Connecting hitting sets and hitting paths in graphs

Faculté des Sciences
Département de Mathématique
Connecting hitting sets and hitting paths
in graphs
Eglantine CAMBY
Thèse présentée en vue de l’obtention du grade de Docteur en Sciences
UNIVERSITÉ LIBRE DE BRUXELLES
Faculté des Sciences
Département de Mathématique
Connecting hitting sets and hitting paths
in graphs
Eglantine CAMBY
Thèse présentée en vue de l’obtention du grade de Docteur en Sciences
Juin 2015
Jury de Thèse
G. Joret (président), Université libre de Bruxelles, Belgium
S. Fiorini (promoteur), Université libre de Bruxelles, Belgium
J. Cardinal (co-promoteur & secrétaire), Univ. libre de Bruxelles, Belgium
A. Hertz, Polytechnique Montréal, Canada
O. Schaudt, Universität zu Köln, Germany
I. Todinca, Université d’Orléans, France
“Hard try and never give up”
Author Unknown.
“All things are difficult before they are easy”
Thomas Fuller.
Remerciements
Après cinq années de thèse, je tiens à remercier les personnes qui m’ont
accompagnée et soutenue durant cette longue période.
Cette thèse a vu le jour sous la direction de Samuel Fiorini, mon promoteur. Je tiens à le remercier de m’avoir suivi dans ce projet, d’avoir cru en
mes idées et de m’avoir laissé suffisamment de liberté pour découvrir l’univers
scientifique à travers le monde. Ce premier a essentiellement mis l’accent sur
le côté structurel de la recherche.
Par la suite, j’ai eu l’honneur d’avoir Jean Cardinal comme co-promoteur.
Étant informaticien, Jean Cardinal a attiré mon attention sur le côté algorithmique de la recherche. Je tiens à le remercier de m’avoir initié, avec
Hadrien Mélot, à la recherche via le mémoire de Master, et aussi de m’avoir
guidé à travers ces années.
Ce tandem est d’abord une richesse, ensuite une occasion d’apprendre
deux fois plus. Il m’a donné le moyen de me forger ma propre opinion sur
base de leurs opinions, souvent complémentaires. Ce duo m’a enseigné une
précision d’écriture tant au point de vue du contenu que de la forme.
Je tiens à remercier Gwenaël Joret, Alain Hertz, Oliver Schaudt et Ioan
Todinca pour avoir accepté de faire partie de mon jury de thèse et pour
leur lecture attentive de ma thèse ainsi que leurs commentaires. I would
like to address special thanks to Oliver Schaudt for his kind and rewarding
collaboration. De même, j’aimerais remercier tout particulièrement Alain
Hertz et Hadrien Mélot pour m’avoir appris à accorder du crédit à mes
idées.
Je remercie l’ensemble des professeurs de l’UMons pour m’avoir initié aux
mathématiques et pour m’avoir donné le goût de la recherche. J’adresse mes
remerciements à Olivier et Stéphanie pour m’avoir épaulé dans des moments
de tristesse.
J’aimerais aussi remercier les personnes qui m’ont aidée avec des relectures tant au niveau scientifique qu’au niveau linguistique.
Je remercie également le Fonds de la Recherche Scientifique, l’Université
Libre de Bruxelles, la Fédération Wallonie-Bruxelles ainsi que mes deux promoteurs pour le soutien financier apporté durant mes nombreuses missions
scientifiques à travers le monde.
Partager le Savoir est primordial. Avec ce but, j’ai pu m’épanouir dans
i
ii
le métier d’assistante. Enseigner est une expérience enrichissante sur le plan
intellectuel mais aussi humain. Je remercie tous mes étudiants, en particulier, Bob, Fränk, Mélanie, Alex, Cédric, Blaise, Vincent, Sofiane, Lancelot,
Matvei, Philippe, Corentin, Bálint, . . . Je tiens spécialement à remercier Yan
et Georges pour leur soutien dans les moments difficiles mais aussi Eileen
dont le chemin est intimement lié au mien.
Ces cinq dernières années n’ont pas toujours été dans la joie. Cependant,
j’ai rencontré une personne formidable durant mes premiers cours du soir
d’anglais : Seher, ma meilleure amie. Même si les maths sont pour elle
comme une langue étrangère, Seher m’a toujours soutenue dans mes décisions
et m’a toujours entourée de son amour inconditionnel. Peu importe l’endroit,
peu importe le moment, je peux compter sur elle. Merci with love, Seher, de
m’avoir accompagné dans ces moments agréables et/ou difficiles.
Parmi mes collègues, je remercie Thomas, Selim, Rémi, Robson, Nathann
et Audrey. J’ai pu particulièrement compter sur Sarah et Carine, alias my
Cherry et Mademoiselle, avec qui j’ai grandi, rigolé mais aussi pleuré. Je les
remercie infininement pour leur gentillesse et leur amour.
De plus, je tiens spécialement à remercier Jean-Paul. Je n’aurais pas pu
espérer un meilleur supérieur que Jean-Paul. Merci pour ta bienveillance et
ton amabilité.
Parmi mes artistes favoris, je cite Nadège. Merci Nadj de m’avoir ouvert
ta porte lorsque j’en avais le plus besoin. Merci pour ta bonne humeur et
tes délires. Merci de m’avoir parlé au bord de la piscine de Soignies il y a
maintenant huit ans.
Je remercie également Alain, un autre de mes artistes favoris. Il m’a
ouvert au monde du spectacle et restera probablement un de mes meilleurs
fans. Merci de garder un telle admiration à mon égard.
Merci à Marie-Eve, Italia et Nadir pour tous les rayons de soleil envoyés
depuis tant d’années.
Depuis l’autre bout du monde, je remercie Corine de m’avoir accueilli
si chaleureusement à Montréal et de m’avoir encouragé lorsque le doute
m’envahissait.
J’adresse un tout grand merci à chacun des membres de ma famille :
Papa, Maman, Gabriel, Anémone, Amélie, Pierre. Chacun de vous m’a
aidée à sa façon à garder le cap dans ma vie, et en particulier dans ce projet
qu’est la thèse. Merci à Parrain, Charlotte et leurs enfants pour m’avoir
accueilli dans leur maison comme si j’étais leur propre enfant.
Je tiens aussi à remercier Dora. Merci pour ces sept années de vie commune, merci de me câliner lorsque mon moral est au plus bas, merci de veiller
avec moi durant ces longues nuits de travail, merci d’avoir partagé ce stress
qui m’habitait.
Finalement, je remercie Gilles pour son amour inconditionnel, son soutien
constant et sa connexion exceptionnelle, grâce auxquels j’ai pu aller au bout
d’un de mes rêves.
Contents
1 Introduction
1.1 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 Background
2.1 Computational complexity . . . . . . . .
2.1.1 Classes P and N P . . . . . . . .
2.1.2 Class Θp2 . . . . . . . . . . . . . .
2.2 Approximation algorithms . . . . . . . .
2.3 Graphs and hypergraphs . . . . . . . . .
2.4 H -hitting set problems . . . . . . . . .
2.4.1 The vertex cover problem . . . .
2.4.2 The dominating set problem . . .
2.4.3 The feedback vertex set problem
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3 The price of connectivity and other prices
3.1 Famous prices . . . . . . . . . . . . . . . . . . . . . . .
3.2 Price of connectivity . . . . . . . . . . . . . . . . . . .
3.2.1 Vertex cover problem . . . . . . . . . . . . . . .
3.2.2 Dominating set problem . . . . . . . . . . . . .
3.2.3 Feedback vertex set problem . . . . . . . . . . .
3.3 Other prices . . . . . . . . . . . . . . . . . . . . . . . .
3.3.1 Paired-domination versus total domination . .
3.3.2 Connected domination versus total domination
4 The price of connectivity for vertex cover
4.1 Computational Complexity . . . . . . . . . . .
4.2 Structural results . . . . . . . . . . . . . . . . .
4.2.1 PoC-Perfect Graphs . . . . . . . . . . .
4.2.2 PoC-Near-Perfect Graphs . . . . . . . .
4.2.3 PoC-Critical Graphs . . . . . . . . . . .
4.2.4 Aside: values of the price of connectivity
iii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
5
8
.
.
.
.
.
.
.
.
.
9
9
10
10
11
12
15
16
16
17
.
.
.
.
.
.
.
.
19
19
20
20
22
24
26
27
29
.
.
.
.
.
.
31
32
35
36
37
44
48
iv
5 The price of connectivity for domination
5.1 Computational Complexity . . . . . . . .
5.2 Structural results . . . . . . . . . . . . . .
5.2.1 PoC-Near-Perfect Graphs . . . . .
5.2.2 PoC-Critical Graphs . . . . . . . .
5.2.3 Aside . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
49
50
53
54
61
69
6 A characterization of Pk -free graphs
73
6.1 A characterization of Pk -free graphs . . . . . . . . . . . . . . 75
6.2 A polynomial-time algorithm to find a special connected dominating set in Pk -free graphs . . . . . . . . . . . . . . . . . . . 77
7 2-colorability of hypergraphs
7.1 Classical results on hypergraph colorability
7.1.1 Sufficient conditions . . . . . . . . .
7.1.2 Computational complexity results . .
7.2 2-colorability of certain hypergraphs . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
83
83
83
85
86
8 The Pk -hitting set problem
91
8.1 P4 -hitting set for general graphs . . . . . . . . . . . . . . . . . 92
9 Conclusion and further research
99
Bibliography
101
Index
111
Chapter 1
Introduction
In 1735, Leonhard Euler (1707–1783) solved a historically notable problem in
discrete mathematics: the seven bridges of Kőnigsberg, establishing the first
result in graph theory. The problem was to find a closed walk crossing exactly
once each bridge in the city of Kőnigsberg, in Prussia (now Kaliningrad, in
Russia). We can model this with a graph: each area is represented by a
vertex and each bridge by an edge (see Figure 1.1). The desired closed walk
is called a Eulerian cycle. Euler established a necessary condition for the
existence of a Eulerian cycle: the number of edges incident to every vertex
must be even. Actually this condition is also sufficient, provided the graph
is connected.
Figure 1.1: The seven bridges of Kőnigsberg and the corresponding graph.
Dénes Kőnig (1884–1944) was another forerunner of graph theory. In
1936, he wrote the first textbook on the field and proved a well-known theorem named after him: in every bipartite graph, the maximum number of
vertex-disjoint edges equals the minimum number of vertices meeting all the
edges, or more formally, the number of edges in a maximum matching equals
the number of vertices in a minimum vertex cover.
Another founding father of graph theory is Claude Berge (1926–2002).
He is well-known in particular for his contributions to perfect graphs. A
1
2
Chapter 1. Introduction
graph is perfect if the chromatic number of every induced subgraph equals
the size of the largest clique of this subgraph (the chromatic number is the
minimum number of colors to assign to vertices such that any two adjacent vertices have distinct colors, and a clique is a set of pairwise adjacent
vertices). Berge proposed two conjectures on perfect graphs. Berge’s first
conjecture stated that a graph is perfect if and only if its complement is
perfect. The complement G of a graph G is the graph on the same vertices
such that two vertices are adjacent in G if and only if they are not in G. The
second conjecture is a characterization of perfect graphs in terms of forbidden induced subgraphs: a graph G is perfect if and only if neither G nor G
contains an induced cycle Ck on k vertices, with k > 5 an odd number.
After Berge, (structural) graph theory emerged as an important discipline
of discrete mathematics. At the same time, major progress was achieved in
computer science, especially in computational theory, whose main focus is
to determine whether a computational problem can be solved efficiently in
standard models of computation.
The introduction of the class P goes back to Jack Edmonds (1934–)
and Alan Cobham (1927–). This class contains all decision problems that
can be solved by a polynomial-time algorithm. Edmonds and Cobham first
proposed polynomial-time solvability as a synonym for tractable.
Beyond P , the class N P contains all decision problems whose certificate
can be checked in polynomial-time. By definition, P is a subset of N P . An
important open question is whether this inclusion is strict, that is, whether
P 6= N P . Stephen Cook (1939–) showed that inside N P , there are problems
which are at least as difficult as all the problems in N P because every such
problem can be reduced to it. Richard Karp (1935–) brought the concept
of N P -completeness to the attention of a larger public with his famous list
of 21 N P -complete problems coming from different fields [83]. Among these
was the vertex cover problem: given a graph G and a positive integer k,
determine whether G has a vertex cover of size at most k.
The class of N P -complete problems includes the vertex cover problem
and the dominating set problem, which will play a major role in our investigations. A dominating set is a set S of vertices such that every vertex
not in S is adjacent to a vertex in S. The dominating set problem can be
formulated as follows: given a graph G and a positive integer k, determine
whether G has a dominating set of size at most k. Both problems are special
cases of the H -hitting set problem.
Given a graph G and a collection H of subgraphs of G, we define an
H -hitting set as a set of vertices of G meeting all subgraphs of H . For the
vertex cover problem, the collection H contains all the edges while, for the
dominating set problem, a subgraph in H is induced by a vertex and all its
neighbors. The H -hitting set problem consists in finding an H -hitting set
of minimum size.
Because it is widely believed that no polynomial-time algorithm exists for
3
N P -complete problems, the computer science community gave up on trying
to find polynomial-time algorithms for solving these problems exactly and,
instead, investigated heuristics. These are efficient algorithms designed to
find a “good” feasible solution to a given optimization problem. Of particular
interest are approximation algorithms, which are heuristics with a guarantee
on the quality of the solution.
A canonical example of an approximation algorithm is the following simple greedy procedure for the vertex cover problem: iteratively find an uncovered edge and add both endpoints to the vertex cover, until no uncovered
edge remains. Since the number of edges in any matching is a lower bound
on the size of every vertex cover, the resulting vertex cover is at most twice
as large as the optimal one. This is an approximation algorithm with a
performance ratio of 2.
This thesis involves two points of view on graph theory. The first one
is structural as illustrated by the contributions of Euler, Kőnig and Berge
described above. The second one is algorithmic. Both sides have their importance and are closely related: their interplay fosters the development of
graph theory. Indeed, structural results give tools to design algorithms, while
algorithmic problems motivate the study of structural questions.
A typical instance of such an interaction between structural and algorithmic results comes from the theory of graph minors. The concept of minor generalizes the concept of subgraph by allowing, besides the operations
of edge-deletion and vertex-deletion, that of edge-contraction. Kuratowski
proved the following theorem about planar graphs (defined as graphs that
can be drawn in the plane R2 without crossing internally edges): a graph is
planar if and only if none of its minors includes K5 or K3,3 .
Figure 1.2: K5 on the left and K3,3 on the right.
Kuratowski’s theorem can be generalized to graphs embedded in any
given surface of R3 . More generally, from 1983 to 2004, Neil Robertson and
Paul Seymour proved inter alia that every family of graphs that is closed
under minors can be characterized by a finite set of forbidden minors.
For instance, a minor-closed family is the set of graphs with treewidth
bounded by some fixed constant k. Intuitively, the treewidth measures how
close a given graph is to a tree. Treewidth is a very important graph invariant
in algorithmic graph theory. Robertson and Seymour showed that if the
4
Chapter 1. Introduction
treewidth of a graph is large, then it contains a somewhat large grid minor.
In this instance, structural graph theory gives tools to develop algorithms on
graphs. Typically, when a problem is easy to solve on trees, it is expected
to be easy to solve on bounded-treewidth graphs.
Before explaining how this interaction materializes in this thesis, we introduce the connectivity constraint, which will be present throughout our
work. We consider the connected version of the H -hitting set problem, in
which we require the H -hitting set to induce a connected subgraph. Clearly,
the minimum size of a connected H -hitting set is always at least that of an
H -hitting set. We define the price of connectivity as the following ratio:
price of connectivity =
minimum size of a connected H -hitting set
minimum size of an H -hitting set
The main goal of this thesis is to study the price of connectivity for the
vertex cover problem and the dominating set problem.
This is a natural structural question motivated, for instance, by the following two-phase algorithmic approach to the connected H -hitting set problem: first find an optimal solution to the H -hitting set problem and then
transform it into a connected H -hitting set without increasing its size too
much. Thus, in some sense, the structural results obtained in this thesis
are motivated by an algorithmic problem. The algorithmic origin of the
questions survives in our proof techniques.
As we will prove, computing the price of connectivity is complete for a
class which is above N P , thus not much can be said in general about graphs
with price of connectivity bounded by a given rational number r. However,
the situation is completely different once we consider restricted classes of
graphs, such as those defined by forbidden induced subgraphs. This explains
why this thesis focuses mainly on such hereditary classes of graphs.
Coming back to the interplay between the structural and algorithmic
points of view, we will also prove structural results that have algorithmic
consequences. We give a new characterization of Pk -free graphs (that is,
graphs without any induced path on k vertices) in terms of connected dominating sets. We will prove that our characterization yields a polynomial-time
algorithm for solving the 2-colorability problem in a restricted class of hypergraphs.
1.1 Outline
1.1
5
Outline
This thesis tackles three distinct topics:
1. the price of connectivity for the H -hitting set problem,
2. a characterization of the class of Pk -free graphs,
3. the Pk -hitting set problem.
We now give a brief overview of the content of each chapter.
Chapter 2 – Background
We give basic definitions used in the following chapters. On the complexity side, we briefly recall essential notions such as complexity classes, Lreductions and approximation algorithms, and we give elementary definitions
involving graphs and hypergraphs. We then consider three famous problems
involving hitting sets in graphs: the vertex cover problem, the dominating
set problem and the feedback vertex set problem.
Chapter 3 – The price of connectivity and other prices
This chapter is completely devoted to giving the context of our first topic.
We briefly recall related notions in mathematics and computer science such
as the competitive ratio, the price of anarchy and the price of stability. Then
we state some of the previously known results on the price of connectivity:
• for the vertex cover problem, initiated by Cardinal and Levy [41, 88],
• for the dominating set problem, based on our Master thesis [30],
• for the feedback vertex set problem, studied by Belmonte, van ’t Hof,
Kamiński and Paulusma [16,17], Grigoriev and Sitters [70], and Schweitzer and Schweitzer [112].
Finally, we summarize several other works comparing different variants
of the domination invariant.
Chapter 4 – The price of connectivity for vertex cover
We continue the study of the price of connectivity for the vertex cover problem, initiated by Cardinal and Levy [41,88]. We investigate both complexity
and structural aspects.
First, we consider the following problem: given a graph G and a constant
r, is the price of connectivity of G at most r? Regarding computational
complexity, we establish that this decision problem is essentially as hard as
computing both the connected vertex cover number and the vertex cover
6
Chapter 1. Introduction
number of this graph. More precisely, computing the price of connectivity is
a Θp2 -complete problem.
Secondly, we consider an analogous problem in which the price of connectivity for all induced subgraphs of G is bounded by a fixed constant r. This
problem is clearly different from the previous one, at least for small values
of r. Indeed, we find a characterization in terms of a finite list of forbidden
induced subgraphs when r ∈ [1, 3/2]. In order to find such results for other
constants r, we define a PoC-critical graph as one that appears in the list
of minimal forbidden induced subgraphs for some threshold. Towards this
goal, we define the restricted subclass of PoC-strongly-critical graphs. Every
PoC-critical chordal graphs is also PoC-strongly-critical. Moreover, we also
characterize this class by special trees.
Besides, we answer the following natural question: for which rational
number r is there a graph whose price of connectivity is exactly r?
Chapter 5 – The price of connectivity for domination
This chapter is split into two sections and extends the work started in our
Master thesis [30].
For the vertex cover problem, we prove that, given a graph G and a
constant r, deciding whether the price of connectivity of G is at most r is
also Θp2 -complete. For a fixed constant r, the following decision problem is
different from the previous one: given a graph G, is the price of connectivity
for every induced subgraph at most r? Similarly to the vertex cover problem,
for r ∈ [1, 3/2], we characterize the class of graphs with a ‘yes’-answer to the
previous problem. Among other results, we prove that for any (P6 , C6 )-free
graph, the difference between the connected domination number and the
domination number is at most 1.
We also introduce likewise the notion of PoC-critical graphs and PoCstrongly-critical graphs for the dominating set problem.
Finally, for all rational number r ∈ [1, 3), we construct a graph whose
price of connectivity is exactly r.
Chapter 6 – A characterization of Pk -free graphs
This chapter introduces our second topic and gives a structural application of
connected dominating sets. The class of Pk -free graphs can be characterized
in terms of connected dominating sets: being Pk -free is equivalent to the fact
that every connected induced subgraph admits a connected dominating set
which is either isomorphic to Ck or Pk−2 -free.
Moreover, we describe a polynomial-time algorithm finding such a connected dominating set. Our algorithm is oblivious to the minimum value k
such that the graph is Pk -free.
1.1 Outline
7
Chapter 7 – 2-colorability of hypergraphs
We give an application of our Pk -free graph characterization for the 2-colorability of hypergraphs: the 2-colorability problem can be solved in polynomial
time for hypergraphs with P7 -free incidence graph. This generalizes previous
results of van ’t Hof and Paulusma [122] who proved this for hypergraphs
with P6 -free incidence graph. Before giving the proof, we give a brief survey
of the 2-colorability problem in hypergraphs by giving a detailed account
of known sufficient conditions and by mentioning some related complexity
results.
Chapter 8 – The Pk -hitting set problem
Our third and last topic concerns the H -hitting set problem, where H is
the set of all paths on k vertices in a graph G. This problem is as hard as
the vertex cover problem, for finding exact solutions but also in the sense
of approximation algorithms. For k = 3, there exists a polynomial-time
2-approximation algorithm [120], inspired from the primal-dual method for
the feedback vertex set problem [12,15,46]. At a higher level, the connection
between the two problems is explained by the fact that graphs not containing
P3 as a subgraph are very restricted forests. Unfortunately, for k > 4, graphs
containing no Pk as a subgraph may have cycles. This makes it more difficult
to adapt the primal-dual algorithm to the Pk -hitting set problem for k > 4.
A k-approximation algorithm can trivially be obtained by taking all vertices in an inclusion-wise maximal packing of vertex-disjoint subgraphs each
isomorphic to Pk . However, nothing better than a k-approximation algorithm is known for the general problem in graphs when k > 4.
In that chapter, we develop a primal-dual 3-approximation algorithm for
the P4 -hitting set problem.
8
Chapter 1. Introduction
1.2
Contributions
• The results of Chapter 4 were obtained in collaboration with Jean
Cardinal, Samuel Fiorini and Oliver Schaudt. They were presented
at the 11th Cologne-Twente Workshop on Graphs and Combinatorial
Optimization [33] and also at GraphDay@Mons and Young Women in
Discrete Mathematics. The results have been published in Discrete
Mathematics & Theoretical Computer Science [32].
• The results of Chapter 5, except those in the last two subsections,
were obtained with Oliver Schaudt, and presented at the 12th CologneTwente Workshop on Graphs and Combinatorial Optimization [37]. Besides, they have been published in Discrete Applied Mathematics [36].
• The characterization of Pk -free graphs and its application to the 2colorability of hypergraphs (Chapter 6 and 7) were originally presented
at 40th International Workshop on Graph-Theoretic Concepts in Computer Science [35] (WG2014). The paper received a “best paper award”
in WG2014 and resulted in a publication in Algorithmica [34]. This is
also joint work with Oliver Schaudt.
• The work on the Pk -hitting set problem (Chapter 8) was done in collaboration with Jean Cardinal, Mathieu Chapelle, Samuel Fiorini and
Gwenaël Joret. It was presented at the 9th International colloquium
on graph theory and combinatorics [31].
Chapter 2
Background
In this section, we give a brief introduction of basic definitions and graphtheoretic concepts. Since all relevant definitions are listed in the index of this
thesis, any person familiar with graph theory can skip the current chapter
and proceed to Chapter 3. We use the notations of Diestel [50]. A good
introduction to the theory of computation is given by Sipser [114].
2.1
Computational complexity
In computational complexity theory, we distinguish two main classes of problems: decision problems and optimization problems. A decision problem is a
problem where the expected answer is “yes” or “no”, whereas an optimization
problem involves a set of feasible solutions, and the expected answer is one
whose value of the objective function is optimal. An optimization problem
is a minimization (resp. maximization) problem when its objective function
must be minimized (resp. maximized). Note that the value of the objective function for a feasible solution is its objective value. Besides, for each
optimization problem, there exists a corresponding decision problem where
the inputs are the input of the optimization problem and some constant.
Then the form of the corresponding decision problem is: “Does there exist a
feasible solution whose objective value is bounded by the constant?”.
For instance, the set cover problem is an optimization problem. An
instance of the set cover problem is an ordered pair (U, S), where U is called
the universe and S is a family of subsets of U whose union equals the universe.
A set cover , a feasible solution, is a subfamily of S whose union equals
the universe. The objective function is the size of the subfamily. The set
cover problem is a minimization problem. For some inputs (U, S) and some
constant k, we can consider the decision problem: “Does there exist a set
cover of U with at most k subsets?”.
Some problems can be solved efficiently by an algorithm. The computational complexity theory classifies problems into classes according to the
9
10
Chapter 2. Background
effectiveness of their resolution. We present three classes encountered in this
thesis.
2.1.1
Classes P and N P
The classes P and N P are two of the most fundamental complexity classes.
A decision problem is in P if it can be solved by a deterministic algorithm
in polynomial time, whereas the class N P contains all decision problems
solvable by a non-deterministic algorithm in polynomial time. In practice,
the former concerns efficiently solvable or tractable problems. However, the
latter ensures that checking the feasibility of a ‘yes’-instance can be done by
a deterministic algorithm in polynomial time. We note the set of decision
problems that can be solved by a deterministic algorithm in a running time
O(f (n)) by DT IM E(f (n)). Consequently,
P =
[
DT IM E(nk ).
k∈N
For instance, primality testing is in P [1], whereas the decision problem
for set cover is in N P .
A major unsolved problem in computer science is whether P 6= N P . If
P 6= N P , some N P problems would be harder to compute than to verify.
One significant advance on this question came by distinguishing certain
problems in N P : if there exists a polynomial-time algorithm solving any
of these problems, all problems in N P would be solvable in polynomial
time. We call these problems N P -complete. The set cover problem is N P complete.
An N P -complete problem is a problem in N P which is N P -hard : at
least as hard as the hardest problems in N P . Formally, a problem P1 is
N P -hard if for every problem P2 in N P , there exists a polynomial-time
reduction from P2 to P1 . A polynomial-time reduction from P2 to P1 is a
polynomial-time algorithm transforming an input x to problem P2 into an
input y to problem P1 such that x is a ‘yes’-instance of P2 if and only if
y is a ‘yes’-instance of P1 . We denote the reduction from problem P2 to
P1 by P2 6p P1 . In practice, proving the N P -completeness of a problem P
consists of proving that P ∈ N P and P 0 6p P for one N P -complete problem
P 0 , because of the transitivity of the polynomial-time reduction.
2.1.2
Class Θp2
To compare the difficulties of problems, we introduce the concept of an oracle
machine: this is an algorithm with a black box, the oracle, which is able
to solve certain decision problems in a single operation. In particular, an
N P -oracle solves decision problems from N P in a single operation.
2.2 Approximation algorithms
11
The class Θp2 , sometimes denoted by P NP[log] , is defined as the class of
decision problems solvable in polynomial time by a deterministic algorithm
that allows using O(log n) many queries to an N P -oracle, where n is the size
of the input. Clearly, N P is included in Θp2 .
A Θp2 -complete problem is in Θp2 and is Θp2 -hard. Similarly to an N P complete problem, a problem P is Θp2 -complete if P ∈ Θp2 and P 0 6p P for
one Θp2 -complete problem P 0 . Spakowski and Vogel [116] proved the Θp2 completeness of the following decision problem: “given two graphs G1 and
G2 , is τ (G1 ) 6 τ (G2 )?”, where τ (G) is the minimum number of vertices of G
meeting all the edges of G, i.e. the minimum number of vertices of a vertex
cover.
2.2
Approximation algorithms
Because of such intractability concerns, alternative methods were developed
for optimization problems: heuristics are algorithms designed for finding
an approximate solution when an exact solution is out of reach. Approximation algorithms are polynomial-time heuristics whose solution is a good
approximation of the optimal one(s). The guarantee of the quality of this
approximation is measured by the performance ratio. Given a feasible solution x provided by an approximation algorithm, the performance ratio α of a
minimization problem (resp. maximization problem) is an upper (resp. lower)
f (x)
bound on the ratio f (OP
T ) , i.e. f (x) 6 αf (OP T ) (resp. αf (OP T ) 6 f (x)),
where f is the objective function and OP T is an optimal solution. In this
case, we say that the optimization problem is α-approximable or that the
algorithm is an α-approximation.
For instance,
the set cover problem is H(n)-approximable [47], where
Pn
H(n) = k=1 1/k is the nth harmonic number. This is achieved by using the
greedy algorithm: iteratively choose a set that contains the largest number
of uncovered elements.
By analogy to polynomial-time reductions in the case of decision problems, an L-reduction compares two optimization problems P1 , P2 with objective functions f1 , f2 and is defined by a quadruple (g, h, β, γ) as follows:
• for every instance x of P1 , g computes in polynomial time an instance
g(x) of P2 ,
• for every feasible solution y to g(x), h computes a feasible solution h(y)
of x in polynomial time,
• for every instance x of P1 , f2 (OP Tg(x) ) 6 βf1 (OP Tx ), where OP Tx
(resp. OP Tg(x) ) is an optimal solution for the instance x (resp. g(x)).
• for every feasible solution y to g(x),
|f1 (OP Tx ) − f1 (h(y))| 6 γ|f2 (OP Tg(x) ) − f2 (y)|.
12
Chapter 2. Background
In this case, P1 is said to be L-reducible to P2 (denoted by P1 6L P2 ).
Note that the constants β and γ allow to preserve a good performance
ratio. For instance, if P1 6L P2 with β = γ = 1 and P2 is α-approximable,
then P1 is also α-approximable.
2.3
Graphs and hypergraphs
A graph is an ordered pair G = (V, E) where V and E are finite sets and E
is a set of subsets of V containing exactly two elements of V . We suppose
that V and E are disjoint. The elements of V are called vertices and those
of E edges. If uv ∈ E with vertices u and v, then u and v are called the
endpoints of the edge uv. When the vertex or edge set of a graph G are not
specified, we denote by V (G) its vertex set and E(G) its edge set. Given a
graph G, the number of vertices |V (G)| is its order .
Two edges e and f are adjacent if e ∩ f 6= ∅. Two vertices u and v are
adjacent if E contains the edge uv. In this case, we say that u and v are
neighbors. The neighborhood NG (v) (sometimes called the open neighborhood ) of a vertex v is the set of all its neighbors. If we add the vertex v
to this set, we obtain the closed neighborhood NG [v] of v in G. A private
neighbor of a vertex v with respect to a vertex set S is a vertex u ∈
/ S such
that NG (u) ∩ S = {v}. The degree of a vertex v, denoted by dG (v), is the
number of its neighbors. A degree-0 vertex is isolated whereas a degree-1
vertex is pendent . A graph whose vertices all have the same degree d is
d-regular . We say that G is cubic if it is 3-regular. The maximum degree
(resp. minimum degree) of a graph G, denoted by ∆(G) (resp. δ(G)), is the
maximum (resp. the minimum) degree of all vertices of G. We omit the
graph G from the previous notations, for instance N (v), N [v], d(v), if there
is no possible confusion.
A path in a graph G is a sequence v1 v2 v3 · · · vk of k distinct vertices with
vi vi+1 ∈ E for any 1 6 i < k. The length of the path v1 v2 v3 · · · vk is the
number of its edges (i.e. k − 1) and the path v1 v2 v3 · · · vk connects vertices v1
and vk . An induced path is a path v1 v2 v3 · · · vk such that vi is not adjacent
to vj for any j ∈
/ {i − 1, i + 1}. By abuse of notation, the graph formed
by a sequence v1 v2 v3 · · · vk is also called a path and is denoted by Pk . The
distance between two vertices u and v, denoted by d(u, v), is the minimum
length of a path connecting them. The distance between two vertex sets X
and Y is min{d(x, y)|x ∈ X, y ∈ Y }. The diameter of a graph is the largest
distance between any pair of vertices. A vertex is central (or a center ) in
G if its largest distance from any other vertex is minimum. This distance is
the radius of G.
We say that H is a subgraph of G if V (H) ⊆ V (G) and E(H) ⊆ E(G).
Let X be a subset of V (G). Then the unique subgraph with vertex set X
and edge set {uv | uv ∈ E(G), u, v ∈ X} is the subgraph induced by X and
2.3 Graphs and hypergraphs
13
is denoted by G[X]. Moreover, an induced subgraph of G is a subgraph of
G which is induced by some set X ⊆ V (G). The complement of a graph G,
denoted by G, is the graph with V (G) = V (G) such that two vertices are
adjacent in G if and only if they are not adjacent in G. Of course, G = G
for every graph G. Let X be a subset of V (G). G − X denotes the subgraph
induced by V (G) \ X. In particular, when X is reduced to the vertex v, we
denote it by G − v. Let Y be a subset of E(G). The graph G − Y is the
graph such that V (G − Y ) = V (G) and E(G − Y ) = E(G) − Y , especially
if Y is reduced to the edge e, G − e is the graph obtained by removing from
G the edge e.
A graph G is connected if there exists a path connecting each pair of
vertices from G. Otherwise the graph G is disconnected . The connected
components of a graph are the inclusion-wise maximal connected subgraphs.
A set of vertices X is a cutset of G if the number of connected components
of G − X is different from that of G, while a vertex v is a cutvertex of G if
the set {v} is a cutset of G. The disjoint union of some graphs G1 , . . . , Gk
with disjoint vertex and edge sets is the graph G with V (G) = ∪ki=1 V (Gi )
and E(G) = ∪ki=1 E(Gi ) and is denoted by G1 + G2 + · · · + Gk . We denote
by kG the disjoint union of k copies of G.
A cycle is a path v1 v2 v3 · · · vk where v1 is adjacent to vk . The length of
the cycle v1 v2 v3 · · · vk is also its number of edges, i.e. k. An induced cycle
is a cycle C = v1 v2 v3 · · · vk such that removing any edge from C results in
an induced path. By abuse of notation, the graph formed by this sequence
v1 v2 v3 · · · vk is also called a cycle and is denoted by Ck . An acyclic graph,
which is one not containing any cycle as a subgraph, is called a forest. A
connected forest is called a tree and any subgraph of a tree is a subtree. The
internal vertices of a tree are those with degree at least two. A linear forest
is a forest where each connected component is a path. A spanning tree T of a
graph G is a subgraph of G which is a tree with V (T ) = V (G). A maximum
leaf spanning tree is a spanning tree with a maximum number of leaves.
Two graphs G and H are isomorphic if there is a bijection φ : V (G) →
V (H) such that uv is an edge of G if and only if φ(u)φ(v) is an edge of H, for
every u, v ∈ V (G). If two graphs G and H are isomorphic, we write G ∼
= H.
A (graph) parameter is a function f from the set of all graphs to the natural
numbers N. A graph parameter f is an invariant if f (G) = f (H) whenever
the graphs G and H are isomorphic.
A clique in a graph is a vertex subset X whose vertices are pairwise
adjacent. When the vertex set of a graph G is a clique, we say that G is
complete. The complete graph on n vertices is denoted by Kn .
An independent set of a graph G is a vertex set X such that no two of
its elements are adjacent. We call the independence number of a graph G
the maximum size of an independent set. It is denoted by α(G).
A graph G is k-partite if there is a partition of V (G) in k parts such that
14
Chapter 2. Background
each part is an independent set. When k = 2, we usually obtain bipartite
graphs. The complete bipartite graph, where one block is of size n and the
other of size m with all possible edges between those two blocks, is denoted
by Kn,m . The graph K1,3 is a claw while, for every k > 0, the graph K1,k is
a star .
A matching is a set of edges such that no two edges share an endpoint.
If M is a matching such that every vertex is incident to some edge of M ,
then M is called a perfect matching.
The graph G is said to be H-free if no induced subgraph of G is isomorphic to H. Furthermore, we say that G is (H1 , . . . , H` )-free if G is Hi -free
for every i ∈ {1, . . . , `}.
A huge number of graph classes have been studied in literature. Below,
we list a few of them:
1. A chordal graph, or triangulated graph, is a graph in which all induced
cycles have length 3.
2. A planar graph is a graph that can be embedded in the plane R2 , i.e. it
can be drawn in R2 in such a way that its edges are internally disjoint.
3. A split graph is a graph whose vertices can be partitioned into a clique
and an independent set.
4. A Moore graph is a d-regular
graph with diameter k whose number
Pk−1
of vertices is exactly 1 + d i=0 (d − 1)i . Notice that the number of
vertices
graph with diameter k is upper bounded by
P of any d-regular
i.
(d
−
1)
1 + d k−1
i=0
5. A cograph is a P4 -free graph.
6. A trivially perfect graph is a (P4 , C4 )-free graph.
A hypergraph H is an ordered pair (V, E) where V is a finite set, called
the ground set of vertices, and E is a finite set of subsets of V . The elements
of E are called hyperedges. The rank of a hypergraph H is the maximum size
of its hyperedges. If all hyperedges have the same size k, the hypergraph is
said to be k-uniform. A graph is a 2-uniform hypergraph. The degree dH (v)
of a vertex v is the number of hyperedges that contain it. H is k-regular if
every vertex has exactly degree k. The (vertex-hyperedge) incidence graph
of a hypergraph H = (V, E) is the bipartite graph G with vertex set V ∪ E
and edge set {ve | v ∈ V, e ∈ E, v ∈ e}. A hypergraph H = (V, E) is
connected if there is no bipartition A ∪ B of V such that for all e ∈ E,
either e ⊆ A or e ⊆ B. For a hypergraph H = (V, E), a k-coloring is a
map c : V → {1, . . . , k} such that every hyperedge of size at least 2 is not
monochromatic, i.e. every such hyperedge contains at least two vertices of
distinct colors.
2.4 H -hitting set problems
2.4
15
H -hitting set problems
Given a graph G and a collection of subgraphs of G, we define an H -hitting
set as a set X of vertices such that for every H ∈ H , V (H) ∩ X 6= ∅. An
H -hitting set is minimum if its size is minimum. The H -hitting number ,
denoted by τH (G), is the size of a minimum H -hitting set. For a connected
graph G, an H -hitting set of G inducing a connected subgraph is called a
connected H -hitting set. Assume that G is disconnected, i.e. G admits the
connected components C1 , . . . , Ck . Let s 6 k be the number of connected
components C such that τH (C) 6= 0. Then a connected H -hitting set of
G is an H -hitting set whose number of connected components is exactly
s. Also, a connected H -hitting set whose size is minimum is a minimum
connected H -hitting set. The size of such a set, denoted by τH ,c (G), is
called the connected H -hitting number . An (resp. connected) H -hitting set
is minimal if none of its proper subsets is an (resp. connected) H -hitting set.
The (resp. connected) H -hitting set problem consists of finding a minimum
(resp. connected) H -hitting set. In this thesis, we are interested in three
particular collections H whose corresponding H -hitting set problems are
the vertex cover problem, the dominating set problem and the feedback
vertex set problem.
The following table describes definitions and notations for these three
problems, given a graph G.
Problems
set
H
τH (G)
τH ,c (G)
(connected)
H -hitting
number
Vertex cover
problem
Dominating set
problem
Feedback vertex set
problem
vertex cover set
all edges
dominating set
all stars induced by
a closed neighborhood
feedback vertex set
all cycles
τ (G)
τc (G)
γ(G)
γc (G)
ρ(G)
ρc (G)
(connected)
vertex cover
number
(connected)
domination
number
(connected)
feedback vertex
number
X is a vertex cover (resp. feedback vertex set) of G if and only if V (G)\X
is an independent set (resp. a forest) in G. An alternative definition of
dominating sets is the following one: a dominating set of a graph G is a
vertex set D such that every vertex not in D has a neighbor in D, i.e.
∪v∈D NG [v] = V (G).
We now give a brief review of literature on these three problems.
16
2.4.1
Chapter 2. Background
The vertex cover problem
The vertex cover problem has been widely studied in literature and is one
of the 21 N P -complete problems identified by Karp [83] in 1972. Moreover,
Garey, Johnson and Stockmeyer [63] proved that it remains N P -complete
in cubic graphs. As is well known, the vertex cover problem admits a 2approximation algorithm, by the vertex set of an inclusion-wise maximal
matching or by the internal vertex set of a depth-first search tree [109],
and better performance ratio can be achieved: 2 − 2 ln(ln(n))
ln(n) (1 − o(1)) [74].
Dinur and Safra [52] proved that the vertex cover problem is N P -hard to
approximate to within a factor of 1.3606, unless P = N P . Moreover, it is
widely believed that this problem is hard to approximate to within 2−ε under
the Unique Games Conjecture [85], unless P = N P . For more explanations
about the Unique Games Conjecture, see [84].
For the connected version, Fernau and Manlove [58] showed that the connected problem is not approximable within a performance ratio of 1.3606 − δ
for any δ > 0, unless P = N P . Furthermore, Escoffier, Gourvès and Monnot [57] proved that this problem is polynomial in chordal graphs and is
5/3-approximable in any class of graphs where the vertex cover problem is
polynomially solvable, especially in bipartite graphs.
2.4.2
The dominating set problem
Like the vertex cover problem, the dominating set problem has been intensively studied in literature. The dominating set problem is N P -complete [62,
p. 190] by a reduction from the vertex cover problem. Moreover, Kann [79,
pp. 108–109] described a pair of polynomial-time L-reductions between the
dominating set problem and the set cover problem, which preserves the
performance ratio. In other words, if there exists a polynomial-time αapproximation algorithm for the dominating set problem, then the reduction
gives a polynomial-time α-approximation algorithm for the set cover problem and vice versa. Therefore, the dominating set problem is (1 + ln(n))approximable by the greedy algorithm [47]. Raz and Safra [104] showed that
no polynomial-time approximation algorithm can run within a ratio better
than c ln(n) for some c > 0 unless P = N P , for the set cover problem,
hence also for the dominating set problem. Recently, Alon, Moshkovitz and
Safra [4] proved a similar result with higher values of c, for instance when
c = 0.2267. In terms of exact algorithms, Fomin, Kratsch and Woeginger [60] designed exponential algorithms whose computational complexity is
in O(1.93782n ) whereas Grandoni [69] developed one with a better performance in O(1.8021n ). Later, Fomin, Grandoni and Kratsch [80, pp. 284-286]
deduced a branch & reduce algorithm in O(1.52626n ).
Among the applications of connected dominating sets, we mention the
routing of messages in mobile ad-hoc networks. Blum, Ding, Thaeler and
2.4 H -hitting set problems
17
Cheng [21] explained the usefulness of connected dominating sets in this
context. From a theoretical point of view, the connected dominating set
problem is equivalent to finding a maximum leaf spanning tree. Garey
and Johnson [62, pp. 206] explained that the last problem is N P -complete.
Therefore, it is the same for the connected dominating set problem. Guha
and Khuller [71] designed two approximation algorithms with ratio 4 +
2 ln(∆) and 3 + ln(∆) (where ∆ is the maximum degree of G) for the
connected dominating set problem, and they proved that there is no approximation algorithm with performance ratio ρH(∆) for ρ < 1 unless
N P ⊆ DT IM E(nO(ln ln(n)) ), where H is the Harmonic function. While
Ruan, Du, Jia, Wu, Li and Ko [108] developed an approximation algorithm
with performance ratio 2 + ln(∆), Du, Graham, Pardalos, Wan, Wu and
Zhao [54] showed that there exists an approximation algorithm with performance ratio a(1 + ln(∆ − 1)), for any a > 1.
2.4.3
The feedback vertex set problem
Karp [83], and more generally Lewis and Yannakakis [89], proved the N P completeness of the feedback vertex set problem. Moreover, approximation
algorithms [12, 15, 46] with performance ratio 2, for instance by the primaldual method, or exact exponential algorithm [59] in O(1.7548n ) were designed. However, Guruswami and Lee [73] proved recently the strong N P hardness of approximation result for a variant: under the Unique Games
Conjecture, for any integer k > 3 and ε > 0, it is hard to find a (k − ε)approximate solution to the problem of intersecting every cycle of length at
most k.
Surprisingly, the connected version has not been studied in literature until
recently. Belmonte, van ’t Hof, Kamiński and Paulusma [16,17] investigated
the connected feedback vertex set problem compared to the feedback vertex
set problem. We discuss their contributions in detail in Chapter 3. Grigoriev
and Sitters [70] studied also the connected feedback vertex set problem for
restricted classes of graphs. They proved the N P -hardness of this problem
for planar graphs with maximum degree 9 and, for any ε > 0, they designed
for planar graphs of minimum degree 3 an approximation algorithm with
performance ratio (1 + ε).
18
Chapter 2. Background
Chapter 3
The price of connectivity and
other prices
The price of connectivity, abbreviated by PoC, expresses the interdependence
of the connected version of a graph invariant and the original invariant.
Many authors studied other prices by comparing a graph invariant with
some variants of this invariant or by comparing various variants of one graph
invariant. This chapter retraces related works and is split into three sections.
The first one mentions famous prices in mathematics or computer science, in
different areas compared to graph theory. The second one is dedicated to the
price of connectivity, especially on the vertex cover problem, the dominating
set problem and the feedback vertex set problem. The last one investigates
other prices involving domination numbers.
3.1
Famous prices
Comparisons between related parameters of discrete structures are ubiquitous in mathematics and computer science. We present a brief survey of
some popular ones.
In computer science, alongside the performance ratio for approximation
algorithms, the competitive ratio deals with on-line algorithms in a theory
starting with the work of Sleator and Tarjan [115]. An on-line algorithm is
one that receives a sequence of requests and performs an immediate action
in response to each request. The novelty of their paper [115] lies in a new
measure of performance, the competitive ratio for on-line algorithms. The
competitive ratio of an algorithm is defined as the worst-case ratio between
its cost and that of a hypothetical offline algorithm which knows the entire sequence of requests in advance and chooses its actions optimally. An
algorithm is competitive if its competitive ratio is bounded. Competitive
algorithms are used to overcome uncertainties about the future, in the case
of on-line requests from a server. Many authors [7, 9, 10, 18, 25, 82, 86, 95]
19
20
Chapter 3. The price of connectivity and other prices
developed competitive algorithms and proved upper and lower bounds on
the competitive ratios achievable by on-line algorithms.
In applied mathematics, game theory [8,38,97,98] has been used to study
a wide variety of human and animal behaviors. The applications are manifold: modeling, economy, business, political science, biology, computer science, logic, philosophy, . . . In this context, many authors [2, 6, 43–45, 87, 90,
106, 107] established two famous notions: the price of anarchy and the price
of stability. A good introduction on the game theory is given by Nisan,
Roughgarden, Tardos and Vazirani [98].
First of all, the price of anarchy of a game is a concept that measures
how the efficiency of a game degrades due to selfish behavior of its players, in
other words, the ratio between the worst welfare function value of one of its
Nash equilibria and that of an optimal outcome. Notice that if the price of
anarchy is closer to 1, choosing an arbitrary Nash equilibrium as a solution is
relevant since the welfare function evaluated in any Nash equilibrium seems a
good approximation to the optimal value. Some authors [43–45, 87, 106, 107]
attempt to bound the price of anarchy in particular cases. Unfortunately, a
game with multiple Nash equilibria has a large price of anarchy even if only
one of its equilibria is highly inefficient.
Secondly, the price of stability is a measure of inefficiency designed to
differentiate between games in which all equilibria are inefficient and those
in which some equilibrium is inefficient. Formally, the price of stability
of a game is the ratio between the best welfare function value of one of
its Nash equilibria and that of an optimal outcome. Of course, in a game
with a unique equilibrium, its price of anarchy and price of stability are
identical. In general, the price of stability is relevant for games in which
there is some objective authority that can partly influence the players, and
can help them converge to a good Nash equilibrium. As the case of the price
of anarchy, bounding the price of stability is a challenge raised by several
authors [2, 6, 90]. Obviously, for a game with multiple equilibria, its price of
stability is at least as close to 1 as its price of anarchy, and it can be much
closer.
3.2
3.2.1
Price of connectivity
Vertex cover problem
The price of connectivity has been introduced by Cardinal and Levy [41,
88] for the vertex cover problem and is defined by the ratio between the
connected vertex cover number τc and the vertex cover number τ .
Let us first note that every vertex cover C of a graph G such that G[C]
has c connected components can be turned into a connected vertex cover
of G by adding at most c − 1 vertices. This directly yields the following
observation.
21
3.2 Price of connectivity
Observation 3.1. For every graph G it holds that τc (G) 6 2τ (G) − 1.
As an immediate consequence of Observation 3.1, the following inequality
holds for every graph G (with at least one edge):
1 6 τc (G)/τ (G) < 2.
(3.1)
Hence the price of connectivity for the vertex cover problem of any graph lies
in the interval [1, 2). Note that the upper bound in (3.1) is asymptotically
sharp in the class of paths Pk and in the class of cycles Ck on k vertices, in
the sense that
lim τc (Pk )/τ (Pk ) = 2 = lim τc (Ck )/τ (Ck ).
k→∞
k→∞
First of all, Cardinal and Levy [41, 88] showed that for the vertex cover
problem, the price of connectivity in dense graphs is bounded by a constant
depending on the graph density.
Theorem 3.2 (Cardinal, Levy [41, 88]). Let G be a graph with at least ε n2
edges. Then its price of connectivity for the vertex cover problem is at most
2
1+ε + O(1).
Moreover, they proved that this theorem is tight for the family of graphs
Gx,y with y−x a multiple of 3, defined as follows: Gx,y is the graph composed
of a clique of size x and (y − x)/3 paths on 3 vertices, all endpoints of which
are totally joined to the clique. Figure 3.1 is an illustration of G4,10 and
G6,18 .
Figure 3.1: On the left, the graph G4,10 and on the right, the graph G6,18 .
22
3.2.2
Chapter 3. The price of connectivity and other prices
Dominating set problem
First of all, Duchet and Meyniel [55] observed that for every graph G it
holds that γc (G) 6 3γ(G) − 2. As an immediate consequence, every graph
G satisfies
1 6 γc (G)/γ(G) < 3,
(3.2)
that is, the price of connectivity for dominating set problem of a graph G,
γc (G)/γ(G), is strictly bounded by 3.
Observation 3.3. It holds that
lim γc (Pk )/γ(Pk ) = 3 = lim γc (Ck )/γ(Ck ).
k→∞
k→∞
(3.3)
In particular, the upper bound (3.2) is asymptotically sharp in the class of
paths and in the class of cycles.
Moreover, Zverovich [126] found a characterization of a particular class
of graphs. Each graph of this particular class has the price of connectivity
for the dominating set problem equal to 1, like all induced subgraphs. The
following theorem is our starting point in Chapter 5.
Theorem 3.4 (Zverovich [126]). The following assertions are equivalent for
every graph G.
(i) For every induced subgraph H of G it holds that γc (H) = γ(H).
(ii) G is (P5 , C5 )-free.
Even though the class of (P5 , C5 )-free graphs is recognized in polynomial
time, the dominating set problem restricted to this class is N P -complete,
as proved by Bertossi [19] and by Corneil and Perl [48]. By the previous
theorem, the connected dominating set problem is also N P -complete.
During her Master thesis, Camby [30] studied the price of connectivity
for the dominating set problem. She proved that for an arbitrary constant
δ, there exists a sequence of graphs with minimum degree δ and price of
connectivity approaching 3 for the dominating set problem. This infinite
family of graphs G∗n,δ is defined as follows. Consider n disjoint Kδ+1 and
n − 1 disjoint Kδ−1 . We place alternately these cliques along a path and we
add edges as follows. In each clique Kδ+1 , choose two distinct vertices, say
u, v, and add all possible edges between u and the previous clique Kδ−1 , and
also between v and the following clique Kδ−1 . Notice that δ(G∗n,δ ) = δ. The
graph G∗4,3 is illustrated by Figure 3.2.
Moreover, for the dominating set problem, the maximum value of the
price of connectivity for graphs with minimum degree δ is decreasing with
respect to δ.
3.2 Price of connectivity
23
Figure 3.2: Graph G∗4,3 .
Theorem 3.5 (Camby [30]). Let n > 4. Consider the function f defined by
γc (G) δ(G) = δ, |V | = n .
f : {1, . . . , n − 1} → R : δ 7→ max
γ(G) Then f is decreasing.
As a result, for the dominating set problem, the maximum value of the
price of connectivity for graphs of order n is attained by a graph with minimum degree 1.
Besides, Camby found upper bounds when the minimum degree is proportional to the order of the graph.
Theorem 3.6 (Camby [30]). Let n > 4 and G be a graph of order n with
minimum degree at least n/2. Then γc (G)/γ(G) < 2.
2
Moreover, if δ(G) = n/2 > 3 then γc (G)/γ(G) 6 2 − n−2
.
The last bound may be not tight. However, Camby constructed by induction a graph G of order 2δ(G) whose price of connectivity for the dominating
set problem is equal to 3/2. The basic case is illustrated by Figure 3.3. We
conjecture that for any graph G with δ(G) = n/2, the price of connectivity
for the dominating set problem is bounded by 3/2.
Figure 3.3: Graph of order 8 with minimum degree 4 and price of connectivity
for the dominating set problem 3/2.
Theorem 3.7 (Camby [30]). Let n > 4 and δ ∈ N0 . Let G be a graph of
order n with minimum degree δ. If nδ > 3 then
γc (G)
2
63− n
.
γ(G)
dδe − 1
24
Chapter 3. The price of connectivity and other prices
Furthermore, Camby studied the price of connectivity for the dominating
set problem in some particular classes of graphs.
Theorem 3.8 (Camby [30]). Let G be a graph.
• If G is a cograph, i.e. a P4 -free graph, then γc (G)/γ(G) = 1.
• If the diameter of G is 2 then γc (G)/γ(G) < 2.
However, we conjecture that the upper bound on the price of connectivity
for the dominating set problem for graphs of diameter 2 is 3/2. Moreover,
there exists a sequence of graphs of order n + 3 with diameter 2 whose price
of connectivity for the dominating set problem is exactly 3/2. An instance of
these graphs, obtained by subdividing an arbitrary edge of K2,n , is depicted
in Figure 3.4.
Figure 3.4: Graph obtained by subdividing one edge from K2,10 .
3.2.3
Feedback vertex set problem
Belmonte, van ’t Hof, Kamiński and Paulusma [16, 17] studied the price of
connectivity for feedback vertex set problem, defined as the ratio between
the connected feedback vertex number ρc and the feedback vertex number ρ.
In general, the price of connectivity can be arbitrarily large for the feedback vertex set problem, for instance for butterflies. A butterfly is a graph
consisting of two disjoint cycles on i and j vertices that are connected to
each other by a path of length k. We denote it by Bi,j,k . The butterfly
B4,8,2 is illustrated by Figure 3.5. Notice that for the vertex cover problem
and the dominating set problem, the price of connectivity for any graph is
bounded by a fixed constant. At the opposite, the price of connectivity for
the feedback vertex set problem can be arbitrarily large since its exact value
for the butterfly Bi,j,k is (k + 2)/2.
Observe that butterflies are planar. However, Grigoriev and Sitters [70]
showed that the price of connectivity for feedback vertex set problem is at
most 11 for planar graphs of minimum degree at least 3. Later, Schweitzer
and Schweitzer [112] improved this upper bound down to 5, which is tight.
Belmonte, van ’t Hof, Kamiński and Paulusma, [17] established different
links between the connected feedback vertex number and the feedback vertex
number for the class of H-free graphs.
3.2 Price of connectivity
25
Figure 3.5: Butterfly B4,8,2 .
Theorem 3.9 (Belmonte et al. [17]). Let H be a graph.
• There is a constant dH such that ρc (G) 6 dH ρ(G) for every connected
H-free graph G if and only if H is a linear forest.
• There is a constant cH such that ρc (G) 6 ρ(G)+cH for every connected
H-free graph G if and only if H is an induced subgraph of P5 + sP1 or
sP3 for some integer s.
• ρc (G) = ρ(G) for every connected H-free graph G if and only if H is
an induced subgraph of P3 .
• For every constant eH , there is a H-free graph G with ρc (G) > eH ρ(G)
if and only if H contains a cycle as a subgraph or a vertex of degree at
least 3.
Afterwards, Belmonte et al. [16] generalized their results when the list
of forbidden induced subgraphs is finite. Let us introduce the following
definition to explain the following result.
Let i, j > 3 be two integers, let H be a finite family of graphs, and
let N = 1 + 2 maxH∈H |V (H)|. The family H covers the pair (i, j) if H
contains an induced subgraph of the butterfly Bi,j,N . A graph H covers the
pair (i, j) if the family {H} covers (i, j).
The following theorem states that the price of connectivity for feedback
vertex set problem in the class of H -free graphs is bounded by a constant
fH if and only if the forbidden induced subgraphs in H prevent arbitrarily
large butterflies from appearing as induced subgraphs.
Theorem 3.10 (Belmonte et al. [16]). Let H be a finite family of graphs.
Then the price of connectivity for feedback vertex set problem in H -free
graphs is upper bounded by a constant fH if and only if H covers the pair
(i, j) for every i, j > 3.
By Theorem 3.9, we know that covering all pair (i, j) for i, j > 3 is
equivalent to being a linear forest, completing the case when |H | = 1. Then,
they obtained a similar characterization when |H | = 2 in the same taste
than Theorem 3.10. First, we define a lollipop Lm,n as the graph obtained
by joining a complete graph Km to a path Pn with a bridge. A lollipop is
26
Chapter 3. The price of connectivity and other prices
simple when the complete graph has only 3 vertices and is denoted by Ln .
A simple lollipop is eaten if it is the subgraph of Ln obtained by removing
the edge to have no degree-2 vertex in the clique. An eaten simple lollipop
is denoted by In . These graphs are illustrated in Figure 3.6. Notice that L0
is isomorphic to C3 , the cycle on 3 vertices.
Figure 3.6: On the left, the simple lollipop L6 and on the right, the eaten
simple lollipop I3 .
Theorem 3.11 (Belmonte et al. [16]). Let H1 and H2 be two graphs, and
let H = {H1 , H2 }. Then the price of connectivity for feedback vertex set
problem in H -free graphs is upper bounded by a constant gH if and only if
there exist integers n > 0 and r > 1 such that one of the following conditions
holds:
- H1 or H2 is a linear forest,
- H1 and H2 are induced subgraphs of Ln and 2Ir , respectively,
- H1 and H2 are induced subgraphs of 2Ln and Ir , respectively,
where 2G is the disjoint union of two copies of G.
Clearly, Theorem 3.11 generalizes Theorem 3.9, as the class of H-free
graphs is equivalent to the class of {H, H}-free graphs. They pointed out
that any graph H that is an induced subgraph of both Ln for some n > 0
and of 2Ir for some r > 1 is a linear forest.
3.3
Other prices
We can also examine other pair of invariants in graph theory. For instance,
Fulman [61] and Zverovich [127] investigated the ratio between the independence number and the upper domination number , which is the maximum size
of an inclusion-wise minimal dominating set. However, we stay focused on
our topic: pair of parameters involving the same invariant.
Indeed, we study different variants of domination. A survey on the ratios
of some important domination invariants is described by Blidia, Chellali
and Favaron [20] for general graphs and for claw-free graphs while Chellali,
Favaron, Haynes and Raber [42] investigated the class of trees.
27
3.3 Other prices
3.3.1
Paired-domination versus total domination
Haynes and Slater [75] gave the following relation between the total domination number γt and the paired-domination number γp . A total dominating
set X is a vertex set such that every vertex, even in X, has a neighbor in X
whereas a paired-dominating set is a dominating set whose induced subgraph
has a perfect matching. Moreover, the total domination number , resp. the
paired-domination number , is the minimum size of such a dominating set.
Theorem 3.12 (Haynes, Slater [75]). Let G be a graph with minimum degree
at least 1. Then
γp (G) 6 2γt (G) − 2.
Therefore, for any graph G with minimum degree at least 1,
γp (G)
< 2.
γt (G)
This bound is asymptotically sharp in the sense that
γp (cr(K1,r ))
2
=2−
−→ 2
γt (cr(K1,r ))
r + 1 r→+∞
where the corona cr(G) of a graph G is the graph obtained from G by
attaching a pendent vertex to every vertex. Dorbec, Henning and McCoy [53] proved similar results for the ratio Γp /Γt between the upper paireddomination number and the upper total domination number, where the upper
paired-domination number Γp is the maximum size of an inclusion-wise minimal paired-dominating set while the upper total domination number Γt is
the maximum size of a minimal total dominating set.
Restricted to some classes of graphs, the upper bound on the ratio γp /γt
could be smaller. Indeed, Brigham and Dutton [29] showed that for K1,3 free graphs with minimum degree at least 1, the bound γp /γt 6 4/3 holds,
whereas Schaudt [111] generalized the upper bound to the class of K1,r -free
graphs.
Theorem 3.13 (Schaudt [111]). Let G be a K1,r -free graph with minimum
degree at least 1, for some r > 3. Then
γp (G)
2
62−
γt (G)
r
and this bound is sharp for each r > 3. Moreover,
Γp (G)
2
62− .
Γt (G)
r
28
Chapter 3. The price of connectivity and other prices
Unfortunately, the second upper bound is possibly not sharp. However,
Schaudt enhanced the last theorem by finding a class of graphs where both
upper bounds are tight. It is the class of (C5 , Hr )-free graphs, for some
r > 3, where Hr is the graph obtained from K1,r by subdividing each edge
exactly once. As a consequence of Theorem 3.13, Schaudt also obtained the
following corollary.
Corollary 3.14 (Schaudt [111]). Let G be a graph with minimum degree at
least 1 and maximum degree ∆,
γp (G)
2
62−
γt (G)
∆+1
and this bound is sharp. Moreover,
Γp (G)
2
62−
.
Γt (G)
∆+1
Besides, Schaudt established the following characterization on the ratio
γp /Γt .
Theorem 3.15 (Schaudt [111]). Let G be a graph with minimum degree at
least 1. The following assertions are equivalent.
(i) γp (H) 6 Γt (H) for any induced subgraph H of G with minimum degree
at least 1.
(ii) G is (C5 , cr(K3 ), cr(P3 ))-free (see Figure 3.7).
Figure 3.7: C5 , cr(K3 ) and cr(P3 ).
Furthermore, similar to Theorem 3.13, Schaudt [111] proposed the following theorem for the ratio γp /Γt .
Theorem 3.16 (Schaudt [111]). Let G be a cr(K1,r )-free graph with minimum degree at least 1, for some r > 3. Then
γp (G)
2
62−
Γt (G)
r
and this bound is sharp for each r > 3.
29
3.3 Other prices
In particular, Schaudt found the following corollary.
Corollary 3.17 (Schaudt [111]). Let G be a connected graph with minimum
degree at least 1 and maximum degree ∆ > 2 that is not isomorphic to C5 ,
γp (G)
2
62−
Γt (G)
∆
and this bound is sharp.
3.3.2
Connected domination versus total domination
A graph is called perfect if the chromatic number of every induced subgraph
equals the size of the largest clique of this subgraph, where the chromatic
number is the minimum value k such that the graph admits a k-coloring.
More generally, we can define perfection with other parameters. For instance, we can consider the domination number and the minimum size of
a dominating set whose induced subgraph is independent. Zverovich and
Zverovich [128] gave a minimal forbidden subgraph characterization of such
domination perfect graphs. We recall that Zverovich [126] gave a characterization of perfect graphs for the connected domination number and the
domination number, which said that γ = γc for any induced subgraph is
equivalent to being (C5 , P5 )-free. We define the clique-domination number
γcl as the minimum size of a dominating set whose induced subgraph is a
clique. Goddard and Henning [64] extended Zverovich’s result to total domination and clique-domination.
Theorem 3.18 (Goddard, Henning [64]). Let G be a graph. The following
assertions are equivalent.
(i) Every connected induced subgraph has a dominating clique.
(ii) γ(H) = γt (H) for any connected induced subgraph H with γ(H) = 2.
(iii) γ(H) = γt (H) for any connected induced subgraph H with γ(H) > 2.
(iv) γ(H) = γcl (H) for any connected induced subgraph H with γ(H) > 2.
(v) γ(H) = γc (H) for any connected induced subgraph H with γ(H) > 2.
(vi) G is (C5 , P5 )-free.
Recently, Schaudt [110] studied the interdependence between the connected domination number and the total domination number, as explained
in the following theorem. In what follows, we define a connected graph as
non-trivial if it is not an isolated vertex.
Theorem 3.19 (Schaudt [110]). Let G be a graph. The following assertions
are equivalent.
30
Chapter 3. The price of connectivity and other prices
(i) For any non-trivial connected induced subgraph H of G, γc (H) 6 γt (H).
(ii) For any non-trivial connected induced subgraph H of G, γc (H) 6 Γt (H).
(iii) For any non-trivial connected induced subgraph H of G, γc (H) 6 γp (H).
(iv) For any non-trivial connected induced subgraph H of G, γc (H) 6 Γp (H).
(v) G is (P7 , C7 , F1 , F2 )-free (see Figure 3.8).
(vi) Any connected induced subgraph H of G has a connected dominating
subgraph X which is (P5 , G1 , G2 )-free (see Figure 3.9).
Figure 3.8: Graphs P7 , C7 , F1 and F2 .
Figure 3.9: Graphs P5 , G1 and G2 .
Observe that any connected graph G with γc (G) > 2 fulfills γc (G) >
γt (G). Accordingly, any (P7 , C7 , F1 , F2 )-free graph G with γc (G) > 2 satisfies
γc (G) = γt (G). Notice also that any connected split graph is in particular
(P7 , C7 , F1 , F2 )-free. Moreover, Bertossi [19] proved that the dominating set
problem in split graphs is N P -complete while Theorem 3.18 implies that
for any non-trivial connected (P5 , C5 )-free graph G, γ(G) = γc (G) = γt (G),
provided γ(G) > 2. Thus, the connected dominating set problem and the
total dominating set problem remain N P -complete even when restricted to
split graphs, or more generally in the class of connected (P7 , C7 , F1 , F2 )-free
graphs.
Chapter 4
The price of connectivity for
vertex cover
We study the interdependence of the vertex cover number, τ , and the connected vertex cover number, τc , both from a complexity-theoretic point of
view and in some hereditary classes of graphs. This chapter is essentially
based on a paper published in Discrete Mathematics & Theoretical Computer Science [32]. Let us first recall the basic observation.
Observation 4.1. For every graph G with at least one edge, it holds that
1 6 τc (G)/τ (G) < 2.
We define the price of connectivity (PoC) of a graph G as the ratio
τc (G)/τ (G), as Cardinal and Levy [41, 88] did.
This chapter is split into two parts. In the first part, we consider the
computational complexity of the problem of deciding whether the price of
connectivity of a graph given as input is bounded by a certain constant r.
We show the completeness of this problem with respect to a well-defined
complexity class in the polynomial hierarchy. In the second part, we investigate graph classes in which the price of connectivity of every induced
subgraph is bounded by a constant r with r ∈ [1, 2). Those classes will be
defined by forbidden induced subgraphs. The forbidden subgraph characterizations directly yield polynomial-time algorithms for recognizing graphs
in those classes. Many results in this area concern graph classes defined by
forbidden induced subgraphs. This line of research stems from the classical
theory of perfect graphs, for which the clique number and the chromatic
number are equal in every induced subgraph [67]. Moreover, we investigate
possible values of the price of connectivity for the vertex cover problem.
31
32
4.1
Chapter 4. The price of connectivity for vertex cover
Computational Complexity
The class ΘP2 = P NP[log] is defined as the class of decision problems solvable
in polynomial time by a deterministic Turing machine that allows using
O(log n) many queries to an N P -oracle, where n is the size of the input.
Theorem 4.2. Let 1 < r < 2 be a fixed rational number. Given a connected
graph G, the problem of deciding whether τc (G)/τ (G) 6 r is Θp2 -complete.
It is easy to see that the above decision problem belongs to Θp2 , since
both τ and τc can be computed using logarithmically many queries to an
N P -oracle by binary search. Thus, Theorem 4.2 is a negative result: loosely
speaking, it tells us that deciding whether the price of connectivity is bounded
by a certain constant is as hard as computing both τ and τc explicitely. And
this remains true even if the constant is not part of the input.
Our reduction stems from the decision problem whether for two given
graphs G and H it holds that τ (G) ≥ τ (H), which is known to be Θp2 complete due to Spakowski and Vogel [116]. It uses a gadgetry that allows
us to compare τ and τc on a single graph.
However, the problem of deciding of the price of connectivity is solved
in polynomial time for certain class of graphs, for instance in the class of
chordal graphs. Indeed, Escoffier, Gourvès and Monnot [57] proved that the
connected vertex cover decision problem is polynomial in this class of graphs.
Moreover, Rose, Lueker and Tarjan [105] show that an algorithm known as
lexicographic breadth-first search solves the vertex cover decision problem
in linear time by finding a perfect elimination ordering. Based on this, they
found an efficient recognition algorithm for chordal graphs.
Unfortunately, it seems that our proof does not apply to the case r = 1.
We leave it as an open problem to determine the computational complexity
of deciding whether τc (G)/τ (G) = 1 for a given graph G.
We now proceed to prove Theorem 4.2.
Lemma 4.3. Given a connected graph G with n vertices, one can construct
in linear time a graph G0 such that τ (G0 ) = n + τ (G) and τc (G0 ) = 2n.
Proof. With each vertex vS∈ V (G), associate three vertices v, v 0 , v 00 in V (G0 ),
and let E(G0 ) := E(G) ∪ v∈V (G) {vv 0 , v 0 v 00 }. A minimum vertex cover of G0
is the union of a minimum vertex cover of G with all vertices of the form
v 0 . On the other hand, a minimum connected vertex cover of G0 contains all
vertices v, v 0 .
Lemma 4.4. Given a graph G with n vertices and m edges, one can construct
in linear time a graph G0 such that τ (G0 ) = n + m + 1 and τc (G0 ) = n + m +
1 + τ (G).
33
4.1 Computational Complexity
Proof. For each edge e = uv ∈ E(G), define two vertices e, e0 of V (G0 ). For
each vertex v ∈ V (G), define three vertices v, v 0 , v 00 of V (G0 ). Finally, add
two vertices w, w0 to V (G0 ). The set of edges E(G0 ) is defined as follows.
For each edge e = uv ∈ E(G), the vertices e and e0 of V (G0 ) are adjacent,
and vertex e is adjacent to vertices u00 and v 00 . Similarly, for each vertex
v ∈ V (G), vertices v and v 0 of V (G0 ) are adjacent, and v is adjacent to
both v 00 and w. Finally, ww0 ∈ E(G0 ). The construction is illustrated in
Figure 4.1.
w0
u0
v0
w
e
u
v 00
u00
v
e0
Figure 4.1: Representation of an edge e = uv in the construction of G0 in
Lemma 4.4.
Since for each edge e ∈ E(G), the corresponding vertex e ∈ V (G0 ) is
adjacent to the degree-1 vertex e0 , it can be considered, without loss of
generality, to be part of any minimum vertex cover of G0 . The same remark
holds for vertices v ∈ V (G), and for the unique vertex w. Now the union
C ⊂ V (G0 ) of those vertices is a vertex cover of G0 , hence we have τ (G0 ) =
n + m + 1.
We now have to compute τc (G0 ). The previous vertex cover C is not
connected, as G0 [C] has exactly m + 1 connected components: one for each
edge of G, and one induced by w and the vertices v ∈ V (G). To make it
connected, we need to augment C with the fewest possible additional vertices
of the form v 00 for v ∈ V (G). Every such vertex v 00 will link the component
containing v to every vertex e ∈ E(G) of G0 such that v ∈ e. Hence the
minimum number of additional vertices to add to C is exactly the size τ (G)
of a minimum vertex cover of G. Thus τc (G0 ) = n + m + 1 + τ (G), as
claimed.
Proof of Theorem 4.2. Let r = r1 /r2 be a fixed rational number with 1 <
r < 2. It is clear that the problem is in Θp2 , so we proceed to the Θp2 hardness. Let G and H be two graphs. We reduce from the Θp2 -complete
problem of deciding, whether τ (G) ≥ τ (H) for two given graphs G and H
(see Spakowski and Vogel [116]).
We can assume that G and H are both connected. Otherwise, we choose a
vertex from each connected component of G (resp. H), add two new vertices
w and w0 , and put an edge from w to all chosen vertices and to w0 . Let G0
34
Chapter 4. The price of connectivity for vertex cover
(resp. H 0 ) be the graph obtained from G (resp. H) by this procedure. It is
clear that τ (G0 ) = τ (G) + 1 and τ (H 0 ) = τ (H) + 1. Hence, τ (G) ≥ τ (H)
if and only if τ (G0 ) ≥ τ (H 0 ). So we may assume that both G and H are
connected.
The reduction consists of the following five steps.
Step 1. Let v be any vertex of G. Starting with r2 disjoint copies of G,
we connect all r2 copies of v to a new vertex w. We then attach a pendent
vertex w0 to w. We denote the graph obtained by Gr2 . Let nG = |V (G)|.
Clearly, τ (Gr2 ) = r2 τ (G) + 1 and |V (Gr2 )| = r2 nG + 2.
Similarly we construct Hr1 from H. Let nH = |V (H)| and mH = |E(H)|.
Clearly, τ (Hr1 ) = r1 τ (H) + 1, |V (Hr1 )| = r1 nH + 2, and |E(Hr1 )| = r1 mH +
r1 + 1.
Step 2. We apply Lemma 4.3 to Gr2 to get G0r2 . We obtain
τ (G0r2 ) = |V (Gr2 )| + τ (Gr2 )
= r2 τ (G) + r2 nG + 3,
τc (G0r2 )
= 2|V (Gr2 )|
= 2r2 nG + 4.
We apply Lemma 4.4 to Hr1 to get Hr0 1 , and obtain
τ (Hr0 1 ) = |V (Hr1 )| + |E(Hr1 )| + 1
= r1 (nH + mH + 1) + 4,
τc (Hr0 1 )
= τ (Hr1 ) + |V (Hr1 )| + |E(Hr1 )| + 1
= r1 τ (H) + r1 (nH + mH + 1) + 5.
Step 3. We construct a new graph U by taking the disjoint union of G0r2
and Hr0 1 , and adding an edge uv such that u ∈ V (G0r2 ), v ∈ V (Hr0 1 ), and
both u and v are adjacent to a degree-1 vertex in G0r2 and Hr0 1 , respectively
(such vertices always exist).
By construction of U ,
τc (U ) = τc (G0r2 ) + τc (Hr0 1 )
= r1 τ (H) + r1 (nH + mH + 1) + 2r2 nG + 9,
τ (U ) = τ (G0r2 ) + τ (Hr0 1 )
= r2 τ (G) + r1 (nH + mH + 1) + r2 nG + 7.
Step 4. Let ϕ1 = 2r2 nG +r1 (nH +mH +1)+9 and ϕ2 = r2 nG +r1 (nH +
mH + 1) + 7. In this step, we determine two non-negative integers a and b
such that
a + 2b + ϕ1
= r.
(4.1)
a + b + ϕ2
Let p = max{|ϕ2 − ϕ1 |, |ϕ1 − 2ϕ2 |} > 0. Let a = p(2r2 − r1 ) + ϕ1 − 2ϕ2
and b = p(r1 − r2 ) + ϕ2 − ϕ1 . Since 1 < r < 2, note that 2r2 − r1 > 1 and
35
4.2 Structural results
r1 − r2 > 1. Therefore, a and b are non-negative integers. Now, we show
that a and b satisfy (4.1). The numerator in (4.1) becomes a + 2b + ϕ1 = pr1
whereas the denominator is a + b + ϕ2 = pr2 . Hence, the ratio equals to r.
This proves our claim.
Step 5. We now construct a graph U 0 from U as follows. Let v be a
vertex in U of degree 1 (such a vertex is always present). Let P 1 be the
graph obtained from the chordless path with vertex set {u1 , u2 , . . . , ua } by
attaching a pendent vertex to every member of {u1 , u2 , . . . , ua }. Let P 2 be
the graph obtained from the chordless path with vertex set {v1 , v2 , . . . , v2b }
by attaching a pendent vertex to every member of {v2 , v4 , . . . , v2b }. Let U 0
be the graph obtained from the disjoint union of U , P 1 , and P 2 by putting
an edge from v to u1 and to v1 . Since a, b ∈ O(ϕ1 + ϕ2 ), the above procedure
can be done in linear time in the size of the graph U .
By the construction of U 0 , we obtain
τc (U 0 ) = τc (U ) + a + 2b
= r1 τ (H) + a + 2b + ϕ1 ,
0
τ (U ) = τ (U ) + a + b
= r2 τ (G) + a + b + ϕ2 .
Recall that r = r1 /r2 . By (4.1), there is some non-negative integer c such
that a + 2b + ϕ1 = r1 c and a + b + ϕ2 = r2 c. Hence,
τc (U 0 )
r1 τ (H) + a + 2b + ϕ1
r1 τ (H) + r1 c
τ (H) + c
=
=
=r
.
0
τ (U )
r2 τ (G) + a + b + ϕ2
r2 τ (G) + r2 c
τ (G) + c
Thus, τc (U 0 )/τ (U 0 ) ≤ r if and only if τ (H) ≤ τ (G). This completes the
proof.
4.2
Structural results
Before establishing further results, we prove the following useful structural
lemma.
Lemma 4.5. Let G be a connected graph and let C be a vertex cover of G.
If (A, B) is a bipartition of the connected components of C with A, B 6= ∅,
there exists A ∈ A and B ∈ B such that the distance between A and B is
exactly 2.
Proof. Let (A, B) be a bipartition of the connected components of C. Since
C has a finite number of connected components, there exist A ∈ A and B ∈ B
such that the distance between them is minimum. Now we show that this
distance is 2. Otherwise, let x1 x2 · · · xn be a shortest path between A and B
with x1 ∈ A and xn ∈ B, where n > 4. In this case, no xi , i = 2, . . . , n − 1,
belongs to C. Otherwise, B is not one nearest component of B from A or
A is not one nearest component of A from B. Thus, the edge x2 x3 is not
covered by C, a contradiction with the definition of vertex cover.
36
Chapter 4. The price of connectivity for vertex cover
4.2.1
PoC-Perfect Graphs
As Theorem 4.2 shows, the class of connected graphs where τc (G)/τ (G) 6 r
holds (for any fixed rational r ∈ (1, 2)) is Θp2 -complete to recognize. However,
if we restrict our attention to hereditary graph classes, we are able to derive
the following results. Note that our characterizations yield polynomial-time
recognition algorithms, since the list of forbidden induced subgraphs is finite
in each case.
We first consider the hereditary class of graphs G for which τc (G) = τ (G),
referred to as PoC-Perfect graphs.
Theorem 4.6. The following assertions are equivalent for every graph G:
(i) For every induced subgraph H of G it holds that τc (H) = τ (H).
(ii) G is (P5 , C5 , C4 )-free.
(iii) G is chordal and P5 -free.
Proof. The class of graphs that are chordal and do not contain an induced
P5 is exactly the class of (C4 , C5 , P5 )-free graphs. Since τc (C4 )/τ (C4 ) =
τc (P5 )/τ (P5 ) = 3/2, and τc (C5 )/τ (C5 ) = 4/3, any graph that contains C4 ,
C5 , or P5 as an induced subgraph does not satisfy the first property. Hence
it remains to show that every graph that does not satisfy the first property
contains either a C4 , a C5 , or a P5 as induced subgraph.
Consider a graph G = (V, E) with τc (G) > τ (G). If G is disconnected, we
consider one of its connected components such that every minimum vertex
cover of this connected component induces at least two connected components. So, we suppose that G is connected. Pick such a minimum vertex
cover C ⊂ V that induces the smallest number of connected components.
There must exist two subsets A, B ⊆ C inducing two disjoint connected
components, and a vertex v, such that G[A ∪ B ∪ {v}] is connected, by
Lemma 4.5.
Consider the breadth-first search (BFS) trees TA ⊆ E in G[{v} ∪ A],
and TB ⊆ E in G[{v} ∪ B], both rooted at v. If both trees have height
at least two, then there is an induced P5 . Hence at least one of the trees,
say TB , has height one, that is, N (v) ∩ B = B. Now we consider the set
C 0 := (C \ {w}) ∪ {v}, where w is an arbitrary vertex of B. Since the
number of connected components in G[C 0 ] is strictly less than the number of
connected components in G[C], and C 0 is not bigger than C, the new set C 0
cannot be a vertex cover. Therefore, there must exist a vertex x ∈
/ C, such
that wx ∈ E is not covered by C 0 . Note that xv ∈
/ E (otherwise it would not
be covered by C). If x is adjacent to a vertex t ∈ A that is itself adjacent
to v, then we have found a C4 . If x is adjacent to a vertex t ∈ A that is
not adjacent to v, then, using the shortest path from v to t in TA , we find a
cycle of length at least 5.
37
4.2 Structural results
Hence there remains the case where x is not adjacent to any vertex in A.
In that case, provided the height of TA is at least two, we can find a P5 . If
the height of TA is exactly one, then N (v) ∩ A = A, and we can do the same
reasoning as above, and show there is a vertex y ∈
/ C adjacent to a vertex
z ∈ A. Similarly, we can assume that y is not adjacent to any vertex in B.
Note that x 6= y because of non-adjacency between x and A and yz ∈ E
with z ∈ A. Hence, the path going from x to y through A, v, and B is an
induced P5 .
By this characterization, the problem of deciding whether τc (H)/τ (H) =
1 holds for every induced subgraph H of a given graph is solved in polynomial
time. In fact, this problem is equivalent to recognizing a P5 -free and chordal
graph. This problem is clearly solvable in polynomial time.
The above characterization tells us that the class of PoC-Perfect graphs
properly contains two well-known classes of graphs: split graphs and trivially
perfect graphs (see [26] for further reference on these classes). Moreover, it
gives rise to the following definition.
4.2.2
PoC-Near-Perfect Graphs
Let r ∈ [1, 2). A graph G is said to be PoC-Near-Perfect with threshold r
if every induced subgraph H of G satisfies τc (H) 6 r · τ (H). This defines a
hereditary class of graphs for every choice of r. Theorem 4.6 gives a forbidden
induced subgraph characterization of this class for r = 1. Our second result
gives such a characterization for r = 4/3.
Note that τc (C5 )/τ (C5 ) = 4/3 and τc (P5 )/τ (P5 ) = τc (C4 )/τ (C4 ) = 3/2.
Hence any graph class that does not forbid either C4 , C5 or P5 contains a
graph G such that τc (G)/τ (G) > 4/3. Therefore, the characterization of
Theorem 4.6 also holds for the class of graphs G such that every induced
subgraph H satisfies τc (H) 6 r · τ (H), for any r ∈ [1, 4/3). We now turn
our attention to r = 4/3, which is the next interesting threshold after r = 1.
Theorem 4.7. The following assertions are equivalent for every graph G:
(i) For every induced subgraph H of G it holds that τc (H) 6
4
3
· τ (H).
(ii) G is (P5 , C4 )-free.
To prove Theorem 4.7, we need to introduce the next notation and to
use the following lemma.
If G is not connected, there always exists a connected component of G
such that the price of connectivity of G is smaller than the price of connectivity of this connected component because a+b
c+d is in the non-oriented interval
a b
[ c , d ], for any a, b, c, d ∈ N0 . Therefore, we consider that G is connected. Let
C be a vertex cover of a graph G. Let C 0 be the vertex set of a connected
component of G[C]. We define PC (C 0 ) to be the set of vertices v ∈ V (G)
such that N [v] ∩ C ⊆ C 0 . It is clear that C 0 ⊆ PC (C 0 ).
38
Chapter 4. The price of connectivity for vertex cover
Lemma 4.8. Let S1 , S2 , . . . , Sk be the vertex sets of connected components
of a vertex cover C. There exists at least one PC (Si ) that is not a cutset of
G, i.e. G − PC (Si ) is connected.
Proof. We consider the graph H defined by
V (H) = {PC (Si )|i = 1, . . . , k}
and
E(H) = {PC (Si )PC (Sj )|N (PC (Si )) ∩ N (PC (Sj )) 6= ∅}.
Note that the sets PC (Si ), 1 6 i 6 k, are disjoint and induce a connected
subgraph of G each. Because C is a vertex cover, H is connected. Because
every connected graph contains a vertex without being a cutvertex, there
exists at least one PC (Si ) which is not a cutvertex of H. Therefore, PC (Si )
is not a cutset of G.
Proof of Theorem 4.7. Since the price of connectivity of P5 and C4 equals
3/2, any graph that contains C4 or P5 as an induced subgraph does not
satisfy the first property. Hence, it remains to show that every graph that
does not satisfy the first property contains either a C4 or a P5 as induced
subgraph.
Let G be a (P5 , C4 )-free graph. As explained before, we can suppose
that G is connected. We prove by induction on the number of connected
components of a minimum vertex cover, say k, that the price of connectivity
of G is bounded by 4/3. Let C be such a vertex cover of G. Let S1 , S2 , . . . , Sk
be the vertex set of the connected components of G[C].
If C is connected (k = 1), then τc /τ = 1.
If k = 2, i.e. S1 and S2 are connected components of G[C], we have a
vertex x adjacent to S1 and S2 , by Lemma 4.5. Hence, τc (G) 6 τ (G) + 1. If
G does not satisfy the first property of the theorem, τ (G) = 2, i.e. S1 = {s1 }
and S2 = {s2 }. If s1 and s2 have at least two common neighbors, there is
an induced C4 . Otherwise x is the unique common neighbor of s1 and s2 .
Because τc (G) 6= 2 = τ (G), each connected component of G[C] has at least
one private neighbor, i.e. there exist x1 , x2 ∈
/ C ∪ {x} with x1 s1 , x2 s2 ∈ E.
Note that x1 x2 ∈
/ E because C is a vertex cover and x1 , x2 ∈
/ C. Therefore
G[{x1 , s1 , x, s2 , x2 }] is an induced P5 .
If S1 , S2 and S3 are connected components of G[C], we can suppose,
without loss of generality, that there exist x1 ∈ N (S1 ) ∩ N (S2 ) and x2 ∈
N (S2 ) ∩ N (S3 ), by Lemma 4.5. The vertex x2 is adjacent to S1 (or x1 is
adjacent to S3 ), otherwise G[C ∪ {x1 , x2 }] contains an induced P5 . Thus,
C ∪ {x2 }, resp. C ∪ {x1 }, is a connected vertex cover. Hence,
τc (G)
|C| + 1
4
6
6 .
τ (G)
|C|
3
4.2 Structural results
39
Now k > 4 and we assume that τc 6 4/3τ holds for every connected
(P5 , C4 )-free graph with a minimum vertex cover of at most k − 3 connected components. Let S1 , S2 , S3 , . . . Sk be the vertex sets of the connected components of G[C]. By Lemma 4.8 at least one of these sets, say
PC (S3 ), is not a cutset of G. By applying twice Lemma 4.8, two more of
these sets, say PC (S2 ), resp. PC (S1 ), are not a cutset of G − PC (S3 ), resp.
G − (PC (S2 ) ∪ PC (S3 )). Let C 0 = C \ (S1 ∪ S2 ∪ S3 ) and note that C 0 is
a minimum vertex cover of G0 = G − (PC (S1 ) ∪ PC (S2 ) ∪ PC (S3 )). By the
induction hypothesis, there is a minimum connected vertex cover of G0 , say
Cc0 , with |Cc0 | 6 4/3|C 0 |.
We show that there exists a connected vertex cover Cc of G with |Cc | 6
|S1 | + |S2 | + |S3 | + |Cc0 | + 1, built from S1 , S2 , S3 and Cc0 . Indeed, we have
τc (G)
|S1 | + |S2 | + |S3 | + 1 + |Cc0 |
6
τ (G)
|S1 | + |S2 | + |S3 | + |C 0 |
|S1 | + |S2 | + |S3 | + 1 |Cc0 |
6 max
, 0
|S1 | + |S2 | + |S3 |
|C |
4
6 .
3
We refer to Cc0 as S4 for ease of writing. We observe that the set V (G) \ (S1 ∪
S2 ∪ S3 ∪ S4 ) is an independent set because its complement is a vertex cover
of G. We complete the proof with the following case distinction.
Case 1. There exists one component, say S1 , such that the other connected components are a distance 2 from S1 . Let xi be a vertex adjacent to
S1 and Si , for i = 2, 3, 4.
Case 1.1. It holds that x2 = x3 = x4 . We have immediately one vertex
to connect S1 , S2 , S3 and S4 .
Case 1.2. Two of the xi are equal, and the third one is distinct from
them. We can suppose without loss of generality that x3 = x4 . We suppose
by the previous case that x2 is not adjacent to S3 ∪ S4 and x3 is not adjacent
to S2 . The graph G[S2 ∪S1 ∪S3 ∪{x2 , x3 }] contains again a P5 not necessarily
induced. Thus, there must be an edge between x2 and S3 . But then, we have
an induced P5 in G[S2 ∪ S3 ∪ S4 ∪ {x2 , x3 }], a contradiction.
Case 1.3. The xi are mutually distinct and xi is not adjacent to Sj for
i 6= j (otherwise we are in the previous cases). Since G[S1 ∪S3 ∪S4 ∪{x3 , x4 }]
contains an induced P5 , we are in the next case.
Case 2. Up to a renaming of the Si , the distance between Si and Si+1 is
2, i = 1, 2, 3. Let xi be a vertex adjacent to Si and Si+1 , i = 1, 2, 3. Because
G is P5 -free, S1 must be adjacent to x2 or x1 must be adjacent to S3 . Hence,
we are in Case 1.
By Theorem 4.7, r = 3/2 is the next interesting threshold after r =
4/3. Our third result states that the list of forbidden induced subgraphs
for threshold r = 3/2 is (C6 , P7 , ∆1 , ∆2 ), where ∆1 is the flower made of
40
Chapter 4. The price of connectivity for vertex cover
two cycles of size 4 sharing a same vertex, and ∆2 is obtained from ∆1 by
removing one edge incident to the vertex of degree 4 (see Figure 4.2). A
flower is a connected graph G with only one cutvertex v such that G − v is
a linear forest and every path x1 · · · xk of G − v is connected to v by x1 and
xk .
Figure 4.2: Graphs ∆1 (on the left) and ∆2 (on the right).
Theorem 4.9. The following assertions are equivalent for every graph G:
(i) For every induced subgraph H of G it holds that τc (H) 6
3
2
· τ (H).
(ii) G is (P7 , C6 , ∆1 , ∆2 )-free.
To prove Theorem 4.9, we need to use the following lemma.
Lemma 4.10. Let G be a connected (C6 , P7 , ∆1 , ∆2 )-free graph, let C be a
vertex cover of G such that G[C] has exactly three connected components,
and let G contain an induced cycle of length 7 intersecting all connected
components of G[C]. Then there exists a connected vertex cover Cc such that
|Cc | 6 |C| + 1
|Cc | = 6
if |C| > 4,
if |C| = 4.
Proof. Let x1 x2 x3 x4 x5 x6 x7 be an induced cycle intersecting the three connected components of C, say S1 , S2 and S3 . Without loss of generality, we
can suppose x1 ∈ S1 , x3 ∈ S2 and x5 , x6 ∈ S3 (see Figure 4.3). We can
assume that no vertex is adjacent to S1 , S2 and S3 , otherwise the result is
obviously true.
x5
x6
x4
S3
x7
S2 x3
x1 S1
x2
Figure 4.3: G contains an induced C7 intersecting all components of a vertex
cover.
41
4.2 Structural results
If |N (x1 ) ∩ N (x3 )| > 2, |N (x1 ) ∩ N (x6 )| > 2, or |N (x5 ) ∩ N (x3 )| > 2,
then we have an induced subgraph ∆2 .
Otherwise N (x1 )∩N (x3 ) = {x2 } and N (x1 )∩N (x6 ) = {x7 } and N (x5 )∩
N (x3 ) = {x4 }. We distinguish several cases, depending on the cardinality of
S3 .
The first case is |S3 | = 2. If |S1 | = |S2 | = 1, i.e., |C| = 4, we have the
connected vertex cover S1 ∪ S2 ∪ S3 ∪ {x2 , x4 } of six vertices.
We can suppose |S2 | > 1. Then every vertex of S2 is adjacent to both x2
and x4 . Indeed, if an edge yz of S2 has one endpoint, say y, adjacent to both
x2 and x4 , then z must be adjacent to both x2 and x4 , otherwise G contains
an induced P7 . Let x be a vertex of S2 \ {x3 } which is not a cutvertex of
G[S2 ], i.e. Y = S1 ∪ S3 ∪ (S2 \ {x}) ∪ {x2 , x4 } induces a connected graph.
Such a vertex x always exists (for example, a leaf of a spanning tree of G[S2 ]
which is different from x3 ). If Y is not a vertex cover, there exists a vertex
t∈
/ Y adjacent to x. Note that t is distinct from x7 , because no vertex is
adjacent to S1 , S2 and S3 , and t is not adjacent to x1 or x5 , because G is
∆2 -free. Moreover t is not adjacent to x6 since G is C6 -free. Therefore we
have an induced P7 subgraph (see Figure 4.4).
x5
x6
x4
S2 x3
S3
x7
x
t
x1 S1
x2
Figure 4.4: G contains an induced C7 and P7 intersecting all components of
a vertex cover.
In the second case, |S3 | > 2. If there exists a vertex p1 in S3 \ {x5 , x6 }
which is adjacent to neither x4 nor x7 , we claim that there is an induced
P7 subgraph. Indeed, the distance in S3 ∪ {x4 , x7 } between this vertex p1
and x4 , resp. p1 and x7 , is at least 2. Without loss of generality, we suppose
that p1 is closer to x4 than x7 . Let p1 p2 · · · ps x4 be a shortest path between
p1 and x4 through S3 . By definition, for i = 1, . . . , s − 1, pi is adjacent
neither to x4 nor x7 . Note that ps is not adjacent to x7 because G is C6 -free.
Hence, G[{x7 , x1 , x2 , x3 , x4 , ps . . . , p2 , p1 }] contains an induced P7 . Let y ∈
S3 \{x5 , x6 } be such that y is not a cutvertex of G[S3 ]. Such a vertex y always
exists (for example, a leaf of a spanning tree rooted in x5 of G[S3 ] which is
different from x5 and x6 ). We can suppose that y is adjacent to x4 . Because
G is C6 -free, y is not adjacent to x7 . If Y = S1 ∪ S2 ∪ (S3 \ {y}) ∪ {x7 , x4 }
is not a vertex cover, there exists a vertex t ∈
/ Y adjacent to y. Note that
42
Chapter 4. The price of connectivity for vertex cover
t is distinct from x2 , because no vertex is adjacent to S1 , S2 and S3 (see
Figure 4.5). If t is adjacent to x1 (resp. x3 ), we have an induced C6 subgraph
(resp. ∆2 ).
x5
x6
y
x4
S2 x3
S3
x7
t
x1 S1
x2
Figure 4.5: Y = S1 ∪ S2 ∪ (S3 \ {y}) ∪ {x4 , x7 } is not a vertex cover of G.
Otherwise we have an induced P7 subgraph.
Proof of Theorem 4.9. If G contains one of the four forbidden induced subgraphs, say H, then τc (H)/τ (H) = 5/3. It remains to prove that the price
of connectivity of a (P7 , C6 , ∆1 , ∆2 )-free graph is bounded by 3/2. So let
G be a (P7 , C6 , ∆1 , ∆2 )-free graph. We can suppose that G is connected.
Otherwise we consider one of its connected components with the highest
price of connectivity. The proof is by induction on the number of connected
components of a minimum vertex cover. Let C be a minimum vertex cover
of G with the minimum number of connected components, say k.
If C is connected (k = 1), then τc /τ = 1.
If k = 2, by Lemma 4.5,
τc /τ 6
|C| + 1
1
1
3
61+
61+ = .
|C|
|C|
2
2
Now let k > 3. We may assume that τc 6 3/2τ holds for every (P7 , C6 , ∆1 ,
∆2 )-free graph with a minimum vertex cover of at most k − 2 connected
components. Let S1 , S2 , S3 , . . . , Sk be the vertex set of the connected components of G[C]. By Lemma 4.8, we may assume that the set PC (S2 ), is not
a cutset of G, and that the set PC (S1 ) is not a cutset of G0 = G − PC (S2 ).
Note that the set C 0 = C \ (S1 ∪ S2 ) is a minimum vertex cover of the
graph G00 = G − (PC (S1 ) ∪ PC (S2 )). By the induction hypothesis, there is a
minimum connected vertex cover of G00 , say Cc0 , with |Cc0 | 6 3/2|C 0 |.
We show that there exists a connected vertex cover Cc of G such that
|Cc | 6 |S1 | + |S2 | + |Cc0 | + 1, built from S1 , S2 and Cc0 . Indeed, we have
τc (G)
|S1 | + |S2 | + 1 + |Cc0 |
|S1 | + |S2 | + 1 |Cc0 |
3
6
6 max
, 0 6 .
0
τ (G)
|S1 | + |S2 | + |C |
|S1 | + |S2 |
|C |
2
We refer to the set Cc0 as S3 for the ease of writing. We can suppose that
there does not exist any single vertex to connect S1 , S2 , and S3 , otherwise
43
4.2 Structural results
S2
x1
S2
x2
S1
x1
S3
(a) Initial case
S1y
1
x2
y
z
z 3 S3
(b) Two private edges of a vertex cover
Figure 4.6: Three components of a vertex cover to connect by adding only
one vertex.
the result is obviously true. Without loss of generality, there is a vertex xi
adjacent only to Si and Si+1 , i = 1, 2, such that x1 6= x2 (see Figure 4.6a).
Note that x1 and x2 are not adjacent because C is a vertex cover. Let
y1 ∈ S1 and z3 ∈ S3 be two vertices such that y1 and z3 are not cutvertices
in G[S1 ∪ S2 ∪ S3 ∪ {x1 , x2 }]. If S1 ∪ S2 ∪ (S3 \ {z3 }) ∪ {x1 , x2 } or (S1 \
{y1 }) ∪ S2 ∪ S3 ∪ {x1 , x2 } is a vertex cover, then τc (G)/τ (G) 6 3/2. Thus,
there exist two edges, say y1 y and z3 z, with y, z ∈
/ S1 ∪ S2 ∪ S3 ∪ {x1 , x2 }
(see Figure 4.6b). Note that y can be equal to z.
Now, we discuss the adjacency of y with S3 and S2 .
Case 1. The vertex y is adjacent to S3 . Thus, y is not adjacent to S2 . If
the shortest induced cycle via S1 ∪ S2 ∪ S3 ∪ {x1 , x2 , y} is of length 6 or more
than 8, we have an induced C6 or a P7 . Thus the shortest induced cycle via
the three connected components has 7 vertices. By Lemma 4.10, it is clear
that τc (G)/τ (G) 6 3/2 if |S1 | + |S2 | + |S3 | > 4. Otherwise S1 , S2 and S3 are
three connected components of the initial vertex cover C. Thus, by Lemma
4.10, τc (G)/τ (G) 6 6/4 = 3/2.
The cases that z is adjacent to S1 or y = z are dealt with similarly.
Case 2. The vertex y is adjacent to S2 and z is not adjacent to S2 . Since
G[S1 ∪ S2 ∪ S3 ∪ {x1 , x2 , y, z}] does not contain an induced P7 , there exists
t ∈ N (x1 ) ∩ N (x2 ) ∩ S2 and t is adjacent to y. Hence, we have an induced
∆2 .
Case 3. Both y and z are adjacent to S2 . Thus y (resp. z) is not
adjacent to S3 (resp. S1 ). Let P be a shortest path from z to y that goes
through S3 , {x2 }, S2 , {x1 }, and S1 . If P has 7 vertices, then we have an
induced P7 , ∆1 or ∆2 subgraph, depending on the adjacency of y and z with
S2 . If P contains at least nine vertices, we have an induced P7 subgraph in
G[S1 ∪ S2 ∪ S3 ∪ {x1 , x2 }]. Otherwise P has exactly 8 vertices. There are
two possibilities.
Case 3.1. S1 (or S3 ) contains an edge of P (see Figure 4.7a). Thus we
have an induced P7 or ∆2 in G[{z, x1 , x2 } ∪ S1 ∪ S2 ∪ S3 }], depending on the
adjacency between S2 and z.
Case 3.2. S2 contains an edge of P (see Figure 4.7b), say vu. Then, if
z is not adjacent to v, G contains a P7 or a ∆2 , depending on the adjacency
44
Chapter 4. The price of connectivity for vertex cover
S2
v
x1
S1y
x2
y
z
1
S2
u
x1
z3S3
(a) Case 3.1.
S1
x2
y
z
z3
y1
S3
(b) Case 3.2.
Figure 4.7: Three components of a vertex cover to connect by adding only
one vertex.
between z and u. Thus z is adjacent to v. Hence, we have an induced P7
or ∆2 subgraph in G[S1 ∪ (S2 \ {u}) ∪ S3 ∪ {x1 , x2 , y, z}], depending on the
adjacency between y and v.
Case 4. The vertex y is adjacent to neither S2 nor S3 . We can suppose
that z is adjacent to neither S1 nor S2 (thus y 6= z). Thus, G contains an
induced P7 .
Since a chordal and P7 -free graph is (C6 , P7 , ∆1 , ∆2 )-free, we deduce the
following corollary from Theorem 4.9.
Corollary 4.11. If G is a chordal, P7 -free graph, then for every induced
subgraph H of G, it holds that τc (H) 6 3/2 · τ (H).
4.2.3
PoC-Critical Graphs
We now turn our attention to critical graphs, that is, graphs G for which
the price of connectivity of any proper induced subgraph H of G is strictly
smaller than the price of connectivity of G. These are exactly the graphs
that can appear in a forbidden induced subgraph characterization of the PoCnear-perfect graphs for some threshold r ∈ [1, 2). A perhaps more tractable
class of graphs is the class of strongly critical graphs, defined as the graphs
G for which every proper (not necessarily induced) subgraph H of G has a
price of connectivity that is strictly smaller than the price of connectivity of
G. It is clear that every strongly critical graph is critical, but the converse
is not true. For instance, C5 is critical, but not strongly critical. Notice that
every (strongly) critical graph is connected.
PoC-Critical Chordal Graphs: Let T be a tree. We call T special if
it is obtained from another tree by subdividing each edge exactly once and
then attaching a pendent vertex to every leaf of the resulting graph (see
Figure 4.8 for an example).
Our following result characterizes the class of (strongly) critical chordal
graphs.
4.2 Structural results
45
Figure 4.8: A special tree constructed from another tree (vertices indicated
by filled circles) by subdividing each edge exactly once (subdivision vertices
are indicated by hollow circles) and by attaching a pendent vertex (indicated
by squares) to every leaf of the resulting graph.
Theorem 4.12. For a chordal graph G, the following assertions are equivalent:
(i) G is a special tree.
(ii) G is strongly critical.
(iii) G is critical.
Lemma 4.13. Let G be a critical graph. For every minimum vertex cover
C of G, there does not exist a bridge of G with endpoints in C.
Proof. Suppose there exists a bridge xy with x, y ∈ C. The removal of the
edge xy results in two connected subgraphs of G, which we denote by G1
resp. G2 . We can assume that x ∈ V (G1 ) and y ∈ V (G2 ). Let G01 be the
graph obtained from G1 by attaching a pendent vertex to x. Similarly let
G02 be the graph obtained from G2 by attaching a pendent vertex to y.
We observe that C ∩ V (G1 ) is a vertex cover of G01 and C ∩ V (G2 ) is a
vertex cover of G02 . Thus
τ (G) > τ (G01 ) + τ (G02 ).
(4.2)
On the other hand, let Cc,1 be a minimum connected vertex cover of G01
and Cc,2 be a minimum connected vertex cover of G02 . We can assume that
Cc,1 ⊆ V (G1 ) and Cc,2 ⊆ V (G2 ). It is clear that x ∈ Cc,1 and y ∈ Cc,2 . Thus
Cc,1 ∪ Cc,2 is a connected vertex cover of G. Since Cc,1 ∩ Cc,2 = ∅,
τc (G) 6 τc (G01 ) + τc (G02 ).
(4.3)
But (4.2) and (4.3) say that
τc (G)/τ (G) 6 max{τc (G01 )/τ (G01 ), τc (G02 )/τ (G02 )}.
(4.4)
Since both G01 and G02 are isomorphic to induced subgraphs of G, (4.4) is a
contradiction to the fact that G is critical.
Proof of Theorem 4.12. It is obvious that (ii) implies (iii). First, we prove
that (iii) implies (i), that is, every critical chordal graph is a special tree.
For this, let G be a critical chordal graph. Hence, G is connected.
46
Chapter 4. The price of connectivity for vertex cover
If the chordal graph G is not a tree, then G contains a triangle as a
subgraph and every minimum vertex cover of G contains at least two vertices
of this triangle. Let v be a vertex that is both in the triangle and in a
minimum vertex cover. Then we have τ (G) = τ (G − v) + 1 and also τc (G) 6
τc (G − v) + 1, implying that G is not critical. Therefore, G is a tree.
Let C be a minimum vertex cover of G.
First we show that C is an independent set. Suppose there are x, y ∈ C
such that xy ∈ E. Since G is a tree, xy is a bridge, a contradiction with
Lemma 4.13.
Now we show that every member of V \ C has degree at most two. For
this, let x ∈ V \ C. Suppose that |N (x)| > 3. Let X1 , X2 , . . . , Xk be the
vertex sets of the connected components of G − x. By assumption, k > 3.
Let
k
[
H1 = G −
Xi
i=3
and
H2 = G − (X1 ∪ X2 ).
We observe that
τ (G) > τ (H1 ) + τ (H2 ).
(4.5)
Since x is a cutvertex of H1 , x is contained in every connected vertex
cover of H1 . Therefore
τc (G) 6 τc (H1 ) + τc (H2 ).
(4.6)
By the same argumentation from Lemma 4.13, (4.5) and (4.6) yield a
contradiction to the fact that G is critical. This proves that every vertex
of V \ C has at most two neighbors. By the discussion above, C is an
independent set and G is a tree. Moreover, the degree of every vertex in C
is at least two. Otherwise let v be a vertex of C with degree 1 and let u be
the neighbor of v. Because C is independent, u ∈
/ C. Because C is a vertex
cover, every neighbor of u is in C. Thus, Y = (C \ {v}) ∪ {u} is a minimum
vertex cover but Y is not independent, a contradiction. We prove that G is
a special tree. In fact, the initial tree H is defined as followed: V (H) = C
and E(H) = {uv|there exists a path Puv in (V (G) \ C) ∪ {v, u} from u to v}.
Because C is a vertex cover of G, if uv is an edge in H, then the length of
the path Puv in G is exactly 2. Moreover, two degree-1 vertices, say x and y,
cannot have the same neighbor since τc (G−x) = τc (G), τ (G−x) = τ (G) and
G is critical. The neighbor y of any degree-1 vertex x must have its degree
equal to 2. Otherwise, clearly τ (G − x) 6 τ (G). The vertex y is a cutvertex
of the tree G − x, hence τc (G − x) = τc (G). We obtain a contradiction since
G is critical. All in all, G is a special tree.
Now, we show that (i) implies (ii), that is, every special tree is strongly
critical. Let G be a special tree. It is easy to see that τc (G)/τ (G) = 2 −
4.2 Structural results
47
1/τ (G). If G is not strongly critical, then there exists a proper subgraph H
of G such that τc (H)/τ (H) > τc (G)/τ (G). We can suppose that such an H
is minimal for inclusion. Thus H is critical. By the previous argumentation,
H is a special tree. Therefore, τc (H)/τ (H) = 2 − 1/τ (H), but 2 − 1/τ (G) >
2 − 1/τ (H 0 ) for every proper special subtree H 0 of G, a contradiction. This
completes the proof.
PoC-Strongly-Critical Graphs: Our following result yields structural
constraints on the class of strongly critical graphs.
Theorem 4.14. Let G be a strongly critical graph.
(i) Every minimum vertex cover of G is independent. In particular, G is
bipartite.
(ii) If G has a cutvertex, then G is a special tree.
Theorem 4.14 follows from Lemma 4.15 and Lemma 4.16 presented below.
Lemma 4.15. Let G be a strongly critical graph. Then every minimum
vertex cover of G is an independent set. In particular, G is bipartite.
Proof. Let G be a strongly critical graph and let C be a minimum vertex
cover of G. We know that G is connected. Suppose that C is not an independent set. Thus, there are two adjacent vertices in C, say x and y.
By Lemma 4.13, xy cannot be a bridge of G. So G − xy is connected.
Let Cc be a minimum connected vertex cover of G − xy. Suppose that
{x, y} ∩ Cc 6= ∅. Then τc (G − xy) = τc (G), a contradiction with G strongly
critical. Thus {x, y} ∩ Cc = ∅. Hence Cc ∪ {x} is a connected vertex cover of
G with y ∈
/ Cc ∪ {x}. Moreover, Cc ∪ {x} is minimum since every minimum
connected vertex cover of G − xy contains neither x nor y.
We go back to the vertex cover C, let A = NG (y)∩C and B = NG (y)\C.
As x ∈ A, A 6= ∅. Since C is a minimum vertex cover and y ∈ C, B 6= ∅. Let
G0 be the graph obtained from G by the removal of all edges joining y to B.
Since Cc ∪ {x} is a connected vertex cover of G and y ∈
/ Cc , then NG (y) =
A ∪ B ⊆ Cc ∪ {x} and G0 is connected. As C \ {y} is a vertex cover of G0 ,
τ (G0 ) < τ (G). We prove that τc (G0 ) 6 τc (G) − 2. If τc (G0 ) > τc (G), we have
a contradiction since G is strongly critical. Otherwise τc (G0 ) = τc (G) − 1.
Then
τc (G0 )
τc (G0 ) + 1
τc (G)
τc (G)
>
=
>
,
0
0
0
τ (G )
τ (G ) + 1
τ (G ) + 1
τ (G)
a contradiction because G is strongly critical. Let Cc0 be a minimum connected vertex cover of G0 . To cover the edge xy, either x or y is in Cc0 . If
x∈
/ Cc0 , then y and at least one vertex from NG0 (y) = A are in Cc0 by connectivity. In each case, A ∩ Cc0 6= ∅. Therefore Cc0 ∪ {y} is a connected vertex
cover of G, a contradiction to the fact that |Cc0 ∪{y}| 6 τc (G0 )+1 6 τc (G)−1.
This completes the proof.
48
Chapter 4. The price of connectivity for vertex cover
Lemma 4.16. Let G be a strongly critical graph. If G has a cutvertex, it is
a special tree.
Proof. Let G = (V, E) be a strongly critical graph with a cutvertex. We
know that G is connected. Suppose that G is not a tree. Thus G has a nontrivial block. We can pick a cutvertex x and an edge e incident to x in this
block. The graph G − e is connected, by the choice of e. Every connected
vertex cover of G − e contains x, as x is a cutvertex of G − e. Hence,
every connected vertex cover of G − e covers e. Thus τc (G − e) > τc (G), a
contradiction with G strongly critical. Hence, G is a tree. In particular, G
is chordal.
The conclusion then follows from Theorem 4.12.
4.2.4
Aside: values of the price of connectivity
In this section, we answer a natural question: for which value r ∈ [1, 2),
does there exist a graph whose price of connectivity is exactly r? Of course,
we are interested only in rational values since the price of connectivity is
defined by a ratio between two integers. The following theorem shows that
for each rational value r, there exists a (P6 , C6 )-free graph G such that
τc (G)/τ (G) = r.
Theorem 4.17. Let r be a rational number in [1, 2). There exists a (P6 , C6 )free graph G such that τc (G)/τ (G) = r.
Proof. Assume that r = pq , with p and q two integers. Let s = p−q. Consider
Fp,q the graph built from the flower, made of s cycles on 4 vertices sharing a
same vertex v, with q − s − 1 paths of length 2 attached to v, as illustrated
by Figure 4.9. Clearly, Fp,q is (P6 , C6 )-free.
Figure 4.9: The set of black vertices indicates a minimum vertex cover (respectively a minimum connected vertex cover) of F8,5 .
We will prove that τ (Fp,q ) = q and τc (Fp,q ) = p. Note that s < q since
r < 2. Hence, q − 1 − s > 0. A minimum vertex cover consists of the center
and all vertices at distance 2 from the center, as illustrated by Figure 4.9.
This implies that τ (Fp,q ) = s + (q − 1 − s) + 1 = q. Furthermore, a minimum
connected vertex cover consists of all vertices of degree > 1 except one vertex
for each petal, which means that τc (Fp,q ) = 2s + 1 + q − 1 − s = p.
Chapter 5
The price of connectivity for
domination
In parallel to the study of the price of connectivity for the vertex cover
problem, let us examine the interdependence of the domination number γ
and the connected domination number γc both from a complexity-theoretic
point of view and in some hereditary classes of graphs. This chapter is
partly based on a paper published in Discrete Applied Mathematics [36].
Many proofs in this chapter are similar to those of the previous chapter.
Duchet and Meyniel [55] observed that for every graph G it holds that
γc (G) 6 3γ(G) − 2. As an immediate consequence, every graph G satisfies
γc (G)/γ(G) < 3,
(5.1)
that is, the price of connectivity for the dominating set problem of any graph
G is strictly bounded by 3.
Our starting point is the following result by Zverovich [126] on the class of
(P5 , C5 )-free graphs, wherein the domination is also N P -complete, as proved
by Bertossi [19], and by Corneil and Perl [48].
Theorem 5.1 (Zverovich [126]). The following assertions are equivalent for
every graph G.
(i) For every induced subgraph H of G it holds that γc (H) = γ(H).
(ii) G is (P5 , C5 )-free.
Firstly, we study the computational complexity of the problem of deciding
whether the price of connectivity of a graph given as input is bounded by a
certain constant r.
Secondly, we prove bounds on the price of connectivity in the class of
(Pk , Ck )-free graphs for k > 6. Actually, we study classes of graphs whose
price of connectivity for any induced subgraphs is bounded by a constant
49
50
Chapter 5. The price of connectivity for domination
r ∈ (1, 3). For a small value of r, those classes will be defined by a finite list
of forbidden induced subgraphs. Hence, the forbidden subgraph characterizations directly yield polynomial-time algorithms for recognizing graphs in
those classes.
Finally, we bound the price of connectivity depending on the radius or
the diameter of the graph. Moreover, for any rational number r ∈ [1, 3), we
find a (P9 , C9 )-free graph with price of connectivity exactly r.
5.1
Computational Complexity
The class ΘP2 , sometimes denoted P NP[log] , is defined as the class of decision
problems solvable in polynomial time by a deterministic Turing machine that
allows using O(log n) many queries to an N P -oracle, where n is the size of
the input.
Theorem 5.2. Let 1 < r < 3 be a fixed rational number. Given a connected
graph G, the problem of deciding whether γc (G)/γ(G) 6 r is Θp2 -complete.
It is easy to see that the above decision problem belongs to Θp2 , since
both γ(G) and γc (G) can be computed using logarithmically many queries
to an N P -oracle by binary search. Thus, Theorem 5.2 is a negative result:
loosely speaking, it tells us that deciding whether the ratio of γc (G) and
γ(G) is bounded by a certain constant is as hard as computing both γc (G)
and γ(G) explicitly, and this remains true even if the constant is not part of
the input.
Our reduction is from the decision problem whether for two given graphs
G and H it holds that τ (G) > τ (H), which is known to be Θp2 -complete due
to Spakowski and Vogel [116]. To simplify the construction, we may, without
loss of generality, assume that G and H are both connected: otherwise we
may add an isolated vertex to G and then a dominating vertex, and proceed
similarly with H. Denoting the resulting graphs by G0 and H 0 , we see that
τ (G0 ) = τ (G) + 1 and τ (H 0 ) = τ (H) + 1.
Before proving Theorem 5.2, we need the following two lemmas.
Lemma 5.3. Given a connected graph G with n > 2 vertices, one can construct in linear time a graph G0 such that γ(G0 ) = n + τ (G) and γc (G0 ) =
3n − 1.
Proof. To each vertex v ∈ V (G), associate three vertices v, v 0 , v 00 in V (G0 ).
Moreover, for each edge e ∈ E(G), define a vertex e of V (G0 ). We may treat
V (G) and E(G) as subsets of V (G0 ). Let
E(G0 ) :=
[
{ue, ve} ∪
e=uv∈E(G)
[
v∈V (G)
{vv 0 , v 0 v 00 }.
5.1 Computational Complexity
51
Let D be a minimum dominating set of G0 . Since every vertex of the
form v 00 is of degree 1, we can assume that v 0 ∈ D for every v ∈ V (G).
Assume that e ∈ D for some e = uv ∈ E(G). Since u0 , v 0 ∈ D, the set
D \ {e} dominates all vertices of G0 except e. Thus (D \ {e}) ∪ {u} is a
minimum dominating set of G0 . So we may assume D ∩ E(G) = ∅. Hence,
D ∩ V (G) is a vertex cover of G, and so γ(G0 ) = |D| > n + τ (G).
Similarly, if T is a vertex cover of G, the set {v 0 | v ∈ V (G)} ∪ T is a
dominating set of G. Hence, γ(G0 ) 6 n + τ (G). This gives γ(G0 ) = n + τ (G).
To see that γc (G0 ) = 3n − 1, let C be a minimum connected dominating
set of G0 . Recall that n > 2 and G contains at least one edge. Thus, the
vertices v and v 0 , for every v ∈ V (G), are cutvertices of G0 and therefore
contained in C. Moreover, C contains no vertex of the form v 00 .
Observe that the set C ∩E(G) defines a minimum spanning tree of G, and
so |C ∩E(G)| = n−1. Summarizing, γc (G0 ) = |C| = 2n+n−1 = 3n−1.
Lemma 5.4. Given a graph G with n vertices and m edges, one can construct
in linear time a graph G0 such that γ(G0 ) = n + m + 1 and γc (G0 ) = n + m +
1 + τ (G).
Proof. We start from the construction given in the proof of Lemma 5.3. We
add two new vertices w, w0 and, for every e ∈ E(G), a vertex e0 . Then we
put edges joining w to every vertex of the form v 0 , where v ∈ V (G), and to
w0 . We also put an edge joining e and e0 , for every e ∈ E(G). The resulting
graph is called G0 .
For each edge e ∈ E(G), the corresponding vertex e ∈ V (G0 ) is adjacent
to the degree-1 vertex e0 . Thus, we can consider without loss of generality
only the minimum dominating sets of G0 that contain all vertices from E(G).
The same remark holds for every vertex v 0 , where v ∈ V (G), and for w. Now
the set D ⊆ V (G0 ) of those vertices is a dominating set of G0 , hence we have
γ(G0 ) = n + m + 1.
γc (G0 ) remains to be computed. The previous dominating set D is not
connected, as G0 [D] has exactly m + 1 connected components: one for each
edge of G, and one induced by w and the vertices of the form v 0 . To make D
connected, we need to add the fewest possible additional vertices v ∈ V (G).
Every such vertex v will link the component containing v to every vertex
e ∈ E(G) of G0 such that v ∈ e. Hence the minimum number of additional
vertices to add to C is exactly the size τ (G) of a minimum vertex cover of
G. Hence γc (G0 ) = n + m + 1 + τ (G).
Proof of Theorem 5.2. Let r = r1 /r2 be a fixed rational number with 1 <
r < 3. We have already argued why the decision problem is in Θp2 , so we
proceed to proving the Θp2 -hardness. Let G and H be two graphs. We reduce from the Θp2 -complete decision problem of deciding whether τ (G) >
τ (H) [116]. We may, without loss of generality, assume that G and H are
52
Chapter 5. The price of connectivity for domination
both connected, as described previously. The reduction consists of the following five steps.
Step 1. We choose an arbitrary vertex v ∈ V (G). Starting with r2 disjoint
copies of G, we connect all r2 copies of v to a new vertex w. We then
attach a pendent vertex w0 to w. We denote by Gr2 the resulting graph. Let
nG = |V (G)|. Clearly, τ (Gr2 ) = r2 τ (G) + 1 and |V (Gr2 )| = r2 nG + 2.
Similarly we construct Hr1 from H. Let nH = |V (H)| and mH = |E(H)|.
Clearly, τ (Hr1 ) = r1 τ (H) + 1, |V (Hr1 )| = r1 nH + 2, and |E(Hr1 )| = r1 mH +
r1 + 1.
Step 2. We apply Lemma 5.3 to Gr2 to get G0r2 . The following results are
obtained:
γ(G0r2 ) = |V (Gr2 )| + τ (Gr2 )
= r2 τ (G) + r2 nG + 3,
γc (G0r2 )
= 3|V (Gr2 )| − 1
= 3r2 nG + 5.
Then, we apply Lemma 5.4 to Hr1 to get Hr0 1 , and obtain
γ(Hr0 1 ) = |V (Hr1 )| + |E(Hr1 )| + 1
= r1 (nH + mH + 1) + 4,
γc (Hr0 1 )
= τ (Hr1 ) + |V (Hr1 )| + |E(Hr1 )| + 1
= r1 τ (H) + r1 (nH + mH + 1) + 5.
Step 3. We construct a new graph U by taking the disjoint union of two
copies of G0r2 and two copies of Hr0 1 , picking a vertex from each of these four
graphs that is adjacent to a degree-1 vertex, and then adding any possible
edge between these four vertices. Observe that there exists a minimum
connected dominating set in each of the four copies containing the picked
vertex.
By the construction of U ,
γc (U ) = 2γc (G0r2 ) + 2γc (Hr0 1 )
= 2r1 τ (H) + 2(r1 (nH + mH + 1) + 3r2 nG + 10),
γ(U ) = 2γ(G0r2 ) + 2γ(Hr0 1 )
= 2r2 τ (G) + 2(r1 (nH + mH + 1) + r2 nG + 7).
Step 4. Let
ϕ1 = r1 (nH + mH + 1) + 3r2 nG + 10,
ϕ2 = r1 (nH + mH + 1) + r2 nG + 7.
53
5.2 Structural results
Let p = max{|ϕ1 − 3ϕ2 |, |ϕ2 − ϕ1 |}, and
a = p(3r2 − r1 ) + (ϕ1 − 3ϕ2 ),
b = p(r1 − r2 ) + (ϕ2 − ϕ1 ).
By definition of p, a > |ϕ1 − 3ϕ2 |(3r2 − r1 ) + (ϕ1 − 3ϕ2 ) > |ϕ1 − 3ϕ2 |(3r2 −
r1 − 1) and b > |ϕ2 − ϕ1 |(r1 − r2 ) + (ϕ2 − ϕ1 ) > |ϕ2 − ϕ1 |(r1 − r2 − 1). Since
r1 > r2 and 3r2 > r1 , then a and b are non-negative integers. Moreover,
a, b ∈ O(ϕ1 + ϕ2 ). An easy calculation shows that
a + 3b + 2ϕ1 = 2pr1 and a + b + 2ϕ2 = 2pr2 .
(5.2)
We now construct a graph U 0 from U as follows. Let v be a degree-1
vertex in U (such a vertex is always present). Let P a be the graph obtained from the chordless path with vertex set {u1 , u2 , . . . , ua } by attaching
a pendent vertex to every member of {u1 , u2 , . . . , ua }. Let P b be the graph
obtained from the chordless path with vertex set {v1 , v2 , . . . , v3b } by attaching a pendent vertex to every member of {v3 , v6 , . . . , v3b }. Let U 0 be the
graph obtained from the disjoint union of U , P a and P b by putting an edge
from v to u1 and to v1 . Since a, b ∈ O(ϕ1 + ϕ2 ), the graph U 0 can be
constructed from G and H in linear time.
By the construction of U 0 , we obtain
γc (U 0 ) = γc (U ) + a + 3b
= 2r1 τ (H) + a + 3b + 2ϕ1
(5.2)
= 2r1 τ (H) + 2pr1 ,
and
γ(U 0 ) = γ(U ) + a + b
= 2r2 τ (G) + a + b + 2ϕ2
(5.2)
= 2r2 τ (G) + 2pr2 .
Recalling r = r1 /r2 , we have
γc (U 0 )
2r1 τ (H) + a + 3b + 2ϕ1
2r1 τ (H) + 2pr1
τ (H) + p
=
=
=r
.
0
γ(U )
2r2 τ (G) + a + b + 2ϕ2
2r2 τ (G) + 2pr2
τ (G) + p
Thus, γc (U 0 )/γ(U 0 ) 6 r if and only if τ (H) 6 τ (G). This completes the
proof.
5.2
Structural results
Before establishing further results, we prove the following lemma. Note that
this lemma is concerned with minimal connected dominating sets.
54
Chapter 5. The price of connectivity for domination
Lemma 5.5. Let G be a connected graph that is (Pk , Ck )-free for some k > 4
and let X be a minimal connected dominating set of G. Then G[X] is Pk−2 free.
Proof. Suppose that there is an induced path v1 v2 · · · vk−2 on k − 2 vertices
in G[X]. As X is minimal, X \ {v1 } is not a connected dominating set.
Hence, X \ {v1 } is not a dominating set or G[X \ {v1 }] is disconnected. In
the first case, there is a vertex v10 ∈ V \ X whose only neighbor in X is v1 . In
the second case, the vertices v2 , . . . , vk−2 are contained in a single connected
component of G[X \{v1 }]. Thus, there is a neighbor of v1 in X, say v10 , that is
not adjacent to any member of {v2 , . . . , vk−2 }. In both cases, there is a vertex
v10 ∈
/ {v1 , v2 , . . . , vk−2 } whose only neighbor among {v1 , v2 , . . . , vk−2 } is v1 .
0
Similarly, there is a vertex vk−2
∈
/ {v1 , v2 , . . . , vk−2 } whose only neighbor
0
among {v1 , v2 , . . . , vk−2 } is vk−2 . But then G[{v10 , v1 , v2 , . . . , vk−2 , vk−2
}] is
0
0
isomorphic to Pk or to Ck , depending on the adjacency of v1 and vk−2 , and
this is a contradiction.
5.2.1
PoC-Near-Perfect Graphs
As Theorem 5.2 shows, the class of connected graphs where γc (G)/γ(G) 6 r
holds (for any fixed rational r ∈ (1, 3)) is Θp2 -complete to recognize. However,
if we restrict our attention to hereditary graph classes, we are able to derive
the following results. Note that our characterizations yield polynomial-time
recognition algorithms, since the list of forbidden induced subgraphs is finite
in each case.
We know from Zverovich [126] that the hereditary class of graphs G for
which γc (G) = γ(G), referred to as PoC-perfect graphs, is exactly the set of
(P5 , C5 )-free graphs.
Let r ∈ [1, 3). A graph G is said to be PoC-near-perfect with threshold
r if every induced subgraph H of G satisfies γc (H) 6 r · γ(H). This defines a hereditary class of graphs for every choice of r. Theorem 5.1 from
Zverovich [126] gives a forbidden induced subgraph characterization of this
class for r = 1. Our second result gives indirectly such a characterization for
r = 3/2.
Note that γc (C5 )/γ(C5 ) = γc (P5 )/γ(P5 ) = 3/2. Hence any graph class
that does not forbid either C5 or P5 contains a graph G such that γc (G)/γ(G)
= 3/2. Therefore, the characterization of Theorem 5.1 also holds for the class
of graphs G such that every induced subgraph H satisfies γc (H) 6 r · γ(H),
for any r ∈ [1, 3/2). We now turn our attention to r = 3/2, which is the
next interesting threshold after r = 1.
Our first result establishes basically the upper bound γc (G) 6 γ(G) + 1
for every connected (P6 , C6 )-free graph G. We turn this result into a characterization for the class of (P6 , C6 )-free graphs by holding the upper bound
inequality for every connected induced subgraph. Moreover, this character-
55
5.2 Structural results
ization gives the characterization of PoC-near-perfect graphs with threshold 3/2, as a corollary. However, γc (G) 6 γ(G) + 1 for every connected
(P6 , C6 )-free graph G is a stronger result than γc (G)/γ(G) 6 3/2 for every
(P6 , C6 )-free graph G.
Theorem 5.6. For every graph G, the following assertions are equivalent:
(a) For every connected induced subgraph H of G it holds that γc (H) 6
γ(H) + 1.
(b) G is (P6 , C6 )-free.
Proof. It is straightforward to check that γc (P6 ) = γc (C6 ) = 4 and γ(P6 ) =
γ(C6 ) = 2. Thus, (a) implies (b).
Now let G = (V, E) be a connected (P6 , C6 )-free graph and let H be a
connected induced subgraph of G. Observe that H is (P6 , C6 )-free. To see
that (b) implies (a), it suffices to prove that γc (H) 6 γ(H) + 1. For this,
let D be a minimum dominating set of H. Let D1 , D2 , . . . , Dk be the vertex
sets of the connected components of H[D]. Let C ⊆ V be an inclusion-wise
minimal set such that H[D ∪ C] is connected, and let X ⊆ D ∪ C be a
minimal connected dominating set of H. By Lemma 5.5, H[X] is P4 -free.
Let I ⊆ {1, 2, . . . , k} be such that i ∈ I if and only if Di ∩ X = ∅. For
every i ∈ I, pick xi ∈ X such that xi has a neighbor in Di (this is always
possible, since X is a dominating set). Note that every xi belongs to C,
and that the xi ’s do not have to be distinct. The situation is illustrated by
Figure 5.1.
D1
x1
D2
D3
C
x3
x5
D4
D5
D6
Figure 5.1: D ∪ C is a minimal connected dominating set containing D but
X, representing by the gray areas, is a minimal connected dominating set
included in D ∪ C. Here, x5 = x6 .
Let S =
S
i∈I
/ (Di
∩ X) ∪ {xj | j ∈ I}. To estimate the cardinality of X,
56
Chapter 5. The price of connectivity for domination
we will prove that S is nearly another description of the dominating set X,
depending on the connectivity of H[S].
Assume first that H[S] is connected. Then H[D ∪ {xi | i ∈ I}] is connected, and so C = {xi | i ∈ I}, since C was chosen minimal such that
H[D ∪ C] is connected. Thus, X = S, which gives
X
γc (H) 6 |X| = |S| 6
|Di ∩ X| + |I| 6 |D| = γ(H).
i∈I
/
Now assume that H[S] is not connected. Seinsche [113] proved that every P4 -free graph with at least two vertices is either disconnected, or its
complement is disconnected. In particular, this applies to the connected
graph H[X], i.e. the complement H[X] of H[X] is disconnected. Since the
complement of H[S] is connected, the graph H[X] has a connected component containing S and at least one other connected component Y . In H,
every vertex in V (Y ) is adjacent to every vertex in S. Let y ∈ V (Y ). Then
H[D ∪ {xi | i ∈ I} ∪ {y}] is connected, and so C = {xi | i ∈ I} ∪ {y}, since C
was chosen minimal such that H[D ∪ C] is connected. Thus, X = S ∪ {y},
which gives
X
γc (H) 6 |X| = |S| + 1 6
|Di ∩ X| + |I| + 1 6 |D| + 1 = γ(H) + 1.
i∈I
/
This completes the proof.
To see that the bound given by Theorem 5.6 is the best possible one,
consider the infinite family {Fk | k > 2} of (P6 , C6 )-free graphs where Fk
is the graph obtained from K1,k by subdividing each edge exactly once, as
illustrated by Figure 5.2. Clearly γc (Fk ) = k + 1 = γ(Fk ) + 1.
Figure 5.2: The set of black vertices indicates a minimum dominating set
(resp. a minimum connected dominating set) of F4 .
From Theorem 5.6 and because γc (P6 )/γ(P6 ) = γc (C6 )/γ(C6 ) = 2, we
deduce the following corollary which gives exactly the characterization of
PoC-near-perfect graphs with threshold 3/2.
Corollary 5.7. For every graph G, the following assertions are equivalent:
5.2 Structural results
57
(a) For every induced subgraph H of G it holds that γc (H)/γ(H) 6 23 .
(b) G is (P6 , C6 )-free.
Notice that the assumption in Corollary 5.7 does not required that the
graph G is connected. Indeed, if G is not connected, there always exists a
connected component of G such that the price of connectivity of G is smaller
than the price of connectivity of this connected component because a+b
c+d is
a b
in the non-oriented interval [ c , d ], for any a, b, c, d ∈ N0 .
By Corollary 5.7, r = 2 is the next interesting threshold after r = 3/2.
Our second result states a sufficient condition for threshold r = 2: being a
(C8 , P8 )-free graph.
Theorem 5.8. For every (P8 , C8 )-free graph G, it holds that γc (G)/γ(G) 6
2. This bound is attained by (P7 , C7 )-free graphs with arbitrarily large values
of γ. In particular, the bound γc (G) 6 2γ(G) is the best possible one even in
the class of (P7 , C7 )-free graphs.
Proof. Let G = (V, E) be a (P8 , C8 )-free graph. As described before, we can
assume that G is connected. Let D be a minimum dominating set of G. Let
D1 , D2 , . . . , Dk be the vertex sets of the connected components of G[D].
It is clear that if k = 1, then γc (G) = γ(G). So assume that G[D] has at
least two connected components, which is, k > 2. Let C ⊆ V be an inclusionwise minimal set such that G[D ∪ C] is connected, and let X ⊆ D ∪ C be
a minimal connected dominating set of G. By Lemma 5.5, G[X] is P6 -free.
The situation is illustrated by Figure 5.1.
Let us first assume that γ(G) = |D| 6 3. If k = 2, then γc (G) 6 γ(G)+2,
and since γc (G) > γ(G) > 2, this implies that γc (G)/γ(G) 6 2. So we may
assume that k = 3. Then D is an independent set of size 3. Let D = {x, y, z}.
Since D is a dominating set of G and {x}, {y}, {z} are the vertex set of
connected components in G[D], there exists a nearest connected component,
say {y}, of G[D] such that the distance from {x} is at most 3. Similarly,
there exists a nearest connected component, say {y}, of G[D] such that
the distance from {z} is at most 3. So, at most four vertices of C suffice
to connect x, y and z. By the minimality of C, |C| 6 4. Thus, |X| 6
|D| + |C| 6 7.
Suppose that |X| = 7, i.e., |C| = 4 and X = D ∪ C. Because |C| = 4,
by the previous argumentation, we can suppose that there are two vertices
u and v in C such that xuvy is a shortest path in G[X] between x and y,
and there are two vertices u0 and v 0 in C such that yv 0 u0 z is a shortest path
in G[X] between y and z. Because |C| = 4, all of u, v, u0 , v 0 are distinct by
minimality of C. Then {u, v, u0 , v 0 } ∩ D = ∅ and C = {u, v, u0 , v 0 }. The
situation is illustrated by Figure 5.3. We will investigate different cases
depending on the adjacency between vertices from {x, y, z, u, u0 , v, v 0 }.
If x, resp. z, is adjacent to at least one of u0 or v 0 , resp. u or v, then by
minimality of C, C = {u0 , v 0 }, resp. C = {u, v}, a contradiction. Otherwise,
58
Chapter 5. The price of connectivity for domination
x
u
v
v0
y
u0
z
Figure 5.3: The situation when D = {x, y, z} and C = {u, u0 , v, v 0 }.
if u, resp. u0 , is adjacent to at least one of u0 or v 0 , resp. u or v, then
by minimality of C, C = {u, u0 , v 0 }, resp. C = {u0 , u, v}, a contradiction.
Otherwise G[X] is isomorphic to P7 , or contains an induced P6 , depending
on the adjacency between v and v 0 , a contradiction.
This means |X| 6 6 and thus γc (G) 6 |X| 6 6 = 2γ(G) in this case.
Now let us assume that γ(G) = |D| > 4. Let I ⊆ {1, 2, . . . , k} be such
that i ∈ I if and only if Di ∩ X = ∅. For every i ∈ I, pick xi ∈ X such that
xi has a neighbor in Di ; this is always possible, since X is a dominating set
of G. Note that every
S xi belongs to C, and that the xi do not have to be
distinct. Let S = i∈I
/ (Di ∩ X) ∪ {xj | j ∈ I}. To estimate the cardinality
of X, we will prove that X mainly consists of all vertices from S and others
from a connected dominating set of G[X].
It is shown by van ’t Hof and Paulusma [122] that every connected P6 -free
graph has a connected dominating set Z for which the following assertion
holds: G[Z] is either isomorphic to C6 or contains a complete bipartite graph
as spanning subgraph. Let Y be such a connected dominating set of G[X].
Assume first that G[Y ] is isomorphic to C6 . Let u1 u2 · · · u6 be a consecutive ordering of the vertices of the C6 . Suppose that Y 0 = {u1 , u2 , u3 , u4 }
is not a dominating set of G[X]. Then there is a vertex z ∈ X with
NG [z] ∩ Y 0 = ∅. Without loss of generality, z is adjacent to u5 . But then, as
illustrated by Figure 5.4, G[Y 0 ∪ {u5 , z}] is isomorphic to P6 , a contradiction
to the fact that G[X] is P6 -free.
Thus Y 0 is a connected dominating set of G[X].
Since {xj | j ∈ I} ⊆ X and Y 0 is a connected dominating set of G[X],
G[Y 0 ∪{xj | j ∈ I}] is connected. Thus, G[D ∪Y 0 ∪{xj | j ∈ I}] is connected:
every Di with Di ∩X 6= ∅ has a neighbor in Y 0 , and every Di with Di ∩X = ∅
has a neighbor in {xj | j ∈ I}, namely xi .
As (Y 0 ∪ {xj | j ∈ I}) ⊆ X, (Y 0 ∪ {xj | j ∈ I}) \ D ⊆ C. By the
minimality of C, C = (Y 0 ∪ {xj | j ∈ I}) \ D. Thus, X ⊆ S ∪ Y 0 , which gives
X
γc (G) 6 |X| 6 |S| + |Y 0 | 6
|Di ∩ X| + |I| + 4 6 |D| + 4 6 2γ(G).
i∈I
/
Now assume that G[Y ] contains a complete bipartite graph as a spanning
subgraph. Let (A, B) be a bipartition of this complete bipartite graph. For
59
5.2 Structural results
u3
u2
u4
u1
u5
u6
z
G[X]
Figure 5.4: G[Y ] is isomorphic to C6 , where Y = {u1 , u2 , u3 , u4 , u5 , u6 } is a
dominating set of G[X], and {u1 , u2 , u3 , u4 } is not a dominating set of G[X].
each 1 6 i 6 k, pick yi ∈ Y with the following property. If Di ∩ X 6= ∅,
NG[X] [yi ] ∩ (Di ∩ X) 6= ∅, and if Di ∩ X = ∅, yi ∈ NG[X] [xi ]. The situation is
illustrated by Figure 5.5. These yi exist since Y is a dominating set of G[X].
D1
y1
x1
y4
D4
y2
D2
x3
y3
x5
D5
A
B
G[Y ]
D3
G[X]
Figure 5.5: G[Y ] contains a complete bipartite graph as a spanning subgraph,
where x5 = y5 .
We can assume that A ∩ {yi | 1 6 i 6 k} =
6 ∅.
If B ∩ {yi | 1 6 i 6 k} =
6 ∅, the graph G[D ∪ {xi | i ∈ I} ∪ {yj |
1 6 j 6 k}] is connected. As {xi | i ∈ I} ∪ {yj | 1 6 j 6 k} ⊆ X,
({xi | i ∈ I} ∪ {yj | 1 6 j 6 k}) \ D ⊆ C. By the minimality of C,
C = ({xi | i ∈ I} ∪ {yj | 1 6 j 6 k}) \ D. Thus X ⊆ S ∪ {yj | 1 6 j 6 k},
which gives
X
γc (G) 6 |X| 6 |S| + k 6
|Di ∩ X| + |I| + k 6 |D| + k 6 2γ(G). (5.3)
i∈I
/
So we may assume that B ∩ {yi | 1 6 i 6 k} = ∅, as illustrated by
Figure 5.6.
60
Chapter 5. The price of connectivity for domination
D1
x1
D4
y1
y2
D2
x3
D3
y3
x5
D5
z
B
A
G[Y ]
G[X]
Figure 5.6: G[Y ] contains a complete bipartite graph as a spanning subgraph,
where B ∩ {yi | 1 6 i 6 k} = ∅ and for instance, x5 = y5 , y2 = y4 .
Pick any z ∈ B. Since D is a dominating set of G, there is an index
1 6 l 6 k such that NG [z] ∩ Dl 6= ∅. In the Figure 5.6, l = 5. Hence,
G[D ∪ {xi | i ∈ I} ∪ {yj | 1 6 j 6 k, j 6= l} ∪ {z}] is connected. So,
C = ({xi | i ∈ I} ∪ {yj | 1 6 j 6 k, j 6= l} ∪ {z}) \ D and thus X ⊆ S ∪ {yj |
1 6 j 6 k, j 6= l} ∪ {z}, which gives (5.3). This completes the proof of the
bound γc (G) 6 2γ(G) for (P8 , C8 )-free graphs.
The bound γc (G) 6 2γ(G) is attained by an infinite number of connected
(P7 , C7 )-free graphs G, given by the following construction. For every k ∈ N,
let Hk be the graph obtained from Kk by attaching to each vertex a pendent
path on two vertices in the way illustrated in Figure 5.7. It is easily seen
that, for all k ∈ N, γc (Hk )/γ(Hk ) = 2.
Figure 5.7: The set of black vertices indicates a minimum dominating set
(respectively a minimum connected dominating set) of H4 .
A similar construction shows that the inequation (5.1) in page 49 is
asymptotically sharp in the class of (P9 , C9 )-free graphs, in the sense that
there is an infinite family {Gk | k ∈ N} of (P9 , C9 )-free graphs such that
limk→∞ γc (Gk )/γ(Gk ) = 3. For every k ∈ N, let Gk be the graph obtained
from Kk by attaching to each vertex a pendent path on three vertices in
5.2 Structural results
61
the way illustrated in Figure 5.8. It is easy to check that for every k > 2,
γ(Gk ) = k + 1 and γc (Gk ) = 3k. Furthermore, Gk is (P9 , C9 )-free.
Figure 5.8: The set of black vertices indicates a minimum dominating set
(respectively a minimum connected dominating set) of G4 .
We end this section with a conjecture that came up during our research.
As Theorem 5.8 shows, it holds that γc (G) 6 2γ(G) for every (P8 , C8 )-free
graph G. However, γc (P8 )/γ(P8 ) = 2 = γc (C8 )/γ(C8 ), i.e., both P8 and C8
do not violate the bound given by Theorem 5.8. While intensively searching
for minimal connected graphs G with γc (G) > 2γ(G), we had the strong
impression that P9 , C9 and H, the graph depicted in Figure 5.9, might be
the only minimal graphs. If this is true, the following conjecture holds.
Conjecture 5.9. For every (P9 , C9 , H)-free graph G, where H is the graph
depicted in Figure 5.9, it holds that γc (G) 6 2γ(G).
Note that for any G ∈ {P9 , C9 , H}, γc (G) > 2γ(G). Hence, if true,
Conjecture 5.9 would give a characterization of the largest class of connected
graphs that is closed under connected induced subgraphs where γc (G) 6
2γ(G) holds, i.e. would give an exact characterization of PoC-near-perfect
graphs with threshold 2.
Figure 5.9: The graph H from Conjecture 5.9.
5.2.2
PoC-Critical Graphs
We now turn our attention to critical graphs, which is, graphs G for which
the price of connectivity of every proper induced subgraph H of G is strictly
smaller than the price of connectivity of G, similarly to what we did for
the vertex cover problem. These are exactly the graphs that can appear
in a minimal forbidden induced subgraph characterization of the PoC-nearperfect graphs for some threshold r ∈ [1, 3). A perhaps more tractable class
of graphs is the class of strongly critical graphs, defined as the graphs G for
62
Chapter 5. The price of connectivity for domination
which every proper (not necessarily induced) subgraph H of G has a price
of connectivity that is strictly smaller than the price of connectivity of G. It
is clear that every strongly critical graph is critical, but the converse is not
true. For instance, C5 is critical, but not strongly critical. Notice that every
(strongly) critical graph is connected.
PoC-Critical Trees: Let T be a tree. We call T special if T is obtained
from another tree (with at least one edge) by subdividing each edge either
once or twice and then attaching a pendent vertex to every leaf of the resulting graph (see Figure 5.10 for an example).
Figure 5.10: A special tree constructed from another tree (vertices indicated
by filled circles) by subdividing each edge either once or twice (subdivision
vertices are indicated by hollow circles) and then attaching a pendent vertex
(indicated by squares) to every leaf.
The next result gives a partial characterization of the class of critical
trees. However, the class of special trees turns out to be too restricted. We
need a new definition.
We call a tree T peculiar if
• the neighbor of every leaf has degree 2,
• every minimum dominating set D of T is independent and
• every vertex v ∈ V (T ) \ D with degree at least 3 has only one neighbor
in D, i.e. |NT (v) ∩ D| = 1.
See Figure 5.11 for an example.
Figure 5.11: A peculiar tree where a minimum dominating set contains vertices indicated by filled circles and leaves are indicated by squares.
5.2 Structural results
63
In spite of our initial expectation, Theorem 4.12 cannot be straightforwardly adapted to the domination case because special trees (in the sense of
this section) are too restricted.
Theorem 5.10. For a tree G, the following assertions are equivalent:
(i) G is a peculiar critical tree.
(ii) G is strongly critical.
(iii) G is critical.
Moreover, if G is critical and if the degree of any v ∈ V (G) \ D, where D is
an arbitrary minimum dominating set of G, is at most 2, then G is a special
tree built on an initial tree H, where V (H) is a minimum dominating set.
Before proving the theorem, we show the following useful lemma.
Lemma 5.11. Let G be a critical graph. For every minimum dominating
set D of G, there does not exist a bridge of G with endpoints in D.
Proof. Suppose there exists a bridge x1 x2 with x1 , x2 ∈ D. The removal of
the edge x1 x2 results in two connected subgraphs of G, which we denote by
G1 and G2 respectively. We can assume that x1 ∈ V (G1 ) and x2 ∈ V (G2 ).
Let G01 be the graph obtained from G1 by attaching a pendent vertex to
x1 . Similarly, let G02 be the graph obtained from G2 by attaching a pendent
vertex to x2 .
We observe that D ∩ V (G1 ) is a dominating set of G01 and D ∩ V (G2 ) is
a dominating set of G02 . Thus
γ(G) > γ(G01 ) + γ(G02 ).
(5.4)
On the other hand, let Dc,1 be a minimum connected dominating set of
G01 and Dc,2 be a minimum connected dominating set of G02 . We can assume
that Dc,1 ⊆ V (G1 ) and Dc,2 ⊆ V (G2 ), since for i = 1, 2, G0i is the graph
Gi with a pendent vertex. It is clear that x1 ∈ Dc,1 and x2 ∈ Dc,2 . Thus
Dc,1 ∪ Dc,2 is a connected dominating set of G. Since Dc,1 ∩ Dc,2 = ∅,
γc (G) 6 γc (G01 ) + γc (G02 ).
(5.5)
But (5.4) and (5.5) say that
γc (G)/γ(G) 6 max{γc (G01 )/γ(G01 ), γc (G02 )/γ(G02 )}.
(5.6)
Since both G01 and G02 are isomorphic to induced subgraphs of G, (5.6) is a
contradiction to the fact that G is critical.
64
Chapter 5. The price of connectivity for domination
Proof of Theorem 5.10. It is obvious that (ii) implies (iii). Firstly, we show
that (i) implies (ii), which is, every peculiar critical tree is strongly critical.
Let G be a peculiar critical tree. Let G0 be a proper (not necessarily induced)
subgraph of G and C1 , . . . , Ck be the vertex sets of its connected components.
Because G is a tree, G0 is the disjoint union of G[Ci ] for i = 1, . . . , k. Moreover a minimum (resp. connected) dominating set of G0 is the union of a
minimum (resp. connected) dominating set of each connected component of
G’, so
P
γc (G0 )
γc (G[Ci ]) γc (G)
16i6k γc (G[Ci ])
P
6 max
=
i = 1, . . . , k <
,
γ(G[C
])
γ(G0 )
γ(G[C
])
γ(G)
i
i
16i6k
since G is critical.
Secondly, we prove that (iii) implies (i), which is, every critical tree is
peculiar. For this, let G = (V, E) be a critical tree. Let D be a minimum
dominating set of G.
First we show that D is an independent set. Suppose there are x, y ∈ D
such that xy ∈ E. Since G is a tree, xy is a bridge, a contradiction to
Lemma 5.11.
Now we show that every member of V \ D with degree at least 3 has only
one neighbor in D. For this, let x ∈ V \ D with |NG (x)| > 3. Suppose that
|NG (x) ∩ D| > 2, hence let d1 , d2 ∈ NG (x) ∩ D. Let X1 , X2 , . . . , Xk be the
vertex sets of the connected components of G − x. By assumption, k > 3.
Suppose that d1 ∈ X1 and d2 ∈ X2 . Let
[
H1 = G −
Xi
i6=2,3
and
H2 = G − (X2 ∪ X3 ).
We observe that
γ(G) > γ(H1 ) + γ(H2 ).
(5.7)
Since x is a cutvertex of H1 , x is contained in every connected dominating
set of H1 . Therefore
γc (G) 6 γc (H1 ) + γc (H2 ).
(5.8)
By the same argumentation from Lemma 5.11, (5.7) and (5.8) yield a
contradiction to the fact that G is critical. This proves that every vertex of
V \ D with degree at least 3 has only one neighbor in D. From the discussion
above, D is an independent set.
Moreover, two degree-1 vertices, say x and y, cannot have the same
neighbor since γc (G − x) = γc (G), γ(G − x) = γ(G) and G is critical.
The neighbor y of any degree-1 vertex x must have its degree equal to 2.
Otherwise, clearly γ(G − x) 6 γ(G). The vertex y is a cutvertex of the
65
5.2 Structural results
tree G − x, hence γc (G − x) = γc (G). We obtain a contradiction since G is
critical. All in all, G is peculiar.
Now, we prove that the critical tree G is special if every member of V \ D
has a degree at most 2, for a minimum dominating set D. By the previous
argument, we know that any minimum dominating set is independent. We
can suppose that D does not contain a leaf. Otherwise, we could replace
in D the degree-1 vertex by its neighbor such that D is an independent
dominating set and every vertex v ∈
/ D has degree at most 2. Consider the
initial tree H defined as followed: V (H) = D and E(H) = {uv| there exists
a path Puv in (V \ D) ∪ {u, v} from u to v}. Because D is a dominating set
of G, if uv is an edge in H, then the length of the path Puv in G is either 2
or 3. All in all, G is a special tree. This completes the proof.
Notice that Theorem 5.10 is quite similar to Theorem 4.12 for the vertex cover problem but the hypothesis in the domination version is stronger.
Indeed, for the dominating set problem, in the class of chordal graphs, the
three assumptions from Theorem 5.10 are not equivalent: the graph from
Conjecture 5.9 is a critical chordal graph without being a tree.
Now, we investigate the relations between graph classes: special trees,
peculiar trees and critical trees. Figure 5.12 illustrates the situation.
Figure 5.11
P8
Figure 5.14
Figure 5.13
P7
critical trees
special trees
peculiar trees
Figure 5.12: The situation around critical trees, where the gray area represents special trees with a double subdivision.
Not all peculiar trees are critical. For instance, the graph depicted in
Figure 5.11 (whose price of connectivity is 12/5) is not critical because it
contains an induced subgraph H with a higher price of connectivity. Indeed,
for instance, H could be the graph obtained from K1,3 by subdividing each
edge exactly thrice. Furthermore, the graph illustrated by Figure 5.13 is a
peculiar critical tree which is not special. Also, we point out that not all
66
Chapter 5. The price of connectivity for domination
special trees are critical, for instance P8 contains an induced P6 with the
same price of connectivity.
Figure 5.13: A peculiar critical tree which is not special, where a minimum
dominating set contains vertices indicated by filled circles and leaves are
indicated by squares.
Moreover, by Proposition 5.12, every special tree built on the initial
tree H, where all edges of H are subdivided exactly twice in G, is critical.
These graphs are represented by the gray area in Figure 5.12. However, the
converse in the class of special trees is not true because the graph illustrated
by Figure 5.14 is critical.
Proposition 5.12. Let G be a special tree built on the initial tree H. If all
edges of H are subdivided twice in G, then G is critical.
Proof. Notice that γc (G) = 3γ(G) − 2. Let G0 be a proper induced subgraph
of G.
First, we suppose that γ(G0 ) = γ(G). We know that a minimum connected dominating set of a tree (with one vertex of degree > 1) is the set
of vertices with degree at least 2, i.e. all vertices which are not a leaf, or in
other words, the set of internal vertices. Observe that the number of internal
vertices of G0 is strictly smaller than this of G because every neighbor of a
leaf in G has a degree 2. Thus γc (G0 ) < γc (G) and
γc (G0 )
γc (G)
<
.
0
γ(G )
γ(G)
Now, assume that γ(G0 ) > γ(G). Because G is a tree, a minimum connected dominating set of G0 is a subset of the internal vertex set of G, hence
γc (G0 ) 6 γc (G). Trivially, we obtain
γc (G)
γc (G0 )
>
.
γ(G)
γ(G0 )
It remains the case where γ(G0 ) < γ(G). Since γc (G0 ) 6 3γ(G0 ) − 2,
γc (G0 )
3γ(G0 ) − 2
2
2
3γ(G) − 2
γc (G)
6
=3−
<3−
=
=
.
0
0
0
γ(G )
γ(G )
γ(G )
γ(G)
γ(G)
γ(G)
5.2 Structural results
67
Figure 5.14: A special critical tree constructed from another tree H (vertices
indicated by filled circles) where each edge of H is not necessarily subdivided
twice.
Besides, the following proposition gives a necessary condition for a special
tree to be critical. First, we prove a short lemma.
Lemma 5.13. Every special tree G built on an initial tree H with |V (H)| > 3
contains a proper induced path on 6 vertices.
Proof. Let P be a longest path in H. Then P has k > 3 vertices, since
|V (H)| > 3. Thus, the corresponding path P 0 in G contains all vertices
from P and at least one for each edge. Moreover, P 0 can be extended in its
endpoints by two vertices, by construction of G. Accordingly, G contains
a path on |V (P 0 )| + 2 > (2k − 1) + 2 > 7 vertices. Besides, being a tree
implies that any path is induced. Thus, G contains a proper induced path
on 6 vertices.
Proposition 5.14. Let G be a special critical tree built on the initial tree H
with V (H) a minimum dominating set. Suppose that |V (H)| > 3.
(i) Let x be a leaf of H and y be its neighbor in H. Then the edge xy is
subdivided exactly twice in G.
(ii) Let v be a vertex in H and NH (v) be its neighborhood. Then there exists
at least one u ∈ NH (v) such that the edge uv is subdivided exactly twice
in G.
Proof. By Lemma 5.13, observe that γc (P6 )/γ(P6 ) = 2 < γc (G)/γ(G) since
G is critical.
First, we prove (i). Suppose that there exists a leaf x in H and its
neighbor y where xy is subdivided exactly once in G. Let x0 be the pendent
vertex of x in G. Consider G0 = G − {x, x0 } the induced subtree built on
H − {x}. It is easy to see that γ(G) > γ(G0 ) + 1 and γc (G) 6 γc (G0 ) + 2.
Thus,
γc (G)
γc (G0 ) + 2
γc (G0 )
γc (G0 )
6
6
max
,
2
=
.
(5.9)
γ(G)
γ(G0 ) + 1
γ(G0 )
γ(G0 )
The last equality is true because γc (G)/γ(G) > 2. Thus, we obtain a
contradiction since G is critical.
It remains to show (ii). Let v be a vertex in H. Suppose that for every
u ∈ NH (v), the edge uv is subdivided only once in G. We can suppose that
68
Chapter 5. The price of connectivity for domination
dH (v) > 2 because the case of leaves was studied previously. Let u1 , . . . , uk
be the neighbors of v in H with k > 2 and vi be the midpoint of the edge
ui v in G, for all i. Consider C1 , . . . , Cj the vertex sets of the connected
components of G − v. Since G is a tree, we have that j = k and we can
assume that vi , ui ∈ Ci for all i.
Let G1 be the subgraph of G induced by C1 and G2 be the subgraph of G
induced by ∪ki=2 Ci ∪ {v, v1 , u1 }. We observe that V (H) ∩ C1 is a dominating
set of G1 and ((V (H) ∩ V (G2 )) \ {v}) ∪ {v1 } is a dominating set of G2 . Thus
γ(G) > γ(G1 ) + γ(G2 ).
(5.10)
On the other hand, let Dc,1 be a minimum connected dominating set of
G1 and Dc,2 be a minimum connected dominating set of G2 . We can assume
that Dc,1 ⊆ V (G1 ) \ {v1 } and Dc,2 ⊆ V (G2 ) \ {u1 }. It is clear that u1 ∈ Dc,1
and v1 ∈ Dc,2 . Thus Dc,1 ∪ Dc,2 is a connected dominating set of G. Since
Dc,1 ∩ Dc,2 = ∅,
γc (G) 6 γc (G1 ) + γc (G2 ).
(5.11)
But (5.10) and (5.11) say that
γc (G)/γ(G) 6 max{γc (G1 )/γ(G1 ), γc (G2 )/γ(G2 )}.
(5.12)
Since both G1 and G2 are induced subgraphs of G, (5.12) is a contradiction
to the fact that G is critical.
PoC-Strongly-Critical Graphs: The following result is similar to Theorem 4.14, except that in the case of the dominating set problem, there exist
strongly critical graphs that are not trees but have a cutvertex (see the graph
in Figure 5.9).
Proposition 5.15. Let G be a strongly critical graph. Every minimum dominating set of G is independent.
Proof. Let G be a strongly critical graph and let D be a minimum dominating
set of G. Suppose that D is not an independent set. Thus there are two
adjacent vertices in D, say x and y.
By Lemma 5.11, xy cannot be a bridge of G. So G − xy is connected.
Clearly γ(G) > γ(G − xy). Every minimum connected dominating set of
G − xy is trivially a connected dominating set of G. Hence γc (G) 6 γc (G −
xy). Therefore,
γc (G − xy)
γc (G)
>
,
γ(G − xy)
γ(G)
which is a contradiction.
5.2 Structural results
5.2.3
69
Aside
In this section, we investigate the price of connectivity in relationship with
other invariants such as the radius and the diameter. This is similar in spirit
to [30]. Moreover, we prove that for all rationals r ∈ [1, 3), there exists a
graph whose price of connectivity is exactly r.
Price of connectivity and radius
The following result describes the relationship between the price of connectivity and radius.
Theorem 5.16. Let G be a graph.
• If the radius of G is 1, then γc (G)/γ(G) = 1.
• If the radius of G is 2, then γc (G)/γ(G) 6 2.
• For every fixed integer k > 3, if the radius of G is k, then γc (G)/γ(G) <
3.
Moreover, all the bounds are (asymptotically) tight, even for graphs G with
large γ(G).
Proof. If the radius of G is 1, then there exists one vertex adjacent to all
the others. In this case, only this vertex is sufficient to dominate the whole
graph, which means γc (G)/γ(G) = 1.
Suppose that the radius of G is exactly 2. Let c be a center of the
graph. For every vertex v in G, the distance between c and v is at most 2.
Let D be a minimum dominating set of G with the connected components
D1 , . . . , Dr , where D1 is a nearest connected components of D to c (it could
be c ∈ D1 ). Observe that d(D1 , c) is at most 1, because D is a dominating
set. We assume that r > 1. Note that, for every i > 2, the distance between
Di and c is at most 2, i.e. either Di is adjacent to c or only one vertex, say
xi , is sufficient to connect Di to c. We define I = {i|d(Di , c) = 2}. In this
case, D ∪ {c} ∪ {xi |i ∈ I} is a connected dominating set by construction.
Furthermore,
γc (G)
|D| + 1 + |{xi |i ∈ I}|
6
6 2.
γ(G)
|D|
We build a tight graph H˜n . Take a clique on n vertices, one of which is
the center c. Choose another vertex v from the clique and add a pendent
vertex to it. Then, for every vertex u in the clique different from c and v,
add a cycle of length 5 through c and u. See Figure 5.15. Since the set
containing the vertex v and the vertex which is at distance 2 from the clique
for each 5-vertex cycle is a minimum dominating set, γ(H˜n ) = n − 1. As
illustrated by Figure 5.15, γc (H˜n ) = 2n − 2.
70
Chapter 5. The price of connectivity for domination
c
c
v
v
Figure 5.15: The set of black vertices indicates a minimum dominating set
(respectively a minimum connected dominating set) of H̃4 with center c.
Let k > 3 be a fixed integer. For all graphs G, we have γc (G)/γ(G) < 3.
To see that this bound is the best possible one for graphs with radius k,
consider the infinite family {Hn,k |n ∈ N} of graphs with radius k, where
Hn,k is a flower with n cycles of size 6 and one of size 2k. An illustration of
H3,k is given by Figure 5.16. Clearly γ(Hn,k ) > n + 2k
3 . Since the set of all
vertices except two vertices for each induced cycle is a connected dominating
set, γc (Hn,k ) 6 3n + 2k − 2. Hence for any fixed k,
γc (Hn,k )
3n + 2k − 2
6
−→ 3.
γ(Hn,k )
n + (2k)/3 n→+∞
...
...
...
...
Figure 5.16: The set of black vertices indicates a minimum dominating set
(respectively a minimum connected dominating set) of H3,k .
Price of connectivity and diameter
Before establishing result on graphs with diameter 2, we state the following
useful lemma.
71
5.2 Structural results
Lemma 5.17. Let G be a graph on n > ∆2 − ∆ − 1 vertices of diameter 2
with ∆(G) = ∆. If there exists one vertex v with dG (v) < ∆ then
γc (G)/γ(G) 6 3/2.
Proof. We have
|V (G)|
∆+1
∆2 − ∆ − 1
>
∆+1
1
=∆−2+
.
∆+1
γ(G) >
Hence, γ(G) > ∆ − 1. Moreover, a connected dominating set is N [v], so
γc (G) 6 ∆. Thus, γc (G)/γ(G) 6 ∆/(∆ − 1) 6 3/2 if and only if ∆ > 3. If
∆ 6 2 then G is a path on k 6 3 vertices or a cycle on r 6 5 vertices, since
G is connected. In each case, its price of connectivity is at most 3/2.
Bondy, Erdős and Fajtlowicz [23] established that every graph G of order
n with diameter 2 and no cycle of length 4 satisfies that either
- ∆(G) = n − 1, or
- G is a Moore graph, i.e. d-regular with 1 + d2 vertices, or
- ∆(G) = ∆, |V (G)| = ∆2 − ∆ + 1 and each vertex of G has degree ∆
or ∆ − 1.
Theorem 5.18. Let G be a graph of diameter 2 with no cycle of length 4.
Then γc (G)/γ(G) = 3/2.
Proof. Obviously, if ∆(G) = n − 1 then γc (G) = γ(G) = 1. Suppose that G
is a Moore graph. We have
|V (G)|
γ(G) >
∆(G) + 1
1 + d2
=
1+d
2
d −1
>
1+d
= dd − 1e
= d − 1.
Hence γ(G) > d. Besides, a connected dominating set is N [v] for any v, so
γc (G) 6 d + 1. Thus, γc (G)/γ(G) 6 (d + 1)/d 6 3/2 since d > 2.
72
Chapter 5. The price of connectivity for domination
Now, assume that |V (G)| = ∆2 − ∆ + 1 and each vertex of G has degree ∆ or ∆ − 1. If there is a vertex v such that d(v) = ∆ − 1, then
Lemma 5.17 gives immediately the result. Otherwise, G is ∆-regular. By a
similar argumentation in Lemma 5.17, we have that γ(G) > ∆ − 1. Moreover, a connected dominating set is N [v] for any v, so γc (G) 6 ∆ + 1. Thus,
γc (G)/γ(G) 6 (∆ + 1)/(∆ − 1) 6 3/2 if and only if ∆ > 5. Besides, two
systems for computer aided graph theory [39, 40] and a graph generator [96]
verify the upper bound on the price of connectivity for all ∆-regular graphs
on at most 13 vertices with diameter 2, completing the proof.
Values of the price of connectivity
Theorem 5.19. Let r be a rational number in [1, 3). There exists a (P9 , C9 )free graph G such that γc (G)/γ(G) = r.
Proof. Assume that r = pq , with p and q two integers. Let s = p − q.
Consider Fp,q the graph obtained from a clique K2q on 2q vertices by adding
to s vertices of the clique a pendent path on three new vertices and a pendent
vertex to the other vertices, as illustrated by Figure 5.17. Clearly, Fp,q is
(P9 , C9 )-free.
Figure 5.17: The set of black vertices indicates a minimum dominating set
(respectively a minimum connected dominating set) of F5,2 .
We will prove that γ(Fp,q ) = 2q and γc (Fp,q ) = 2p. Note that s < 2q since
r < 3. Hence, at least one vertex from the clique is attached to a pendent
vertex. A minimum dominating set consists of the middle vertex from each
pendent path of length 3 and the vertex in the clique for each pendent vertex,
as illustrated by Figure 5.17, which implies that γ(Fp,q ) = 2q. Furthermore,
a minimum connected dominating set is the set of all vertices with degree
> 1, which means that γc (Fp,q ) = 3s + (2q − s) = 2p.
Chapter 6
A characterization of Pk -free
graphs
The class of graphs that do not contain an induced path on k vertices, Pk -free
graphs, plays a prominent role in algorithmic graph theory. Let us mention
a recent result: there exists a polynomial-time algorithm to compute an independent set of maximum weight in a P5 -free graph, given by Lokshtanov,
Vatshelle and Villanger [93]. This prominent role motivates the search for
special structural properties of Pk -free graphs, including alternative characterizations. Bácso and Tuza are the precursors in the study of Pk -free graphs
with the following theorem.
Theorem 6.1 (Bácso and Tuza [11]). Let G be a connected P5 -free graph.
Then G has a dominating clique or a dominating induced P3 .
An immediate consequence of this result is the following theorem.
Theorem 6.2 (Bácso and Tuza [11], Cozzens and Kelleher [49]). Let G be
a graph. The following assertions are equivalent.
(i) G is P5 -free.
(ii) Every connected induced subgraph H of G admits a connected dominating set X such that H[X] is a clique or H[X] ∼
= C5 .
Later, van ’t Hof and Paulusma [122] obtained a characterization for the
class of P6 -free graphs in the flavor of Theorem 6.2. An earlier, slightly
weaker result was given by Liu, Peng and Zhao [91], and the particular case
of (C3 , P6 )-free graphs was discussed before by Liu and Zhou [92].
Theorem 6.3 (van ’t Hof and Paulusma [122]). Let G be a graph. The
following assertions are equivalent.
(i) G is P6 -free.
73
74
Chapter 6. A characterization of Pk -free graphs
(ii) Every connected induced subgraph H of G admits a connected dominating set X such that H[X] has a complete bipartite spanning subgraph
or H[X] ∼
= C6 .
Complementing Theorem 6.3, van ’t Hof and Paulusma give a polynomial-time algorithm that, given a connected P6 -free graph, computes a connected dominating set X such that G[X] has a complete bipartite spanning
subgraph or G[X] ∼
= C6 .
In view of Theorems 6.2 and 6.3, two questions arise.
• The first one is whether assertion (ii) of Theorem 6.3 can be strengthened, such as H[X] is a P4 -free graph or H[X] ∼
= C6 . Note that if H[X]
is P4 -free, it is a connected cograph, and in particular has a complete
bipartite spanning subgraph. This condition is the direct analogy of
condition (ii) of Theorem 6.2 for P6 -free graphs. The advantage of the
strenghtened version is, of course, that the structure of cographs is well
understood and more restricted compared to the class of graphs having
a spanning complete bipartite graph.
• The second question is whether similar characterizations can be given
for the class of Pk -free graphs, for k > 6. In their paper, van ’t Hof and
Paulusma [122] explicitly ask for such a characterization in the case of
k = 7.
This chapter and the next one are based on a joint paper published first in
the 40th International Workshop on Graph-Theoretic Concepts in Computer
Science (WG2014) and then in Algorithmica [34]. The paper received a best
paper award in WG2014. This chapter is split into two sections.
• In the first section, we give an affirmative answer to the two questions
above. We show that every Pk -free graph, k ≥ 4, admits a connected
dominating set that induces either a Pk−2 -free graph or a graph isomorphic to Pk−2 , hence generalizing Theorem 6.1. Surprisingly, it turns
out that every minimum connected dominating set of G has this property. This yields a new characterization for Pk -free graphs, which is
similar to Theorem 6.2: a graph G is Pk -free if and only if each connected induced subgraph of G has a connected dominating set that
induces either a Pk−2 -free graph, or a graph isomorphic to Ck . Notice that Pk−2 at the end of the first assertion was changed to Ck in
order to handle the case of Pk . Accordingly, our results strengthen
Theorem 6.3.
• In the second section, we present an efficient algorithm that, given
a connected graph G, computes a connected dominating set X of G
with the following property based on our first result: for the minimum
k such that G is Pk -free, the subgraph induced by X is Pk−2 -free or
6.1 A characterization of Pk -free graphs
75
isomorphic to Pk−2 . A property of our algorithm is that it does not
require the value k, which is N P -complete to compute.
Our theorems have other applications. One example we will give in the
next chapter is Hypergraph 2-Colorability for hypergraphs with P7 free incidence graphs.
Other possible future applications of our results include the coloring of
Pk -free graphs. Hoang, Kamiński, Lozin, Sawada and Shu [77] showed that kColorability is efficiently solvable on P5 -free graphs, using the fact that a
connected P5 -free graph has a dominating clique or a dominating induced P3 .
As a private communication, Bonomo, Chudnovsky, Maceli, Schaudt, Stein
and Zhong [24] use our characterization for proving that 3-Colorability
is polytime-time solvable on P7 -free graphs, which will be an important application of our results. They prove that a 3-colorable P7 -free graph has a
set X of at most three vertices such that the distance from any vertex to X
is at most 2, by applying twice our results.
6.1
A characterization of Pk -free graphs
As mentioned previously, we show that every connected Pk -free graph, k ≥ 4,
admits a connected dominating set that induces either a Pk−2 -free graph, or
a graph isomorphic to Pk−2 . Surprisingly, it turns out that every minimum
connected dominating set has this property.
Theorem 6.4. Let G be a connected Pk -free graph, k ≥ 4, and let X be
any minimum connected dominating set of G. Then G[X] is Pk−2 -free, or
G[X] ∼
= Pk−2 .
Let us recall the following lemma, proved in Chapter 5.
Lemma 6.5 (Camby and Schaudt [36]). Let G be a connected graph that is
(Pk , Ck )-free, for some k ≥ 4, and let X be a minimal connected dominating
set of G. Then G[X] is Pk−2 -free.
When applied to connected Pk -free graphs, which are in particular (Pk+1 ,
Ck+1 )-free, the above lemma implies that any minimal connected dominating
set induces a Pk−1 -free graph, for k ≥ 3.
Let X be a connected dominating set of a connected graph G, and x ∈ X.
Assuming that X is a minimal connected dominating set and |X| ≥ 2, x is a
cutvertex of G[X] or x has a private neighbor : a vertex y ∈ V (G) \ X with
NG (y) ∩ X = {x}.
Next we prove a simple but useful lemma, which plays a key role also in
the proof of Theorem 6.8, for our algorithm in the next section.
Lemma 6.6. Let G be a connected Pk -free graph, for some k ≥ 4, and
let X be a minimal connected dominating set of G. Assume that there is an
76
Chapter 6. A characterization of Pk -free graphs
induced Pk−2 in G[X], say on the vertices x1 , x2 , . . . , xk−2 . Then any private
neighbor y of x1 is such that (X ∪ {y}) \ {xk−2 } is a connected dominating
set of G.
Proof. Let X 0 := {x1 , x2 , . . . , xk−2 }. Suppose x1 has a private neighbor y,
and let Y := (X ∪ {y}) \ {xk−2 }. We have to prove that Y is a connected
dominating set of G.
Suppose for a contradiction that G[Y ] is not connected. Hence, xk−2
is a cutvertex of G[X]. In particular, there is a vertex t ∈ X such that
NG (t) ∩ X 0 = {xk−2 }. But then G[X 0 ∪ {y, t}] ∼
= Pk , a contradiction.
It remains to show that Y is a dominating set. Suppose the contrary,
that is, there is a vertex z with NG [z] ∩ Y = ∅. As X is a dominating set,
NG [z] ∩ X = {xk−2 }. Because xk−2 is adjacent to Y and z is not adjacent to
Y , z 6= xk−2 . But this means that G[X 0 ∪ {y, z}] ∼
= Pk , a contradiction.
Now we can state the proof of Theorem 6.4.
Proof of Theorem 6.4. Let X be a minimum connected dominating set of G.
Since G is in particular (Pk+1 , Ck+1 )-free, G[X] is Pk−1 -free, by Lemma 6.5.
We have to show that G[X] is Pk−2 -free or isomorphic to Pk−2 .
To validate this, assume there is an induced Pk−2 in G[X], say on the
vertices x1 , x2 , . . . , xk−2 . Let X 0 := {x1 , x2 , . . . , xk−2 }. We will prove that
X \ X 0 = ∅. Note that x1 is not a cutvertex of G[X]: otherwise there is
a vertex x0 ∈ X such that NG (x0 ) ∩ X 0 = {x1 }, and hence G[X 0 ∪ {x0 }] ∼
=
Pk−1 . This is a contradiction. Thus, x1 is not a cutvertex of G[X] and
therefore has a private neighbor with respect to X, say y1 . By Lemma 6.6,
Y1 := (X ∪ {y1 }) \ {xk−2 } is a connected dominating set of G. As X is a
minimum connected dominating set, Y1 is a minimum connected dominating
set, too. Moreover, y1 has no neighbor in X \ {x1 }, in particular in X \ X 0 .
By reapplying the argumentation to Y1 and the induced Pk−2 on y1 , x1 ,
x2 , . . . , xk−3 , we obtain a vertex y2 ∈ V (G) \ Y1 such that Y2 := (Y1 ∪ {y2 }) \
{xk−3 } is a minimum connected dominating set of G and G[Y2 ] contains an
induced Pk−2 on the vertices y2 , y1 , x1 , x2 , . . . , xk−4 . Moreover, y2 has no
neighbor in Y1 \ {y1 }, in particular in X \ X 0 .
Iteratively, we end up with a minimum connected dominating set Yk−2 ,
which is exactly (X \ X 0 ) ∪ {y1 , . . . , yk−2 }. Since, for i = 1, 2, . . . , k − 2, yi
is not adjacent to X \ X 0 and G[Yk−2 ] is connected, X \ X 0 must be empty,
hence X = X 0 . Thus, G[X] = G[X 0 ] ∼
= Pk−2 . This completes the proof.
From Theorem 6.4, we derive the following characterization of Pk -free
graphs.
Theorem 6.7. Let G be a graph and k ≥ 4. The following assertions are
equivalent.
(i) G is Pk -free.
6.2 A polynomial-time algorithm to find a special connected
dominating set in Pk -free graphs
77
(ii) Every connected induced subgraph H of G admits a connected dominating set X such that H[X] is Pk−2 -free or H[X] ∼
= Ck .
Proof. Clearly Pk does not satisfy (ii) for H = Pk . Accordingly, (ii) implies
(i).
Conversely, let H be any connected induced subgraph of G, and let X
be a minimum connected dominating set of H. By Theorem 6.4, H[X] is
Pk−2 -free or H[X] ∼
= Pk−2 . If H[X] is Pk−2 -free, (ii) is satisfied. Otherwise,
let x1 x2 · · · xk−2 be a consecutive ordering of the induced path H[X]. In
particular, x1 and xk−2 are not cutvertices of H[X], since H[X] is Pk−2 . As
X is minimum, there exists a private neighbor yi of xi , for i ∈ {1, k − 2}.
It must be that y1 yk−2 ∈ E(H), since otherwise H[X ∪ {y1 , yk−2 }] ∼
= Pk .
∼
Hence, H[X ∪ {y1 , yk−2 }] = Ck , as desired. So, (i) implies (ii).
6.2
A polynomial-time algorithm to find a special
connected dominating set in Pk -free graphs
Now we give an algorithmic version of Theorem 6.4. Actually, most of the
proof of Theorem 6.4 holds if we start with a minimal connected dominating
set. However, the result would be: for any connected Pk -free graph, there
exists a minimal connected dominating set X of G such that G[X] is either
Pk−2 -free or isomorphic to Pk−2 . Then this proof is constructive in the sense
that it yields an algorithm to compute, given a connected Pk -free graph, a
connected dominating set that induces either a Pk−2 -free graph, or a graph
isomorphic to Pk−2 . This algorithm runs in polynomial time only when k
is fixed, and hence not useful for arbitrary input graphs. However, recall
that the computation of a longest induced path in a graph is an N P -hard
problem. In other words, there is little hope of computing in polynomial
time the minimum k for which the input graph is Pk -free. To overcome
this obstacle, our algorithm can only make implicit use of the absence of an
induced Pk , which is the main difficulty here.
Theorem 6.8. Given a connected graph G with n vertices and m edges, one
can compute in time O(n5 (n + m)) a connected dominating set X with the
following property: for the minimum k ≥ 4 such that G is Pk -free, G[X] is
Pk−2 -free or G[X] ∼
= Pk−2 .
Before we state our algorithm, we need to introduce some notation and
definitions. For this, let us assume we are given a connected input graph G
on n vertices and m edges. Let X be an arbitrary connected dominating set
of G with at least two vertices.
By NC (X) we denote the set of vertices in X that are non-cutting in
G[X], i.e. for every x ∈ NC (X), G[X \ {x}] is connected. Let x be a degree-1
vertex of G[X]. We define the half-path starting in x to be the maximal path
78
Chapter 6. A characterization of Pk -free graphs
xx1 x2 · · · xs in X such that dG[X] (xi ) = 2 for each i ∈ {1, 2, . . . , s − 1}. The
length of the half-path is then s. For example, if the neighbor y ∈ X of x
has degree at least 3, the half-path is simply xy.
To each x ∈ X we assign a weight wX (x) as follows:
1. if dG[X] (x) ≥ 2, put wX (x) = 0, and
2. if dG[X] (x) = 1, put wX (x) = s, where s is the length of the half-path
starting in x.
Finally, the weight w(X) of the set X is given by
X
w(X) =
(wX (x))2 .
x∈X
See Figure 6.1 for an illustration of these definitions.
0
2
0
0
0
0
0
1
Figure 6.1: A graph G. The black vertices form a connected dominating set
X of G, with weights wX as shown. We have w(X) = 22 + 12 = 5.
Let X be the family of all connected dominating sets of G. We next
define a strict partial order ≺ on X as follows. For any two sets X, Y ∈ X ,
we say that X is strictly smaller than Y according to ≺, denoted by X ≺ Y ,
if
1. |X| > |Y |, or
2. |X| = |Y | and w(X) < w(Y ).
We now consider the strict poset (X , ≺). The height of (X , ≺) is the maximum order of a set of mutually comparable elements of X .
Lemma 6.9. For a connected n-vertex graph G, the height of (X , ≺) is in
O(n3 ).
Proof. Let X be a connected dominating set of a connected graph G. If
G[X] is not an induced path, every vertex in XPof degree at most 2 in G[X]
is contained in at most one half-path. Hence, x∈X wX (x) ≤ |X|. If G[X]
is
Pan induced path, every vertex appears in exactly two half-paths, implying
x∈X wX (x) ≤ 2|X|. Thus
!2
X
X
2
w(X) =
(wX (x)) ≤
wX (x)
≤ 4|X|2 ,
x∈X
x∈X
6.2 A polynomial-time algorithm to find a special connected
dominating set in Pk -free graphs
79
and so the weight of a connected dominating set is in O(n2 ). Since there
are at most n different possible sizes of connected dominating sets of G, the
height of (X , ≺) is in O(n3 ).
Proof of Theorem 6.8. Assume we are given a connected graph G with n
vertices and m edges as input and let k ∈ N be the smallest integer such that
G is Pk -free. Our algorithm works as follows, starting with the connected
dominating set Y := V (G). Its output is a connected dominating set X with
the properties stated in Theorem 6.8.
1. Compute a minimal connected dominating set X ⊆ Y .
2. If G[X] is an induced path, return X and terminate the algorithm.
3. Compute the set NC (X) and the weight wX (x) for every x ∈ NC (X).
4. Order the vertices of NC (X) in non-increasing weight wX , breaking
ties arbitrarily. Let that order be v1 , v2 , . . . , v|NC (X)| .
5. For i from 1 to |NC (X)| do as follows:
(a) Compute a private neighbor yi of vi w.r.t. X.
(b) For j from i + 1 to |NC (X)| do as follows:
i. Check whether Yij := (X ∪ {yi }) \ {vj } is a connected dominating set.
ii. If yes, let Y ← Yij and go to Step 1.
6. Return X and terminate the algorithm.
We remark that the computation of yi in Step 5a is always possible, since xi
is non-cutting in G[X] and X is a minimal connected dominating set.
See Figure 6.2 for an illustration of Step 5(b)ii.
0
2
0
0
0
0
0
0
0
0
0
0
4
0
1
1
Figure 6.2: Before (left) and after (right) an application of Step 5(b)ii. In
the next iteration, the algorithm terminates with the connected dominating
set on the right as output.
The proof is completed by the following sequence of claims.
80
Chapter 6. A characterization of Pk -free graphs
Claim 6.10. When the algorithm terminates, the output X is a connected
dominating set and G[X] is Pk−2 -free or G[X] ∼
= Pk−2 .
Proof. Since Step 1 is applied before the algorithm terminates, X is always a minimal connected dominating set. Since G is Pk -free and hence
(Pk+1 , Ck+1 )-free, G[X] is Pk−1 -free, by Lemma 6.5. If the algorithm terminates with Step 2, it holds that G[X] is isomorphic to P` for some ` 6 k − 2.
Hence, either G[X] ∼
= Pk−2 or G[X] is Pk−2 -free.
Now assume that the algorithm terminates in Step 6. In particular, G[X]
is not an induced path. Suppose for a contradiction that G[X] contains
an induced Pk−2 , say on the vertices x1 , x2 , . . . , xk−2 . Like in the proof of
Lemma 6.6, neither x1 , nor xk−2 can be cutvertices of G[X]. Thus, x1 , xk−2 ∈
NC (X ).
After Step 4, the vertices of NC (X) are ordered v1 , v2 , . . . , v|NC (X)| with
non-increasing weight. Without loss of generality x1 = vi , xk−2 = vj , and
i < j and let yi be the private neighbor of vi that is computed by the
algorithm. As X is returned, the set Yij := (X ∪ {yi }) \ {vj } is in particular
not a connected dominating set, in contradiction to Lemma 6.6. This proves
our claim.
Claim 6.11. Let X be a minimal connected dominating set considered in
some iteration of the algorithm. Assume that the ‘go to’ is called in Step 5(b)ii
because Yij := (X ∪ {yi }) \ {vj } is a connected dominating set. Let X 0 be the
minimal connected dominating set computed in the subsequent Step 1. Then
X ≺ X 0.
Proof. Note that |X| > 2 since the ‘go to’ is called in Step 5(b)ii and G[X]
is not an induced path. So we can assume that every vertex in G[X] has
degree at least 1. Clearly |X 0 | ≤ |X|. If |X 0 | < |X|, X ≺ X 0 by definition.
So we may assume that |X 0 | = |X|, and hence X 0 = Yij . It remains to show
that w(X) < w(X 0 ).
Let z ∈ X \ {vi , vj }. If z has degree at least 2, then wX (z) = 0 and
hence wX 0 (z) > wX (z). Now suppose z has degree 1. Let zx1 x2 · · · xs be a
half-path starting in z. As G[X] is not a path, xs is a cutvertex of G[X]. In
particular, xs 6= vj . Hence, in G[X 0 ], zx1 x2 · · · xs is the initial segment of a
half-path starting in z. In particular, wX 0 (z) ≥ wX (z).
If vi is not a degree-1 vertex of G[X], wX 0 (vi ) = wX (vi ) = 0, and yi vi
is the initial segment of a half-path starting in yi . Hence, wX 0 (yi ) ≥ 1, and
thus
wX 0 (vi ) = 0 and wX 0 (yi ) ≥ wX (vi ) + 1.
(6.1)
If the degree of vi in G[X] is 1, let vi x1 x2 · · · xs be a half-path starting in
vi . Again, xs is a cutvertex of G[X], and so xs 6= vj . Hence, in G[X 0 ],
yi vi x1 x2 · · · xs is the initial segment of a half-path starting in yi . Again (6.1)
holds.
6.2 A polynomial-time algorithm to find a special connected
dominating set in Pk -free graphs
81
Summing up, we see that (6.1) holds, and
wX 0 (z) ≥ wX (z) for every vertex z ∈ X 0 \ {yi , vi }.
(6.2)
We now turn to the vertex vj . First assume that the degree of vj in G[X]
is at least 2, and thus wX (vj ) = 0. Combining this with (6.1) and (6.2)
yields
w(X 0 ) − w(X) ≥ wX 0 (yi )2 − wX (vj )2 > 0,
and so w(X 0 ) − w(X) > 0.
Now assume that vj is a vertex of degree 1 in G[X], and so wX (vj ) ≥ 1.
Let NG[X] (vj ) = {x}. As G[X] is not a path, dG[X] (x) ≥ 2, and so wX (x) =
0. Thus wX 0 (x) = wX (vj ) − 1. Recall that (6.1) and (6.2) hold. We obtain
the following inequality.
w(X 0 ) − w(X) ≥ wX 0 (yi )2 + wX 0 (x)2 − wX (vi )2 − wX (vj )2
= (wX 0 (yi )2 − wX (vi )2 ) − (wX (vj )2 − wX 0 (x)2 )
≥ [(wX (vi ) + 1)2 − wX (vi )2 ] − [wX (vj )2 − (wX (vj ) − 1)2 ]
But wX (vi ) ≥ wX (vj ) implies
(wX (vi ) + 1)2 − wX (vi )2 > wX (vj )2 − (wX (vj ) − 1)2 ,
and thus w(X 0 ) − w(X) > 0 holds as in the previous case.
Hence, X ≺ X 0 , proving our claim.
Claim 6.12. The algorithm terminates in O(n5 (n + m)) time.
Proof. By Claim 6.11, each call of the ‘go to’-step and the subsequent application of Step 1 result in a connected dominating set that is properly larger
in the order ≺. By Lemma 6.9, the height of the poset (X , ≺), and hence
the number of iterations the whole algorithm performs, is in O(n3 ).
The computational complexity of the particular steps remains to be discussed. For this, recall that it can be checked in time O(n + m) whether a
given vertex subset is a connected dominating set. Consequently, Step 1 can
be performed in time O(n(n + m)) by a straightforward greedy procedure.
Step 2 and the computation of the weights in Step 3 can both be performed in linear time using the degree sequence of G[X]. The computation
of the set NC (X) in Step 3 can be done in time O(m) [78].
It remains to discuss the computational complexity of the loop of Step 5.
The computation of a private neighbor in Step 5a can clearly be done in
O(n + m) time. The inner loop of Step 5b performs O(n) checks whether
some vertex set is a connected dominating set, requiring O(n+m) time each.
Hence, Step 5 can be done in O(n2 (n + m)) time.
The overall running time amounts to O(n5 (n + m)), which completes the
proof of both our claim and Theorem 6.8.
82
Chapter 6. A characterization of Pk -free graphs
Chapter 7
2-colorability of hypergraphs
In the previous chapter, we gave a description of the structure of connected
dominating sets in Pk -free graphs. We have shown that any connected Pk free graph admits a connected dominating set whose induced subgraph is
Pk−2 -free or isomorphic to Pk−2 . In fact, any minimum connected dominating set has this property. Loosely speaking, this means that the restricted
structure of connected Pk -free graph results in an even more restricted structure for the induced subgraph of their minimum connected dominating sets.
We now show how to apply these results to a computational problem. A
2-coloring of a hypergraph assigns to each vertex one of two colors, such
that each hyperedge contains vertices of both colors. The Hypergraph
2-Colorability problem is to decide whether a given hypergraph admits
a 2-coloring. In fact, we prove that Hypergraph 2-Colorability, an
N P -complete problem in general, can be solved in polynomial time for hypergraphs whose vertex-hyperedge incidence graph is P7 -free.
7.1
Classical results on hypergraph colorability
Many results are known on the 2-colorability problem in hypergraphs, of
which we present a brief summary. This section is split into two parts: the
former concerns sufficient conditions while the latter is about complexity.
Since our complexity result concerns hypergraphs with conditions on the
vertex-hyperedge incidence graph, we investigate known results with other
conditions on it.
7.1.1
Sufficient conditions
Firstly, conditions are imposed on the size of hyperedges, i.e. on the degree
of vertices corresponding to hyperedges in the incidence graph.
Erdős and Hajnal [56] proved the following theorem.
Theorem 7.1 ( Erdős, Hajnal [56]). All k-uniform hypergraphs with fewer
83
84
Chapter 7. 2-colorability of hypergraphs
than 2k−1 hyperedges is 2-colorable. Moreover, there exists a k-uniform hypergraph with at least k 2 2k−1 hyperedges which is not 2-colorable.
Beck [13, 14] and later Spencer [117], with a shorter proof, showed the
following theorem.
Theorem 7.2 (Beck [13, 14], Spencer [117]). Every k-uniform hypergraph
1
with at most k 3 −O(1) 2k hyperedges is 2-colorable.
Afterward, Radhakrishnan and Srinivasan [103] improved
the previous
q
k
k
upper bound on the number of hyperedges to 0.7
ln(k) 2 . Recently,
Pluhar [102] proved with a new technique a weaker result similar to Theorem 7.2 with the bound ck 1/4 2k .
Moreover, we can also consider hypergraphs with constraints on the degree of all vertices in the incidence graph, especially the d-uniform d-regular
hypergraphs. In these hypergraphs, every hyperedge contains exactly d vertices and each vertex is contained in exactly d hyperedges, i.e. the incidence
graph is d-regular.
In the book called ‘The probabilistic method’ [5], Alon and Spencer
explained the following theorem for hypergraphs with d-regular incidence
graph.
Theorem 7.3 (Alon, Spencer [5]). For d > 9, every d-uniform d-regular
hypergraph is 2-colorable.
Alon and Bregman [3] improved Theorem 7.3 by investigating the case
d = 8. It was implicitly known in literature that Theorem 7.3 was true for
all d > 4, as remarked by Vishwanathan [123] even though we had not seen
it explicitly proved until Henning and Yeo [76] provided a short proof, using
Thomassen’s result [118]. As noticed by Alon and Bregman the result is not
true when d = 3, as may be seen by considering the Fano plane illustrated
by Figure 7.1.
Figure 7.1: The Fano plane.
7.1 Classical results on hypergraph colorability
85
However, Henning and Yeo [76] characterized the 3-uniform 3-regular
hypergraphs in terms of 2-colorability, while Person and Schacht [101] showed
that almost all hypergraphs without Fano planes are 2-colorable.
Theorem 7.4 (Henning, Yeo [76]). Every connected 3-uniform 3-regular
hypergraph is either 2-colorable or becomes 2-colorable after deleting any hyperedge from it.
Finally, Vishwanathan gave another type of constraint on the incidence
graph: the number of quasi-matchings. If G = (A∪B, E) is a bipartite graph
with |A| > |B|, a quasi-matching is a subgraph of G in which the degree of
every vertex in A is one and the degree of every vertex in B is positive. Note
that when |A| = |B|, this is a perfect matching.
Theorem 7.5 (Vishwanathan [123]). Let H be a k-uniform hypergraph.
If the number of quasi-matchings in the incidence graph is different from
0 modulo k then H is 2-colorable.
7.1.2
Computational complexity results
Garey and Johnson [62, p. 221] mentioned that Hypergraph 2-Colorability is N P -complete in general, even for hypergraphs of rank at most 3,
i.e. hypergraphs where the cardinality of any hyperedges is at most 3, as
proved by Lovász [94]. However, it is solvable in polynomial time for hypergraphs of rank 2, i.e. graphs. Moreover, coloring a 2-colorable hypergraph
remains hard as the following result points out.
Theorem 7.6 (Guruswami, Hastad, Sudan [72]). For any constant c, it is
N P -hard to color a 2-colorable 4-uniform hypergraph with c colors.
Latter, Dinur, Regev and Smyth [51] generalized Theorem 7.6 to the class
of 2-colorable 3-uniform hypergraphs.
Theorem 7.7 (Dinur, Regev, Smyth [51]). For any integers k > 3, c2 >
c1 > 1, coloring a k-uniform c1 -colorable hypergraph with c2 colors is N P hard.
Finally, van ’t Hof and Paulusma [122] found a class of hypergraphs where
Hypergraph 2-Colorability problem can be solved in polynomial-time.
Theorem 7.8 (van ’t Hof, Paulusma [122]). Hypergraph 2-Colorability is solvable in polynomial time for hypergraphs with P6 -free incidence
graphs
Firstly, van ’t Hof and Paulusma [122] showed that we can only consider
clutter hypergraph: hypergraph for which no two hyperedges are comparable
with respect to inclusion. Then they applied their characterization of P6 -free
86
Chapter 7. 2-colorability of hypergraphs
graphs on the bipartite incidence graph, i.e. there is a connected dominating
set which is either isomorphic to C6 or contains a complete bipartite subgraph. Finally, they dealt each case in a very short proof. In the further
section, we settle similarly the case of hypergraphs with P7 -free incidence
graphs.
7.2
2-colorability of certain hypergraphs
Our following result is a double application of the characterization of Pk -free
graphs, proved in Chapter 6.
Theorem 7.9. Hypergraph 2-Colorability can be solved in polynomial
time for hypergraphs with P7 -free incidence graphs. If it exists, a 2-coloring
can be computed in polynomial time.
First of all, we simplify the structure of the hypergraph H = (V, E)
by considering only clutter, as proved by van ’t Hof and Paulusma [122].
Secondly, we apply our characterization of Pk -free graphs on the incidence
graph to obtain a connected P5 -free dominating set X, since odd cycle does
not exist in bipartite graph. Contrary to the argumentation of van ’t Hof
and Paulusma, we need to apply again our characterization on G[X] and we
bring out a dominating edge ve in the bipartite graph G[X], where v ∈ V
and e ∈ E. Finally, we settle the proof by dealing cases depending on the
cardinality of e.
Proof of Theorem 7.9. Let H = (V, E) be a hypergraph whose incidence
graph is P7 -free. We denote a 2-coloring of H by (A, B), where A, B ⊆ V
are two non-empty sets with A ∪ B = V , each of which intersects every
hyperedge.
The following observation was proven by van ’t Hof and Paulusma [122].
In order to be self-contained, we give a quick proof of it.
Claim 7.10. We may assume that H is a clutter, i.e. no hyperedge is included in another.
Proof. Assume there are hyperedges e, f ∈ E with e ⊆ f . We can detect
such a pair of hyperedges in polynomial time.
Every 2-coloring of H is a 2-coloring of the hypergraph H 0 = (V, E \ {f })
in particular. If (A, B) is a 2-coloring of H 0 , it holds that e ∩ A 6= ∅ and
e ∩ B 6= ∅. Thus, f ∩ A 6= ∅ and f ∩ B 6= ∅, and so (A, B) is a 2-coloring of
H.
So we may delete, for every such pair e, f ∈ E with e ⊆ f the hyperedge
f from H. It is clear that the resulting hypergraph is a clutter, and its
incidence graph is still P7 -free. This proves Claim 7.10.
7.2 2-colorability of certain hypergraphs
87
Although immediate, Claim 7.10 considerably simplifies the argumentation of the following proof. We now assume that H is a clutter. Moreover, we
may assume that H is connected, which is, its incidence graph is connected.
In the following, we prove a sequence of claims that discuss all relevant cases
for the 2-coloring problem. We give the polynomial-time algorithm along
the way.
Let G be the incidence graph of H. Since we are searching for a 2-coloring,
we may assume that |NG (f )| ≥ 2 for every f ∈ E. By Theorem 6.7, there is
a connected dominating set X of G such that G[X] is P5 -free or G[X] ∼
= C7 .
However, the latter case contradicts the fact that G is bipartite. So, G[X] is
a connected P5 -free graph.
Using Theorem 6.7 again, we see that G[X] has a connected dominating
set Y such that G[Y ] is P3 -free. That is, there is a pair of adjacent vertices,
say v ∈ V and e ∈ E, that together dominate G[X]. In particular, e is
adjacent to vertices of X from the ground set V in the bipartite graph G[X],
which dominate the hyperedge set in G, i.e. e intersects every other hyperedge
of H. It is clear that we can compute such a hyperedge in polynomial time.
Claim 7.11. If there is a proper subset Y ⊂ e which dominates E in G,
(Y, V \ Y ) is a 2-coloring of H.
Proof. Let f ∈ E be arbitrary. By assumption, f ∩ Y 6= ∅. Since H is a
clutter, f 6⊆ e, and thus f 6⊆ Y . Hence, f \ Y 6= ∅, proving Claim 7.11.
Indeed, it can be checked in polynomial time whether there is a proper
subset Y ⊂ e that dominates E. (If so, Y is found in polynomial time, too.)
In view of Claim 7.11, we may assume that no proper subset of e dominates
E.
We now make a distinction between the cases |e| = 2 and |e| ≥ 3. Let
us first assume that |e| = 2, say e = {x, y}. Since H is a clutter, every
hyperedge f of H contains either x or y. Let Ex , Ey ⊆ E \ {e} such that
every f ∈ Ex contains x, every g ∈ Ey contains y, and Ex ∪ Ey = E \ {e}.
If |Ex | = 0, every hyperedge contains y and, as H is a clutter, another
vertex. Thus a 2-coloring of H is given by ({y}, V \ {y}). By symmetry,
we may now assume that |Ex |, |Ey | ≥ 1. Observe that, if |Ex | = 1, say
Ex = {f }, H is 2-colorable if and only if there is a vertex v ∈ f such that
({v, y}, V \ {v, y}) is a 2-coloring of H. Suppose that H is 2-colorable. If for
every vertex v ∈ f , ({v, y}, V \ {v, y}) is not a 2-coloring of H, there exists
a hyperedge ev = {v, y} for each such vertex v. Let now v be an arbitrary
vertex in f . Since e = {x, y} and ev = {y, v} are two hyperedges of H,
then x and v must have the same color, and so there is a vertex v 0 ∈ f with
the second color. Then, the hyperedge ev0 = {v 0 , y} is monochromatic, a
contradiction. This condition can clearly be checked in polynomial time.
Now let |Ex |, |Ey | ≥ 2. We show next that H admits a 2-coloring. To see
this, pick any f ∈ Ex and g ∈ Ey . Since H is a clutter, f \ e, g \ e 6= ∅. Pick
88
Chapter 7. 2-colorability of hypergraphs
any u ∈ f \ e and v ∈ g \ e. If f v, gu 6∈ E(G), G[{u, f, x, e, y, g, v}] ∼
= P7 ,
a contradiction. As u and v were arbitrary, it must be that f \ e ⊆ g \ e or
g \ e ⊆ f \ e.
Now let f, f 0 ∈ Ex and g ∈ Ey be three mutually distinct hyperedges.
As shown above, the sets f \ e, f 0 \ e are comparable to g \ e. Since H is a
clutter, f \ e is not comparable to f 0 \ e. Hence, either f \ e, f 0 \ e ⊆ g, or
g \ e ⊆ f, f 0 .
S
T In the first case, f \ e ⊆ g for any f ∈ Ex , g ∈ Ey . Thus, ( f ∈Ex f ) \ e ⊆
g. Since H is a clutter, every g ∈ Ey has a neighbor outside the set
g∈EyT
{y} ∪ g∈Ey g. Hence,
({y} ∪
\
g, V \ ({y} ∪
g∈Ey
\
g))
g∈Ey
is a 2-coloring of H. The second case, g \ e ⊆ f, f 0 , is dealt with in a similar
fashion.
So we may assume |e| ≥ 3. Since no proper subset of e dominates E in
G, the following assertion holds: for every x ∈ e there is a hyperedge fx such
that fx ∩ e = {x}.
Claim 7.12. For all x, y ∈ e, fx \ e = fy \ e.
Proof. Let x, y ∈ e. The case where x = y is trivial. So we may assume that
x 6= y.
Suppose that there is a vertex z ∈ fx \ (e ∪ fy ). If there is a vertex
0
z ∈ fy \ (e ∪ fx ), G[{z, fx , x, e, y, fy , z 0 }] ∼
= P7 , a contradiction. Thus,
fy \ (e ∪ fx ) = ∅, and so fy \ e ⊆ fx \ e.
Since H is a clutter, there is a vertex u ∈ fy \ e. As fy \ e ⊆ fx \ e,
u ∈ (fx ∩ fy ) \ e. Since |e| ≥ 3, there is a vertex v ∈ e \ {x, y}. But then
G[{z, fx , u, fy , y, e, v}] ∼
= P7 , a contradiction.
So, fx \ (e ∪ fy ) = ∅ and, for symmetry, fy \ (e ∪ fx ) = ∅. This proves
Claim 7.12. For an illustration, see Figure 7.2.
fy
fx
z
u
x
e
y
v
Figure 7.2: The situation in the proof of Claim 7.12.
Claim 7.13. If |fx \ e| = 1 for some x ∈ e, H does not admit a 2-coloring.
7.2 2-colorability of certain hypergraphs
89
Proof. Assume that |fx \ e| = 1 for some x ∈ e. By Claim 7.12, there is a
vertex v ∈ V such that fy \ e = {v} for all y ∈ e.
Suppose that (A, B) is a 2-coloring of H. We may assume that v ∈ A.
Since for every z ∈ e, fz ∩ B 6= ∅, e ⊆ B holds, a contradiction. So Claim
7.13 holds.
It can be checked in polynomial time whether |fx \ e| = 1 for some x ∈ e.
In view of Claim 7.12 and Claim 7.13, we may now assume that |fx \ e| ≥ 2
for all x ∈ e.
Claim 7.14. Let x, y ∈ e be two arbitrary, distinct vertices and let z ∈ fx \e.
A 2-coloring of H is given by ({x, y, z}, V \ {x, y, z}).
Proof. Let x, y, z be chosen according to the claim. Suppose that ({x, y, z},
V \ {x, y, z}) is not a 2-coloring of H. Thus there is a hyperedge f with
f ⊆ {x, y, z} or f ∩ {x, y, z} = ∅.
Let us first assume f ⊆ {x, y, z}. In particular, |f \ e| ≤ 1. Since
|fx0 \ e| ≥ 2 for all x0 ∈ e, we know that |f ∩ e| =
6 1. As NG (e) dominates
the set E, |f ∩ e| ≥ 2 and so x, y ∈ f . Since H is a clutter, f 6⊆ e, and so
f = {x, y, z}.
By assumption, |fx \ e| ≥ 2, and so there is a vertex z 0 ∈ fx \ (e ∪
{z}). Moreover, since |e| ≥ 3, there is a vertex x0 ∈ E \ {x, y}. But then
G[{z 0 , fx , z, f, y, e, x0 }] ∼
= P7 , a contradiction.
So we may assume f ∩ {x, y, z} = ∅. As NG (e) dominates E, e ∩ f 6= ∅.
Let x0 ∈ e ∩ f . As H is not a clutter, there is some z 0 ∈ f \ e. This situation
is illustrated in Figure 7.3.
f
z0
fx
e
x0
y
x
z
Figure 7.3: The situation in the proof of Claim 7.14. The dashed edge is
optional.
If fx z 0 ∈ E(G), G[{z, fx , z 0 , f, x0 , e, y}] ∼
= P7 , a contradiction. Otherwise,
G[{z, fx , x, e, x0 , f, z 0 }] ∼
= P7 , another contradiction. This proves Claim 7.14.
Clearly, a 2-coloring as provided by Claim 7.14 can be constructed efficiently. This completes the proof.
90
Chapter 7. 2-colorability of hypergraphs
Chapter 8
The Pk -hitting set problem
For a fixed k > 2, a Pk -hitting set of a graph G is a set X of vertices
such that G − X does not contain any path on k vertices as a subgraph.
In other words, X is a Pk -hitting set if and only if X meets the vertex
set of every path on k vertices in G. Naturally, we are interested in the
minimum size of a Pk -hitting set, the Pk -hitting number denoted by ψk (G).
The Pk -hitting set problem is motivated by applications, e.g., to the wireless
sensor networks [66,99,100,124]. In this chapter, we focus on computational
aspects, especially on approximation algorithms.
Clearly, the P2 -hitting set problem is the well-known vertex cover problem. Since the vertex cover problem is N P -complete, it is not surprising that
so is the Pk -hitting set problem, for each k > 3. Brešar, Kardoš, Katrenič and
Semanišin [28] reduced the vertex cover problem to the Pk -hitting set problem by adding a pendent path on b k−1
2 c vertices to each vertex of the graph.
This straightforward reduction shows that every α-approximation algorithm
for the Pk -hitting set problem can be turned into an α-approximation algorithm for the vertex cover problem. Hence, obtaining such an algorithm with
α < 2 for some k > 2 is unlikely for general graphs. However, we remark
that in certain classes of graph, one could approximate the Pk -hitting set
problem within a performance ratio smaller than 2.
The case k = 3. By complementary, the dissociation set of a graph corresponds to a P3 -hitting set. Indeed, as defined by several authors [22, 68,
81, 125], the dissociation set of a graph G is a vertex subset of V (G) whose
induced subgraph has maximum degree 1. Thus, the dissociation number ,
which is the maximum size of a dissociation set, is the difference between
the number of vertices and ψ3 (G).
As observed by Tu and Zhou [120,121], the primal-dual 2-approximation
algorithm [12, 15, 46] for the feedback vertex set problem readily gives a 2approximation for the P3 -hitting set problem when adapted to this case. At
a high level point of view, this is essentially due to the fact that graphs
91
92
Chapter 8. The Pk -hitting set problem
not containing P3 as a subgraph are very restricted forests (every connected
component being isomorphic to K1 or K2 ). Tu and Yang [119] investigated
the P3 -hitting set problem for cubic graphs. For this special class of graphs,
they proved the N P -completeness of the P3 -hitting set problem, gave sharp
lower and upper bounds on ψ3 (G) and proposed a 1.57-approximation algorithm. Kardoš, Katrenič and Schiermeyer [81] presented an exact algorithm
with a running time O(1.5171n ) for the P3 -hitting set problem.
The case k = 4. In this chapter, we explain a 3-approximation algorithm
for the P4 -hitting set problem. Our algorithm follows a primal-dual approach
and is very much inspired by the 2-approximation for the feedback vertex set
problem [12, 15, 46]. We note that, as is usual with primal-dual algorithms,
our 3-approximation algorithm also works for the vertex-weighted version of
the problem.
The general case. Brešar et al. [28] described a linear-time exact algorithm in the class of trees and proved the upper bound ψk (T ) 6 |V (T )|/k,
for any tree T . For an arbitrary graph G, they also found various upper
and lower bounds on ψk (G) depending on the number of edges, the degree
of vertices or other invariants and even exact value in certain classes of
graphs [27, 28].
For k > 4, one difficulty of the Pk -hitting set problem is that graphs containing no Pk as a subgraph may have cycles. Note that a k-approximation
can trivially be obtained by taking all vertices in an inclusion-wise maximal packing of vertex-disjoint subgraphs each isomorphic to Pk . However,
nothing better than a k-approximation is known for the problem in general
graphs when k > 4, but for a variant of the feedback vertex set problem,
Guruswami and Lee [73] proved recently strong N P -hardness of approximation result: under the Unique Games Conjecture, for any integer k > 3, and
ε > 0, it is hard to find a (k − ε)-approximate solution to the problem of
intersecting every cycle of length at most k.
A natural question arises: is there an ε > 0 such that the Pk -hitting set
problem can be approximated to within a performance ratio of (1 − ε)k in
polynomial time for every fixed k > 4?
8.1
P4 -hitting set for general graphs
The main result of this chapter is the following theorem.
Theorem 8.1. The P4 -hitting set problem admits a 3-approximation algorithm.
Our algorithm is based on the primal-dual method, see [65] for a survey
of that method. The starting point is the following linear programming (LP)
8.1 P4 -hitting set for general graphs
93
relaxation of the problem. Below, P4 (G) denotes the set of subgraphs P ⊆ G
that are isomorphic to P4 , E(X) denotes the set of edges in G[X] for every
X ⊂ V (G) and dX (v) denotes the degree of the vertex v in G[X].
X
xv
MIN
v∈V (G)
s.t.
X
∀P ∈ P4 (G);
xv > 1
(1)
v∈V (P )
X
(dS (v) − 1)xv > |E(S)| − |S|
∀∅ ( S ⊆ V (G); (2)
v∈S
∀v ∈ V (G).
xv > 0
The dual of this LP relaxation is:
MAX
X
X
zP
P ∈P4 (G)
S⊆V (G)
s.t.
X
(|E(S)| − |S|) yS +
X
(dS (v) − 1) yS +
S:v∈S
zP 6 1
∀v ∈ V (G);
(3)
P :v∈V (P )
∀S ⊆ V (G);
∀P ∈ P4 (G).
yS > 0
zP > 0
The variables yS (∅ ( S ⊆ V (G)) of the dual correspond to inequalities
(2), which we call sparsity inequalities, while the variables zP (P ∈ P4 (G))
correspond to the covering constraints (1). Before explaining the algorithm,
we verify that the LP given above is indeed a relaxation of our problem.
Lemma 8.2. Let X be a P4 -hitting set of the graph G = (V, E). For any
S ⊆V,
X
(dS (v) − 1) > |E(S)| − |S|.
(8.1)
v∈X∩S
Proof. To see that (8.1) holds, first consider the case S = V (G) = V . If
E(X, V \ X) denotes edges between X and V \ X, we have
X
X
(dV (v) − 1) =
dV (v) − |X|
v∈X
v∈X
= 2|E(X)| + |E(X, V \ X)| − |X|
= |E(G)| + |E(X)| − |E(V \ X)| − |X|
= |E(G)| − |V | + |E(X)| − |E(V \ X)| + |V \ X|
> |E(G)| − |V | − |E(V \ X)| + |V \ X|
> |E(G)| − |V |.
94
Chapter 8. The Pk -hitting set problem
The last inequality is the key inequality here. It stems from the fact that
|E(H)| 6 |V (H)| for every graph H not containing a subgraph isomorphic
to P4 , as is easily checked.
Finally, the validity in the case of an arbitrary subset S of V (G) follows
from the observation that if X is a P4 -hitting set of G then X ∩ S is a
P4 -hitting set of G[S].
Our algorithm essentially follows the standard template from the primaldual method. The main difference compared to, e.g., Chudak, Goemans,
Hochbaum and Williamson [46] is that we have two types of inequalities
(the sparsity constraints and the covering constraints) rather than one.
The algorithm maintains an initially infeasible 0/1-solution x to the primal LP and a feasible solution (y, z) to the dual LP. In each iteration, a
certain dual variable is raised until a dual constraint (3) becomes tight. The
corresponding vertex is then “added” to the primal solution. These steps
are repeated until the primal solution becomes feasible. Finally, a “reversedelete” operation is performed and ensures a certain form of minimality for
the P4 -hitting set X output by the algorithm, which is needed in the analysis.
A subtlety of the algorithm is that we do not allow to increase a dual
variable of the type zP for every P ∈ P4 (G). This is allowed only for
“good” paths P ∈ P4 (G), where P is said to be good in G if for some vertex
v ∈ V (P ), every subgraph of G isomorphic to P4 that includes v also includes
another vertex from P . Observe also that every inclusion-wise minimal P4 hitting set of G avoids the vertex v, and thus contains at most 3 vertices
from P . Also, the non-existence of good paths simplifies the analysis of our
algorithm and imposes a structure on the graph, as explained in the following
lemma. A vertex v ∈ V (G) is irrelevant for G if for every P ∈ P4 (G), v ∈
/
V (P ).
Lemma 8.3. Let G be a graph without irrelevant vertices. If none of the
paths P ∈ P4 (G) is good, then G has minimum degree at least 3.
Proof. Observe that for every vertex v ∈ V (G), there exists a path Pv ∈
P4 (G) such that v ∈ V (Pv ).
Firstly, we suppose that there exists a degree-1 vertex v ∈ V (G). Let Pv
be a corresponding 4-vertex path. Then Pv is a good path in G since every
path P ∈ P4 (G) with v ∈ V (P ) must contain the neighbor of v.
Secondly, assume that G has a degree-2 vertex v. Let u1 , u2 be the
neighbors of v and Pv a corresponding 4-vertex path of v. If {u1 , u2 } * V (Pv )
then Pv contains either u1 or u2 , say u1 . Hence Pv = vu1 xy for some
vertices x, y ∈ V (G). Thus, P = u2 vu1 x is a good path in G, since every
path P ∈ P4 (G) with v ∈ V (P ) must contain either u1 or u2 . Otherwise
{u1 , u2 } ⊆ V (Pv ). Similarly, Pv is a good path in G.
In both cases, we obtain a contradiction. Thus the minimum degree of
G is at least 3.
8.1 P4 -hitting set for general graphs
95
Before proving Theorem 8.1, we prove the helpful following lemma.
Lemma 8.4. Let G be a graph without irrelevant vertices and without good
paths P ∈ P4 (G). For any inclusion-wise minimal P4 -hitting set X of G,
X
(dG (v) − 1) 6 3(|E(G)| − |V (G)|)
(8.2)
v∈X
Proof. By Lemma 8.3, the minimum degree of G is at least 3. Since X is
a P4 -hitting set, G − X is the disjoint union of triangles and stars, where a
vertex and an edge are particular stars. Suppose that there are k ? stars and
k 4 triangles in G − X. Note by ξ(X) the number of edges between X and
V (G) \ X, i.e. ξ(X) = |E(X, V (G) \ X)|. Because a triangle has 3 edges and
a forest on n vertices with s connected components has n − s edges, we have
X
dG (v) = 2|E(G)| − ξ(X) − 2(3k 4 + (|V (G)| − |X| − 3k 4 − k ? )).
v∈X
Hence, (8.2) is equivalent to
|X| + 2k ? + |V (G)| − |E(G)| 6 ξ(X).
(8.3)
Since the minimum degree of G is at least 3,
X
X
2|E(G)| =
dG (v) >
3 = 3|V (G)|.
v∈V (G)
v∈V (G)
Then the left member of (8.3) is upper bounded by:
|X| + 2k ? + |V (G)| − |E(G)| 6 |X| + 2k ? −
We distinguish two cases. Assume that |X| 6
|X| + 2k ? −
|V (G)|
2
|V (G)|
.
2
+ k ? . Thus
|V (G)|
|V (G)|
|V (G)|
6
+ 3k ? −
= 3k ? .
2
2
2
Besides, 3k ? 6 ξ(X) because each star in V (G) \ X sends 3 edges to X since
the minimum degree of G is at least 3.
Now, suppose that |X| > |V (G)|
+ k ? . Since each star contains at least
2
+ 2k ? ,
one vertex, |X| + k ? 6 |V (G)|. Hence |V (G)| > |X| + k ? > |V (G)|
2
|V (G)|
which implies 4 > k ? . Thus,
|X| + 2k ? −
|V (G)|
|V (G)| |V (G)|
6 |X| + 2
−
= |X|
2
4
2
Furthermore, |X| 6 ξ(X) since, by minimality of X, each vertex x in X has a
private path, which is a path Px on 4 vertices such that V (Px )∩X = {x}.
Chapter 8. The Pk -hitting set problem
96
Algorithm 1 Primal-dual 3-approximation algorithm for P4 -hitting set
Require: A graph G
Ensure: A P4 -hitting set X of G
X ← ∅, G0 ← G, ` ← 0
yS ← 0 for every subset S ⊆ V (G)
zP ← 0 for every subgraph P of G isomorphic to P4
while G0 contains a subgraph isomorphic to P4 do
`←`+1
V 0 ← V (G0 )
Remove from G0 every vertex v that is irrelevant for G0
if G0 contains a good P4 in G0 , say P , then
Increase zP until ∃v` ∈ V 0 :
X
X
(dS (v` ) − 1) yS +
zP = 1
S:v` ∈S
else
Increase yV 0 until ∃v` ∈ V 0 :
X
(dS (v` ) − 1) yS +
S:v` ∈S
end if
X ← X ∪ {v` }
G0 ← G0 − v `
end while
for j ← ` downto 1 do
if X − {vj } is a P4 -hitting set then
X ← X − {vj }
end if
end for
return X
P :v` ∈V (P )
X
P :v` ∈V (P )
zP = 1
8.1 P4 -hitting set for general graphs
97
Proof of Theorem 8.1. We show that Algorithm 1 is a 3-approximation. Let
X be the P4 -hitting set output by Algorithm 1.
Firstly, since the “reverse-delete” step deletes redundant vertices in the reverse of the order in which they were added, X ∩V (G0 ) must be an inclusionwise minimal P4 -hitting set of every current graph G0 .
Secondly, since every vertex added in X is tight for the sparsity constraint, we have
X
|X| =
1
v∈X 

X X
X

=
zP 
(dS (v) − 1) yS +
v∈X
=
(?)
6
S:v∈S
P
!:v∈V (P )
X
X
∅(S⊆V (G)
v∈X∩S
X
(dS (v) − 1)
X
=
3
6
3 ψ4 (G)
|P ∩ X| zP
P ∈P4 (G)
X
3(|E(S)| − |S|) yS +
∅(S⊆V
 (G)
X
yS +
3 zP
P ∈P4 (G)

(|E(S)| − |S|) yS +
∅(S⊆V (G)
X
zP 
P ∈P4 (G)
We explain the key inequality (?). For the first sum, we can only consider terms when yS 6= 0, i.e. when S = V (G0 ) for one current graph G0
without irrelevant vertices and without good paths in P4 (G0 ). Accordingly,
Lemma 8.4 implies directly what we want because X ∩ S is an inclusionwise minimal P4 -hitting set of G0 . For the second sum, we only consider
terms when zP 6= 0, i.e. when P is a good path of one current G0 . By definition, this path must have at most 3 vertices in every minimal inclusion0
wise
X ∩ V (G0 ). Finally, we conclude because
P P4 -hitting set of G , e.g. P
∅(S⊆V (G) (|E(S)| − |S|) yS +
P ∈P4 (G) zP is a lower bound on ψ4 (G) by
duality.
Note that our algorithm runs in polynomial time because testing if a
path is good can be done in polynomial time.
98
Chapter 8. The Pk -hitting set problem
Chapter 9
Conclusion and further
research
In this research, several problems were solved, but our reflection has led to
new questions, which concern the algorithmic and structural points of view.
• The price of connectivity
Given a graph G and a constant r, we proved that the problem of
deciding whether the price of connectivity of G is at most r is Θp2 complete, for the vertex cover problem and the dominating set problem.
Then, for both problems, we considered the following distinct decision
problem: for any constant r, given a graph G, determine whether the
price of connectivity for all induced subgraphs of G is at most r. We
characterized the class of graphs with a ‘yes’-answer to the previous
question, which are called PoC-near-perfect graphs, for small values of
r, namely r ∈ [1, 3/2] for both problems. Hence, a natural question is to
know, given a rational number r ∈ (3/2, 2) for the vertex cover problem
and r ∈ (3/2, 3) for the dominating set problem, whether the list of
minimal forbidden graphs is finite for the characterization of PoC-nearperfect graphs with threshold r? In particular, for the dominating set
problem, are C9 , P9 and the graph H from Conjecture 5.9 the only
minimal forbidden graphs for the characterization of PoC-near-perfect
graphs with threshold 2?
For the vertex cover problem, in the class of chordal graphs, we proved
that the class of critical graphs is the same as the class of stronglycritical graphs, which can be characterized by special trees. A natural question arises: for both problems, is it possible to characterize
strongly-critical graphs, and more generally critical graphs? It might
also be interesting to investigate the computational complexity of the
critical-graph recognition.
For the dominating set problem, we noticed that even in the class
99
100
Chapter 9. Conclusion and further research
of trees, critical graphs are not completely known. The computation
of the domination number and the connected domination number is
linear in the class of trees. Hence, the price of connectivity of every
tree can be computed in linear time. However, recognizing whether a
tree is critical is still of unknown computational complexity. From a
structural point of view, is it possible to characterize critical trees?
In this thesis, for the dominating set problem, we studied the price
of connectivity of graphs with diameter 2 and some other constraints.
According to the obtained results, we conjecture that the price of connectivity of graphs with diameter 2 is always bounded by 3/2.
• The characterization of Pk -free graphs and applications
We gave a characterization of Pk -free graphs: a graph G is Pk -free if
and only if every connected induced subgraph of G admits a connected
dominating set which is either Pk−2 -free or isomorphic to Ck . As an application of this characterization, we gave a polynomial-time algorithm
solving the Hypergraph 2-Colorability problem for hypergraphs
with P7 -free incidence graphs. Consequently, a natural question would
be to know whether there is any k for which the Hypergraph 2Colorability problem for hypergraphs with Pk -free incidence graphs
is N P -complete.
• The Pk -hitting set problem for k > 4
We described a 3-approximation algorithm for the P4 -hitting set problem, based on the primal-dual method. Is it possible to push our
algorithm further, for instance by adding other constraints, in order
to obtain a 2-approximation? Is there an ε > 0 such that the Pk hitting set problem can be approximated to within a performance ratio
of (1 − ε)k in polynomial time for every fixed k > 4?
A variant of the Pk -hitting set could be a set of vertices meeting all induced k-vertex paths (called Pk -induced-hitting set). Of course, every
Pk -hitting set is a Pk -induced-hitting set but the converse is not true.
This problem is also N P -complete, since the reduction of Brešar, Kardoš, Katrenič and Semanišin [28] from the vertex cover problem holds.
It might be interesting to design specialized approximation algorithms
for this problem.
To summarize, this thesis is a path from the price of connectivity to the
Pk -hitting set problem, through induced subgraphs.
Bibliography
[1] M. Agrawal, N. Kayal, N. Saxena, PRIMES is in P, Annals of
mathematics (2004), pp. 781–793.
[2] L. Agussurja, H.C. Lau, The price of stability in selfish scheduling
games, Web Intelligence and Agent Systems 7 (2009), pp. 321–332.
[3] N. Alon, Z. Bregman, Every 8-uniform 8-regular hypergraph is 2colorable, Graphs and Combinatorics 4 (1988), pp. 303–306.
[4] N. Alon, D. Moshkovitz, S. Safra, Algorithmic construction of
sets for k-restrictions, ACM Transactions on Algorithms (TALG) 2
(2006), pp.153–177.
[5] N. Alon, J.H. Spencer, The probabilistic method, John Wiley and
Sons (2004).
[6] E. Anshelevich, A. Dasgupta, J. Kleinberg, E. Tardos,
T. Wexler, T. Roughgarden, The price of stability for network design with fair cost allocation, SIAM Journal on Computing 38 (2008),
pp. 1602–1623.
[7] J. Aspnes, Competitive analysis of distributed algorithms, Online
Algorithms (1998), pp. 118–146.
[8] R.J. Aumann, S. Hart, Handbook of game theory with economic
applications, North-Holland (1994).
[9] B. Awerbuch, Y. Azar, S. Plotkin, Throughput-competitive online routing, Proceedings of 34th Annual Symposium on Foundations of
Computer Science (1993), pp. 32–40.
[10] B. Awerbuch, S. Kutten, D. Peleg, Competitive distributed job
scheduling, Proceedings of the twenty-fourth annual ACM symposium
on Theory of computing (1992), pp. 571–580.
[11] G. Bácso, Z. Tuza, Dominating cliques in P5 -free graphs, Periodica
Mathematica Hungarica 21 (1990), pp. 303-308.
101
102
BIBLIOGRAPHY
[12] V. Bafna, P. Berman, T. Fujito, A 2-approximation algorithm for
the undirected feedback vertex set problem, SIAM Journal on Discrete
Mathematics 12 (1999), pp. 289–297.
[13] J. Beck, On 3-chromatic hypergraphs,
(1978), pp. 127–137.
Discrete Mathematics 24
[14] J. Beck, On a combinatorial problem of P. Erdős and L. Lovász,
Discrete Mathematics 17 (1977), pp. 127–131.
[15] A. Becker, D. Geiger, Optimization of Pearl’s method of conditioning and greedy-like approximation algorithms for the vertex feedback
set problem, Artificial Intelligence 83 (1996), pp. 167–188.
[16] R. Belmonte, P. van ’t Hof, M. Kamiński, D. Paulusma, Forbidden Induced Subgraphs and the Price of Connectivity for Feedback
Vertex Set, Mathematical Foundations of Computer Science (2014),
pp. 57–68.
[17] R. Belmonte, P. van ’t Hof, M. Kamiński, D. Paulusma, The
price of connectivity for feedback vertex set, The Seventh European
Conference on Combinatorics, Graph Theory and Applications (2013),
pp. 123–128.
[18] S. Ben-David, A. Borodin, R. Karp, G. Tardos, A. Wigderson,
On the power of randomization in on-line algorithms, Algorithmica 11
(1994), pp. 2–14.
[19] A.A. Bertossi, Dominating sets for split and bipartite graphs, Information processing letters 19 (1984), pp. 37–40.
[20] M. Blidia, M. Chellali, O. Favaron, Ratios of some domination
parameters in graphs and claw-free graphs, Graph Theory in Paris
(2007), pp. 61–72.
[21] J. Blum, M. Ding, A. Thaeler, X. Cheng, Connected Dominating Set in Sensor Networks and MANETs, Handbook of Combinatorial
Optimization, Springer (2005), pp. 329–369.
[22] R. Boliac, C. Cameron, V. Lozin, On computing the dissociation
number and the induced matching number of bipartite graphs, Ars
Combinatoria 72 (2004), pp. 241–253.
[23] J. A. Bondy, P. Erdős, S. Fajtlowicz, Graphs of diameter two
with no 4-circuits, Discrete mathematics 200 (1999), pp. 21–25.
[24] F. Bonomo, M. Chudnovsky, P. Maceli, O. Schaudt, M. Stein,
M. Zhong, Three-coloring graphs without induced paths on seven
vertices, in process.
BIBLIOGRAPHY
103
[25] A. Borodin, R. El-Yaniv, Online computation and competitive analysis, Cambridge University Press Cambridge 2 (1998).
[26] A. Brandstädt, V.B. Le, J. Spinrad, Graph classes: a survey.
SIAM Monographs on Discrete Mathematics and Applications 3 (1999).
[27] B. Brešar, M. Jakovac, J. Katrenič, G. Semanišin, A. Taranenko, On the vertex k-path cover, Discrete Applied Mathematics 161
(2013), pp. 1943–1949.
[28] B. Brešar, F. Kardoš, J. Katrenič, G. Semanišin, Minimum kpath vertex cover, Discrete Applied Mathematics 159 (2011), pp. 1189–
1195.
[29] R.C. Brigham, R.D. Dutton, Domination in claw-free graphs, Congressus Numerantium (1998), pp. 69–76.
[30] E. Camby, Prix de la Connexité pour le Problème de l’Ensemble Dominant, Master thesis, UMons (2010).
[31] E. Camby, J. Cardinal, M. Chapelle, S. Fiorini, G. Joret,
A Primal-Dual 3-Approximation Algorithm for Hitting 4-Vertex Paths,
Proceedings of 9th International colloquium on graph theory and combinatorics (2014), p. 61.
[32] E. Camby, J. Cardinal, S. Fiorini, O. Schaudt, The price of
connectivity for vertex cover, Discrete Mathematics & Theoretical Computer Science 16 (2014), pp. 207–224.
[33] E. Camby, J. Cardinal, S. Fiorini, O. Schaudt, The price of Connectivity for Vertex Cover: Perfect, Near-Perfect and Critical Graphs,
Proceedings of 11th Cologne-Twente Workshop on Graphs and Combinatorial Optimization (2012), pp. 56–59.
[34] E. Camby, O. Schaudt, A new characterization of Pk -free graphs,
Algorithmica 71 (2015).
[35] E. Camby, O. Schaudt, A new characterization of Pk -free graphs,
Proceedings of 40th International Workshop on Graph-Theoretic Concepts in Computer Science (2014), pp. 129–138.
[36] E. Camby, O. Schaudt, The price of connectivity for dominating
sets: upper bounds and complexity, Discrete Applied Mathematics 177
(2014), pp. 53–59.
[37] E. Camby, O. Schaudt, Connected dominating set in graphs without
long paths and cycles, Proceedings of 12th Cologne-Twente Workshop
on Graphs and Combinatorial Optimization (2013), pp. 39–42.
104
BIBLIOGRAPHY
[38] C. Camerer, Behavioral game theory: Experiments in strategic interaction, Princeton University Press (2003).
[39] G. Caporossi, Variable neighborhood search for extremal vertices:
The AutoGraphiX-III system, Les cahiers du GERAD G-2015-09
(2015).
[40] G. Caporossi, P. Hansen, Variable neighborhood search for extremal
graphs: 1 The AutoGraphiX system, Discrete Mathematics 212 (2000),
pp. 29–44.
[41] J. Cardinal, E. Levy, Connected vertex covers in dense graphs,
Theoretical Computer Science 411 (2010), pp. 2581–2590.
[42] M. Chellali, O. Favaron, T.W. Haynes, D. Raber, Ratios of
some domination parameters in trees, Discrete Mathematics 308 (2008),
pp. 3879–3887.
[43] G. Christodoulou, Price of Anarchy, Encyclopedia of Algorithms
(2008), pp. 1–99.
[44] G. Christodoulou, E. Koutsoupias, On the price of anarchy and
stability of correlated equilibria of linear congestion games, Algorithms–
ESA (2005), pp 59–70.
[45] G. Christodoulou, E. Koutsoupias, The price of anarchy of finite congestion games, Proceedings of the thirty-seventh annual ACM
symposium on Theory of computing (2005), pp. 67–73.
[46] F.A.
Chudak,
M.X.
Goemans,
D.S
.Hochbaum,
D.P. Williamson,
A primal–dual interpretation of two 2approximation algorithms for the feedback vertex set problem in
undirected graphs, Operations Research Letters 22 (1998), pp. 111–
118.
[47] V. Chvatal, A greedy heuristic for the set-covering problem, Mathematics of operations research 4 (1979), pp. 233–235.
[48] D. Corneil, Y. Perl, Clustering and domination in perfect graphs,
Discrete Applied Mathematics 9 (1984), pp. 27–39.
[49] M.B. Cozzens, L.L. Kelleher, Dominating cliques in graphs, Discrete Mathematics 86 (1990), pp. 101–116.
[50] R. Diestel, Graph Theory, second edition, Springer-Verlag (2000).
[51] I. Dinur, O. Regev, C. Smyth, The hardness of 3-uniform hypergraph coloring, Combinatorica 25 (2005), pp. 519–535.
BIBLIOGRAPHY
105
[52] I. Dinur, S. Safra, On the hardness of approximating minimum
vertex cover, Annals of mathematics (2005), pp. 439–485.
[53] P. Dorbec, M.A. Henning, J. McCoy, Upper total domination
versus upper paired-domination, Quaestiones Mathematicae 30 (2007),
pp. 1–12.
[54] D.-Z. Du, R.L. Graham, P.M. Pardalos, P.-J. Wan, W. Wu,
W. Zhao, Analysis of greedy approximations with nonsubmodular
potential functions, Proceedings of the nineteenth annual ACM-SIAM
symposium on Discrete algorithms (2008), pp. 167–175.
[55] P. Duchet, H. Meyniel, On Hadwiger’s number and the stability
number, Annals of Discrete Mathematics 13 (1982), pp. 71–74.
[56] P. Erdős, A. Hajnal, On a property of families of sets, Acta Mathematica Hungarica 12 (1961), pp. 87–123.
[57] B. Escoffier, L. Gourvès, J. Monnot, Complexity and Approximation Results for the Connected Vertex Cover Problem in Graphs and
Hypergraphs, Journal of Discrete Algorithms 8 (2010), pp. 36–49.
[58] H. Fernau, D. Manlove, Vertex and edge covers with clustering properties: Complexity and algorithms, Journal of Discrete Algorithms 7 (2009), pp. 149–167.
[59] F.V. Fomin, S. Gaspers, A.V. Pyatkin, I. Razgon, On the minimum feedback vertex set problem: Exact and enumeration algorithms,
Algorithmica 52 (2008), pp. 293–307.
[60] F.V. Fomin, D. Kratsch, G.J. Woeginger, Exact (exponential)
algorithms for the dominating set problem, Graph-Theoretic Concepts
in Computer Science (2005), pp. 245–256.
[61] J. Fulman, A note on the characterization of domination perfect
graphs, Journal of Graph Theory 17 (1993), pp. 47–51.
[62] M. R. Garey, D. S. Johnson, Computers and Intractability: An
Introduction to the Theory of NP-completeness, WH Freeman, San
Francisco (1979).
[63] M.R. Garey, D.S. Johnson, L. Stockmeyer, Some simplified NPcomplete problems, Proceedings of the sixth annual ACM symposium
on Theory of computing (1974), pp. 47–63.
[64] W. Goddard, M.A. Henning, Clique/connected/total domination
perfect graphs, Bulletin of the ICA 41 (2004), pp. 20–21.
106
BIBLIOGRAPHY
[65] M.X. Goemans, D.P. Williamson, The primal-dual method for approximation algorithms and its application to network design problems,
Approximation algorithms for NP-hard problems (1997), pp. 144–191.
[66] D. Gollmann, Protocol analysis for concrete environments, Computer
Aided Systems Theory–EUROCAST 2005 (2005), pp. 365–372.
[67] M.C. Golumbic, Algorithmic graph theory and perfect graphs, North
Holland 57 (2004).
[68] F. Göring, J. Harant, D. Rautenbach, I. Schiermeyer, On Findependence in graphs, Discussiones Mathematicae Graph Theory 29
(2009), pp. 377–383.
[69] F. Grandoni, Exact Algorithms for Hard Graph Problems, Ph.D.
thesis, Università di Roma (2004).
[70] A. Grigoriev, R. Sitters, Connected feedback vertex set in planar
graphs, Graph-Theoretic Concepts in Computer Science (2010), pp. 143–
153.
[71] S. Guha, S. Khuller, Approximation algorithms for connected dominating sets, Algorithmica 20 (1998), pp. 374–387.
[72] V. Guruswami, J. Hastad, M. Sudan, Hardness of approximate
hypergraph coloring, SIAM Journal on Computing 31 (2002), pp. 1663–
1686.
[73] V. Guruswami, E. Lee, Inapproximability of Feedback Vertex Set
for Bounded Length Cycles, Electronic Colloquium on Computational
Complexity 21 (2014), p. 2.
[74] E. Halperin, Improved approximation algorithms for the vertex cover
problem in graphs and hypergraphs, SIAM Journal on Computing 31
(2002), pp. 1608–1623.
[75] T.W. Haynes, P.J. Slater,
works 32 (1998), pp. 199–206.
Paired-domination in graphs,
Net-
[76] M.A. Henning, A. Yeo, 2-Colorings in k-regular k-uniform hypergraphs, European Journal of Combinatorics 34 (2013), pp. 1192–1202.
[77] C.T. Hoáng, M. Kamiński, V.V. Lozin, J. Sawada, X. Shu, Deciding k-colorability of P5 -free graphs in polynomial time, Algorithmica 57 (2010), pp. 74–81.
[78] J. Hopcroft, R. Tarjan, Algorithm 447: Efficient algorithms for
graph manipulation, Communications of the ACM 16 (1973), pp. 372–
378.
BIBLIOGRAPHY
107
[79] V. Kann, On the approximability of NP-complete optimization problems, Ph.D. thesis, Royal Institute of Technology Stockholm (1992).
[80] M.-Y. Kao, Encyclopedia of algorithms, Springer Science & Business
Media (2008).
[81] F. Kardoš, J. Katrenič, I. Schiermeyer, On computing the minimum 3-path vertex cover and dissociation number of graphs, Theoretical
Computer Science 412 (2011), pp. 7009–7017.
[82] R.M. Karp, On-line algorithms versus off-line algorithms: How much
is it worth to know the future?, IFIP Congress 12 (1992), pp. 416–429.
[83] R.M. Karp, Reducibility among combinatorial problems, Springer
(1972).
[84] S. Khot, On the Unique Games Conjecture, Proceedings of IEEE 25th
Annual Conference on Computational Complexity (2010), pp. 99–121.
[85] S. Khot, O. Regev, Vertex Cover Might Be Hard to Approximate
to Within 2 − , Journal of Computer and System Sciences 74 (2008),
pp. 335–349.
[86] R. Kleinberg, A multiple-choice secretary algorithm with applications to online auctions, Proceedings of the sixteenth annual ACM-SIAM
symposium on Discrete algorithms (2005), pp. 630–631.
[87] E. Koutsoupias, C. Papadimitriou,
STACS 99 (1999), pp. 404–413.
Worst-case equilibria,
[88] E. Levy, Approximation Algorithms for Covering Problems in Dense
Graphs, Ph.D. thesis, Université libre de Bruxelles (2009).
[89] J.M. Lewis, M. Yannakakis, The node-deletion problem for hereditary properties is NP-complete, Journal of Computer and System Sciences 20 (1980), pp. 219–230.
[90] J. Li, An upper bound on the price of stability for undirected Shapley network design games, Information Processing Letters 109 (2009),
pp. 876–878.
[91] J. Liu, Y. Peng, C. Zhao, Characterization of P6 -free graphs, Discrete Applied Mathematics 155 (2007), pp. 1038–1043.
[92] J. Liu, H. Zhou, Dominating subgraphs in graphs with some forbidden
structures, Discrete Mathematics 135 (1994), pp. 163–168.
[93] D. Lokshtanov, M. Vatshelle, Y. Villanger, Independent Set
in P5 -Free Graphs in Polynomial Time, SIAM (2013).
108
BIBLIOGRAPHY
[94] L. Lovász, Coverings and colorings of hypergraphs, Proc. 4th Southeastern Conference on Combinatorics (1973), pp. 3–12.
[95] M.S. Manasse, L.A. McGeoch, D.D. Sleator, Competitive algorithms for server problems, Journal of Algorithms 11 (1990), pp. 208–
230.
[96] B. McKay, Geng, A program for generating graphs available at
http://cs. anu. edu. au/˜ bdm/nauty (1984).
[97] R.B. Myerson, Game theory: analysis of conflict, Harvard University
(1991).
[98] N. Nisan, T. Roughgarden, E. Tardos, V.V. Vazirani, Algorithmic game theory, Cambridge University Press Cambridge 1 (2007).
[99] M. Novotnỳ, Design and analysis of a generalized canvas protocol, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices (2010), pp. 106–121.
[100] M. Novotnỳ, Formal analysis of security protocols for wireless sensor networks, Tatra Mountains Mathematical Publications 47 (2010),
pp. 81–97.
[101] Y. Person, M. Schacht, Almost all hypergraphs without Fano
planes are bipartite, Proceedings of the Twentieth Annual ACM-SIAM
Symposium on Discrete Algorithms (2009), pp. 217–226.
[102] A. Pluhár, Greedy colorings of uniform hypergraphs, Random Structures & Algorithms 35 (2009), pp. 216–221.
[103] J. Radhakrishnan, A. Srinivasan, Improved bounds and algorithms for hypergraph two-coloring, Proceedings of 39th Annual Symposium on Foundations of Computer Science, (1998), pp. 684–693.
[104] R. Raz, S. Safra, A sub-constant error-probability low-degree test,
and a sub-constant error-probability PCP characterization of NP, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing (1997), pp. 475–484.
[105] D.J. Rose, G.S. Lueker, R.E. Tarjan, Algorithmic aspects of
vertex elimination on graphs, SIAM Journal on computing 5 (1976),
pp. 266–283.
[106] T. Roughgarden, Selfish routing and the price of anarchy, MIT
press Cambridge (2005).
BIBLIOGRAPHY
109
[107] T. Roughgarden, The price of anarchy is independent of the network
topology, Journal of Computer and System Sciences 67 (2003), pp. 341–
364.
[108] L. Ruan, H. Du, X. Jia, W. Wu, Y. Li, K. Ko, A greedy approximation for minimum connected dominating sets, Theoretical Computer
Science 329 (2004), pp. 325–330.
[109] C. Savage, Depth-first search and the vertex cover problem, Information Processing Letters 14 (1982), pp. 233–235.
[110] O. Schaudt, On graphs for which the connected domination number
is at most the total domination number, Discrete Applied Mathematics 160 (2012), pp. 1281-1284.
[111] O. Schaudt, Total domination versus paired domination, Discussiones Mathematicae Graph Theory 32 (2012), pp. 435–447.
[112] P. Schweitzer, P. Schweitzer, Connecting face hitting sets in
planar graphs, Information Processing Letters 111 (2010), pp. 11–15.
[113] D. Seinsche, On a property of the class of n-colorable graphs, Journal
of Combinatorial Theory Series B 16 (1974), pp. 191–193.
[114] M. Sipser, Introduction to the Theory of Computation, Cengage
Learning (2012).
[115] D.D. Sleator, R.E. Tarjan, Amortized efficiency of list update
and paging rules, Communications of the ACM 28 (1985), pp. 202–208.
[116] H. Spakowski, J. Vogel, Θp2 -Completeness: A Classical Approach
for New Results, FSTTCS 2000 (2000), pp. 348–360.
[117] J. Spencer, Coloring n-sets red and blue, Journal of Combinatorial
Theory, Series A, 30 (1981), pp. 112–113.
[118] C. Thomassen, The even cycle problem for directed graphs, Journal
of the American Mathematical Society 5 (1992), pp. 217–229.
[119] J. Tu, F. Yang, The vertex cover P3 problem in cubic graphs, Information Processing Letters 113 (2013), pp. 481–485.
[120] J. Tu, W. Zhou, A factor 2 approximation algorithm for the vertex
cover P3 problem, Information Processing Letters 111 (2011), pp. 683–
686.
[121] J. Tu, W. Zhou, A primal-dual approximation algorithm for the
vertex cover P3 problem, Theoretical Computer Science 412 (2011),
pp. 7044–7048.
110
BIBLIOGRAPHY
[122] P. van ’t Hof, D. Paulusma, A new characterization of P6 -free
graphs, Discrete Applied Mathematics 158 (2010), pp. 731–740.
[123] S. Vishwanathan, On 2-coloring certain k-uniform hypergraphs,
Journal of Combinatorial Theory, Series A 101 (2003), pp. 168–172.
[124] H. Vogt, Integrity preservation for communication in sensor networks, Technical Report 434, Institute for Pervasive Computing, ETH
Zürich (2004).
[125] M. Yannakakis, Node-deletion problems on bipartite graphs, SIAM
Journal on Computing 10 (1981), pp. 310–327.
[126] I.E. Zverovich, Perfect connected-dominant graphs, Discussiones
Mathematicae Graph Theory 23 (2003), pp. 159–162.
[127] I.E. Zverovich, V.E. Zverovich, A semi-induced subgraph characterization of upper domination perfect graphs, Journal of Graph Theory 31 (1999), pp. 29–49.
[128] I.E. Zverovich, V.E. Zverovich, An induced subgraph characterization of domination perfect graphs, Journal of Graph Theory 20
(1995), pp. 375–395.
Index
H-free, 14
Pk -hitting number, 91
Pk -hitting set, 91
H -hitting number, 15
connected, 15
H -hitting set, 15
connected, 15
minimal, 15
minimum, 15
minimum connected, 15
Θp2 -complete, 11
α-approximable, 11
α-approximation, 11
d-regular
graph, 12
hypergraph, 14
k-partite, 13
k-uniform
hypergraph, 14
2-coloring hypergraph, 83
hypergraph, 14
competitive
algorithm, 19
ratio, 19
complement, 13
complete graph, 13
connected
component, 13
graph, 13
hypergraph, 14
corona, 27
critical graph
domination, 61
vertex cover, 44
cubic, 12
cutset, 13
cutvertex, 13
cycle, 13
acyclic, 13
approximation algorithm, 11
decision problem, 9
degree
graph, 12
hypergraph, 14
maximum, 12
minimum, 12
diameter, 12
disconnected, 13
disjoint union, 13
dissociation
number, 91
set, 91
distance, 12
dominating set
bipartite graph, 14
complete, 14
butterfly, 24
center, 12
central vertex, 12
chordal graph, 14
claw, 14
clique, 13
clutter, 85
cograph, 14
coloring
111
112
paired-, 27
total , 27
domination number
paired-, 27
total, 27
upper, 26
upper paired-, 27
upper total, 27
flower, 40
forest, 13
linear, 13
graph, 12
ground set, 14
heuristic, 11
hypergraph, 14
independence number, 13
independent set, 13
induced
cycle, 13
path, 12
subgraph, 13
internal vertex, 13
invariant, 13
isolated vertex, 12
isomorphic, 13
length
cycle, 13
path, 12
lollipop, 25
eaten simple lollipop, 26
simple lollipop, 26
matching, 14
perfect, 14
quasi-, 85
maximization problem, 9
minimization problem, 9
monochromatic, 14
Moore graph, 14
neighbor, 12
INDEX
neighborhood
closed, 12
open, 12
non-trivial graph, 29
NP, 10
NP-complete, 10
NP-hard, 10
objective value, 9
on-line algorithm, 19
optimization problem, 9
oracle, 10
machine, 10
order, 12
P, 10
parameter, 13
path, 12
pendent vertex, 12
perfect graph, 29
performance ratio, 11
planar graph, 14
PoC-near-perfect graph
domination, 54
vertex cover, 37
PoC-perfect graph
domination, 54
vertex cover, 36
price of
anarchy, 20
connectivity, 19
domination, 22, 49
vertex cover, 20, 31
stability, 20
private
neighbor, 12
path, 95
radius, 12
rank
hypergraph, 14
reduction
polynomial-time, 10
set cover, 9
INDEX
problem, 9
split graph, 14
star, 14
strongly critical graph
domination, 61
vertex cover, 44
subgraph, 12
induced, 12
subtree, 13
tree, 13
113
maximum leaf spanning tree,
13
peculiar tree, 62
spanning tree, 13
special tree
dominating set, 62
vertex cover, 44
trivially perfect graph, 14
vertex-hyperedge incidence graph
hypergraph, 14