首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
On the structural parameterized complexity of defective coloring 缺陷着色的结构参数化复杂度
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-11-11 DOI: 10.1016/j.jcss.2025.103736
Sriram Bhyravarapu , Pankaj Kumar , Saket Saurabh
In this paper, we consider the problem Defective Coloring. Given a graph G and two positive integers k and Δ, the objective is to determine whether it is possible to obtain a coloring (not necessarily proper) of the vertices of G using at most k colors such that each vertex has at most Δ neighbors in the same color class. Defective Coloring is a generalization of Graph Coloring with Δ=0. The optimization variant of this problem, which aims to find the minimum number of colors k, is known to be NP-hard even for split graphs and cographs. Belmonte, Lampis, and Mitsou (SIDMA 2020) showed that Defective Coloring is W[1]-hard when parameterized by feedback vertex set or by treedepth, which implies W[1]-hardness for path-width and treewidth parameters. The problem is W[1]-hard parameterized by modular-width or clique-width as Defective Coloring is NP-hard on cographs. They asked whether Defective Coloring is fixed-parameter tractable (FPT) when parameterized by modular-width, neighborhood diversity or clique-width combined with either k or Δ. In an effort to address the question concerning modular-width, this study investigates the parameters neighborhood diversity and twin-cover, which are special cases of modular-width. We show that Defective Coloring is FPT when parameterized by twin-cover, distance to disjoint paths, or the combined parameters neighborhood diversity and k. The latter implies an FPT algorithm for complete-d-partite graphs, a subclass of cographs, parameterized by d. We present an algorithm for graphs with bounded distance to d-degree. We also present a 1-additive approximation algorithm for split graphs.
本文考虑了缺陷着色问题。给定一个图G和两个正整数k和Δ ,目标是确定是否有可能使用最多k种颜色获得G的顶点的着色(不一定是适当的),使得每个顶点在同一颜色类中最多有Δ 邻居。缺陷着色是Δ =0的图着色的一种推广。这个问题的优化变体,旨在找到最小颜色k的数量,已知即使对于分割图和图也是np困难的。Belmonte, Lampis, and Mitsou (SIDMA 2020)表明,当用反馈顶点集或树深度参数化时,缺陷着色是W[1]-硬度,这意味着路径宽度和树宽度参数的硬度为W[1]-硬度。由于缺陷着色在图上是NP-hard的,所以问题是用模宽度或团宽度参数化w[1]-hard。他们问,当用模块宽度、邻域多样性或与k或Δ联合的团宽度进行参数化时,缺陷着色是否是固定参数可处理的(FPT)。为了解决模块宽度的问题,本文研究了模块宽度的特殊情况——邻域多样性和双覆盖参数。我们证明了当用双覆盖、到不相交路径的距离或结合参数邻域多样性和k来参数化时,缺陷着色是FPT。后者暗示了一种用于完全d部图的FPT算法,完全d部图是图的一个子类,参数化为d。我们提出了一种用于到d度有界距离的图的算法。我们还提出了一个分割图的1加性近似算法。
{"title":"On the structural parameterized complexity of defective coloring","authors":"Sriram Bhyravarapu ,&nbsp;Pankaj Kumar ,&nbsp;Saket Saurabh","doi":"10.1016/j.jcss.2025.103736","DOIUrl":"10.1016/j.jcss.2025.103736","url":null,"abstract":"<div><div>In this paper, we consider the problem <span>Defective Coloring</span>. Given a graph <em>G</em> and two positive integers <em>k</em> and <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span>, the objective is to determine whether it is possible to obtain a coloring (not necessarily proper) of the vertices of <em>G</em> using at most <em>k</em> colors such that each vertex has at most <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> neighbors in the same color class. <span>Defective Coloring</span> is a generalization of <span>Graph Coloring</span> with <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>=</mo><mn>0</mn></math></span>. The optimization variant of this problem, which aims to find the minimum number of colors <em>k</em>, is known to be <span>NP</span>-hard even for split graphs and cographs. Belmonte, Lampis, and Mitsou (SIDMA 2020) showed that <span>Defective Coloring</span> is <span>W[1]</span>-hard when parameterized by feedback vertex set or by treedepth, which implies <span>W[1]</span>-hardness for path-width and treewidth parameters. The problem is <span>W[1]</span>-hard parameterized by modular-width or clique-width as <span>Defective Coloring</span> is <span>NP</span>-hard on cographs. They asked whether <span>Defective Coloring</span> is fixed-parameter tractable (<span>FPT</span>) when parameterized by modular-width, neighborhood diversity or clique-width combined with either <em>k</em> or <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span>. In an effort to address the question concerning modular-width, this study investigates the parameters neighborhood diversity and twin-cover, which are special cases of modular-width. We show that <span>Defective Coloring</span> is <span>FPT</span> when parameterized by twin-cover, distance to disjoint paths, or the combined parameters neighborhood diversity and <em>k</em>. The latter implies an FPT algorithm for complete-<em>d</em>-partite graphs, a subclass of cographs, parameterized by <em>d</em>. We present an algorithm for graphs with bounded distance to <em>d</em>-degree. We also present a 1-additive approximation algorithm for split graphs.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103736"},"PeriodicalIF":0.9,"publicationDate":"2025-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145580509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithms and hardness results for the (k,ℓ)-cover problem (k, r)-覆盖问题的算法和硬度结果
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-11-03 DOI: 10.1016/j.jcss.2025.103727
Amirali Madani , Anil Maheshwari , Babak Miraftab , Bodhayan Roy
A connected graph has a (k,)-cover if each of its edges is contained in at least cliques of order k. Motivated by recent advances in extremal combinatorics and the literature on edge modification problems, we study the algorithmic version of the (k,)-cover problem. Given a connected graph G, the (k,)-cover problem is to identify the smallest subset of non-edges of G such that their addition to G results in a graph with a (k,)-cover. For every constant k3, we show that the (k,1)-cover problem is NP-complete for general graphs. Moreover, we show that for every constant k3, the (k,1)-cover problem admits no polynomial-time constant-factor approximation algorithm unless P=NP. However, we show that the (3,1)-cover problem can be solved in polynomial time when the input graph is chordal. For the class of trees and general values of k, we show that the (k,1)-cover problem is NP-hard even for spiders. However, we show that for every k4, the (3,k2)-cover and the (k,1)-cover problems are constant-factor approximable when the input graph is a tree.
如果连通图的每条边都包含在至少r个k阶的团中,则连通图具有(k, r)-覆盖。受极值组合学的最新进展和边修正问题的文献的启发,我们研究了(k, r)-覆盖问题的算法版本。给定一个连通图G, (k, r)-覆盖问题是识别G的非边的最小子集,使得它们加到G上得到一个具有(k, r)-覆盖的图。对于每一个常数k≥3,我们证明(k,1)-覆盖问题对于一般图是np完全的。此外,我们证明了对于每一个常数k≥3,(k,1)-覆盖问题不允许多项式时间常数因子逼近算法,除非P=NP。然而,我们证明了当输入图是弦图时,(3,1)-覆盖问题可以在多项式时间内解决。对于树类和k的一般值,我们证明(k,1)-覆盖问题即使对于蜘蛛也是np困难的。然而,我们证明了对于每k≥4,当输入图是树时,(3,k−2)-覆盖问题和(k,1)-覆盖问题是常数因子近似的。
{"title":"Algorithms and hardness results for the (k,ℓ)-cover problem","authors":"Amirali Madani ,&nbsp;Anil Maheshwari ,&nbsp;Babak Miraftab ,&nbsp;Bodhayan Roy","doi":"10.1016/j.jcss.2025.103727","DOIUrl":"10.1016/j.jcss.2025.103727","url":null,"abstract":"<div><div>A connected graph has a <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>ℓ</mi><mo>)</mo></math></span>-cover if each of its edges is contained in at least <em>ℓ</em> cliques of order <em>k</em>. Motivated by recent advances in extremal combinatorics and the literature on edge modification problems, we study the algorithmic version of the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>ℓ</mi><mo>)</mo></math></span>-cover problem. Given a connected graph <em>G</em>, the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>ℓ</mi><mo>)</mo></math></span>-cover problem is to identify the smallest subset of non-edges of <em>G</em> such that their addition to <em>G</em> results in a graph with a <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>ℓ</mi><mo>)</mo></math></span>-cover. For every constant <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>, we show that the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mn>1</mn><mo>)</mo></math></span>-cover problem is <span><math><mi>NP</mi></math></span>-complete for general graphs. Moreover, we show that for every constant <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>, the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mn>1</mn><mo>)</mo></math></span>-cover problem admits no polynomial-time constant-factor approximation algorithm unless <span><math><mi>P</mi><mo>=</mo><mrow><mi>NP</mi></mrow></math></span>. However, we show that the <span><math><mo>(</mo><mn>3</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>-cover problem can be solved in polynomial time when the input graph is chordal. For the class of trees and general values of <em>k</em>, we show that the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mn>1</mn><mo>)</mo></math></span>-cover problem is <span><math><mi>NP</mi></math></span>-hard even for spiders. However, we show that for every <span><math><mi>k</mi><mo>≥</mo><mn>4</mn></math></span>, the <span><math><mo>(</mo><mn>3</mn><mo>,</mo><mi>k</mi><mo>−</mo><mn>2</mn><mo>)</mo></math></span>-cover and the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mn>1</mn><mo>)</mo></math></span>-cover problems are constant-factor approximable when the input graph is a tree.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103727"},"PeriodicalIF":0.9,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redundancy of information: Lowering effective dimension 信息冗余:降低有效维数
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-11-03 DOI: 10.1016/j.jcss.2025.103732
Jun Le Goh , Joseph S. Miller , Mariya I. Soskova , Linda Westrick
Let At2ω denote the set of infinite sequences of effective dimension t. Greenberg, Miller, Shen, and Westrick [6] studied both how near and how far an infinite sequence of dimension s can be from the closest sequence of dimension t, where distance in 2ω is measured using the Besicovitch pseudometric. They found infXAsd(X,At) and supXAsd(X,At) for all s,t[0,1], except for the supremum when t<s<1. This case is made difficult by the fact that the information in a dimension s sequence can be coded redundantly, so it is not clear what density of changes is needed to erase enough of that information. We completely solve the dimension reduction problem. We also identify classes of sequences for which these infima and suprema are realized as minima and maxima. When t<s, we find d(X,At) is minimized when X is a Bernoulli H1(s)-random, and maximized when X belongs to a class of infinite sequences that we call s-codewords. When s<t, the situation is reversed. Finally, we prove that all distances between the extrema are realized.
设At≤2ω,表示有效维数为t的无限序列的集合。Greenberg、Miller、Shen和Westrick[6]研究了一个维数为s的无限序列与最近维数为t的序列之间的距离有多近和多远,其中2ω中的距离使用Besicovitch伪度量来测量。他们发现对于所有s,t∈[0,1],除了t<;s<;1时的极值外,infX∈As d(X,At)和supX∈As d(X,At)。由于维度序列中的信息可以被冗余编码,因此不清楚需要多大的更改密度才能擦除足够的信息,这使得这种情况变得困难。我们完全解决了降维问题。我们还确定了这些无穷值和上值被实现为极小值和极大值的序列的类别。当t<;s时,我们发现当X是伯努利H−1(s)随机时,d(X,At)是最小的,当X属于一类我们称为s码字的无限序列时,d(X,At)是最大的。当s<;t时,情况正好相反。最后,我们证明了所有极值之间的距离都是可以实现的。
{"title":"Redundancy of information: Lowering effective dimension","authors":"Jun Le Goh ,&nbsp;Joseph S. Miller ,&nbsp;Mariya I. Soskova ,&nbsp;Linda Westrick","doi":"10.1016/j.jcss.2025.103732","DOIUrl":"10.1016/j.jcss.2025.103732","url":null,"abstract":"<div><div>Let <span><math><msub><mrow><mi>A</mi></mrow><mrow><mi>t</mi></mrow></msub><mo>⊆</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>ω</mi></mrow></msup></math></span> denote the set of infinite sequences of effective dimension <em>t</em>. Greenberg, Miller, Shen, and Westrick <span><span>[6]</span></span> studied both how near and how far an infinite sequence of dimension <em>s</em> can be from the closest sequence of dimension <em>t</em>, where distance in <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>ω</mi></mrow></msup></math></span> is measured using the Besicovitch pseudometric. They found <span><math><msub><mrow><mi>inf</mi></mrow><mrow><mi>X</mi><mo>∈</mo><msub><mrow><mi>A</mi></mrow><mrow><mi>s</mi></mrow></msub></mrow></msub><mo>⁡</mo><mi>d</mi><mo>(</mo><mi>X</mi><mo>,</mo><msub><mrow><mi>A</mi></mrow><mrow><mi>t</mi></mrow></msub><mo>)</mo></math></span> and <span><math><msub><mrow><mi>sup</mi></mrow><mrow><mi>X</mi><mo>∈</mo><msub><mrow><mi>A</mi></mrow><mrow><mi>s</mi></mrow></msub></mrow></msub><mo>⁡</mo><mi>d</mi><mo>(</mo><mi>X</mi><mo>,</mo><msub><mrow><mi>A</mi></mrow><mrow><mi>t</mi></mrow></msub><mo>)</mo></math></span> for all <span><math><mi>s</mi><mo>,</mo><mi>t</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></math></span>, except for the supremum when <span><math><mi>t</mi><mo>&lt;</mo><mi>s</mi><mo>&lt;</mo><mn>1</mn></math></span>. This case is made difficult by the fact that the information in a dimension <em>s</em> sequence can be coded redundantly, so it is not clear what density of changes is needed to erase enough of that information. We completely solve the dimension reduction problem. We also identify classes of sequences for which these infima and suprema are realized as minima and maxima. When <span><math><mi>t</mi><mo>&lt;</mo><mi>s</mi></math></span>, we find <span><math><mi>d</mi><mo>(</mo><mi>X</mi><mo>,</mo><msub><mrow><mi>A</mi></mrow><mrow><mi>t</mi></mrow></msub><mo>)</mo></math></span> is minimized when <em>X</em> is a Bernoulli <span><math><msup><mrow><mi>H</mi></mrow><mrow><mo>−</mo><mn>1</mn></mrow></msup><mo>(</mo><mi>s</mi><mo>)</mo></math></span>-random, and maximized when <em>X</em> belongs to a class of infinite sequences that we call <em>s</em>-codewords. When <span><math><mi>s</mi><mo>&lt;</mo><mi>t</mi></math></span>, the situation is reversed. Finally, we prove that all distances between the extrema are realized.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103732"},"PeriodicalIF":0.9,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145521312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decomposing finite-valued two-way finite transducers 分解有限值双向有限换能器
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-10-31 DOI: 10.1016/j.jcss.2025.103731
Hsu-Chun Yen , Di-De Yen
Finite transducers are finite automata with outputs. A transducer is finite-valued if the number of different outputs for any input string is bounded by a constant, and is single-valued if the constant is one. It is known that finite-valued one-way finite transducers enjoy a nice property that they can be decomposed into finitely many single-valued ones. In this paper, we develop an analytical technique for finite-valued 2-way finite transducers, capable of not only showing the decomposability result but also revealing the decomposition complexity. In particular, we show that every finite-valued two-way finite transducer can be effectively decomposed into a finite collection of single-valued two-way finite transducers. The number of such single-valued transducers is bounded by a tower of three exponentials in the size of the original transducer, while the size of each single-valued transducer is bounded by a tower of five exponentials. For special classes of 2-way transducers such as sweeping transducers and reversal-bounded transducers, lower decomposition complexity can be achieved by simplifying certain steps in the decomposition procedure. Finally, our decomposition analysis also allows us to derive complexity bounds for the equivalence problem for various classes of finite-valued 2-way finite transducers.
有限换能器是具有输出的有限自动机。如果任何输入字符串的不同输出的数量由一个常数限定,则换能器是有限值的,如果该常数为1,则换能器是单值的。已知有限值单向有限换能器具有可以分解为有限多个单值换能器的优良性质。在本文中,我们开发了一种有限值双向有限传感器的解析技术,它不仅能够显示分解结果,而且能够显示分解的复杂性。特别地,我们证明了每个有限值双向有限换能器都可以有效地分解为单值双向有限换能器的有限集合。这种单值换能器的数量由原始换能器大小的三个指数塔限制,而每个单值换能器的大小由五个指数塔限制。对于特殊类型的双向换能器,如扫描换能器和反向有界换能器,可以通过简化分解过程中的某些步骤来降低分解复杂度。最后,我们的分解分析还使我们能够推导出各种有限值双向有限换能器等效问题的复杂性界限。
{"title":"Decomposing finite-valued two-way finite transducers","authors":"Hsu-Chun Yen ,&nbsp;Di-De Yen","doi":"10.1016/j.jcss.2025.103731","DOIUrl":"10.1016/j.jcss.2025.103731","url":null,"abstract":"<div><div>Finite transducers are finite automata with outputs. A transducer is finite-valued if the number of different outputs for any input string is bounded by a constant, and is single-valued if the constant is one. It is known that finite-valued one-way finite transducers enjoy a nice property that they can be decomposed into finitely many single-valued ones. In this paper, we develop an analytical technique for finite-valued 2-way finite transducers, capable of not only showing the decomposability result but also revealing the decomposition complexity. In particular, we show that every finite-valued two-way finite transducer can be effectively decomposed into a finite collection of single-valued two-way finite transducers. The number of such single-valued transducers is bounded by a tower of three exponentials in the size of the original transducer, while the size of each single-valued transducer is bounded by a tower of five exponentials. For special classes of 2-way transducers such as sweeping transducers and reversal-bounded transducers, lower decomposition complexity can be achieved by simplifying certain steps in the decomposition procedure. Finally, our decomposition analysis also allows us to derive complexity bounds for the equivalence problem for various classes of finite-valued 2-way finite transducers.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103731"},"PeriodicalIF":0.9,"publicationDate":"2025-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Search-space reduction via essential vertices revisited: Vertex multicut and cograph deletion 通过重访基本顶点来减少搜索空间:顶点多切割和图形删除
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-10-30 DOI: 10.1016/j.jcss.2025.103730
Bart M.P. Jansen , Ruben F.A. Verhaegh
For an optimization problem Π on graphs whose solutions are vertex sets, a vertex v is called c-essential for Π if all solutions of size at most
contain v. Recent work showed that polynomial-time algorithms to detect c-essential vertices can be used to reduce the search-space of fixed-parameter tractable algorithms solving such problems parameterized by the size k of the solution. We provide several new upper- and lower bounds for detecting essential vertices. For example, we give a polynomial-time algorithm for 3-Essential detection for Vertex Multicut, which translates into an algorithm that finds a minimum multicut of an undirected n-vertex graph G in time 2O(3)nO(1), where is the number of vertices in an optimal solution that are not 3-essential. Our positive results are obtained by analyzing the integrality gaps of certain linear programs. Our lower bounds show that for sufficiently small values of c, the detection task becomes NP-hard assuming the Unique Games Conjecture. For example, we show that (2ε)-Essential detection for Directed Feedback Vertex Set is NP-hard under this conjecture, thereby proving that the existing algorithm that detects 2-essential vertices is best-possible.
对于解为顶点集的图上的优化问题Π,如果所有大小的解最多包含v,则顶点v称为Π的c-必要顶点。最近的工作表明,检测c-必要顶点的多项式时间算法可以用来减少求解由解的大小k参数化的固定参数可处理算法的搜索空间。我们提供了几个新的检测基本顶点的上界和下界。例如,我们给出了一个顶点多切的3-必要检测的多项式时间算法,它转化为一个在时间为2O(l3)⋅nO(1)的无向n顶点图G的最小多切算法,其中,l0为最优解中非3-必要顶点的个数。通过对某些线性规划的完整性间隙的分析,得到了一些积极的结果。我们的下界表明,对于足够小的c值,假设唯一对策猜想,检测任务变得np困难。例如,我们证明了在这个猜想下有向反馈顶点集的(2−ε)-基本检测是np困难的,从而证明了现有的检测2-基本顶点的算法是最好的。
{"title":"Search-space reduction via essential vertices revisited: Vertex multicut and cograph deletion","authors":"Bart M.P. Jansen ,&nbsp;Ruben F.A. Verhaegh","doi":"10.1016/j.jcss.2025.103730","DOIUrl":"10.1016/j.jcss.2025.103730","url":null,"abstract":"<div><div>For an optimization problem Π on graphs whose solutions are vertex sets, a vertex <em>v</em> is called <em>c-essential</em> for Π if all solutions of size at most <figure><img></figure> contain <em>v</em>. Recent work showed that polynomial-time algorithms to detect <em>c</em>-essential vertices can be used to reduce the search-space of fixed-parameter tractable algorithms solving such problems parameterized by the size <em>k</em> of the solution. We provide several new upper- and lower bounds for detecting essential vertices. For example, we give a polynomial-time algorithm for 3<span>-Essential detection for Vertex Multicut</span>, which translates into an algorithm that finds a minimum multicut of an undirected <em>n</em>-vertex graph <em>G</em> in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mi>ℓ</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>, where <em>ℓ</em> is the number of vertices in an optimal solution that are <em>not</em> 3-essential. Our positive results are obtained by analyzing the integrality gaps of certain linear programs. Our lower bounds show that for sufficiently small values of <em>c</em>, the detection task becomes NP-hard assuming the <em>Unique Games Conjecture</em>. For example, we show that <span>(</span><span><math><mn>2</mn><mo>−</mo><mi>ε</mi></math></span><span>)-Essential detection for Directed Feedback Vertex Set</span> is NP-hard under this conjecture, thereby proving that the existing algorithm that detects 2-essential vertices is best-possible.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103730"},"PeriodicalIF":0.9,"publicationDate":"2025-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bringing memory to Boolean networks: A unifying framework 将内存引入布尔网络:一个统一的框架
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-10-30 DOI: 10.1016/j.jcss.2025.103729
Maximilien Gadouleau , Loïc Paulevé , Sara Riva
Boolean networks are extensively applied as models of complex dynamical systems, aiming at capturing essential features related to causality and synchronicity of the state changes of components along time. Dynamics of Boolean networks result from the application of their Boolean map according to a so-called update mode, specifying the possible transitions between network configurations. In this paper, we explore update modes that possess a memory on past configurations, and provide a generic framework to define them. We show that recently introduced modes such as the most permissive and interval modes can be naturally expressed in this framework, and we propose novel update modes, the history-based, trapping, and subcube-based modes. Building on the unified definitions, we provide a comprehensive comparison of memory-based update modes, resulting in their hierarchy by simulation and weak simulation. Finally, we highlight consequences of introducing memory on the notions of trajectory and attractors.
布尔网络作为复杂动力系统的模型被广泛应用,其目的是捕捉部件状态随时间变化的因果性和同步性等本质特征。布尔网络的动态是根据所谓的更新模式应用其布尔映射而产生的,该模式指定了网络配置之间可能的转换。在本文中,我们探索了具有过去配置记忆的更新模式,并提供了一个通用框架来定义它们。我们证明了最近引入的模式,如最允许模式和间隔模式,可以在这个框架中自然地表达,我们提出了新的更新模式,基于历史的,捕获的,和基于子立方体的模式。在统一定义的基础上,我们对基于内存的更新模式进行了全面的比较,得出了基于仿真和弱仿真的层次结构。最后,我们强调了引入记忆对轨迹和吸引子概念的影响。
{"title":"Bringing memory to Boolean networks: A unifying framework","authors":"Maximilien Gadouleau ,&nbsp;Loïc Paulevé ,&nbsp;Sara Riva","doi":"10.1016/j.jcss.2025.103729","DOIUrl":"10.1016/j.jcss.2025.103729","url":null,"abstract":"<div><div>Boolean networks are extensively applied as models of complex dynamical systems, aiming at capturing essential features related to causality and synchronicity of the state changes of components along time. Dynamics of Boolean networks result from the application of their Boolean map according to a so-called update mode, specifying the possible transitions between network configurations. In this paper, we explore update modes that possess a memory on past configurations, and provide a generic framework to define them. We show that recently introduced modes such as the most permissive and interval modes can be naturally expressed in this framework, and we propose novel update modes, the history-based, trapping, and subcube-based modes. Building on the unified definitions, we provide a comprehensive comparison of memory-based update modes, resulting in their hierarchy by simulation and weak simulation. Finally, we highlight consequences of introducing memory on the notions of trajectory and attractors.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103729"},"PeriodicalIF":0.9,"publicationDate":"2025-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The complexity of (Pk,Pℓ)-arrowing (Pk, p0)的复杂度
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-10-29 DOI: 10.1016/j.jcss.2025.103726
Zohair Raza Hassan, Edith Hemaspaandra, Stanisław Radziszowski
For fixed nonnegative integers k and , the (Pk,P)-Arrowing problem asks whether a given graph, G, has a red/blue coloring of E(G) such that there are no red copies of Pk and no blue copies of P. The problem is trivial when max(k,)3, but has been shown to be coNP-complete when k==4. In this work, we show that the problem remains coNP-complete for all pairs of k and , except (3,4), and when max(k,)3. We define and prove the existence of special graphs that we call “transmitters.” Using transmitters, we construct gadgets for three distinct cases: 1) k=3 and 5, 2) >k4, and 3) =k4. For (P3,P4)-Arrowing we show a polynomial-time algorithm by reducing the problem to 2SAT, thus successfully categorizing the complexity of all (Pk,P)-Arrowing problems.
对于固定的非负整数k和r, (Pk,P, r)箭头问题问的是给定的图G,是否具有E(G)的红/蓝着色,使得P, r没有红色的副本,P, r没有蓝色的副本。当max (k, r)≤3时,问题是平凡的,但当k= r =4时,问题是conp完备的。在这项工作中,我们证明了除(3,4)外,当max (k, r)≤3时,对于k和r的所有对,问题保持conp完全。我们定义并证明了我们称之为“传送”的特殊图的存在性。利用变送器,我们构造了三种不同情况下的小波:1)k=3且r≥5,2)r >k≥4,3)r =k≥4。对于(P3,P4)- arrow问题,我们展示了一个多项式时间算法,通过将问题简化为2SAT,从而成功地对所有(Pk,P, r)- arrow问题的复杂性进行了分类。
{"title":"The complexity of (Pk,Pℓ)-arrowing","authors":"Zohair Raza Hassan,&nbsp;Edith Hemaspaandra,&nbsp;Stanisław Radziszowski","doi":"10.1016/j.jcss.2025.103726","DOIUrl":"10.1016/j.jcss.2025.103726","url":null,"abstract":"<div><div>For fixed nonnegative integers <em>k</em> and <em>ℓ</em>, the <span><math><mo>(</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>,</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>ℓ</mi></mrow></msub><mo>)</mo></math></span>-Arrowing problem asks whether a given graph, <em>G</em>, has a red/blue coloring of <span><math><mi>E</mi><mo>(</mo><mi>G</mi><mo>)</mo></math></span> such that there are no red copies of <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub></math></span> and no blue copies of <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>ℓ</mi></mrow></msub></math></span>. The problem is trivial when <span><math><mi>max</mi><mo>⁡</mo><mo>(</mo><mi>k</mi><mo>,</mo><mi>ℓ</mi><mo>)</mo><mo>≤</mo><mn>3</mn></math></span>, but has been shown to be coNP-complete when <span><math><mi>k</mi><mo>=</mo><mi>ℓ</mi><mo>=</mo><mn>4</mn></math></span>. In this work, we show that the problem remains coNP-complete for all pairs of <em>k</em> and <em>ℓ</em>, except <span><math><mo>(</mo><mn>3</mn><mo>,</mo><mn>4</mn><mo>)</mo></math></span>, and when <span><math><mi>max</mi><mo>⁡</mo><mo>(</mo><mi>k</mi><mo>,</mo><mi>ℓ</mi><mo>)</mo><mo>≤</mo><mn>3</mn></math></span>. We define and prove the existence of special graphs that we call “transmitters.” Using transmitters, we construct gadgets for three distinct cases: 1) <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span> and <span><math><mi>ℓ</mi><mo>≥</mo><mn>5</mn></math></span>, 2) <span><math><mi>ℓ</mi><mo>&gt;</mo><mi>k</mi><mo>≥</mo><mn>4</mn></math></span>, and 3) <span><math><mi>ℓ</mi><mo>=</mo><mi>k</mi><mo>≥</mo><mn>4</mn></math></span>. For <span><math><mo>(</mo><msub><mrow><mi>P</mi></mrow><mrow><mn>3</mn></mrow></msub><mo>,</mo><msub><mrow><mi>P</mi></mrow><mrow><mn>4</mn></mrow></msub><mo>)</mo></math></span>-Arrowing we show a polynomial-time algorithm by reducing the problem to 2SAT, thus successfully categorizing the complexity of all <span><math><mo>(</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>,</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>ℓ</mi></mrow></msub><mo>)</mo></math></span>-Arrowing problems.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103726"},"PeriodicalIF":0.9,"publicationDate":"2025-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145424690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational complexity of covering multigraphs with semi-edges: Small cases 用半边覆盖多图的计算复杂度:小情况
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-10-17 DOI: 10.1016/j.jcss.2025.103714
Jan Bok , Jiří Fiala , Petr Hliněný , Nikola Jedličková , Jan Kratochvíl
We initiate the study of computational complexity of graph coverings, aka locally bijective graph homomorphisms, for graphs with semi-edges. The notion of graph covering is a discretization of coverings between surfaces or topological spaces, a notion well known and deeply studied in classical topology. Graph covers have found applications in discrete mathematics for constructing highly symmetric graphs, and in computer science in the theory of local computations. In 1991, Abello, Fellows, and Stillwell asked for a classification of the computational complexity of deciding if an input graph covers a fixed target graph, in the ordinary setting (of graphs with only edges). Although many general results are known, the full classification is still open. In spite of that, we propose to study the more general case of covering graphs composed of normal edges (including multiedges and loops) and so-called semi-edges. Semi-edges are becoming increasingly popular in modern topological graph theory, as well as in mathematical physics. They also naturally occur in the local computation setting, since they are lifted to matchings in the covering graph. We show that the presence of semi-edges makes the covering problem considerably harder; e.g., it is no longer sufficient to specify the vertex mapping induced by the covering, but one necessarily has to deal with the edge mapping as well. We show some solvable cases and, in particular, completely characterize the complexity of the already very nontrivial problem of covering one- and two-vertex (multi)graphs with semi-edges. Our NP-hardness results are proven for simple input graphs, and in the case of regular two-vertex target graphs, even for bipartite ones. We remark that our new characterization results also strengthen previously known results for covering graphs without semi-edges, and they in turn apply to an infinite class of simple target graphs with at most two vertices of degree more than two. Some of the results are moreover proven in a more general setting (e.g., finding k-tuples of pairwise disjoint perfect matchings in regular graphs).
我们开始了图覆盖的计算复杂度的研究,又称局部双射图同态,对于具有半边的图。图覆盖的概念是曲面或拓扑空间之间的覆盖的离散化,这是一个在经典拓扑学中众所周知并被深入研究的概念。图盖在离散数学中用于构造高度对称的图,在计算机科学的局部计算理论中也有应用。1991年,Abello, Fellows和Stillwell要求对在普通设置(只有边的图)中决定输入图是否覆盖固定目标图的计算复杂度进行分类。虽然许多一般的结果是已知的,但完整的分类仍然是开放的。尽管如此,我们建议研究由正规边(包括多边和环)和所谓的半边组成的覆盖图的更一般的情况。半边在现代拓扑图理论和数学物理中越来越流行。它们也自然地出现在局部计算设置中,因为它们被提升到覆盖图中的匹配。我们证明了半边的存在使覆盖问题变得相当困难;例如,指定由覆盖引起的顶点映射已经不够了,还必须处理边缘映射。我们展示了一些可解的情况,特别是,完全表征了用半边覆盖单顶点和双顶点(多)图这个已经非常重要的问题的复杂性。我们的np -硬度结果证明了简单的输入图,在规则的两顶点目标图的情况下,甚至对于二部图。我们注意到,我们的新表征结果也加强了先前已知的无半边覆盖图的结果,并且它们反过来适用于无限类的简单目标图,其中最多有两个顶点的次数大于2。一些结果还在更一般的情况下得到了证明(例如,在正则图中找到成对不相交完美匹配的k元组)。
{"title":"Computational complexity of covering multigraphs with semi-edges: Small cases","authors":"Jan Bok ,&nbsp;Jiří Fiala ,&nbsp;Petr Hliněný ,&nbsp;Nikola Jedličková ,&nbsp;Jan Kratochvíl","doi":"10.1016/j.jcss.2025.103714","DOIUrl":"10.1016/j.jcss.2025.103714","url":null,"abstract":"<div><div>We initiate the study of computational complexity of graph coverings, aka locally bijective graph homomorphisms, for <em>graphs with semi-edges</em>. The notion of graph covering is a discretization of coverings between surfaces or topological spaces, a notion well known and deeply studied in classical topology. Graph covers have found applications in discrete mathematics for constructing highly symmetric graphs, and in computer science in the theory of local computations. In 1991, Abello, Fellows, and Stillwell asked for a classification of the computational complexity of deciding if an input graph covers a fixed target graph, in the ordinary setting (of graphs with only edges). Although many general results are known, the full classification is still open. In spite of that, we propose to study the more general case of covering graphs composed of normal edges (including multiedges and loops) and so-called semi-edges. Semi-edges are becoming increasingly popular in modern topological graph theory, as well as in mathematical physics. They also naturally occur in the local computation setting, since they are lifted to matchings in the covering graph. We show that the presence of semi-edges makes the covering problem considerably harder; e.g., it is no longer sufficient to specify the vertex mapping induced by the covering, but one necessarily has to deal with the edge mapping as well. We show some solvable cases and, in particular, completely characterize the complexity of the already very nontrivial problem of covering one- and two-vertex (multi)graphs with semi-edges. Our NP-hardness results are proven for simple input graphs, and in the case of regular two-vertex target graphs, even for bipartite ones. We remark that our new characterization results also strengthen previously known results for covering graphs without semi-edges, and they in turn apply to an infinite class of simple target graphs with at most two vertices of degree more than two. Some of the results are moreover proven in a more general setting (e.g., finding <em>k</em>-tuples of pairwise disjoint perfect matchings in regular graphs).</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103714"},"PeriodicalIF":0.9,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of graphs with excluded minors 排除小调图的探索
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-10-10 DOI: 10.1016/j.jcss.2025.103725
Júlia Baligács, Yann Disser, Irene Heinrich, Pascal Schweitzer
We study the online graph exploration problem proposed by Kalyanasundaram and Pruhs (1994) and prove a constant competitive ratio on minor-free graphs. This result encompasses and significantly extends the graph classes that were previously known to admit a constant competitive ratio. The main ingredient of our proof is that we find a connection between the performance of the particular exploration algorithm
and the existence of light spanners. Conversely, we exploit this connection to construct light spanners of bounded genus graphs. In particular, we achieve a lightness that improves on the best known upper bound for genus g1 and recovers the known tight bound for the planar case (g=0).
我们研究了Kalyanasundaram和Pruhs(1994)提出的在线图探索问题,并证明了无次图上的恒定竞争比。这个结果包含并显著扩展了以前已知的具有恒定竞争比的图类。我们证明的主要成分是,我们发现了特定探索算法的性能与光扳手的存在之间的联系。反过来,我们利用这个联系来构造有界属图的轻扳手。特别是,我们实现了一种轻度,它改进了已知的g≥1属的上界,并恢复了平面情况(g=0)的已知紧界。
{"title":"Exploration of graphs with excluded minors","authors":"Júlia Baligács,&nbsp;Yann Disser,&nbsp;Irene Heinrich,&nbsp;Pascal Schweitzer","doi":"10.1016/j.jcss.2025.103725","DOIUrl":"10.1016/j.jcss.2025.103725","url":null,"abstract":"<div><div>We study the online graph exploration problem proposed by Kalyanasundaram and Pruhs (1994) and prove a constant competitive ratio on minor-free graphs. This result encompasses and significantly extends the graph classes that were previously known to admit a constant competitive ratio. The main ingredient of our proof is that we find a connection between the performance of the particular exploration algorithm <figure><img></figure> and the existence of light spanners. Conversely, we exploit this connection to construct light spanners of bounded genus graphs. In particular, we achieve a lightness that improves on the best known upper bound for genus <span><math><mi>g</mi><mo>≥</mo><mn>1</mn></math></span> and recovers the known tight bound for the planar case (<span><math><mi>g</mi><mo>=</mo><mn>0</mn></math></span>).</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103725"},"PeriodicalIF":0.9,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic programming on bipartite tree decompositions 二部树分解的动态规划
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-10-09 DOI: 10.1016/j.jcss.2025.103722
Lars Jaffke , Laure Morelle , Ignasi Sau , Dimitrios M. Thilikos
We revisit a graph width parameter that we dub bipartite treewidth (btw). Bipartite treewidth can be seen as a common generalization of treewidth and the odd cycle transversal number, and is closely related to odd-minors. Intuitively, a bipartite tree decomposition is a tree decomposition whose bags induce almost bipartite graphs and whose adhesions contain at most one “bipartite” vertex, while the width of such decomposition measures the number of “non-bipartite” vertices in a bag. We provide para-NP-completeness results and develop dynamic programming techniques to solve problems on graphs of small btw. In particular, we show that Kt-Subgraph-Cover, Weighted Independent Set, Odd Cycle Transversal, and Maximum Weighted Cut are FPT parameterized by btw. We also provide the following dichotomy when H is a 2-connected graph: if H is bipartite, then H-{Subgraph/Induced-Subgraph/Odd-Minor/Scattered}-Packing is para-NP-complete parameterized by btw while, if H is non-bipartite, then the problem is solvable in XP-time.
我们重新审视一个图宽度参数,我们称之为二部树宽度(btw)。二部树宽度可以看作是树宽度和奇环截数的共同推广,并且与奇副数密切相关。直观地说,二部树分解是这样一种树分解,它的袋归纳出几乎二部图,它的粘连最多包含一个“二部”顶点,而这种分解的宽度度量了一个袋中“非二部”顶点的数量。我们提供了准np完备性结果,并开发了动态规划技术来解决小btw图上的问题。特别地,我们证明了Kt-Subgraph-Cover、加权独立集、奇环截线和最大加权截线是由btw参数化的FPT。当H是2连通图时,我们还给出了以下二分法:如果H是二部图,则H-{Subgraph/ inducd_subgraph /Odd-Minor/Scattered}- packing是btw参数化的准np完全,如果H是非二部图,则问题在XP-time内可解。
{"title":"Dynamic programming on bipartite tree decompositions","authors":"Lars Jaffke ,&nbsp;Laure Morelle ,&nbsp;Ignasi Sau ,&nbsp;Dimitrios M. Thilikos","doi":"10.1016/j.jcss.2025.103722","DOIUrl":"10.1016/j.jcss.2025.103722","url":null,"abstract":"<div><div>We revisit a graph width parameter that we dub <em>bipartite treewidth</em> (<span>btw</span>). Bipartite treewidth can be seen as a common generalization of treewidth and the odd cycle transversal number, and is closely related to odd-minors. Intuitively, a <em>bipartite tree decomposition</em> is a tree decomposition whose bags induce almost bipartite graphs and whose adhesions contain at most one “bipartite” vertex, while the width of such decomposition measures the number of “non-bipartite” vertices in a bag. We provide <span>para-NP</span>-completeness results and develop dynamic programming techniques to solve problems on graphs of small <span>btw</span>. In particular, we show that <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>t</mi></mrow></msub></math></span><span>-Subgraph-Cover</span>, <span>Weighted Independent Set</span>, <span>Odd Cycle Transversal</span>, and <span>Maximum Weighted Cut</span> are <span><math><mtext>FPT</mtext></math></span> parameterized by <span>btw</span>. We also provide the following dichotomy when <em>H</em> is a 2-connected graph: if <em>H</em> is bipartite, then <em>H</em><span>-{Subgraph/Induced-Subgraph/Odd-Minor/Scattered}-Packing</span> is <span>para-NP</span>-complete parameterized by <span>btw</span> while, if <em>H</em> is non-bipartite, then the problem is solvable in <span>XP</span>-time.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103722"},"PeriodicalIF":0.9,"publicationDate":"2025-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145333248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1