertices of the input graph such that, for every selected vertex, the number of selected neighbors is in $σ$ and, for every unselected vertex, the number of selected neighbors is in $ρ$ [Telle, Nord. J. Comp. 1994]. This framework covers many fundament…
▽ More
For the vertex selection problem $(σ,ρ)$-DomSet one is given two fixed sets $σ$ and $ρ$ of integers and the task is to decide whether we can select vertices of the input graph such that, for every selected vertex, the number of selected neighbors is in $σ$ and, for every unselected vertex, the number of selected neighbors is in $ρ$ [Telle, Nord. J. Comp. 1994]. This framework covers many fundamental graph problems such as Independent Set and Dominating Set.
We significantly extend the recent result by Focke et al. [SODA 2023] to investigate the case when $σ$ and $ρ$ are two (potentially different) residue classes modulo $m\ge 2$. We study the problem parameterized by treewidth and present an algorithm that solves in time $m^{tw} \cdot n^{O(1)}$ the decision, minimization and maximization version of the problem. This significantly improves upon the known algorithms where for the case $m \ge 3$ not even an explicit running time is known. We complement our algorithm by providing matching lower bounds which state that there is no $(m-ε)^{pw} \cdot n^{O(1)}$-time algorithm parameterized by pathwidth $pw$, unless SETH fails. For $m = 2$, we extend these bounds to the minimization version as the decision version is efficiently solvable.
△ Less
Submitted 7 May, 2025; v1 submitted 12 March, 2024;
originally announced March 2024.
-
Hitting Meets Packing: How Hard Can it Be?
Authors:
Jacob Focke,
Fabian Frei,
Shaohua Li,
Dániel Marx,
Philipp Schepper,
Roohani Sharma,
Karol Węgrzycki
Abstract:
We study a general family of problems that form a common generalization of classic hitting (also referred to as covering or transversal) and packing problems. An instance of X-HitPack asks: Can removing k (deletable) vertices of a graph G prevent us from packing $\ell$ vertex-disjoint objects of type X? This problem captures a spectrum of problems with standard hitting and packing on opposite ends…
▽ More
We study a general family of problems that form a common generalization of classic hitting (also referred to as covering or transversal) and packing problems. An instance of X-HitPack asks: Can removing k (deletable) vertices of a graph G prevent us from packing $\ell$ vertex-disjoint objects of type X? This problem captures a spectrum of problems with standard hitting and packing on opposite ends. Our main motivating question is whether the combination X-HitPack can be significantly harder than these two base problems. Already for a particular choice of X, this question can be posed for many different complexity notions, leading to a large, so-far unexplored domain in the intersection of the areas of hitting and packing problems.
On a high-level, we present two case studies: (1) X being all cycles, and (2) X being all copies of a fixed graph H. In each, we explore the classical complexity, as well as the parameterized complexity with the natural parameters k+l and treewidth. We observe that the combined problem can be drastically harder than the base problems: for cycles or for H being a connected graph with at least 3 vertices, the problem is Σ_2^P-complete and requires double-exponential dependence on the treewidth of the graph (assuming the Exponential-Time Hypothesis). In contrast, the combined problem admits qualitatively similar running times as the base problems in some cases, although significant novel ideas are required. For example, for X being all cycles, we establish a 2^poly(k+l)n^O(1) algorithm using an involved branching method. Also, for X being all edges (i.e., H = K_2; this combines Vertex Cover and Maximum Matching) the problem can be solved in time 2^\poly(tw)n^O(1) on graphs of treewidth tw. The key step enabling this running time relies on a combinatorial bound obtained from an algebraic (linear delta-matroid) representation of possible matchings.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Tight Complexity Bounds for Counting Generalized Dominating Sets in Bounded-Treewidth Graphs Part II: Hardness Results
Authors:
Jacob Focke,
Dániel Marx,
Fionn Mc Inerney,
Daniel Neuen,
Govind S. Sankar,
Philipp Schepper,
Philip Wellnitz
Abstract:
For a well-studied family of domination-type problems, in bounded-treewidth graphs, we investigate whether it is possible to find faster algorithms. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) u…
▽ More
For a well-studied family of domination-type problems, in bounded-treewidth graphs, we investigate whether it is possible to find faster algorithms. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) unifies common problems like $\text{Independent Set}$, $\text{Dominating Set}$, $\text{Independent Dominating Set}$, and many others.
In an accompanying paper, it is proven that, for all pairs of finite or cofinite sets $(σ,ρ)$, there is an algorithm that counts $(σ,ρ)$-sets in time $(c_{σ,ρ})^{\text{tw}}\cdot n^{O(1)}$ (if a tree decomposition of width $\text{tw}$ is given in the input). Here, $c_{σ,ρ}$ is a constant with an intricate dependency on $σ$ and $ρ$. Despite this intricacy, we show that the algorithms in the accompanying paper are most likely optimal, i.e., for any pair $(σ, ρ)$ of finite or cofinite sets where the problem is non-trivial, and any $\varepsilon>0$, a $(c_{σ,ρ}-\varepsilon)^{\text{tw}}\cdot n^{O(1)}$-algorithm counting the number of $(σ,ρ)$-sets would violate the Counting Strong Exponential-Time Hypothesis ($\#$SETH). For finite sets $σ$ and $ρ$, our lower bounds also extend to the decision version, showing that those algorithms are optimal in this setting as well.
△ Less
Submitted 26 May, 2023;
originally announced June 2023.
-
Tight Complexity Bounds for Counting Generalized Dominating Sets in Bounded-Treewidth Graphs Part I: Algorithmic Results
Authors:
Jacob Focke,
Dániel Marx,
Fionn Mc Inerney,
Daniel Neuen,
Govind S. Sankar,
Philipp Schepper,
Philip Wellnitz
Abstract:
We investigate how efficiently a well-studied family of domination-type problems can be solved on bounded-treewidth graphs. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) unifies standard problems…
▽ More
We investigate how efficiently a well-studied family of domination-type problems can be solved on bounded-treewidth graphs. For sets $σ,ρ$ of non-negative integers, a $(σ,ρ)$-set of a graph $G$ is a set $S$ of vertices such that $|N(u)\cap S|\in σ$ for every $u\in S$, and $|N(v)\cap S|\in ρ$ for every $v\not\in S$. The problem of finding a $(σ,ρ)$-set (of a certain size) unifies standard problems such as Independent Set, Dominating Set, Independent Dominating Set, and many others.
For all pairs of finite or cofinite sets $(σ,ρ)$, we determine (under standard complexity assumptions) the best possible value $c_{σ,ρ}$ such that there is an algorithm that counts $(σ,ρ)$-sets in time $c_{σ,ρ}^{\sf tw}\cdot n^{O(1)}$ (if a tree decomposition of width ${\sf tw}$ is given in the input). For example, for the Exact Independent Dominating Set problem (also known as Perfect Code) corresponding to $σ=\{0\}$ and $ρ=\{1\}$, we improve the $3^{\sf tw}\cdot n^{O(1)}$ algorithm of [van Rooij, 2020] to $2^{\sf tw}\cdot n^{O(1)}$.
Despite the unusually delicate definition of $c_{σ,ρ}$, an accompanying paper shows that our algorithms are most likely optimal, that is, for any pair $(σ, ρ)$ of finite or cofinite sets where the problem is non-trivial, and any $\varepsilon>0$, a $(c_{σ,ρ}-\varepsilon)^{\sf tw}\cdot n^{O(1)}$-algorithm counting the number of $(σ,ρ)$-sets would violate the Counting Strong Exponential-Time Hypothesis (#SETH). For finite sets $σ$ and $ρ$, these lower bounds also extend to the decision version, and hence, our algorithms are optimal in this setting as well. In contrast, for many cofinite sets, we show that further significant improvements for the decision and optimization versions are possible using the technique of representative sets.
△ Less
Submitted 18 April, 2025; v1 submitted 8 November, 2022;
originally announced November 2022.
-
Computing Generalized Convolutions Faster Than Brute Force
Authors:
Barış Can Esmer,
Ariel Kulik,
Dániel Marx,
Philipp Schepper,
Karol Węgrzycki
Abstract:
In this paper, we consider a general notion of convolution. Let $D$ be a finite domain and let $D^n$ be the set of $n$-length vectors (tuples) of $D$. Let $f : D \times D \to D$ be a function and let $\oplus_f$ be a coordinate-wise application of $f$. The $f$-Convolution of two functions $g,h : D^n \to \{-M,\ldots,M\}$ is…
▽ More
In this paper, we consider a general notion of convolution. Let $D$ be a finite domain and let $D^n$ be the set of $n$-length vectors (tuples) of $D$. Let $f : D \times D \to D$ be a function and let $\oplus_f$ be a coordinate-wise application of $f$. The $f$-Convolution of two functions $g,h : D^n \to \{-M,\ldots,M\}$ is $$(g \otimes_f h)(\textbf{v}) := \sum_{\substack{\textbf{v}_g,\textbf{v}_h \in D^n\\ \text{s.t. } \textbf{v}_g \oplus_f \textbf{v}_h}} g(\textbf{v}_g) \cdot h(\textbf{v}_h)$$ for every $\textbf{v} \in D^n$. This problem generalizes many fundamental convolutions such as Subset Convolution, XOR Product, Covering Product or Packing Product, etc. For arbitrary function $f$ and domain $D$ we can compute $f$-Convolution via brute-force enumeration in $\widetilde{O}(|D|^{2n}\mathrm{polylog}(M))$ time.
Our main result is an improvement over this naive algorithm. We show that $f$-Convolution can be computed exactly in $\widetilde{O}((c \cdot |D|^2)^{n}\mathrm{polylog}(M))$ for constant $c := 3/4$ when $D$ has even cardinality. Our main observation is that a \emph{cyclic partition} of a function $f : D \times D \to D$ can be used to speed up the computation of $f$-Convolution, and we show that an appropriate cyclic partition exists for every $f$.
Furthermore, we demonstrate that a single entry of the $f$-Convolution can be computed more efficiently. In this variant, we are given two functions $g,h : D^n \to \{-M,\ldots,M\}$ alongside with a vector $\textbf{v} \in D^n$ and the task of the $f$-Query problem is to compute integer $(g \otimes_f h)(\textbf{v})$. This is a generalization of the well-known Orthogonal Vectors problem. We show that $f$-Query can be computed in $\widetilde{O}(|D|^{\fracω{2} n}\mathrm{polylog}(M))$ time, where $ω\in [2,2.372)$ is the exponent of currently fastest matrix multiplication algorithm.
△ Less
Submitted 30 January, 2023; v1 submitted 4 September, 2022;
originally announced September 2022.
-
Domination and Cut Problems on Chordal Graphs with Bounded Leafage
Authors:
Esther Galby,
Daniel Marx,
Philipp Schepper,
Roohani Sharma,
Prafullkumar Tale
Abstract:
The leafage of a chordal graph G is the minimum integer l such that G can be realized as an intersection graph of subtrees of a tree with l leaves. We consider structural parameterization by the leafage of classical domination and cut problems on chordal graphs. Fomin, Golovach, and Raymond [ESA 2018, Algorithmica 2020] proved, among other things, that Dominating Set on chordal graphs admits an al…
▽ More
The leafage of a chordal graph G is the minimum integer l such that G can be realized as an intersection graph of subtrees of a tree with l leaves. We consider structural parameterization by the leafage of classical domination and cut problems on chordal graphs. Fomin, Golovach, and Raymond [ESA 2018, Algorithmica 2020] proved, among other things, that Dominating Set on chordal graphs admits an algorithm running in time $2^{O(l^2)} n^{O(1)}$. We present a conceptually much simpler algorithm that runs in time $2^{O(l)} n^{O(1)}$. We extend our approach to obtain similar results for Connected Dominating Set and Steiner Tree. We then consider the two classical cut problems MultiCut with Undeletable Terminals and Multiway Cut with Undeletable Terminals. We prove that the former is W[1]-hard when parameterized by the leafage and complement this result by presenting a simple $n^{O(l)}$-time algorithm. To our surprise, we find that Multiway Cut with Undeletable Terminals on chordal graphs can be solved, in contrast, in $n^{O(1)}$-time.
△ Less
Submitted 4 August, 2022;
originally announced August 2022.
-
Parameterized Complexity of Weighted Multicut in Trees
Authors:
Esther Galby,
Dániel Marx,
Philipp Schepper,
Roohani Sharma,
Prafullkumar Tale
Abstract:
The Edge Multicut problem is a classical cut problem where given an undirected graph $G$, a set of pairs of vertices $\mathcal{P}$, and a budget $k$, the goal is to determine if there is a set $S$ of at most $k$ edges such that for each $(s,t) \in \mathcal{P}$, $G-S$ has no path from $s$ to $t$. Edge Multicut has been relatively recently shown to be fixed-parameter tractable (FPT), parameterized b…
▽ More
The Edge Multicut problem is a classical cut problem where given an undirected graph $G$, a set of pairs of vertices $\mathcal{P}$, and a budget $k$, the goal is to determine if there is a set $S$ of at most $k$ edges such that for each $(s,t) \in \mathcal{P}$, $G-S$ has no path from $s$ to $t$. Edge Multicut has been relatively recently shown to be fixed-parameter tractable (FPT), parameterized by $k$, by Marx and Razgon [SICOMP 2014], and independently by Bousquet et al. [SICOMP 2018]. In the weighted version of the problem, called Weighted Edge Multicut one is additionally given a weight function $\mathtt{wt} : E(G) \to \mathbb{N}$ and a weight bound $w$, and the goal is to determine if there is a solution of size at most $k$ and weight at most $w$. Both the FPT algorithms for Edge Multicut by Marx et al. and Bousquet et al. fail to generalize to the weighted setting. In fact, the weighted problem is non-trivial even on trees and determining whether Weighted Edge Multicut on trees is FPT was explicitly posed as an open problem by Bousquet et al. [STACS 2009]. In this article, we answer this question positively by designing an algorithm which uses a very recent result by Kim et al. [STOC 2022] about directed flow augmentation as subroutine.
We also study a variant of this problem where there is no bound on the size of the solution, but the parameter is a structural property of the input, for example, the number of leaves of the tree. We strengthen our results by stating them for the more general vertex deletion version.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
Anti-Factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard)
Authors:
Dániel Marx,
Govind S. Sankar,
Philipp Schepper
Abstract:
In the general AntiFactor problem, a graph $G$ is given with a set $X_v\subseteq \mathbb{N}$ of forbidden degrees for every vertex $v$ and the task is to find a set $S$ of edges such that the degree of $v$ in $S$ is not in the set $X_v$. Standard techniques (dynamic programming + fast convolution) can be used to show that if $M$ is the largest forbidden degree, then the problem can be solved in ti…
▽ More
In the general AntiFactor problem, a graph $G$ is given with a set $X_v\subseteq \mathbb{N}$ of forbidden degrees for every vertex $v$ and the task is to find a set $S$ of edges such that the degree of $v$ in $S$ is not in the set $X_v$. Standard techniques (dynamic programming + fast convolution) can be used to show that if $M$ is the largest forbidden degree, then the problem can be solved in time $(M+2)^k\cdot n^{O(1)}$ if a tree decomposition of width $k$ is given. However, significantly faster algorithms are possible if the sets $X_v$ are sparse: our main algorithmic result shows that if every vertex has at most $x$ forbidden degrees (we call this special case AntiFactor$_x$), then the problem can be solved in time $(x+1)^{O(k)}\cdot n^{O(1)}$. That is, the AntiFactor$_x$ is fixed-parameter tractable parameterized by treewidth $k$ and the maximum number $x$ of excluded degrees.
Our algorithm uses the technique of representative sets, which can be generalized to the optimization version, but (as expected) not to the counting version of the problem. In fact, we show that #AntiFactor$_1$ is already #W[1]-hard parameterized by the width of the given decomposition. Moreover, we show that, unlike for the decision version, the standard dynamic programming algorithm is essentially optimal for the counting version. Formally, for a fixed nonempty set $X$, we denote by $X$-AntiFactor the special case where every vertex $v$ has the same set $X_v=X$ of forbidden degrees. We show the following lower bound for every fixed set $X$: if there is an $ε>0$ such that #$X$-AntiFactor can be solved in time $(\max X+2-ε)^k\cdot n^{O(1)}$ on a tree decomposition of width $k$, then the Counting Strong Exponential-Time Hypothesis (#SETH) fails.
△ Less
Submitted 7 February, 2023; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Degrees and Gaps: Tight Complexity Results of General Factor Problems Parameterized by Treewidth and Cutwidth
Authors:
Dániel Marx,
Govind S. Sankar,
Philipp Schepper
Abstract:
For the General Factor problem we are given an undirected graph $G$ and for each vertex $v\in V(G)$ a finite set $B_v$ of non-negative integers. The task is to decide if there is a subset $S\subseteq E(G)$ such that $deg_S(v)\in B_v$ for all vertices $v$ of $G$. The maxgap of a finite integer set $B$ is the largest $d\ge 0$ such that there is an $a\ge 0$ with $[a,a+d+1]\cap B=\{a,a+d+1\}$. Cornuéj…
▽ More
For the General Factor problem we are given an undirected graph $G$ and for each vertex $v\in V(G)$ a finite set $B_v$ of non-negative integers. The task is to decide if there is a subset $S\subseteq E(G)$ such that $deg_S(v)\in B_v$ for all vertices $v$ of $G$. The maxgap of a finite integer set $B$ is the largest $d\ge 0$ such that there is an $a\ge 0$ with $[a,a+d+1]\cap B=\{a,a+d+1\}$. Cornuéjols (1988) showed that if the maxgap of all sets $B_v$ is at most 1, then the decision version of General Factor is poly-time solvable. Dudycz and Paluch (2018) extended this result for the minimization and maximization versions. Using convolution techniques from van Rooij (2020), we improve upon the previous algorithm by Arulselvan et al. (2018) and present an algorithm counting the number of solutions of a certain size in time $O^*((M+1)^k)$, given a tree decomposition of width $k$, where $M=\max_v \max B_v$.
We prove that this algorithm is essentially optimal for all cases that are not polynomial time solvable for the decision, minimization or maximization versions. We prove that such improvements are not possible even for $B$-Factor, which is General Factor on graphs where all sets $B_v$ agree with the fixed set $B$. We show that for every fixed $B$ where the problem is NP-hard, our new algorithm cannot be significantly improved: assuming the Strong Exponential Time Hypothesis (SETH), no algorithm can solve $B$-Factor in time $O^*((\max B+1-ε)^k)$ for any $ε>0$. We extend this bound to the counting version of $B$-Factor for arbitrary, non-trivial sets $B$, assuming #SETH.
We also investigate the parameterization of the problem by cutwidth. Unlike for treewidth, a larger set $B$ does not make the problem harder: Given a linear layout of width $k$ we give a $O^*(2^k)$ algorithm for any $B$ and provide a matching lower bound that this is optimal for the NP-hard cases.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Subcubic Certificates for CFL Reachability
Authors:
Dmitry Chistikov,
Rupak Majumdar,
Philipp Schepper
Abstract:
Many problems in interprocedural program analysis can be modeled as the context-free language (CFL) reachability problem on graphs and can be solved in cubic time. Despite years of efforts, there are no known truly sub-cubic algorithms for this problem. We study the related certification task: given an instance of CFL reachability, are there small and efficiently checkable certificates for the exi…
▽ More
Many problems in interprocedural program analysis can be modeled as the context-free language (CFL) reachability problem on graphs and can be solved in cubic time. Despite years of efforts, there are no known truly sub-cubic algorithms for this problem. We study the related certification task: given an instance of CFL reachability, are there small and efficiently checkable certificates for the existence and for the non-existence of a path? We show that, in both scenarios, there exist succinct certificates ($O(n^2)$ in the size of the problem) and these certificates can be checked in subcubic (matrix multiplication) time. The certificates are based on grammar-based compression of paths (for positive instances) and on invariants represented as matrix constraints (for negative instances). Thus, CFL reachability lies in nondeterministic and co-nondeterministic subcubic time.
A natural question is whether faster algorithms for CFL reachability will lead to faster algorithms for combinatorial problems such as Boolean satisfiability (SAT). As a consequence of our certification results, we show that there cannot be a fine-grained reduction from SAT to CFL reachability for a conditional lower bound stronger than $n^ω$, unless the nondeterministic strong exponential time hypothesis (NSETH) fails.
Our results extend to related subcubic equivalent problems: pushdown reachability and two-way nondeterministic pushdown automata (2NPDA) language recognition. For example, we describe succinct certificates for pushdown non-reachability (inductive invariants) and observe that they can be checked in matrix multiplication time. We also extract a new hardest 2NPDA language, capturing the "hard core" of all these problems.
△ Less
Submitted 25 February, 2021;
originally announced February 2021.
-
Fine-Grained Complexity of Regular Expression Pattern Matching and Membership
Authors:
Philipp Schepper
Abstract:
The currently fastest algorithm for regular expression pattern matching and membership improves the classical O(nm) time algorithm by a factor of about log^{3/2}n. Instead of focussing on general patterns we analyse homogeneous patterns of bounded depth in this work. For them a classification splitting the types in easy (strongly sub-quadratic) and hard (essentially quadratic time under SETH) is k…
▽ More
The currently fastest algorithm for regular expression pattern matching and membership improves the classical O(nm) time algorithm by a factor of about log^{3/2}n. Instead of focussing on general patterns we analyse homogeneous patterns of bounded depth in this work. For them a classification splitting the types in easy (strongly sub-quadratic) and hard (essentially quadratic time under SETH) is known. We take a very fine-grained look at the hard pattern types from this classification and show a dichotomy: few types allow super-poly-logarithmic improvements while the algorithms for the other pattern types can only be improved by a constant number of log-factors, assuming the Formula-SAT Hypothesis.
△ Less
Submitted 21 September, 2020; v1 submitted 6 August, 2020;
originally announced August 2020.