Genus characterizes the complexity of certain graph problems: Some tight results

نویسندگان

  • Jianer Chen
  • Iyad A. Kanj
  • Ljubomir Perkovic
  • Eric Sedgwick
  • Ge Xia
چکیده

We study the fixed-parameter tractability, subexponential time computability, and approximability of the well-known NP-hard problems: INDEPENDENT SET, VERTEX COVER, and DOMINATING SET. We derive tight results and show that the computational complexity of these problems, with respect to the above complexity measures, is dependent on the genus of the underlying graph. For instance, we show that, under the widely-believed complexity assumption W [1] = FPT, INDEPENDENT SET on graphs of genus bounded by g1(n) is fixed parameter tractable if and only if g1(n) = o(n2), and DOMINATING SET on graphs of genus bounded by g2(n) is fixed parameter tractable if and only if g2(n) = no(1). Under the assumption that not all SNP problems are solvable in subexponential time, we show that the above three problems on graphs of genus bounded by g3(n) are solvable in subexponential time if and only if g3(n)= o(n). We also show that the INDEPENDENT SET, the kernelized VERTEX COVER, and the kernelized DOMINATING SET problems on graphs of genus bounded by g4(n) have PTAS if g4(n)= o(n/ logn), and that, under the assumption P = NP, the INDEPENDENT SET problem on graphs of genus bounded by g5(n) has no PTAS if g5(n)=Ω(n), and the VERTEX COVER and DOMINATING SET problems on graphs of genus bounded by g6(n) have no PTAS if g6(n)= nΩ(1). Published by Elsevier Inc.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

When is weighted satisfiability in FPT?∗

We consider the weighted monotone and antimonotone satisfiability problems on normalized circuits of depth at most t ≥ 2, abbreviated wsat[t] and wsat−[t], respectively. These problems model the weighted satisfiability of monotone and antimonotone propositional formulas (including weighted monotone/antimonotone cnf-sat) in a natural way, and serve as the canonical problems in the definition of ...

متن کامل

The Complexity of Symmetric Boolean Parity Holant Problems

For certain subclasses of NP, ⊕P or #P characterized by local constraints, it is known that if there exist any problems that are not polynomial time computable within that subclass, then those problems are NP-, ⊕Por #P-complete. Such dichotomy results have been proved for characterizations such as Constraint Satisfaction Problems, and directed and undirected Graph Homomorphism Problems, often w...

متن کامل

Graph Clustering by Hierarchical Singular Value Decomposition with Selectable Range for Number of Clusters Members

Graphs have so many applications in real world problems. When we deal with huge volume of data, analyzing data is difficult or sometimes impossible. In big data problems, clustering data is a useful tool for data analysis. Singular value decomposition(SVD) is one of the best algorithms for clustering graph but we do not have any choice to select the number of clusters and the number of members ...

متن کامل

Matrix Tightness: A Linear-Algebraic Framework for Sorting by Transpositions

We study the problems of sorting signed permutations by reversals (SBR) and sorting unsigned permutations by transpositions (SBT), which are central problems in computational molecular biology. While a polynomial-time solution for SBR is known, the computational complexity of SBT has been open for more than a decade and is considered a major open problem. In the first efficient solution of SBR,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Comput. Syst. Sci.

دوره 73  شماره 

صفحات  -

تاریخ انتشار 2007