SlideShare a Scribd company logo
1 of 104
Download to read offline
Parameterized Algorithms for the
Max q-Colorable Induced Subgraph problem
on Perfect Graphs
Neeldhara Misra, Fahad Panolan, Ashutosh Rai,
Venkatesh Raman, and Saket Saurabh
The Problem
Given a graph G, find the largest subgraph that is
q-colorable.
The Problem
Given a graph G, find the largest subgraph that is
1-colorable.
The Problem
Given a graph G, find the largest subgraph that is
an independent set.
The Problem
Given a graph G, find the largest subgraph that is
2-colorable.
The Problem
Given a graph G, find the largest subgraph that is
an induced bipartite subgraph.
Our Motivation
Yannakakis and Gavril [IPL 1987] showed that this problem is NP-complete even
on split graphs if q is part of input, but gave an nO(q) algorithm on chordal
graphs for fixed q.
Our Motivation
Yannakakis and Gavril [IPL 1987] showed that this problem is NP-complete even
on split graphs if q is part of input, but gave an nO(q) algorithm on chordal
graphs for fixed q.
An immediate natural question is: What is the status of this question in
parametrized complexity?
Our Motivation
Yannakakis and Gavril [IPL 1987] showed that this problem is NP-complete even
on split graphs if q is part of input, but gave an nO(q) algorithm on chordal
graphs for fixed q.
An immediate natural question is: What is the status of this question in
parametrized complexity?
In other words: Does this problem have an algorithm with running time
f(q) · p(n) or f(q, ℓ) · p(n, q)? Here ℓ is the size of the subgraph we are
looking for.
We first present a randomized algorithm with running time:
f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q),
to find an induced q-colorable subgraph of size at least ℓ.
We first present a randomized algorithm with running time:
f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q),
to find an induced q-colorable subgraph of size at least ℓ.
We first present a randomized algorithm with running time:
f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q),
to find an induced q-colorable subgraph of size at least ℓ.
Notice that we do not expect an algorithm with running time:
f(ℓ) · p(n, q),
since the problem is W[1]-hard on general graphs even when q = 1.
We first present a randomized algorithm with running time:
f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q),
to find an induced q-colorable subgraph of size at least ℓ.
This algorithm is reasonable for graph classes where maximal independent sets
can be enumerated efficiently, for example, co-chordal and split graphs.
The problem remains NP-complete even when restricted to these graph classes.
We first present a randomized algorithm with running time:
f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q),
to find an induced q-colorable subgraph of size at least ℓ.
We also establish the non-existence of a polynomial kernels for the problem
when parameterized by solution size alone.
(Under standard complexity-theoretic assumptions.)
The Algorithm
Enumerate all maximal independent sets, and create an auxiliary graph that has
one vertex mi for every MIS.
The Algorithm
Enumerate all maximal independent sets, and create an auxiliary graph that has
one vertex mi for every MIS.
The Algorithm
Enumerate all maximal independent sets, and create an auxiliary graph that has
one vertex mi for every MIS.
The Algorithm
Enumerate all maximal independent sets, and create an auxiliary graph that has
one vertex mi for every MIS.
The Algorithm
Enumerate all maximal independent sets, and create an auxiliary graph that has
one vertex mi for every MIS.
The Algorithm
Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if
v ∈ mi.
a
b
b
c
c
d
d
e
e
f
f
a
The Algorithm
Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if
v ∈ mi.
a
b
b
c
c
d
d
e
e
f
f
a
The Algorithm
Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if
v ∈ mi.
a
b
b
c
c
d
d
e
e
f
f
a
The Algorithm
Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if
v ∈ mi.
a
b
b
c
c
d
d
e
e
f
f
a
The Algorithm
Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if
v ∈ mi.
a
b
b
c
c
d
d
e
e
f
f
a
The Algorithm
Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if
v ∈ mi.
a
b
b
c
c
d
d
e
e
f
f
a
The Algorithm
Color the vertices of the graph with ℓ colors, uniformly at random. Consider the
color classes in the auxiliary graph.
b
a
Maximal
Independent
Sets
Partition
into
L classes
A random coloring of G
The Algorithm
Now contract all the color classes into singletons, and find a dominating set of
size at most q.
b
a
Maximal
Independent
Sets
Partition
into
L classes
A random coloring of G
The Algorithm
Clearly, if there is a dominating set, then we have found q-colorable subgraph of
size at least ℓ.
b
a
Maximal
Independent
Sets
Partition
into
L classes
A random coloring of G
The Algorithm
To compute the dominating set, make the “MIS vertices” a clique and run Steiner
Tree with the V as the terminals.
b
a
Maximal
Independent
Sets
Partition
into
L classes
A random coloring of G
Make this a clique
The Algorithm
When we randomly color the vertices, each vertex in a possible solution will get
different colors with probability:
ℓ!
ℓℓ
⩾ e−ℓ
The Algorithm
When we randomly color the vertices, each vertex in a possible solution will get
different colors with probability:
ℓ!
ℓℓ
⩾ e−ℓ
Once we have a nice coloring, clearly
everything else works out fine.
The Algorithm
When we randomly color the vertices, each vertex in a possible solution will get
different colors with probability:
ℓ!
ℓℓ
⩾ e−ℓ
Once we have a nice coloring, clearly
everything else works out fine.
The Algorithm
We then present a randomized algorithm with running time:
f(ℓ) · [Time to find a maximum sized independent sets] · p(n, q),
to find an induced q-colorable subgraph of size at least ℓ.
The Algorithm
We then present a randomized algorithm with running time:
f(ℓ) · [Time to find a maximum sized independent sets] · p(n, q),
to find an induced q-colorable subgraph of size at least ℓ.
This algorithm is good for perfect graphs where maximum independent set can
be found in polynomial time.
The Algorithm
A graph H is q colorable if and only if its vertex set can be partitioned into q
independent sets.
The Algorithm
• Randomly color the vertices of G with {1, . . . , q}.
• Let Vi be the set of vertices with color i.
• Find a maximum sized independent set Ii ⊆ G[Vi].
• Return I = ∪q
i=1Ii.
The Algorithm
Suppose we have a solution W =
⊎q
i=1 Wi. Here Wi is an independent
solution and
∑q
1=1 Wi| = ℓ.
The Algorithm
Suppose we have a solution W =
⊎q
i=1 Wi. Here Wi is an independent
solution and
∑q
1=1 Wi| = ℓ.
When we randomly color the vertices, a vertex in Wi gets color i
1
qℓ
The Algorithm
Suppose we have a solution W =
⊎q
i=1 Wi. Here Wi is an independent
solution and
∑q
1=1 Wi| = ℓ.
When we randomly color the vertices, a vertex in Wi gets color i
1
qℓ
Once we have a nice coloring, clearly
everything else works out fine.
The Algorithm
Suppose we have a solution W =
⊎q
i=1 Wi. Here Wi is an independent
solution and
∑q
1=1 Wi| = ℓ.
When we randomly color the vertices, a vertex in Wi gets color i
1
qℓ
Once we have a nice coloring, clearly
everything else works out fine.
Kernelization Algorithm
A parameterized problem is said to admit a polynomial kernel if every instance
(I, k) can be reduced in polynomial time to an equivalent instance (I′, k′) with
both size and parameter value bounded by a polynomial in k.
No Kernel Results
Finally, we show that (under standard complexity-theoretic assumptions) the
problem does not admit a polynomial kernel on split and perfect graphs in the
following sense:
No Kernel Results
Finally, we show that (under standard complexity-theoretic assumptions) the
problem does not admit a polynomial kernel on split and perfect graphs in the
following sense:
(a) On split graphs, we do not expect a polynomial kernel if q is a part of the
input.
(b) On perfect graphs, we do not expect a polynomial kernel even for fixed
values of q ⩾ 2.
Composition
A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an
algorithm
Composition
A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an
algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with
(xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t,
Composition
A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an
algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with
(xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t,
uses time polynomial in
∑t
i=1 |xi| + k, and outputs (y, k′) ∈ Σ∗ × N
Composition
A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an
algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with
(xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t,
uses time polynomial in
∑t
i=1 |xi| + k, and outputs (y, k′) ∈ Σ∗ × N
with (a) (y, k′) ∈ Π ⇐⇒ (xi, k) ∈ Π for some 1 ⩽ i ⩽ t and (b) k′ is
polynomial in k.
Composition
A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an
algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with
(xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t,
uses time polynomial in
∑t
i=1 |xi| + k, and outputs (y, k′) ∈ Σ∗ × N
with (a) (y, k′) ∈ Π ⇐⇒ (xi, k) ∈ Π for some 1 ⩽ i ⩽ t and (b) k′ is
polynomial in k.
A parameterized problem is or OR-compositional if there is a composition
algorithm for it.
The Composition
The Composition Algorithm
The Composition
.. G1
.
G2
.
G3
.
G4
.G5
.
G6
.
G7
.
G8
The Composition
.. G1
.
G2
.
G3
.
G4
.
G6
.
G7
.
G8
.G5
The Composition
..
G2
.
G3
.
G6
.
G8
. G1
.
G4
.G5
.
G7
The Composition
.. G1
.
G2
.
G3
.
G4
.G5
.
G6
.
G7
.
G8
The Composition
..
G2
.
G3
.
G6
.
G8
.
G7
. G1
.
G4
.G5
The Composition
..
G2
.
G3
.
G6
.
G8
.G5
.
G7
. G1
.
G4
A spillover across two instances could still be a problem.
The Composition
At most two inner vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
What is this gadget trying to achieve?
At most two inner vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
At most two inner vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
At most two inner vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
At most two inner vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
At most two inner vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
At most two inner vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
All four outer vertices participate in the solution.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
Inner vertices from two levels do not participate together.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
Inner vertices from two levels do not participate together.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
Inner vertices from two levels do not participate together.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
Inner vertices from two levels do not participate together.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
Inner vertices from two levels do not participate together.
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
A valid contribution, therefore, is either …
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
A valid contribution, therefore, is either this
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
If the gadget contributes six vertices to any induced bipartite subgraph, then:
A valid contribution, therefore, is either or this:
..
xij
.
wij
.
yij
.
zij
.
aij
.
bij
.
cij
.
dij
The Composition
........................................................
—log t—
.
2k
The Composition
.........................................................
—log t—
.
2k
The Composition
........................................................
G0 : 000
...................
—log t—
.
2k
The Composition
........................................................
G1 : 001
...................
—log t—
.
2k
The Composition
........................................................
G2 : 010
...................
—log t—
.
2k
The Composition
........................................................
G3 : 011
...................
—log t—
.
2k
The Composition
........................................................
G4 : 100
...................
—log t—
.
2k
The Composition
........................................................
G5 : 101
...................
—log t—
.
2k
The Composition
........................................................
G6 : 110
...................
—log t—
.
2k
The Composition
........................................................
G7 : 111
...................
—log t—
.
2k
k −→ k + 12k · log t
k −→ k + 12k · log t
...can be shown to be a polynomial in k without loss of generality.
The Forward Direction
Suppose some Gi has a bipartite subgraph on k vertices.
Suppose some Gi has a bipartite subgraph on k vertices.
Consider the binary representation of i. Pick the six vertices from the 2k log t
gadgets that Gi is non-adjacent to.
........................................................
G5 : 101
..................
......................................
G5 : 101
The Reverse Direction
Suppose the composed instance has an induced bipartite subgraph S on at least
k + 12k · log t vertices.
Suppose the composed instance has an induced bipartite subgraph S on at least
k + 12k · log t vertices.
Recall that each of the (2k log t) gadgets can contribute at most six vertices
each.
Suppose the composed instance has an induced bipartite subgraph S on at least
k + 12k · log t vertices.
Recall that each of the (2k log t) gadgets can contribute at most six vertices
each.
Consider:
(S ∩ Gi) for 1 ⩽ i ⩽ t.
Suppose the composed instance has an induced bipartite subgraph S on at least
k + 12k · log t vertices.
Recall that each of the (2k log t) gadgets can contribute at most six vertices
each.
Consider:
(S ∩ Gi) for 1 ⩽ i ⩽ t.
If S ∩ Gi is non-empty for exactly one instance Gi, then we are done, because
then we automatically have that |S ∩ Gi| ⩾ k.
We also know that S cannot be shared by three of the instances, since that would
induce a triangle.
We also know that S cannot be shared by three of the instances, since that would
induce a triangle.
Let us now address the only remaining case: what if S intersects Gi and Gj
non-trivially, for some 1 ⩽ i ̸= j ⩽ t?
If i ̸= j, then the bit vectors corresponding to i and j are also different.
If i ̸= j, then the bit vectors corresponding to i and j are also different.
Let b be an index (1 ⩽ b ⩽ log t) where i and j differ.
........................................................
G5 : 101 and G7 : 111
........................
These 2k gadgets, corresponding to the index b, cannot contribute to S at all,
being global to vertices in Gi and Gj.
......................................
G5 : 101 and G7 : 111
............
The remaining gadgets can contribute at most:
[2k · (log t − 1)]6 + 4(2k) = 12k log t − 4k.
The remaining gadgets can contribute at most:
[2k · (log t − 1)]6 + 4(2k) = 12k log t − 4k.
Thus Gi and Gj together must account for at least 5k vertices between them.
The remaining gadgets can contribute at most:
[2k · (log t − 1)]6 + 4(2k) = 12k log t − 4k.
Thus Gi and Gj together must account for at least 5k vertices between them.
This implies that at least one of them must be contributing at least k vertices,
and this leads us to our conclusion.
Danke!

More Related Content

What's hot

Theory of Automata and formal languages Unit 3
Theory of Automata and formal languages Unit 3Theory of Automata and formal languages Unit 3
Theory of Automata and formal languages Unit 3Abhimanyu Mishra
 
lecture 30
lecture 30lecture 30
lecture 30sajinsc
 
Split Contraction: The Untold Story
Split Contraction: The Untold StorySplit Contraction: The Untold Story
Split Contraction: The Untold StoryAkankshaAgrawal55
 
Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)Shiang-Yun Yang
 
Lossy Kernelization
Lossy KernelizationLossy Kernelization
Lossy Kernelizationmsramanujan
 
140106 isaim-okayama
140106 isaim-okayama140106 isaim-okayama
140106 isaim-okayamagumitaro2012
 
Graph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesGraph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesAkankshaAgrawal55
 
Representation formula for traffic flow estimation on a network
Representation formula for traffic flow estimation on a networkRepresentation formula for traffic flow estimation on a network
Representation formula for traffic flow estimation on a networkGuillaume Costeseque
 
Asymptotic Notations
Asymptotic NotationsAsymptotic Notations
Asymptotic NotationsNagendraK18
 
Nies cuny describing_finite_groups
Nies cuny describing_finite_groupsNies cuny describing_finite_groups
Nies cuny describing_finite_groupsAndre Nies
 
Computability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable FunctionComputability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable FunctionReggie Niccolo Santos
 
ABC-Xian
ABC-XianABC-Xian
ABC-XianDeb Roy
 
20110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-0220110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-02Computer Science Club
 
Polylogarithmic approximation algorithm for weighted F-deletion problems
Polylogarithmic approximation algorithm for weighted F-deletion problemsPolylogarithmic approximation algorithm for weighted F-deletion problems
Polylogarithmic approximation algorithm for weighted F-deletion problemsAkankshaAgrawal55
 
Loss Calibrated Variational Inference
Loss Calibrated Variational InferenceLoss Calibrated Variational Inference
Loss Calibrated Variational InferenceTomasz Kusmierczyk
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Valentin De Bortoli
 

What's hot (20)

Fine Grained Complexity
Fine Grained ComplexityFine Grained Complexity
Fine Grained Complexity
 
Theory of Automata and formal languages Unit 3
Theory of Automata and formal languages Unit 3Theory of Automata and formal languages Unit 3
Theory of Automata and formal languages Unit 3
 
lecture 30
lecture 30lecture 30
lecture 30
 
Split Contraction: The Untold Story
Split Contraction: The Untold StorySplit Contraction: The Untold Story
Split Contraction: The Untold Story
 
Volume computation and applications
Volume computation and applications Volume computation and applications
Volume computation and applications
 
Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)Aaex4 group2(中英夾雜)
Aaex4 group2(中英夾雜)
 
Lossy Kernelization
Lossy KernelizationLossy Kernelization
Lossy Kernelization
 
140106 isaim-okayama
140106 isaim-okayama140106 isaim-okayama
140106 isaim-okayama
 
Graph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known BoundariesGraph Modification: Beyond the known Boundaries
Graph Modification: Beyond the known Boundaries
 
Representation formula for traffic flow estimation on a network
Representation formula for traffic flow estimation on a networkRepresentation formula for traffic flow estimation on a network
Representation formula for traffic flow estimation on a network
 
Asymptotic Notations
Asymptotic NotationsAsymptotic Notations
Asymptotic Notations
 
Biconnectivity
BiconnectivityBiconnectivity
Biconnectivity
 
Nies cuny describing_finite_groups
Nies cuny describing_finite_groupsNies cuny describing_finite_groups
Nies cuny describing_finite_groups
 
Computability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable FunctionComputability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable Function
 
NP completeness
NP completenessNP completeness
NP completeness
 
ABC-Xian
ABC-XianABC-Xian
ABC-Xian
 
20110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-0220110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-02
 
Polylogarithmic approximation algorithm for weighted F-deletion problems
Polylogarithmic approximation algorithm for weighted F-deletion problemsPolylogarithmic approximation algorithm for weighted F-deletion problems
Polylogarithmic approximation algorithm for weighted F-deletion problems
 
Loss Calibrated Variational Inference
Loss Calibrated Variational InferenceLoss Calibrated Variational Inference
Loss Calibrated Variational Inference
 
Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...Maximum likelihood estimation of regularisation parameters in inverse problem...
Maximum likelihood estimation of regularisation parameters in inverse problem...
 

Similar to Wg qcolorable

Color Coding-Related Techniques
Color Coding-Related TechniquesColor Coding-Related Techniques
Color Coding-Related Techniquescseiitgn
 
Design and Analysis of Algorithms Exam Help
Design and Analysis of Algorithms Exam HelpDesign and Analysis of Algorithms Exam Help
Design and Analysis of Algorithms Exam HelpProgramming Exam Help
 
Important Cuts and (p,q)-clustering
Important Cuts and (p,q)-clusteringImportant Cuts and (p,q)-clustering
Important Cuts and (p,q)-clusteringASPAK2014
 
Analysis and design of algorithms part 4
Analysis and design of algorithms part 4Analysis and design of algorithms part 4
Analysis and design of algorithms part 4Deepak John
 
Average Polynomial Time Complexity Of Some NP-Complete Problems
Average Polynomial Time Complexity Of Some NP-Complete ProblemsAverage Polynomial Time Complexity Of Some NP-Complete Problems
Average Polynomial Time Complexity Of Some NP-Complete ProblemsAudrey Britton
 
Design and Analysis of Algorithms Assignment Help
Design and Analysis of Algorithms Assignment HelpDesign and Analysis of Algorithms Assignment Help
Design and Analysis of Algorithms Assignment HelpProgramming Homework Help
 
RachelKnakResearchPoster
RachelKnakResearchPosterRachelKnakResearchPoster
RachelKnakResearchPosterRachel Knak
 
P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2S.Shayan Daneshvar
 
2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)Jon Scott
 
unit-4-dynamic programming
unit-4-dynamic programmingunit-4-dynamic programming
unit-4-dynamic programminghodcsencet
 
multi threaded and distributed algorithms
multi threaded and distributed algorithms multi threaded and distributed algorithms
multi threaded and distributed algorithms Dr Shashikant Athawale
 
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Dahua Lin
 
Kolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametriclineKolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametriclineAlina Barbulescu
 
test pre
test pretest pre
test prefarazch
 

Similar to Wg qcolorable (20)

Algorithm Exam Help
Algorithm Exam HelpAlgorithm Exam Help
Algorithm Exam Help
 
Algorithm Assignment Help
Algorithm Assignment HelpAlgorithm Assignment Help
Algorithm Assignment Help
 
Color Coding-Related Techniques
Color Coding-Related TechniquesColor Coding-Related Techniques
Color Coding-Related Techniques
 
Design and Analysis of Algorithms Exam Help
Design and Analysis of Algorithms Exam HelpDesign and Analysis of Algorithms Exam Help
Design and Analysis of Algorithms Exam Help
 
Important Cuts and (p,q)-clustering
Important Cuts and (p,q)-clusteringImportant Cuts and (p,q)-clustering
Important Cuts and (p,q)-clustering
 
Analysis and design of algorithms part 4
Analysis and design of algorithms part 4Analysis and design of algorithms part 4
Analysis and design of algorithms part 4
 
Average Polynomial Time Complexity Of Some NP-Complete Problems
Average Polynomial Time Complexity Of Some NP-Complete ProblemsAverage Polynomial Time Complexity Of Some NP-Complete Problems
Average Polynomial Time Complexity Of Some NP-Complete Problems
 
Design and Analysis of Algorithms Assignment Help
Design and Analysis of Algorithms Assignment HelpDesign and Analysis of Algorithms Assignment Help
Design and Analysis of Algorithms Assignment Help
 
Approx
ApproxApprox
Approx
 
RachelKnakResearchPoster
RachelKnakResearchPosterRachelKnakResearchPoster
RachelKnakResearchPoster
 
P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2
 
2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)2016--04-07-NCUR-JON (1)
2016--04-07-NCUR-JON (1)
 
unit-4-dynamic programming
unit-4-dynamic programmingunit-4-dynamic programming
unit-4-dynamic programming
 
multi threaded and distributed algorithms
multi threaded and distributed algorithms multi threaded and distributed algorithms
multi threaded and distributed algorithms
 
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
Appendix to MLPI Lecture 2 - Monte Carlo Methods (Basics)
 
Kolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametriclineKolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametricline
 
test pre
test pretest pre
test pre
 
Algorithm Homework Help
Algorithm Homework HelpAlgorithm Homework Help
Algorithm Homework Help
 
Richard Everitt's slides
Richard Everitt's slidesRichard Everitt's slides
Richard Everitt's slides
 
Chap8 new
Chap8 newChap8 new
Chap8 new
 

More from Neeldhara Misra

Efficient algorithms for hard problems on structured electorates
Efficient algorithms for hard problems on structured electoratesEfficient algorithms for hard problems on structured electorates
Efficient algorithms for hard problems on structured electoratesNeeldhara Misra
 
On the Parameterized Complexity of Party Nominations
On the Parameterized Complexity of Party NominationsOn the Parameterized Complexity of Party Nominations
On the Parameterized Complexity of Party NominationsNeeldhara Misra
 
Graph Modification Problems: A Modern Perspective
Graph Modification Problems: A Modern PerspectiveGraph Modification Problems: A Modern Perspective
Graph Modification Problems: A Modern PerspectiveNeeldhara Misra
 
Deleting to Structured Trees
Deleting to Structured TreesDeleting to Structured Trees
Deleting to Structured TreesNeeldhara Misra
 
Elicitation for Preferences Single Peaked on Trees
Elicitation for Preferences Single Peaked on Trees Elicitation for Preferences Single Peaked on Trees
Elicitation for Preferences Single Peaked on Trees Neeldhara Misra
 
Graph Modification Algorithms
Graph Modification AlgorithmsGraph Modification Algorithms
Graph Modification AlgorithmsNeeldhara Misra
 
An FPT Algorithm for Maximum Edge Coloring
An FPT Algorithm for Maximum Edge ColoringAn FPT Algorithm for Maximum Edge Coloring
An FPT Algorithm for Maximum Edge ColoringNeeldhara Misra
 
Cheat Sheets for Hard Problems
Cheat Sheets for Hard ProblemsCheat Sheets for Hard Problems
Cheat Sheets for Hard ProblemsNeeldhara Misra
 
Separators with Non-Hereditary Properties
Separators with Non-Hereditary PropertiesSeparators with Non-Hereditary Properties
Separators with Non-Hereditary PropertiesNeeldhara Misra
 
A Kernel for Planar F-deletion: The Connected Case
A Kernel for Planar F-deletion: The Connected CaseA Kernel for Planar F-deletion: The Connected Case
A Kernel for Planar F-deletion: The Connected CaseNeeldhara Misra
 
Kernels for Planar F-Deletion (Restricted Variants)
Kernels for Planar F-Deletion (Restricted Variants)Kernels for Planar F-Deletion (Restricted Variants)
Kernels for Planar F-Deletion (Restricted Variants)Neeldhara Misra
 
Efficient Simplification: The (im)possibilities
Efficient Simplification: The (im)possibilitiesEfficient Simplification: The (im)possibilities
Efficient Simplification: The (im)possibilitiesNeeldhara Misra
 
Kernelization Complexity of Colorful Motifs
Kernelization Complexity of Colorful MotifsKernelization Complexity of Colorful Motifs
Kernelization Complexity of Colorful MotifsNeeldhara Misra
 
Expansions for Reductions
Expansions for ReductionsExpansions for Reductions
Expansions for ReductionsNeeldhara Misra
 
Lower Bounds In Kernelization
Lower Bounds In KernelizationLower Bounds In Kernelization
Lower Bounds In KernelizationNeeldhara Misra
 
Connected Dominating Set and Short Cycles
Connected Dominating Set and Short CyclesConnected Dominating Set and Short Cycles
Connected Dominating Set and Short CyclesNeeldhara Misra
 

More from Neeldhara Misra (19)

Efficient algorithms for hard problems on structured electorates
Efficient algorithms for hard problems on structured electoratesEfficient algorithms for hard problems on structured electorates
Efficient algorithms for hard problems on structured electorates
 
On the Parameterized Complexity of Party Nominations
On the Parameterized Complexity of Party NominationsOn the Parameterized Complexity of Party Nominations
On the Parameterized Complexity of Party Nominations
 
Graph Modification Problems: A Modern Perspective
Graph Modification Problems: A Modern PerspectiveGraph Modification Problems: A Modern Perspective
Graph Modification Problems: A Modern Perspective
 
Deleting to Structured Trees
Deleting to Structured TreesDeleting to Structured Trees
Deleting to Structured Trees
 
Elicitation for Preferences Single Peaked on Trees
Elicitation for Preferences Single Peaked on Trees Elicitation for Preferences Single Peaked on Trees
Elicitation for Preferences Single Peaked on Trees
 
Graph Modification Algorithms
Graph Modification AlgorithmsGraph Modification Algorithms
Graph Modification Algorithms
 
An FPT Algorithm for Maximum Edge Coloring
An FPT Algorithm for Maximum Edge ColoringAn FPT Algorithm for Maximum Edge Coloring
An FPT Algorithm for Maximum Edge Coloring
 
Research in CS
Research in CSResearch in CS
Research in CS
 
Cheat Sheets for Hard Problems
Cheat Sheets for Hard ProblemsCheat Sheets for Hard Problems
Cheat Sheets for Hard Problems
 
EKR for Matchings
EKR for MatchingsEKR for Matchings
EKR for Matchings
 
Separators with Non-Hereditary Properties
Separators with Non-Hereditary PropertiesSeparators with Non-Hereditary Properties
Separators with Non-Hereditary Properties
 
From FVS to F-Deletion
From FVS to F-DeletionFrom FVS to F-Deletion
From FVS to F-Deletion
 
A Kernel for Planar F-deletion: The Connected Case
A Kernel for Planar F-deletion: The Connected CaseA Kernel for Planar F-deletion: The Connected Case
A Kernel for Planar F-deletion: The Connected Case
 
Kernels for Planar F-Deletion (Restricted Variants)
Kernels for Planar F-Deletion (Restricted Variants)Kernels for Planar F-Deletion (Restricted Variants)
Kernels for Planar F-Deletion (Restricted Variants)
 
Efficient Simplification: The (im)possibilities
Efficient Simplification: The (im)possibilitiesEfficient Simplification: The (im)possibilities
Efficient Simplification: The (im)possibilities
 
Kernelization Complexity of Colorful Motifs
Kernelization Complexity of Colorful MotifsKernelization Complexity of Colorful Motifs
Kernelization Complexity of Colorful Motifs
 
Expansions for Reductions
Expansions for ReductionsExpansions for Reductions
Expansions for Reductions
 
Lower Bounds In Kernelization
Lower Bounds In KernelizationLower Bounds In Kernelization
Lower Bounds In Kernelization
 
Connected Dominating Set and Short Cycles
Connected Dominating Set and Short CyclesConnected Dominating Set and Short Cycles
Connected Dominating Set and Short Cycles
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Wg qcolorable

  • 1. Parameterized Algorithms for the Max q-Colorable Induced Subgraph problem on Perfect Graphs Neeldhara Misra, Fahad Panolan, Ashutosh Rai, Venkatesh Raman, and Saket Saurabh
  • 2. The Problem Given a graph G, find the largest subgraph that is q-colorable.
  • 3. The Problem Given a graph G, find the largest subgraph that is 1-colorable.
  • 4. The Problem Given a graph G, find the largest subgraph that is an independent set.
  • 5. The Problem Given a graph G, find the largest subgraph that is 2-colorable.
  • 6. The Problem Given a graph G, find the largest subgraph that is an induced bipartite subgraph.
  • 7. Our Motivation Yannakakis and Gavril [IPL 1987] showed that this problem is NP-complete even on split graphs if q is part of input, but gave an nO(q) algorithm on chordal graphs for fixed q.
  • 8. Our Motivation Yannakakis and Gavril [IPL 1987] showed that this problem is NP-complete even on split graphs if q is part of input, but gave an nO(q) algorithm on chordal graphs for fixed q. An immediate natural question is: What is the status of this question in parametrized complexity?
  • 9. Our Motivation Yannakakis and Gavril [IPL 1987] showed that this problem is NP-complete even on split graphs if q is part of input, but gave an nO(q) algorithm on chordal graphs for fixed q. An immediate natural question is: What is the status of this question in parametrized complexity? In other words: Does this problem have an algorithm with running time f(q) · p(n) or f(q, ℓ) · p(n, q)? Here ℓ is the size of the subgraph we are looking for.
  • 10. We first present a randomized algorithm with running time: f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q), to find an induced q-colorable subgraph of size at least ℓ.
  • 11. We first present a randomized algorithm with running time: f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q), to find an induced q-colorable subgraph of size at least ℓ.
  • 12. We first present a randomized algorithm with running time: f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q), to find an induced q-colorable subgraph of size at least ℓ. Notice that we do not expect an algorithm with running time: f(ℓ) · p(n, q), since the problem is W[1]-hard on general graphs even when q = 1.
  • 13. We first present a randomized algorithm with running time: f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q), to find an induced q-colorable subgraph of size at least ℓ. This algorithm is reasonable for graph classes where maximal independent sets can be enumerated efficiently, for example, co-chordal and split graphs. The problem remains NP-complete even when restricted to these graph classes.
  • 14. We first present a randomized algorithm with running time: f(ℓ) · [Time to enumerate maximal independent sets] · p(n, q), to find an induced q-colorable subgraph of size at least ℓ. We also establish the non-existence of a polynomial kernels for the problem when parameterized by solution size alone. (Under standard complexity-theoretic assumptions.)
  • 15. The Algorithm Enumerate all maximal independent sets, and create an auxiliary graph that has one vertex mi for every MIS.
  • 16. The Algorithm Enumerate all maximal independent sets, and create an auxiliary graph that has one vertex mi for every MIS.
  • 17. The Algorithm Enumerate all maximal independent sets, and create an auxiliary graph that has one vertex mi for every MIS.
  • 18. The Algorithm Enumerate all maximal independent sets, and create an auxiliary graph that has one vertex mi for every MIS.
  • 19. The Algorithm Enumerate all maximal independent sets, and create an auxiliary graph that has one vertex mi for every MIS.
  • 20. The Algorithm Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if v ∈ mi. a b b c c d d e e f f a
  • 21. The Algorithm Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if v ∈ mi. a b b c c d d e e f f a
  • 22. The Algorithm Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if v ∈ mi. a b b c c d d e e f f a
  • 23. The Algorithm Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if v ∈ mi. a b b c c d d e e f f a
  • 24. The Algorithm Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if v ∈ mi. a b b c c d d e e f f a
  • 25. The Algorithm Introduce vertices corresponding to V(G) and introduce the edge (v, mi) if v ∈ mi. a b b c c d d e e f f a
  • 26. The Algorithm Color the vertices of the graph with ℓ colors, uniformly at random. Consider the color classes in the auxiliary graph. b a Maximal Independent Sets Partition into L classes A random coloring of G
  • 27. The Algorithm Now contract all the color classes into singletons, and find a dominating set of size at most q. b a Maximal Independent Sets Partition into L classes A random coloring of G
  • 28. The Algorithm Clearly, if there is a dominating set, then we have found q-colorable subgraph of size at least ℓ. b a Maximal Independent Sets Partition into L classes A random coloring of G
  • 29. The Algorithm To compute the dominating set, make the “MIS vertices” a clique and run Steiner Tree with the V as the terminals. b a Maximal Independent Sets Partition into L classes A random coloring of G Make this a clique
  • 30. The Algorithm When we randomly color the vertices, each vertex in a possible solution will get different colors with probability: ℓ! ℓℓ ⩾ e−ℓ
  • 31. The Algorithm When we randomly color the vertices, each vertex in a possible solution will get different colors with probability: ℓ! ℓℓ ⩾ e−ℓ Once we have a nice coloring, clearly everything else works out fine.
  • 32. The Algorithm When we randomly color the vertices, each vertex in a possible solution will get different colors with probability: ℓ! ℓℓ ⩾ e−ℓ Once we have a nice coloring, clearly everything else works out fine.
  • 33. The Algorithm We then present a randomized algorithm with running time: f(ℓ) · [Time to find a maximum sized independent sets] · p(n, q), to find an induced q-colorable subgraph of size at least ℓ.
  • 34. The Algorithm We then present a randomized algorithm with running time: f(ℓ) · [Time to find a maximum sized independent sets] · p(n, q), to find an induced q-colorable subgraph of size at least ℓ. This algorithm is good for perfect graphs where maximum independent set can be found in polynomial time.
  • 35. The Algorithm A graph H is q colorable if and only if its vertex set can be partitioned into q independent sets.
  • 36. The Algorithm • Randomly color the vertices of G with {1, . . . , q}. • Let Vi be the set of vertices with color i. • Find a maximum sized independent set Ii ⊆ G[Vi]. • Return I = ∪q i=1Ii.
  • 37. The Algorithm Suppose we have a solution W = ⊎q i=1 Wi. Here Wi is an independent solution and ∑q 1=1 Wi| = ℓ.
  • 38. The Algorithm Suppose we have a solution W = ⊎q i=1 Wi. Here Wi is an independent solution and ∑q 1=1 Wi| = ℓ. When we randomly color the vertices, a vertex in Wi gets color i 1 qℓ
  • 39. The Algorithm Suppose we have a solution W = ⊎q i=1 Wi. Here Wi is an independent solution and ∑q 1=1 Wi| = ℓ. When we randomly color the vertices, a vertex in Wi gets color i 1 qℓ Once we have a nice coloring, clearly everything else works out fine.
  • 40. The Algorithm Suppose we have a solution W = ⊎q i=1 Wi. Here Wi is an independent solution and ∑q 1=1 Wi| = ℓ. When we randomly color the vertices, a vertex in Wi gets color i 1 qℓ Once we have a nice coloring, clearly everything else works out fine.
  • 41. Kernelization Algorithm A parameterized problem is said to admit a polynomial kernel if every instance (I, k) can be reduced in polynomial time to an equivalent instance (I′, k′) with both size and parameter value bounded by a polynomial in k.
  • 42. No Kernel Results Finally, we show that (under standard complexity-theoretic assumptions) the problem does not admit a polynomial kernel on split and perfect graphs in the following sense:
  • 43. No Kernel Results Finally, we show that (under standard complexity-theoretic assumptions) the problem does not admit a polynomial kernel on split and perfect graphs in the following sense: (a) On split graphs, we do not expect a polynomial kernel if q is a part of the input. (b) On perfect graphs, we do not expect a polynomial kernel even for fixed values of q ⩾ 2.
  • 44. Composition A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an algorithm
  • 45. Composition A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with (xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t,
  • 46. Composition A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with (xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t, uses time polynomial in ∑t i=1 |xi| + k, and outputs (y, k′) ∈ Σ∗ × N
  • 47. Composition A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with (xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t, uses time polynomial in ∑t i=1 |xi| + k, and outputs (y, k′) ∈ Σ∗ × N with (a) (y, k′) ∈ Π ⇐⇒ (xi, k) ∈ Π for some 1 ⩽ i ⩽ t and (b) k′ is polynomial in k.
  • 48. Composition A OR-composition algorithm for a parameterized problem Π ⊆ Σ∗ × N is an algorithm that receives as input a sequence ((x1, k), ..., (xt, k)), with (xi, k) ∈ Σ∗ × N for each 1 ⩽ i ⩽ t, uses time polynomial in ∑t i=1 |xi| + k, and outputs (y, k′) ∈ Σ∗ × N with (a) (y, k′) ∈ Π ⇐⇒ (xi, k) ∈ Π for some 1 ⩽ i ⩽ t and (b) k′ is polynomial in k. A parameterized problem is or OR-compositional if there is a composition algorithm for it.
  • 55. The Composition .. G2 . G3 . G6 . G8 .G5 . G7 . G1 . G4 A spillover across two instances could still be a problem.
  • 56. The Composition At most two inner vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 57. The Composition What is this gadget trying to achieve? At most two inner vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 58. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: At most two inner vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 59. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: At most two inner vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 60. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: At most two inner vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 61. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: At most two inner vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 62. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: At most two inner vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 63. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: All four outer vertices participate in the solution. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 64. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: Inner vertices from two levels do not participate together. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 65. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: Inner vertices from two levels do not participate together. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 66. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: Inner vertices from two levels do not participate together. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 67. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: Inner vertices from two levels do not participate together. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 68. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: Inner vertices from two levels do not participate together. .. xij . wij . yij . zij . aij . bij . cij . dij
  • 69. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: A valid contribution, therefore, is either … .. xij . wij . yij . zij . aij . bij . cij . dij
  • 70. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: A valid contribution, therefore, is either this .. xij . wij . yij . zij . aij . bij . cij . dij
  • 71. The Composition If the gadget contributes six vertices to any induced bipartite subgraph, then: A valid contribution, therefore, is either or this: .. xij . wij . yij . zij . aij . bij . cij . dij
  • 82. k −→ k + 12k · log t
  • 83. k −→ k + 12k · log t ...can be shown to be a polynomial in k without loss of generality.
  • 85. Suppose some Gi has a bipartite subgraph on k vertices.
  • 86. Suppose some Gi has a bipartite subgraph on k vertices. Consider the binary representation of i. Pick the six vertices from the 2k log t gadgets that Gi is non-adjacent to.
  • 90. Suppose the composed instance has an induced bipartite subgraph S on at least k + 12k · log t vertices.
  • 91. Suppose the composed instance has an induced bipartite subgraph S on at least k + 12k · log t vertices. Recall that each of the (2k log t) gadgets can contribute at most six vertices each.
  • 92. Suppose the composed instance has an induced bipartite subgraph S on at least k + 12k · log t vertices. Recall that each of the (2k log t) gadgets can contribute at most six vertices each. Consider: (S ∩ Gi) for 1 ⩽ i ⩽ t.
  • 93. Suppose the composed instance has an induced bipartite subgraph S on at least k + 12k · log t vertices. Recall that each of the (2k log t) gadgets can contribute at most six vertices each. Consider: (S ∩ Gi) for 1 ⩽ i ⩽ t. If S ∩ Gi is non-empty for exactly one instance Gi, then we are done, because then we automatically have that |S ∩ Gi| ⩾ k.
  • 94. We also know that S cannot be shared by three of the instances, since that would induce a triangle.
  • 95. We also know that S cannot be shared by three of the instances, since that would induce a triangle. Let us now address the only remaining case: what if S intersects Gi and Gj non-trivially, for some 1 ⩽ i ̸= j ⩽ t?
  • 96. If i ̸= j, then the bit vectors corresponding to i and j are also different.
  • 97. If i ̸= j, then the bit vectors corresponding to i and j are also different. Let b be an index (1 ⩽ b ⩽ log t) where i and j differ.
  • 99. These 2k gadgets, corresponding to the index b, cannot contribute to S at all, being global to vertices in Gi and Gj.
  • 101. The remaining gadgets can contribute at most: [2k · (log t − 1)]6 + 4(2k) = 12k log t − 4k.
  • 102. The remaining gadgets can contribute at most: [2k · (log t − 1)]6 + 4(2k) = 12k log t − 4k. Thus Gi and Gj together must account for at least 5k vertices between them.
  • 103. The remaining gadgets can contribute at most: [2k · (log t − 1)]6 + 4(2k) = 12k log t − 4k. Thus Gi and Gj together must account for at least 5k vertices between them. This implies that at least one of them must be contributing at least k vertices, and this leads us to our conclusion.
  • 104. Danke!