From gap-eth to fpt-inapproximability: Clique, dominating set, and more

P Chalermsook, M Cygan, G Kortsarz… - 2017 IEEE 58th …, 2017 - ieeexplore.ieee.org
We consider questions that arise from the intersection between the areas of approximation
algorithms, subexponential-time algorithms, and fixed-parameter tractable algorithms. The …

From gap-exponential time hypothesis to fixed parameter tractable inapproximability: Clique, dominating set, and more

P Chalermsook, M Cygan, G Kortsarz… - SIAM Journal on …, 2020 - SIAM
We consider questions that arise from the intersection between the areas of polynomial-time
approximation algorithms, subexponential-time algorithms, and fixed-parameter tractable …

Losing treewidth by separating subsets

A Gupta, E Lee, J Li, P Manurangsi… - Proceedings of the Thirtieth …, 2019 - SIAM
We study the problem of deleting the smallest set S of vertices (resp. edges) from a given
graph G such that the induced subgraph (resp. subgraph) G\S belongs to some class ℋ. We …

An improved approximation for maximum k-dependent set on bipartite graphs

S Hosseinian, S Butenko - Discrete Applied Mathematics, 2022 - Elsevier
We present a (1+ k k+ 2)-approximation algorithm for the Maximum k-dependent Set
problem on bipartite graphs for any k≥ 1. For a graph with n vertices and m edges, the …

[PDF][PDF] Pseudorandom self-reductions for NP-complete problems

RA Elrazik, R Robere, A Schuster… - 13th Innovations in …, 2022 - drops.dagstuhl.de
A language L is random-self-reducible if deciding membership in L can be reduced (in
polynomial time) to deciding membership in L for uniformly random instances. It is known …

An improved algorithm for finding maximum outerplanar subgraphs

G Călinescu, H Kaul, B Kudarzi - Discrete Applied Mathematics, 2024 - Elsevier
An improved algorithm for finding maximum outerplanar subgraphs - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View …

[HTML][HTML] String editing under pattern constraints

RD Barish, T Shibuya - Theoretical Computer Science, 2024 - Elsevier
We introduce the novel Nearest Pattern Constrained String (NPCS) problem of finding a
minimum set Q of character mutation, insertion, and deletion edit operations sufficient to …

Topological protection from the next generation malware: a survey

A Arbore, VA Fioriti - International Journal of Critical …, 2013 - inderscienceonline.com
The spreading of dangerous malware in inter-dependent networks of electronics devices
has raised deep concern, because from the ICT networks infections may propagate to other …

Composition techniques for tree communication schedules

M Anand, S Fischmeister, I Lee - 19th Euromicro Conference …, 2007 - ieeexplore.ieee.org
A critical resource in a distributed real-time system is its shared communication medium.
Unrestrained concurrent access to the network can lead to collisions that reduce the …

Efficient Maximum Vertex (k, ℓ)-Biplex Computation on Bipartite Graphs

H Zhou, S Liu, R Cao - Tsinghua Science and Technology, 2024 - ieeexplore.ieee.org
Cohesive subgraph search is a fundamental problem in bipartite graph analysis. Given
integers k and ℓ, a (k, ℓ)-biplex is a cohesive structure which requires each vertex to …