mysubfig[2] [#2]\BODY
Fixed-Treewidth-Efficient Algorithms for Edge-Deletion to Interval Graph Classes††thanks: This manuscript corrects some errors in [24].
Abstract
For a graph class , the -Edge-Deletion problem asks for a given graph to delete the minimum number of edges from in order to obtain a graph in . We study the -Edge-Deletion problem for the class of interval graphs and other related graph classes. It follows from Courcelle’s Theorem that these problems are fixed parameter tractable when parameterized by treewidth. In this paper, we present concrete FPT algorithms for these problems. By giving explicit algorithms and analyzing these in detail, we obtain algorithms that are significantly faster than the algorithms obtained by using Courcelle’s theorem.
1 Introduction
Intersection graphs are represented by geometric objects aligned in certain ways so that each object corresponds to a vertex and two objects intersect if and only if the corresponding vertices are adjacent. Intersection graphs are well-studied in the area of graph algorithms since there are many important applications and we can solve many NP-hard problems in general graphs in polynomial time on such graph classes. Interval graphs are intersection graphs which are represented by intervals on a line. Clique, Independent Set, and Coloring on interval graphs can be solved in linear time and interval graphs have many applications in bioinformatics, scheduling, and so on. See [14, 3, 26] for more details of interval graphs and other intersection graphs.
Graph modification problems on a graph class are to find a graph in by modifying a given graph in certain ways. -Vertex-Deletion, -Edge-Deletion, and -Completion are to find a graph in by deleting vertices, deleting edges, and adding edges, respectively, with the minimum cost. These problems can be seen as generalizations of many NP-hard problems. Clique is equivalent to Complete-Vertex-Deletion: we find a complete graph by deleting the smallest number of vertices. Modification problems on intersection graph classes also have many applications. For example, Interval-Vertex/Edge-Deletion problems have applications to DNA (physical) mapping [13, 12, 27]. Lewis and Yannakakis showed that -Vertex-Deletion is NP-complete for any nontrivial hereditary graph class [17]. A graph class is hereditary if for any graph in , every induced subgraph of the graph is also in . Since the class of intersection graphs are hereditary, -Vertex Deletion is NP-complete for any nontrivial intersection graph class . The problems -Edge-Deletion are also NP-hard when is the class of perfect, chordal, split, circular arc, chain [23], interval, proper interval [13], trivially perfect (a.k.a. nested interval) [25], threshold [20], permutation, weakly chordal, or circle graphs [4]. See the lists in [19, 4].
Parameterized complexity is well-studied in the area of computer science. A problem with a parameter is fixed parameter tractable, FPT for short, if there is an algorithm running in time where is the size of input, is a computable function and is a constant. Such an algorithm is called an FPT algorithm. The treewidth of a graph represents treelikeness and is one of the most important parameters in parameterized complexity concerning graph algorithms. For many NP-hard problems in general, there are tons of FPT algorithms with parameter by dynamic programming on tree decompositions. Finding the treewidth of an input graph is NP-hard and it is known that Chordal-Completion with minimizing the size of the smallest maximum clique is equivalent to the problem. There is an FPT algorithm for computing the treewidth of a graph by Bodlaender [2] which runs in time where and are the numbers of vertices and edges of a given graph: i.e., the running time is linear in the size of input. Courcelle showed that every problem that can be expressed in monadic second order logic (MSO2) has a linear time algorithm on graphs of bounded treewidth [9]. Some intersection graph classes, for example interval graphs, proper interval graphs, chordal graphs, and permutation graphs, can be represented by MSO2 [8] and thus there are FPT algorithms for Edge-Deletion problems on such graph classes. However, the algorithms obtained by Courcelle’s theorem have a very large hidden constant factor even when the treewidth is very small, since the running time is the exponential tower of the coding size of the MSO2 expression.
Our results: We propose concrete FPT algorithms for Edge-Deletion to interval graphs and other related graph classes, when parameterized by the treewidth of the input graph. Our algorithms virtually compute a set of edges with the minimum size such that is in a graph class by using dynamic programming on a tree-decomposition. We maintain possible alignments of geometric objects corresponding to vertices in the bag of each node of the tree-decomposition. Alignments of the objects of forgotten vertices are remembered only relatively to the objects of the current bag. If two forgotten objects have the same relative position to the objects of the current bag, we remember only the fact that there is at least one forgotten object at that position. In this way, we achieve the fixed-parameter-tractability, while guaranteeing that no object pairs of non-adjacent vertices of the input graph will intersect in our dynamic programming algorithm. Our algorithms run in time where and are the numbers of vertices and edges of the input graph. Our explicit algorithms are significantly faster than those obtained by using Courcelle’s theorem. We also analyze the time complexity of our algorithms parameterized by pathwidth which is analogous to treewidth. The relation among the graph classes for which this paper provides -Edge-Deletion algorithms is shown in Figure 1.
Related works: Another kind of common parameters considered in parameterized complexity of graph modification problems is the number of vertices or edges to be removed or to be added. Here we review preceding studies on those problems for intersection graphs with those parameters.
Concerning parameterized complexity of -Vertex-Deletion, Hof et al. proposed an FPT algorithm for Proper-Interval-Vertex-Deletion [28], and Marx proposed an FPT algorithm for Chordal-Vertex-Deletion [21]. Heggernes et al. showed Perfect-Vertex-Deletion and Weakly-Chordal-Vertex-Deletion are W[2]-hard [15]. Cai showed that -Vertex/Edge-Deletion are FPT when is characterized by a finite set of forbidden induced subgraphs [5].
For modification problems on interval graphs, Villanger et al. presented an FPT algorithm for Interval-Completion [29], and Cao and Marx presented an FPT algorithm for Interval-Vertex-Deletion [7]. Cao improved these algorithms and developed an FPT algorithm for Edge-Deletion [6].
It is known that Threshold-Edge-Deletion, Chain-Edge-Deletion and Trivially-Perfect-Edge-Deletion are FPT, since threshold graphs, chain graphs and trivially perfect graphs are characterized by a finite set of forbidden induced subgraphs [5]. Nastos and Gao presented faster algorithms for the problems [22], and Liu et al. improved their algorithms to and using modular decomposition trees [18], where is the number of deleted edges. There are algorithms to find a polynomial kernel for Chain-Edge-Deletion and Trivially Perfect-Edge-Deletion [1, 11].
Organization of this article: Section 2 prepares the notation and definitions used in this paper. We propose an FPT algorithm for Interval-Edge-Deletion in Section 3. We then extend the algorithm related to the interval graphs in Section 4. We conclude this paper and provide some open questions in Section 6.
2 Preliminaries
For a set , its cardinality is denoted by . A partition of is a tuple of subsets of such that and if , where we allow some of the subsets to be empty. For entities , we let if , and otherwise. For a subset , define .
For a linear order over a finite set , the maximum and the minimum elements of w.r.t. are denoted by and , respectively. We denote the successor of w.r.t. by . Note that is undefined. Similarly denotes the predecessor of .
A simple graph is a pair of vertex and edge sets, where each element of is a subset of consisting of exactly two elements.
A tree-decomposition of is a tree such that111We use the terms “vertices” for an input graph and “nodes” for a tree-decomposition.
-
•
to each node of a subset of is assigned,
-
•
if the assigned sets of two nodes of contain a vertex , then so does every node on the path between the two nodes,
-
•
for each , there is a node of whose assigned set includes both and .
The width of a tree-decomposition is the maximum cardinality of the assigned sets minus one and the treewidth of a graph is the smallest width of its tree-decompositions. A tree-decomposition is said to be nice if it is rooted, the root is assigned the empty set, and its nodes are grouped into the following four:
-
•
leaf nodes, which have no children and are assigned the empty set,
-
•
introduce nodes, each of which has just one child, where the set assigned to the node adds one vertex to the child’s set,
-
•
forget nodes, each of which has just one child, where the set assigned to the node removes one vertex from the child’s set,
-
•
join nodes, each of which has just two children, where the same vertex set is assigned to the node and its children.
It is known that every tree-decomposition has a nice tree-decomposition of the same width whose size is , where is the treewidth of the tree-decomposition [16, 10]. Hereafter, under a fixed graph and a fixed nice tree-decomposition , we let denote the subset of assigned to a node of a tree-decomposition and denote the union of all the subsets assigned to the node and its descendant nodes. We call vertices in and in active and forgotten, respectively. Moreover, we define and . Given a tree decomposition of treewidth , we can compute a nice tree-decomposition with treewidth and nodes in time [10].
A tree-decomposition is called a path-decomposition if the tree is a path. The pathwidth of a graph is the smallest width of its path-decompositions. Every path-decomposition has a nice path-decomposition of the same pathwidth, which consists of leaf, introduce, forget, but not join nodes.
The problem we tackle in this paper is given as follows.
Definition 1.
For a graph class , the -Edge-Deletion is a problem to find the minimum natural number such that there is a subgraph of with and for an input simple graph .
In the succeeding sections, for different classes of intersection graphs, we present algorithms for -Edge-Deletion that run in linear time in the input graph size when the treewidth is bounded. We assume that the algorithm takes a nice tree-decomposition of in addition as input [2, 16]. Our algorithms are dynamic programming algorithms that recursively compute solutions (and some auxiliary information) for the subproblems on for each node in the given tree-decomposition from leaves to the root.
3 Finding a Largest Interval Subgraph
An interval representation over a set is a linear order over the set with and such that for all . An interval is a pair . We say that two intervals and intersect, denoted by if and . Otherwise, we write .
The interval graph of an interval representation on is where
Figure 2 (a) and (b) show an example of an interval representation and the defined interval graph, respectively.
This section presents an FPT algorithm for the interval edge deletion problem w.r.t. the treewidth. Let be an input graph and a node of a nice tree-decomposition of . On each node of , for each interval representation over that gives an interval subgraph of , we would like to remember some pieces of information about , which we call the “abstraction” of . The abstraction is the triple , where the linear order over is the restriction of to , forgotten vertices are represented in by anchoring the ends of intervals formed by forgotten vertices to active vertices, and counts the number of edges of such that at least one of their ends is forgotten. For each forgotten vertex , let the intersection closure of (w.r.t. and ) be the smallest set such that
-
•
and
-
•
if , and , then .
For an interval representation over such that is a subgraph of , we define the abstraction of for to be the triple such that222Actually presence of intervals and in does not matter.
-
•
is the restriction of to ,
-
•
and }, -
•
and .
We call elements of forbidden intervals because introducing a new vertex interval intersecting a forbidden interval means making the new vertex and a forgotten vertex adjacent, which is forbidden. Figure 2 (c) shows an example of . Since forbidden intervals are formed by intersection closures, no distinct forbidden intervals may intersect. If is the root of a nice tree-decomposition, the abstraction will be where is the trivial order on such that and . That is, the smallest for an interval subgraph is the solution to our problem.
However, we do not have to compute of all the possible interval representations over on each node . We say that dominates if and only if , and , where we write if every forbidden interval of is inside some forbidden interval of : i.e., for every , there is such that and . In this case, every possible way of introducing new intervals to is also possible for by cheaper or equivalent cost. Therefore, it is enough to remember discarding . For a set of abstractions, the process of removing ones which are dominated by others is called reduction. We call a set of abstractions reduced if it has no pair of distinct elements such that one dominates the other.
Lemma 1.
Suppose dominates . For any extension of such that , there is an extension of such that .
Our algorithm calculates a reduced set of abstractions of interval representations of interval subgraphs of for each node of which satisfies the following invariant.
Condition 1.
-
•
Every element is the abstraction of some interval representation of an interval subgraph of for ,
-
•
Any interval representation of any interval subgraph of has an element of that dominates its abstraction .
Since is reduced, if , we have for some and , where is the trivial order such that . Particularly for the root node , the number is the least number such that one can obtain an interval subgraph by removing edges from . That is, is the solution to our problem. If is a leaf, by definition. It remains to show how to calculate from the child(ren) of , while preserving the invariant (Condition 1).
Introduce Node:
Suppose that is an introduce node. It has just one child such that . For an extension of for , let us anchor the new points and to points and in :
We say respects and if
-
•
for implies ,
-
•
implies ,
respectively. If does not respect (resp. ), then it means that we are creating an edge between and a vertex in (resp. in ) which are not adjacent in the input graph . Figure 3 shows examples of extensions that do or do not respect . For each interval representation extending to that respects and , we put one or two elements into by the following manner. Some forbidden intervals that had an anchor or in may be re-anchored to or . Forbidden intervals are partitioned into three, where the ones in and are certainly left to and right to , respectively:
Note that is either empty or a singleton and that and are mutually exclusive, since respects . If a forbidden interval has a point anchored to and is right to , then it will be re-anchored:
Corresponding to the possible choices, we put both and into . We will not add since it is dominated by the other two.
Example 1.
Figure 3 shows several possibilities of extending () to by introducing and . Defining by letting is illustrated by the interval of , where , , and , in which case the anchors of forbidden intervals will be updated to . Defining by letting gives , , and . We consider two ways to put the interval relative to the forbidden interval anchored to . One is to put left to those forbidden intervals, like the interval of shows, in which case we update to , so we obtain . The other is to put right to them, as shows, in which case we keep , so we obtain . We note that there can be several non-intersecting forbidden intervals between and , and one may locate between them. This interpretation gives but we ignore this possibility, due to .
We then obtain by reducing .
Forget Node:
Suppose that is a forget node. It has just one child such that . For each in , in accordance with the definition of abstractions, we add to the triple where
-
•
is the restriction of ,
-
•
and .
We make from by
-
•
making a new forbidden interval involving and
-
•
re-ahcoring forbidden intervals if they have an anchor or .
Let us anchor the points and to points and in :
The set of forbidden intervals that intersect with will be given below. They will be merged into one in .
Figure 4 may help understanding why we take “intersecting” with rather than with . This comes from the gap of the meanings of position pairs and . While the interval of starts exactly at and ends at , the forbidden interval anchored to starts after and ends after . Although forbidden intervals anchored to for some must intersect with the interval of , we have according to the definition. On the other hand, forbidden intervals anchored to for some do not intersect with and holds. The new forbidden interval will be
Then we obtain by reducing .
Join Node:
Suppose that has two children and , where . We say that and are compatible if and there are no and such that . Figure 5 illustrates an incompatible pair. If and are not compatible, any interval representation on which extends and will make two vertices adjacent which are not adjacent in the input graph for any interval representations on of which is the abstraction for . For each compatible pair , one can find an interval representation on that forms a subgraph of which extends some and whose abstractions are and , respectively. We add the triple to . We obtain by reducing .
Theorem 1.
The edge deletion problem for interval graphs can be solved in time for the treewidth of and some polynomial function . If is the pathwidth, it can be solved in time.
Proof.
Let be the maximum size of the assigned set to a node of a nice tree-decomposition. We first estimate the number of possible forbidden interval sets for a fixed in . Recall that must satisfy that
-
•
implies ,
-
•
and implies ,
-
•
and implies .
That is, there are at most three intervals in that involves each :
-
(1)
ending a forbidden interval started earlier: for some ,
-
(2)
starting and ending a minimal forbidden interval: ,
-
(3)
starting a new forbidden interval: for some .
Those possibilities are neither mutually exclusive nor independent. To count the number of possible forbidden intervals inductively, hereafter we will also count interval sets that may contain a right-unbounded interval. Let and be the numbers of possible ways of drawing forbidden intervals with points in addition to where the last intervals are right-bounded and right-unbounded, respectively. Solving the recurrence equations
we obtain . Therefore, since we have points, there are at most possible sets of forbidden intervals. There can be at most varieties of . Recall that is reduced, where if has two elements of the form and , then . We conclude that each may contain at most elements.
Suppose is a forget node, whose child is . Then, from each element , we calculate just one element . Therefore, the calculation can be done in time.
Suppose is an introduce node, whose child is . Then, each element is derived from a unique element . Therefore, the calculation can be done in time.
Suppose is a join node with children and . Recall that and are compatible only when . Checking the compatibility of and and computing their “join” takes time. Since we have at most pairs to examine for each , it takes time.
Since the nice tree-decomposition has nodes, we obtain the conclusion. ∎
4 Finding a Largest Permutation Subgraph
A permutation representation over a set is a pair of linear orders on such that for all and . For two points and in , we write if and agree on the order of and : that is, either and or and . Otherwise, we write and say that and intersect in . The permutation graph of a permutation representation on is where
Figure 7 (a) shows an example of a permutation representation and (b) shows the induced permutation graph . For each vertex of , we put a point on each of the two parallel lines respecting the linear orders and and draw a line, called the -line, between the points. Then we make an edge between and if and only if the -line and the -line intersect. This section gives an FPT algorithm for the edge deletion problem for permutation graphs.
4.1 Algorithm Invariant
We anchor the areas bordered with the lines of forgotten vertices to the points of the current bag . For each , let the intersection closure of (w.r.t. and ) be the smallest set such that
-
•
and
-
•
if , , and , then .
Each closure forms a forbidden area in the sense that we may introduce no new lines that intersect the area.
For each permutation representation over , we define the abstraction of for as follows:
-
•
and are the restrictions of and to , respectively,
-
•
there is s.t. for ,
and , -
•
.
Intuitively, anchors occurrences of forgotten vertices in to occurrences of active vertices in . Figure 7 (c) illustrates an example of forbidden areas. We note that, two distinct elements and cannot “intersect”, due to the definition of intersection closures. In other words, there are no such that and for some . Elements of will be linearly ordered by extending so that if and only if or . The integer is the number of the edges deleted from except those among active vertices.
We say that dominates if and only if , and , where we write if every forbidden area of is inside some forbidden area of : i.e., for every , there is such that , , , and .
Lemma 2.
Suppose dominates . For any extension of such that , there is an extension of such that .
We call a set of abstractions reduced if it has no pair of distinct elements of which one dominates the other. The reduced form of a set of abstractions is obtained by removing abstractions that are dominated by others. Our algorithm for Permutation-Edge-Deletion calculates, for each node of the tree-decomposition, a reduced set of abstractions of permutation representations of permutation subgraphs of for satisfying the following invariant properties.
Condition 2.
-
•
Every element of is the abstraction of some permutation representation of a permutation subgraph of for ,
-
•
Any permutation representation of any permutation subgraph of has an element of that dominates its abstraction .
Clearly satisfies the above condition if and only if so is its reduced form. We make each reduced. Particularly if is the root node, we have , where is the trivial order over such that and is the least number such that one can obtain a permutation subgraph by removing edges from . That is, the number will be the solution to our problem. If is a leaf, by definition . Our algorithm computes those values recursively from leaves to the root. In what follows, we show how to calculate from for child(ren) of , while preserving the invariant (Condition 2).
4.2 Algorithm
Leaf Node:
If is a leaf, we let .
Introduce Node:
Suppose is an introduce node. It has just one child such that . Figure 8 would help to understand the behavior of our algorithm in this case. For each in , we say that an extension of to respects and precisely in the cases where
-
•
if for , then ,
-
•
there are no and such that and ,
respectively. If does not respect , we would wrongly make two non-adjacent vertices and of intersect in , which gives a non-subgraph of the input graph. Otherwise, they will be non-adjacent. Since for any forgotten vertex , we must avoid and intersect in an extension of . This requires to respect . If respects , there are such that and an extension of both and such that . We note that here we use rather than to judge whether respects . This is because the quadruple consists of anchors rather than the exact points of the forbidden area.
For each extension respecting and , we add at most two triples to as described below. Since , need not be updated by definition.
Some forbidden areas that had an anchor may be re-anchored to . Forbidden areas are partitioned into three, where the ones in and are certainly left to and right to , respectively, while can go to the left or right to :
Note that is either empty or a singleton and that and are mutually exclusive, since respects . If a forbidden area has a point anchored to and is right to , it will be re-anchored:
Corresponding to the possible choices, we put both and into . We will not add since it is dominated by the other two.
We then obtain by reducing .
Forget Node:
Suppose is a forget node. It has just one child such that . For each in , we add the following triple to where
-
•
is the restriction of for ,
-
•
.
Let
be the set of forbidden areas of intersecting with . We note that the asymmetry between and is due to the fact that the actual forbidden area starts after and and ends after and , while the points of are exact.
The new forbidden area formed by and will be where for and ,
We then define by
This is illustrated in Figure 9.
We obtain by reducing .
Join Node:
Suppose has two children and , where . We say that a pair of and is compatible precisely in the case where
-
•
, say , and
-
•
no members of and intersect: that is, there are no pairs of and such that and for some .
If they are compatible, we add the triple to . We then obtain by reducing .
Theorem 2.
The edge deletion problem for permutation graphs can be solved in time where for the treewidth of . If is the pathwidth, it can be solved in time.
Proof.
Let be the maximum size of the assigned set to a node of the tree-decomposition. There are at most variants of of abstractions .
In order to count the number of possible forbidden interval sets for a fixed in , we give a transformation of below. Let for be the interval projections of :
The proof of Theorem 1 has shown that there can be at most possibilities for each . However, since there is no one-one corresponding between and , the pair is not informative enough to recover . For example, there can be distinct and in such that . We call an interval a hub if there are two (or more) distinct intervals such that . We call an interval a terminal if it is not a hub and there is no such that where is the successor of in . We use the same names for intervals in . Let enrich so that each interval has a 3-valued variable that indicate whether it is a hub, a terminal, or neither. Figure 10 illustrates how will be transformed into and .
We will show that is at most the number of possible enriched sets and . Algorithm 1 recovers elements of from left to right using and , where elements of and are sorted and stored in stacks. From the first intervals of the stacks, we obtain the first forbidden area . If is a hub, we keep it as the active hub. Note that it is impossible that both and are hubs simultaneously. Suppose we have reconstructed a forbidden area with no active hub. In this case, the next forbidden area will be . Suppose is the active hub. If is neither a hub nor a terminal, then the next forbidden area will be and we keep the active hub . If is a terminal, then the next forbidden area will be and the active hub will be null. If is a hub, then the next forbidden area will be and the new active hub is .
A point may appear in in the following ways:
-
(1)
ending a forbidden interval started earlier: for some ,
-
(2)
starting and ending a minimal forbidden interval: , which may be a hub or a terminal,
-
(3)
starting a new forbidden interval: for some , which may be a terminal but not a hub.
We do not care whether or not it is a terminal in the first case, leaving counting different possibilities to the interval starting point . Solving the recurrence equations
we obtain . All in all, we have at most possibilities for .
Arguments similar to the proof of Theorem 1 derive the theorem. ∎
5 Other Classes Related to Interval Graphs
The algorithm presented in the previous section can be applied to the -Edge-Deletion for some subclasses and a superclass of interval graphs with a slight modifications.
5.1 Proper interval graphs
An interval representation is said to be proper if there are no such that . An interval graph is proper if it admits a proper interval representation. In accordance with the definition of the graph class, we simply require in Introduce Node of the algorithm in Section 3 to be a proper interval representation.
Corollary 1.
The edge deletion problem for proper interval graphs can be solved in time where for the treewidth of . If is the pathwidth, it can be solved in time.
Proof.
Let be the maximum size of the assigned set to a node of a nice tree-decomposition. The number of possible proper interval representations over vertices is for the -th Catalan number . Let be the numbers of possible ways of drawing forbidden intervals with points in addition to where the last intervals may be right-unbounded. We observed in the proof of Theorem 1 (Figure 6) that . However, in the case of proper interval representations, we never have . If the last st point is , we have at most three times more possible forbidden interval sets than the number of possible forbidden interval sets over points. Therefore, the number of possible abstractions in each is at most . ∎
5.2 Trivially perfect graphs
An interval representation is said to be nested if there are no , such that . A trivially perfect graph (a.k.a. nested interval graph) is an interval graph that admits a nested interval representation. The algorithm presented in Section 3 can easily be modified so that it solves the edge deletion problem for trivially perfect graphs. In accordance with the definition of the graph class, we simply require in Introduce Node of the algorithm in Section 3 to be a nested interval representation.
Corollary 2.
The edge deletion problem for trivially perfect graphs can be solved in time where for the treewidth of . If is the pathwidth, it can be solved in time.
Proof.
In this case, forbidden intervals and active intervals are nested. Let be the number of possible pairs in abstractions with active vertices modulo renaming of vertices. Then, the maximum cardinality of is at most . Hereafter we assume that neither nor appears in . Let us say that is splittable if can be partitioned into two non-empty subsets and so that
-
•
,
-
•
for any , and belong to the same component or ,
-
•
if and , and belong to the same component or .
Otherwise, is non-splittable. Let and count the numbers of non-splittable and splittable pairs , respectively, where . We have , , , and for ,
(1) | ||||
(2) | ||||
(3) |
The first term of (2) is the th Catalan number, which counts the possible permutations when , i.e., when . The second term counts cases where and for some vertex . The coefficient counts the number of subsets of . Note that when , and thus we have . Each term of (3) counts the number of pairs where the first splitting point is at the th active vertex interval. In other words, is the minimum cardinality of the first splitting component . The coefficient counts the cases where presents and absents in where .
We show for by induction on . One can confirm it is true for by calculation. For ,
Noting that and , we obtain
Hence, the number of possible abstractions is at most . ∎
5.3 Circular-arc graphs
Circular-arc graphs are a generalization of interval graphs which have an arc model, which can be seen as a “circular” interval representation. For a linear order over a set and four elements , we write if either
-
•
for some , or
-
•
or for some .
Otherwise, we write . A circular-arc graph is a graph such that
for some linear order over . Note that this set contains neither nor . The algorithm presented in Section 3 can easily be modified so that it solves the edge deletion problem for circular-arc graphs by replacing the definitions of and as above, and defining and . Since we allow , the number of admissible arc model is bigger than that of (ordinary) interval representations. This affects the computational complexity.
Corollary 3.
The edge deletion problem for circular-arc graphs can be solved in time where for the treewidth of . If is the pathwidth, it can be solved in time.
Proof.
There can be varieties of . One can argue that each has at most sets of forbidden intervals similarly to the proof of Theorem 1. ∎
5.4 Threshold graphs
Threshold graphs are special cases of trivially perfect graphs, which can be defined in several different ways. Here we use a pair of a vertex subset and a linear order over as a threshold interval representation. We say that vertices and intersect on if and only if and or the other way around. A threshold graph is a graph where is a threshold interval representation on and . By extending to over so that for all and and for all , then the induced interval graph coincides with the threshold graph. To attain drastic improvement on the complexity, we design an algorithm for the edge deletion problem for threshold graphs from scratch, rather than modifying the one for interval graphs.
For a threshold representation of a subgraph , we define its abstraction as follows: (1) is the restriction of to , (2) , (3) if , then and (4) if , then and , and (5) .
We say that dominates if , , , and either (a) and , (b) and , or (c) and . Using the above invariant, we can provide an algorithm for Threshold-Edge-Deletion.
Our algorithm assigns a set for each node of so that the threshold counterpart of Condition 1 holds. Accordingly for leaf nodes .
Introduce Node:
Suppose has just one child such that . For each , we add to all tuples fulfilling the following conditions:
-
•
is an extension of to ,
-
•
.
-
•
if for , then and do not intersect in .
-
•
if , then or ,
and moreover -
•
if , then and .
We then obtain by reducing .
Forget Node:
Suppose has just one child such that . For each , we add the tuple to where
-
•
is the restriction of for ,
-
•
,
-
•
if , and otherwise,
-
•
if , then ,
-
•
if , then
-
•
We then obtain by reducing .
Join node:
Suppose has two children and , where . We add to if there are and such that , and either
-
•
and ,
-
•
, and , or
-
•
, and .
We then obtain by reducing .
Theorem 3.
The edge deletion problem for threshold graphs can be solved in time where for the treewidth of . If is the pathwidth, it can be solved in time.
6 Conclusion
We have proposed FPT algorithms for Edge-Deletion to some intersection graphs parameterized by treewidth in this paper. Our algorithms maintain partial intersection models on a node of a tree decomposition with some restrictions and extend the models consistently for the restrictions in the next step. We expect that the ideas in our algorithms can be applied to other intersection graphs whose intersection models can be represented as linear-orders, for example circle graphs, chain graphs and so on, and to Vertex-Deletion of intersection graphs.
We have the following questions as future work:
-
•
Do there exist single exponential time algorithms for the considered problems, that is, time, or can we show matching lower bounds assuming the Exponential Time Hypothesis?
-
•
Are there FPT algorithms parameterized by treewidth for -Completion which is to find the minimum number of adding edges to obtain a graph in an intersection graph class ? We can naturally apply the idea of our algorithms to -Completion problems. While -Edge-Deletion algorithms do not allow introduced objects to intersect with forgotten objects, -Completion algorithms do allow it with the cost of addition of new edges. Thus -Completion algorithms based on this naive approach will be XP algorithms since we have to remember the number of forgotten objects in the representation to count the number of intersections between the introduced objects and forgotten objects.
-
•
Are there FPT algorithms for Edge-Deletion to intersection graphs defined using objects on a plane, like unit disk graphs? The intersection graph classes discussed in this paper are all defined using objects aligned on a line. Going up to a geometric space of higher dimension is a challenging topic.
Acknowledgement
We are very much grateful to Yasuaki Kobayashi for his valuable comment that has improved the complexity analyses. This work was supported in part by JSPS KAKENHI Grant Numbers JP18H04091 and JP19K12098.
References
- [1] Stéphane Bessy and Anthony Perez. Polynomial kernels for proper interval completion and related problems. Inf. Comput., 231:89–108, 2013.
- [2] Hans L. Bodlaender. A linear-time algorithm for finding tree-decompositions of small treewidth. SIAM J. Comput., 25(6):1305–1317, 1996.
- [3] Andreas Brandstädt, Van Bang Le, and Jeremy P. Spinrad. Graph Classes: A Survey. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, 1999.
- [4] Pablo Burzyn, Flavia Bonomo, and Guillermo Durán. NP-completeness results for edge modification problems. Discrete Applied Mathematics, 154(13):1824–1844, 2006.
- [5] Leizhen Cai. Fixed-parameter tractability of graph modification problems for hereditary properties. Inf. Process. Lett., 58(4):171–176, 1996.
- [6] Yixin Cao. Linear recognition of almost interval graphs. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12, 2016, pages 1096–1115, 2016.
- [7] Yixin Cao and Dániel Marx. Interval deletion is fixed-parameter tractable. ACM Trans. Algorithms, 11(3):21:1–21:35, 2015.
- [8] Bruno Courcelle. The monadic second-order logic of graphs XV: on a conjecture by D. Seese. J. Applied Logic, 4(1):79–114, 2006.
- [9] Bruno Courcelle and Joost Engelfriet. Graph Structure and Monadic Second-Order Logic - A Language-Theoretic Approach, volume 138 of Encyclopedia of mathematics and its applications. Cambridge University Press, 2012.
- [10] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015.
- [11] Pål Grønås Drange and Michal Pilipczuk. A polynomial kernel for trivially perfect editing. Algorithmica, 80(12):3481–3524, 2018.
- [12] Zeev Frenkel, Etienne Paux, David I. Mester, Catherine Feuillet, and Abraham B. Korol. LTC: a novel algorithm to improve the efficiency of contig assembly for physical mapping in complex genomes. BMC Bioinformatics, 11:584, 2010.
- [13] Paul W. Goldberg, Martin Charles Golumbic, Haim Kaplan, and Ron Shamir. Four strikes against physical mapping of DNA. Journal of Computational Biology, 2(1):139–152, 1995.
- [14] Martin Charles Golumbic. Algorithmic Graph Theory and Perfect Graphs (Annals of Discrete Mathematics, Vol 57). North-Holland Publishing Co., Amsterdam, The Netherlands, 2004.
- [15] Pinar Heggernes, Pim van ’t Hof, Bart M. P. Jansen, Stefan Kratsch, and Yngve Villanger. Parameterized complexity of vertex deletion into perfect graph classes. Theor. Comput. Sci., 511:172–180, 2013.
- [16] Ton Kloks. Treewidth, Computations and Approximations, volume 842 of Lecture Notes in Computer Science. Springer, 1994.
- [17] John M. Lewis and Mihalis Yannakakis. The node-deletion problem for hereditary properties is NP-complete. J. Comput. Syst. Sci., 20(2):219–230, 1980.
- [18] Yunlong Liu, Jianxin Wang, Jie You, Jianer Chen, and Yixin Cao. Edge deletion problems: Branching facilitated by modular decomposition. Theor. Comput. Sci., 573:63–70, 2015.
- [19] Federico Mancini. Graph modification problems related to graph classes. PhD thesis, University of Bergen, 5 2008.
- [20] François Margot. Some complexity results about threshold graphs. Discrete Applied Mathematics, 49(1-3):299–308, 1994.
- [21] Dániel Marx. Chordal deletion is fixed-parameter tractable. Algorithmica, 57(4):747–768, 2010.
- [22] James Nastos and Yong Gao. Bounded search tree algorithms for parametrized cograph deletion: Efficient branching rules by exploiting structures of special graph classes. Discrete Math., Alg. and Appl., 4(1), 2012.
- [23] Assaf Natanzon, Ron Shamir, and Roded Sharan. Complexity classification of some edge modification problems. Discrete Applied Mathematics, 113(1):109–128, 2001.
- [24] Toshiki Saitoh, Ryo Yoshinaka, and Hans L. Bodlaender. Fixed-treewidth-efficient algorithms for edge-deletion to interval graph classes. In WALCOM: Algorithms and Computation, volume 12635 of Lecture Notes in Computer Science, pages 142–153. Springer, 2021.
- [25] Roded Sharan. Graph Modification Problems and their Applications to Genomic Research. PhD thesis, University of Bergen, 5 2008.
- [26] Jeremy P Spinrad. Efficient graph representations. Fields Institute monographs. American Mathematical Society, Providence, RI, 2003.
- [27] Michael S.Watermanl and Jerrold R.Griggs. Interval graphs and maps of dna. Bulletin of Mathematical Biology, 48:189–195, 1986.
- [28] Pim van ’t Hof and Yngve Villanger. Proper interval vertex deletion. Algorithmica, 65(4):845–867, 2013.
- [29] Yngve Villanger, Pinar Heggernes, Christophe Paul, and Jan Arne Telle. Interval completion is fixed parameter tractable. SIAM J. Comput., 38(5):2007–2020, 2009.