From gap-eth to fpt-inapproximability: Clique, dominating set, and more
We consider questions that arise from the intersection between the areas of approximation
algorithms, subexponential-time algorithms, and fixed-parameter tractable algorithms. The …
algorithms, subexponential-time algorithms, and fixed-parameter tractable algorithms. The …
From gap-exponential time hypothesis to fixed parameter tractable inapproximability: Clique, dominating set, and more
We consider questions that arise from the intersection between the areas of polynomial-time
approximation algorithms, subexponential-time algorithms, and fixed-parameter tractable …
approximation algorithms, subexponential-time algorithms, and fixed-parameter tractable …
Losing treewidth by separating subsets
We study the problem of deleting the smallest set S of vertices (resp. edges) from a given
graph G such that the induced subgraph (resp. subgraph) G\S belongs to some class ℋ. We …
graph G such that the induced subgraph (resp. subgraph) G\S belongs to some class ℋ. We …
An improved approximation for maximum k-dependent set on bipartite graphs
S Hosseinian, S Butenko - Discrete Applied Mathematics, 2022 - Elsevier
We present a (1+ k k+ 2)-approximation algorithm for the Maximum k-dependent Set
problem on bipartite graphs for any k≥ 1. For a graph with n vertices and m edges, the …
problem on bipartite graphs for any k≥ 1. For a graph with n vertices and m edges, the …
[PDF][PDF] Pseudorandom self-reductions for NP-complete problems
RA Elrazik, R Robere, A Schuster… - 13th Innovations in …, 2022 - drops.dagstuhl.de
A language L is random-self-reducible if deciding membership in L can be reduced (in
polynomial time) to deciding membership in L for uniformly random instances. It is known …
polynomial time) to deciding membership in L for uniformly random instances. It is known …
An improved algorithm for finding maximum outerplanar subgraphs
An improved algorithm for finding maximum outerplanar subgraphs - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View …
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View …
[HTML][HTML] String editing under pattern constraints
RD Barish, T Shibuya - Theoretical Computer Science, 2024 - Elsevier
We introduce the novel Nearest Pattern Constrained String (NPCS) problem of finding a
minimum set Q of character mutation, insertion, and deletion edit operations sufficient to …
minimum set Q of character mutation, insertion, and deletion edit operations sufficient to …
Topological protection from the next generation malware: a survey
A Arbore, VA Fioriti - International Journal of Critical …, 2013 - inderscienceonline.com
The spreading of dangerous malware in inter-dependent networks of electronics devices
has raised deep concern, because from the ICT networks infections may propagate to other …
has raised deep concern, because from the ICT networks infections may propagate to other …
Composition techniques for tree communication schedules
A critical resource in a distributed real-time system is its shared communication medium.
Unrestrained concurrent access to the network can lead to collisions that reduce the …
Unrestrained concurrent access to the network can lead to collisions that reduce the …
Efficient Maximum Vertex (k, ℓ)-Biplex Computation on Bipartite Graphs
H Zhou, S Liu, R Cao - Tsinghua Science and Technology, 2024 - ieeexplore.ieee.org
Cohesive subgraph search is a fundamental problem in bipartite graph analysis. Given
integers k and ℓ, a (k, ℓ)-biplex is a cohesive structure which requires each vertex to …
integers k and ℓ, a (k, ℓ)-biplex is a cohesive structure which requires each vertex to …