Graph Covering and Subgraph Problems

Total Page:16

File Type:pdf, Size:1020Kb

Graph Covering and Subgraph Problems Graph Covering and Subgraph Problems Gabrovˇsek, Peter and Miheliˇc, Jurij Abstract: Combinatorial optimization prob- For each problem, we first present its for- lems and graph theory play an important role in mal definition and give its hardness of solving. several fields including logistics, artificial intel- Afterward, we also list several exact, heuristic ligence, software engineering, etc. In this pa- and approximation algorithms for solving it. per, we explore a subset of combinatorial graph problems which we placed into two groups, Our survey methodology is as follows. First namely, graph covering and subgraph problems. we investigated definitions in several generic 1 Here, the former include well-known dominat- sources such as online compendiums , encyclo- ing set and vertex cover problem, and the lat- pedias2 and books [1, 13, 14]. Afterward, we ter include clique and independent set prob- searched for the research papers on the focused lem. For each problem we give its definition, graph problems using Google scholar. Our goal report state-of-the-art exact algorithms as well was to supplement each problem with refer- as heuristic and approximation algorithms, and list real-world applications if we were able to ences to exact, heuristics and approximation obtain any. At the end of the paper, we also algorithms. Moreover, we also supplemented relate the problems among each other. our descriptions with real-world applications. Finally, we also collected a list of reductions Index Terms: combinatorial optimization, among the selected problems. graph covering, subgraph problems, exact al- Let us present a few basic notions used in gorithms, approximation algorithms the rest of the paper. An undirected graph G = (V, E) consist of a set of vertices V and a set of edges E ⊆ V × V . We also use n = |V | for 1. Introduction the number of vertices in the graph and m = |E| raphs are often used by computer scien- for the number of edges in the graph. An G tists and other researchers for modeling example of a graph is shown in Figure 1. various problems from practice. In particular, one can find them in areas such as social net- work analysis, wireless networks, gaming indus- try, advertising, bioinformatics [8, 26, 23, 27]. In this paper, we review several popular Figure 1: An example of a graph graph problems and their variants. We include covering problems where the goal is to select To describe the asymptotic complexity of either a subset of vertices or edges of the graph algorithms a well-known Oh-notation is used. in order to ”cover” the whole graph. Addition- We write f(n) = O(g(n)) and say that a func- ally, we also include problems, sometimes called tion f(n) is bounded from above by g(n) when subgraph problems, where the goal is to either there exists two constants c > 0 and n0 > 0 select such a subset of vertices or edges of the such that for all n > n0 it holds that graph that all the selected objects are either ad- |f(n)| ≤ c · |g(n)|. jacent or not-adjacent to each other. We also discuss various relations among the problems. For exponential time algorithms we oftentimes also use the O∗ notation, which is defined as Manuscript received May, 2019. The authors are with the Faculty of Computer and O∗(cn) = O(cn · poly(n)), Information Science, University of Ljubljana, Slovenia 1 (e-mail: [email protected]). https://www.nada.kth.se/ viggo/problemlist/ 2https://www.wikipedia.org/ where poly(n) in a polynomial in n. This no- 2.1 Dominating Set Problem tation allows us to ignore the polynomial factor A dominating set of a graph G = (V, E) is a in the overall exponential time complexity. subset S ⊆ V such that every vertex in V is In the paper, we also mention several either in S or is adjacent to at least one vertex polynomial-time approximation algorithms. A of S, i.e. problem may exhibit an approximation algo- rithm that guarantees a constant approximation ∀v ∈ V \ S ∃(u, v) ∈ E : u ∈ S ratio. We also say that such problems belong to the class APX (”approximable”) [1]. We also say that vertices of D cover (or dom- The rest of the paper is organized as fol- inate) vertices of the graph. An example of a lows. In section 2 we describe and analyze dominating set is shown in Figure 2. Here the graph covering problems. Afterward, in section vertices marked with red cover all vertices of 3 we describe and analyze subgraph problems. the given graph. In section 4 we summarize the paper by showing several relations among the problems described in the paper. Finally, we conclude the paper in Section 5. Figure 2: An example of a dominating set 2. Graph Covering Problems A minimum dominating set of a graph is In this section, we focus on graph covering a dominating set with the smallest number of problems where the task is to select some ob- vertices. The size of such minimum dominating jects, i.e., either vertices or edges, in such a set is oftentimes called domination number and way that the selected objects cover the whole is denoted with γ(G). The problem of finding graph, i.e., either all vertices or all edges of the a minimum dominating set is NP-hard [14]. graph. For both objects that are covering and Several variants of the problem exist. For objects that are covered, we have two possi- example, a connected dominating set is a dom- bilities, thus altogether we have four different inating set that is also a connected component. covering problems presented in Table 1. A minimum connected dominating set is equiv- alent to a maximum leaf spanning tree, where what is covered V E the goal is to find a spanning tree in a graph with the highest number of leaves [1]. dominating vertex S ⊆ V Various dominating set problems appear in set cover social networks, mobile networks, sensor net- edge edge works [23, 15], etc. Dominating sets algorithms S ⊆ E dominating cover what covers can also be used to solve other combinatorial set optimization problems, for example, k-center Table 1: Graph covering problems problem [21]. In particular, the problems are Algorithms. An exact algorithm, which finds a minimum dominating set by exhaustively enu- • dominating set: vertices cover vertices, merating all vertex subsets, has a computa- ∗ n • vertex cover: vertices cover edges, tional time complexity of O (2 ). If we tackle the problem with basic use of • edge cover: edges cover vertices, and Measure and Conquer method the running time improves to O∗(1.5259n) [13]. The fastest al- • edge dominating set: edges cover edges. gorithm we were able to find has a running time ∗ n In the rest of this section, we explore each of of O (1.4969 ) [25] and also uses a Measure the above-listed problems. and Conquer method with additional edge case analysis and optimization techniques. Minimum dominating set problem is in not of antipodal points, we can achieve the approx- AP X 1 the class which means that the problem imation factor of 2 − Θ √ [17]. For does not have an approximation algorithm with log(n) a constant approximation guarantee. In partic- other algorithms see also [20, 21]. ular, the quality depends on the problem size [16] and is approximable within the factor of 2.3 Edge Cover Problem 1 + log n. An edge cover of a graph G = (V, E) is a set of edges C such that each vertex in G is incident 2.2 Vertex Cover Problem with at least one edge in C, i.e., ∀v ∈ V, ∃e ∈ E, v ∈ e A vertex cover of a graph G = (V, E) is a . An example of the edge cover is subset S ⊆ V such that at least one endpoint shown in Figure 4. of each edge is in S, i.e., u ∈ S ∨ v ∈ S for all (u, v) ∈ E. An example of a vertex cover is shown in Figure 3. Figure 4: An example of an edge cover A minimum edge cover of a graph is an edge cover with the smallest amount of edges pos- Figure 3: An example of a vertex cover sible. The edge covering number ρ(G) is the In the minimum vertex cover problem, the size of the minimum edge cover. goal is to find a vertex cover with the small- est number of vertices. The size of such set is Algorithms. The smallest edge cover of a called vertex cover number and denoted with graph can be found in polynomial time [18]. τ(G). At first, we find a maximal matching which we The vertex cover problem has been used for then greedily extend to the solution. Thus the sequence alignment in biology and biochemistry computational complexity of such an algorithm 2 [3]. is O(n m). Algorithms. A trivial exact algorithm finds a 2.4 Edge Dominating Set Problem minimum vertex cover by exhaustive enumera- An edge dominating set of a graph G = (V, E) tion. It checks whether a vertex has to be in is a subset D ⊆ E such that every edge not in the solution or not. The computational time D is adjacent to at least one edge in D, i.e., complexity of this approach is O∗(2n). The vertex cover is one of the most popu- ∀(u, v) ∈ E ∃w ∈ V :(u, w) ∈ E ∨(v, w) ∈ E. lar fixed-parameter tractable (FPT) problems. Currently the best FPT algorithm finds a min- An example of edge dominating set is shown in imum vertex cover in O(1.28k + k · n) time, Figure 5.
Recommended publications
  • Rounding Algorithms for Covering Problems
    Mathematical Programming 80 (1998) 63 89 Rounding algorithms for covering problems Dimitris Bertsimas a,,,1, Rakesh Vohra b,2 a Massachusetts Institute of Technology, Sloan School of Management, 50 Memorial Drive, Cambridge, MA 02142-1347, USA b Department of Management Science, Ohio State University, Ohio, USA Received 1 February 1994; received in revised form 1 January 1996 Abstract In the last 25 years approximation algorithms for discrete optimization problems have been in the center of research in the fields of mathematical programming and computer science. Re- cent results from computer science have identified barriers to the degree of approximability of discrete optimization problems unless P -- NP. As a result, as far as negative results are con- cerned a unifying picture is emerging. On the other hand, as far as particular approximation algorithms for different problems are concerned, the picture is not very clear. Different algo- rithms work for different problems and the insights gained from a successful analysis of a par- ticular problem rarely transfer to another. Our goal in this paper is to present a framework for the approximation of a class of integer programming problems (covering problems) through generic heuristics all based on rounding (deterministic using primal and dual information or randomized but with nonlinear rounding functions) of the optimal solution of a linear programming (LP) relaxation. We apply these generic heuristics to obtain in a systematic way many known as well as new results for the set covering, facility location, general covering, network design and cut covering problems. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.
    [Show full text]
  • Structural Graph Theory Meets Algorithms: Covering And
    Structural Graph Theory Meets Algorithms: Covering and Connectivity Problems in Graphs Saeed Akhoondian Amiri Fakult¨atIV { Elektrotechnik und Informatik der Technischen Universit¨atBerlin zur Erlangung des akademischen Grades Doktor der Naturwissenschaften Dr. rer. nat. genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Rolf Niedermeier Gutachter: Prof. Dr. Stephan Kreutzer Gutachter: Prof. Dr. Marcin Pilipczuk Gutachter: Prof. Dr. Dimitrios Thilikos Tag der wissenschaftlichen Aussprache: 13. October 2017 Berlin 2017 2 This thesis is dedicated to my family, especially to my beautiful wife Atefe and my lovely son Shervin. 3 Contents Abstract iii Acknowledgementsv I. Introduction and Preliminaries1 1. Introduction2 1.0.1. General Techniques and Models......................3 1.1. Covering Problems.................................6 1.1.1. Covering Problems in Distributed Models: Case of Dominating Sets.6 1.1.2. Covering Problems in Directed Graphs: Finding Similar Patterns, the Case of Erd}os-P´osaproperty.......................9 1.2. Routing Problems in Directed Graphs...................... 11 1.2.1. Routing Problems............................. 11 1.2.2. Rerouting Problems............................ 12 1.3. Structure of the Thesis and Declaration of Authorship............. 14 2. Preliminaries and Notations 16 2.1. Basic Notations and Defnitions.......................... 16 2.1.1. Sets..................................... 16 2.1.2. Graphs................................... 16 2.2. Complexity Classes................................
    [Show full text]
  • 3.1 Matchings and Factors: Matchings and Covers
    1 3.1 Matchings and Factors: Matchings and Covers This copyrighted material is taken from Introduction to Graph Theory, 2nd Ed., by Doug West; and is not for further distribution beyond this course. These slides will be stored in a limited-access location on an IIT server and are not for distribution or use beyond Math 454/553. 2 Matchings 3.1.1 Definition A matching in a graph G is a set of non-loop edges with no shared endpoints. The vertices incident to the edges of a matching M are saturated by M (M-saturated); the others are unsaturated (M-unsaturated). A perfect matching in a graph is a matching that saturates every vertex. perfect matching M-unsaturated M-saturated M Contains copyrighted material from Introduction to Graph Theory by Doug West, 2nd Ed. Not for distribution beyond IIT’s Math 454/553. 3 Perfect Matchings in Complete Bipartite Graphs a 1 The perfect matchings in a complete b 2 X,Y-bigraph with |X|=|Y| exactly c 3 correspond to the bijections d 4 f: X -> Y e 5 Therefore Kn,n has n! perfect f 6 matchings. g 7 Kn,n The complete graph Kn has a perfect matching iff… Contains copyrighted material from Introduction to Graph Theory by Doug West, 2nd Ed. Not for distribution beyond IIT’s Math 454/553. 4 Perfect Matchings in Complete Graphs The complete graph Kn has a perfect matching iff n is even. So instead of Kn consider K2n. We count the perfect matchings in K2n by: (1) Selecting a vertex v (e.g., with the highest label) one choice u v (2) Selecting a vertex u to match to v K2n-2 2n-1 choices (3) Selecting a perfect matching on the rest of the vertices.
    [Show full text]
  • Bin Completion Algorithms for Multicontainer Packing, Knapsack, and Covering Problems
    Journal of Artificial Intelligence Research 28 (2007) 393-429 Submitted 6/06; published 3/07 Bin Completion Algorithms for Multicontainer Packing, Knapsack, and Covering Problems Alex S. Fukunaga [email protected] Jet Propulsion Laboratory California Institute of Technology 4800 Oak Grove Drive Pasadena, CA 91108 USA Richard E. Korf [email protected] Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 Abstract Many combinatorial optimization problems such as the bin packing and multiple knap- sack problems involve assigning a set of discrete objects to multiple containers. These prob- lems can be used to model task and resource allocation problems in multi-agent systems and distributed systms, and can also be found as subproblems of scheduling problems. We propose bin completion, a branch-and-bound strategy for one-dimensional, multicontainer packing problems. Bin completion combines a bin-oriented search space with a powerful dominance criterion that enables us to prune much of the space. The performance of the basic bin completion framework can be enhanced by using a number of extensions, in- cluding nogood-based pruning techniques that allow further exploitation of the dominance criterion. Bin completion is applied to four problems: multiple knapsack, bin covering, min-cost covering, and bin packing. We show that our bin completion algorithms yield new, state-of-the-art results for the multiple knapsack, bin covering, and min-cost cov- ering problems, outperforming previous algorithms by several orders of magnitude with respect to runtime on some classes of hard, random problem instances. For the bin pack- ing problem, we demonstrate significant improvements compared to most previous results, but show that bin completion is not competitive with current state-of-the-art cutting-stock based approaches.
    [Show full text]
  • Solving Packing Problems with Few Small Items Using Rainbow Matchings
    Solving Packing Problems with Few Small Items Using Rainbow Matchings Max Bannach Institute for Theoretical Computer Science, Universität zu Lübeck, Lübeck, Germany [email protected] Sebastian Berndt Institute for IT Security, Universität zu Lübeck, Lübeck, Germany [email protected] Marten Maack Department of Computer Science, Universität Kiel, Kiel, Germany [email protected] Matthias Mnich Institut für Algorithmen und Komplexität, TU Hamburg, Hamburg, Germany [email protected] Alexandra Lassota Department of Computer Science, Universität Kiel, Kiel, Germany [email protected] Malin Rau Univ. Grenoble Alpes, CNRS, Inria, Grenoble INP, LIG, 38000 Grenoble, France [email protected] Malte Skambath Department of Computer Science, Universität Kiel, Kiel, Germany [email protected] Abstract An important area of combinatorial optimization is the study of packing and covering problems, such as Bin Packing, Multiple Knapsack, and Bin Covering. Those problems have been studied extensively from the viewpoint of approximation algorithms, but their parameterized complexity has only been investigated barely. For problem instances containing no “small” items, classical matching algorithms yield optimal solutions in polynomial time. In this paper we approach them by their distance from triviality, measuring the problem complexity by the number k of small items. Our main results are fixed-parameter algorithms for vector versions of Bin Packing, Multiple Knapsack, and Bin Covering parameterized by k. The algorithms are randomized with one-sided error and run in time 4k · k! · nO(1). To achieve this, we introduce a colored matching problem to which we reduce all these packing problems. The colored matching problem is natural in itself and we expect it to be useful for other applications.
    [Show full text]
  • Dominating Cliques in Graphs
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Discrete Mathematics 86 (1990) 101-116 101 North-Holland DOMINATING CLIQUES IN GRAPHS Margaret B. COZZENS Mathematics Department, Northeastern University, Boston, MA 02115, USA Laura L. KELLEHER Massachusetts Maritime Academy, USA Received 2 December 1988 A set of vertices is a dominating set in a graph if every vertex not in the dominating set is adjacent to one or more vertices in the dominating set. A dominating clique is a dominating set that induces a complete subgraph. Forbidden subgraph conditions sufficient to imply the existence of a dominating clique are given. For certain classes of graphs, a polynomial algorithm is given for finding a dominating clique. A forbidden subgraph characterization is given for a class of graphs that have a connected dominating set of size three. Introduction A set of vertices in a simple, undirected graph is a dominating set if every vertex in the graph which is not in the dominating set is adjacent to one or more vertices in the dominating set. The domination number of a graph G is the minimum number of vertices in a dominating set. Several types of dominating sets have been investigated, including independent dominating sets, total dominating sets, and connected dominating sets, each of which has a corresponding domination number. Dominating sets have applications in a variety of fields, including communication theory and political science. For more background on dominating sets see [3, 5, 151 and other articles in this issue. For arbitrary graphs, the problem of finding the size of a minimum dominating set in the graph is an NP-complete problem [9].
    [Show full text]
  • The Bidimensionality Theory and Its Algorithmic
    The Bidimensionality Theory and Its Algorithmic Applications by MohammadTaghi Hajiaghayi B.S., Sharif University of Technology, 2000 M.S., University of Waterloo, 2001 Submitted to the Department of Mathematics in partial ful¯llment of the requirements for the degree of DOCTOR OF PHILOSOPHY at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2005 °c MohammadTaghi Hajiaghayi, 2005. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part. Author.............................................................. Department of Mathematics April 29, 2005 Certi¯ed by. Erik D. Demaine Associate Professor of Electrical Engineering and Computer Science Thesis Supervisor Accepted by . Rodolfo Ruben Rosales Chairman, Applied Mathematics Committee Accepted by . Pavel I. Etingof Chairman, Department Committee on Graduate Students 2 The Bidimensionality Theory and Its Algorithmic Applications by MohammadTaghi Hajiaghayi Submitted to the Department of Mathematics on April 29, 2005, in partial ful¯llment of the requirements for the degree of DOCTOR OF PHILOSOPHY Abstract Our newly developing theory of bidimensional graph problems provides general techniques for designing e±cient ¯xed-parameter algorithms and approximation algorithms for NP- hard graph problems in broad classes of graphs. This theory applies to graph problems that are bidimensional in the sense that (1) the solution value for the k £ k grid graph (and similar graphs) grows with k, typically as ­(k2), and (2) the solution value goes down when contracting edges and optionally when deleting edges. Examples of such problems include feedback vertex set, vertex cover, minimum maximal matching, face cover, a series of vertex- removal parameters, dominating set, edge dominating set, r-dominating set, connected dominating set, connected edge dominating set, connected r-dominating set, and unweighted TSP tour (a walk in the graph visiting all vertices).
    [Show full text]
  • Algorithms for Minimum M-Connected K-Tuple Dominating Set Problem$
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Theoretical Computer Science 381 (2007) 241–247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem$ Weiping Shanga,c,∗, Pengjun Wanb, Frances Yaoc, Xiaodong Hua a Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing 10080, China b Department of Computer Science, Illinois Institute of Technology, Chicago, IL 60616, USA c Department of Computer Science, City University of Hong Kong, Hong Kong Received 24 January 2007; received in revised form 25 April 2007; accepted 29 April 2007 Communicated by D.-Z. Du Abstract In wireless sensor networks, a virtual backbone has been proposed as the routing infrastructure to alleviate the broadcasting storm problem and perform some other tasks such as area monitoring. Previous work in this area has mainly focused on how to set up a small virtual backbone for high efficiency, which is modelled as the minimum Connected Dominating Set (CDS) problem. In this paper we consider how to establish a small virtual backbone to balance efficiency and fault tolerance. This problem can be formalized as the minimum m-connected k-tuple dominating set problem, which is a general version of minimum CDS problem with m = 1 and k = 1. We propose three centralized algorithms with small approximation ratios for small m and improve the current best results for small k. c 2007 Elsevier B.V. All rights reserved. Keywords: Connected dominating set; Approximation algorithm; k-vertex connectivity; Wireless sensor networks 1. Introduction A Wireless Sensor Network (WSN) consists of wireless nodes (transceivers) without any underlying physical infrastructure.
    [Show full text]
  • An Overview of Graph Covering and Partitioning
    Takustr. 7 Zuse Institute Berlin 14195 Berlin Germany STEPHAN SCHWARTZ An Overview of Graph Covering and Partitioning ZIB Report 20-24 (August 2020) Zuse Institute Berlin Takustr. 7 14195 Berlin Germany Telephone: +49 30-84185-0 Telefax: +49 30-84185-125 E-mail: [email protected] URL: http://www.zib.de ZIB-Report (Print) ISSN 1438-0064 ZIB-Report (Internet) ISSN 2192-7782 An Overview of Graph Covering and Partitioning Stephan Schwartz Abstract While graph covering is a fundamental and well-studied problem, this eld lacks a broad and unied literature review. The holistic overview of graph covering given in this article attempts to close this gap. The focus lies on a characterization and classication of the dierent problems discussed in the literature. In addition, notable results and common approaches are also included. Whenever appropriate, our review extends to the corresponding partioning problems. Graph covering problems are among the most classical and central subjects in graph theory. They also play a huge role in many mathematical models for various real-world applications. There are two dierent variants that are concerned with covering the edges and, respectively, the vertices of a graph. Both draw a lot of scientic attention and are subject to prolic research. In this paper we attempt to give an overview of the eld of graph covering problems. In a graph covering problem we are given a graph G and a set of possible subgraphs of G. Following the terminology of Knauer and Ueckerdt [KU16], we call G the host graph while the set of possible subgraphs forms the template class.
    [Show full text]
  • A Dominating-Set-Based Routing Scheme in Ad Hoc Wireless
    A Dominating-Set-Based Routing Scheme in Ad Ho c Wireless 1 Networks Jie Wu and Hailan Li Department of Computer Science and Engineering Florida Atlantic University Bo ca Raton, FL 33431 1 This work was supp orted in part by NSF grants CCR 9900646 and ANI 0073736. Abstract Ecient routing among a set of mobile hosts also called no des is one of the most imp ortant functions in ad-ho c wireless networks. Routing based on a connected dominating set is a promising approach, where the searching space for a route is reduced to no des in the set. A set is dominating if all the no des in the system are either in the set or neighb ors of no des in the set. In this pap er, we prop ose a simple and ecient distributed algorithm for calculating connected dominating set in ad- ho c wireless networks, where connections of no des are determined by their geographical distances. We also prop ose an up date/recalculation algorithm for the connected dominating set when the top ology of the ad ho c wireless network changes dynamically. Our simulation results show that the prop osed approach outp erforms a classical algorithm in terms of nding a small connected dominating set and doing so quickly. Our approach can be p otentially used in designing ecient routing algorithms based on a connected dominating set. Keywords: ad hoc wireless networks, dominating sets, mobile computing, routing, simulation 1 Intro duction Recent advances in technology have provided p ortable computers with wireless interfaces that allow networked communication among mobile users.
    [Show full text]
  • Linear Separation of Connected Dominating Sets in Graphs∗
    ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 487–525 https://doi.org/10.26493/1855-3974.1330.916 (Also available at http://amc-journal.eu) Linear separation of connected dominating sets in graphs∗ Nina Chiarelli y, Martin Milanicˇ z University of Primorska, UP FAMNIT, Glagoljaskaˇ 8, SI-6000 Koper, Slovenia University of Primorska, UP IAM, Muzejski trg 2, SI-6000 Koper, Slovenia Received 21 February 2017, accepted 12 November 2018, published online 15 March 2019 Abstract A connected dominating set in a graph is a dominating set of vertices that induces a connected subgraph. Following analogous studies in the literature related to independent sets, dominating sets, and total dominating sets, we study in this paper the class of graphs in which the connected dominating sets can be separated from the other vertex subsets by a linear weight function. More precisely, we say that a graph is connected-domishold if it admits non-negative real weights associated to its vertices such that a set of vertices is a connected dominating set if and only if the sum of the corresponding weights exceeds a certain threshold. We characterize the graphs in this non-hereditary class in terms of a property of the set of minimal cutsets of the graph. We give several char- acterizations for the hereditary case, that is, when each connected induced subgraph is required to be connected-domishold. The characterization by forbidden induced subgraphs implies that the class properly generalizes two well known classes of chordal graphs, the block graphs and the trivially perfect graphs.
    [Show full text]
  • Linear Separation of Connected Dominating Sets in Graphs (Extended Abstract) Nina Chiarelli1 and Martin Milanicˇ2
    Linear Separation of Connected Dominating Sets in Graphs (Extended Abstract) Nina Chiarelli1 and Martin Milanicˇ2 1 University of Primorska, UP FAMNIT, Glagoljaskaˇ 8, SI6000 Koper, Slovenia [email protected] 2 University of Primorska, UP IAM, Muzejski trg 2, SI6000 Koper, Slovenia University of Primorska, UP FAMNIT, Glagoljaskaˇ 8, SI6000 Koper, Slovenia [email protected] Abstract are looking for, such as matchings, cliques, stable sets, dominating sets, etc. A connected dominating set in a graph is a dominating set of vertices that induces a The above framework provides a unified way connected subgraph. We introduce and study of describing characteristic properties of several the class of connected-domishold graphs, graph classes studied in the literature, such as which are graphs that admit non-negative real threshold graphs (Chvatal´ and Hammer 1977), weights associated to their vertices such that domishold graphs (Benzaken and Hammer 1978), a set of vertices is a connected dominating total domishold graphs (Chiarelli and Milanicˇ set if and only if the sum of the correspond- 2013a; 2013b) and equistable graphs (Payan 1980; ing weights exceeds a certain threshold. We show that these graphs form a non-hereditary Mahadev, Peled, and Sun 1994). If weights as class of graphs properly containing two above exist and are given with the graph, and the well known classes of chordal graphs: block set T is given by a membership oracle, then a dy- graphs and trivially perfect graphs. We char- namic programming algorithm can be
    [Show full text]