21 results on '"Paul, Christophe"'
Search Results
2. Front Matter, Table of Contents, Preface, Conference Organization
- Author
-
Paul, Christophe and Bläser, Markus
- Subjects
Conference Organization ,Table of Contents ,Preface ,Front Matter - Abstract
Front Matter, Table of Contents, Preface, Conference Organization, LIPIcs, Vol. 154, 37th International Symposium on Theoretical Aspects of Computer Science (STACS 2020), pages 0:i-0:xii
- Published
- 2020
- Full Text
- View/download PDF
3. Typical Sequences Revisited: Computing Width Parameters of Graphs
- Author
-
Sub Algorithms and Complexity, Algorithms and Complexity, Bodlaender, Hans L., Jaffke, Lars, Telle, Jan Arne, Paul, Christophe, Bläser, Markus, Sub Algorithms and Complexity, Algorithms and Complexity, Bodlaender, Hans L., Jaffke, Lars, Telle, Jan Arne, Paul, Christophe, and Bläser, Markus
- Published
- 2020
4. A Linear Fixed Parameter Tractable Algorithm for Connected Pathwidth
- Author
-
Mamadou Moustapha Kanté and Christophe Paul and Dimitrios M. Thilikos, Kanté, Mamadou Moustapha, Paul, Christophe, Thilikos, Dimitrios M., Mamadou Moustapha Kanté and Christophe Paul and Dimitrios M. Thilikos, Kanté, Mamadou Moustapha, Paul, Christophe, and Thilikos, Dimitrios M.
- Abstract
The graph parameter of pathwidth can be seen as a measure of the topological resemblance of a graph to a path. A popular definition of pathwidth is given in terms of node search where we are given a system of tunnels (represented by a graph) that is contaminated by some infectious substance and we are looking for a search strategy that, at each step, either places a searcher on a vertex or removes a searcher from a vertex and where an edge is cleaned when both endpoints are simultaneously occupied by searchers. It was proved that the minimum number of searchers required for a successful cleaning strategy is equal to the pathwidth of the graph plus one. Two desired characteristics for a cleaning strategy is to be monotone (no recontamination occurs) and connected (clean territories always remain connected). Under these two demands, the number of searchers is equivalent to a variant of pathwidth called connected pathwidth. We prove that connected pathwidth is fixed parameter tractable, in particular we design a 2^O(k²)⋅n time algorithm that checks whether the connected pathwidth of G is at most k. This resolves an open question by [Dereniowski, Osula, and Rzążewski, Finding small-width connected path-decompositions in polynomial time. Theor. Comput. Sci., 794:85–100, 2019]. For our algorithm, we enrich the typical sequence technique that is able to deal with the connectivity demand. Typical sequences have been introduced in [Bodlaender and Kloks. Efficient and constructive algorithms for the pathwidth and treewidth of graphs. J. Algorithms, 21(2):358–402, 1996] for the design of linear parameterized algorithms for treewidth and pathwidth. While this technique has been later applied to other parameters, none of its advancements was able to deal with the connectivity demand, as it is a "global" demand that concerns an unbounded number of parts of the graph of unbounded size. The proposed extension is based on an encoding of the connectivity property that is quite versat
- Published
- 2020
- Full Text
- View/download PDF
5. Hierarchical Clusterings of Unweighted Graphs
- Author
-
Svein Høgemo and Christophe Paul and Jan Arne Telle, Høgemo, Svein, Paul, Christophe, Telle, Jan Arne, Svein Høgemo and Christophe Paul and Jan Arne Telle, Høgemo, Svein, Paul, Christophe, and Telle, Jan Arne
- Abstract
We study the complexity of finding an optimal hierarchical clustering of an unweighted similarity graph under the recently introduced Dasgupta objective function. We introduce a proof technique, called the normalization procedure, that takes any such clustering of a graph G and iteratively improves it until a desired target clustering of G is reached. We use this technique to show both a negative and a positive complexity result. Firstly, we show that in general the problem is NP-complete. Secondly, we consider min-well-behaved graphs, which are graphs H having the property that for any k the graph H^{(k)} being the join of k copies of H has an optimal hierarchical clustering that splits each copy of H in the same optimal way. To optimally cluster such a graph H^{(k)} we thus only need to optimally cluster the smaller graph H. Co-bipartite graphs are min-well-behaved, but otherwise they seem to be scarce. We use the normalization procedure to show that also the cycle on 6 vertices is min-well-behaved.
- Published
- 2020
- Full Text
- View/download PDF
6. Front Matter, Table of Contents, Preface, Conference Organization
- Author
-
Christophe Paul and Markus Bläser, Paul, Christophe, Bläser, Markus, Christophe Paul and Markus Bläser, Paul, Christophe, and Bläser, Markus
- Abstract
Front Matter, Table of Contents, Preface, Conference Organization
- Published
- 2020
- Full Text
- View/download PDF
7. LIPIcs, Vol. 154, STACS 2020, Complete Volume
- Author
-
Christophe Paul and Markus Bläser, Paul, Christophe, Bläser, Markus, Christophe Paul and Markus Bläser, Paul, Christophe, and Bläser, Markus
- Abstract
LIPIcs, Vol. 154, STACS 2020, Complete Volume
- Published
- 2020
- Full Text
- View/download PDF
8. Connected Search for a Lazy Robber
- Author
-
Isolde Adler and Christophe Paul and Dimitrios M. Thilikos, Adler, Isolde, Paul, Christophe, Thilikos, Dimitrios M., Isolde Adler and Christophe Paul and Dimitrios M. Thilikos, Adler, Isolde, Paul, Christophe, and Thilikos, Dimitrios M.
- Abstract
The node search game against a lazy (or, respectively, agile) invisible robber has been introduced as a search-game analogue of the treewidth parameter (and, respectively, pathwidth). In the connected variants of the above two games, we additionally demand that, at each moment of the search, the clean territories are connected. The connected search game against an agile and invisible robber has been extensively examined. The monotone variant (where we also demand that the clean territories are progressively increasing) of this game, corresponds to the graph parameter of connected pathwidth. It is known that the price of connectivty to search for an agile robber is bounded by 2, that is the connected pathwidth of a graph is at most twice (plus some constant) its pathwidth. In this paper, we investigate the connected search game against a lazy robber. A lazy robber moves only when the searchers' strategy threatens the location that he currently occupies. We introduce two alternative graph-theoretic formulations of this game, one in terms of connected tree decompositions, and one in terms of (connected) layouts, leading to the graph parameter of connected treewidth. We observe that connected treewidth parameter is closed under contractions and prove that for every k >= 2, the set of contraction obstructions of the class of graphs with connected treewidth at most k is infinite. Our main result is a complete characterization of the obstruction set for k=2. One may observe that, so far, only a few complete obstruction sets are explicitly known for contraction closed graph classes. We finally show that, in contrast to the agile robber game, the price of connectivity is unbounded.
- Published
- 2019
- Full Text
- View/download PDF
9. LIPIcs, Volume 126, STACS'19, Complete Volume
- Author
-
Rolf Niedermeier and Christophe Paul, Niedermeier, Rolf, Paul, Christophe, Rolf Niedermeier and Christophe Paul, Niedermeier, Rolf, and Paul, Christophe
- Abstract
LIPIcs, Volume 126, STACS'19, Complete Volume
- Published
- 2019
- Full Text
- View/download PDF
10. Front Matter, Table of Contents, Preface, Conference Organization
- Author
-
Rolf Niedermeier and Christophe Paul, Niedermeier, Rolf, Paul, Christophe, Rolf Niedermeier and Christophe Paul, Niedermeier, Rolf, and Paul, Christophe
- Abstract
Front Matter, Table of Contents, Preface, Conference Organization
- Published
- 2019
- Full Text
- View/download PDF
11. Front Matter, Table of Contents, Preface, Conference Organization
- Author
-
Christophe Paul and Michal Pilipczuk, Paul, Christophe, Pilipczuk, Michal, Christophe Paul and Michal Pilipczuk, Paul, Christophe, and Pilipczuk, Michal
- Abstract
Front Matter, Table of Contents, Preface, Conference Organization
- Published
- 2019
- Full Text
- View/download PDF
12. LIPIcs, Volume 115, IPEC'18, Complete Volume
- Author
-
Christophe Paul and Michał Pilipczuk, Paul, Christophe, Pilipczuk, Michał, Christophe Paul and Michał Pilipczuk, Paul, Christophe, and Pilipczuk, Michał
- Abstract
LIPIcs, Volume 115, IPEC'18, Complete Volume
- Published
- 2019
- Full Text
- View/download PDF
13. Parameterized Complexity of Finding a Spanning Tree with Minimum Reload Cost Diameter
- Author
-
Julien Baste and Didem Gözüpek and Christophe Paul and Ignasi Sau and Mordechai Shalom and Dimitrios M. Thilikos, Baste, Julien, Gözüpek, Didem, Paul, Christophe, Sau, Ignasi, Shalom, Mordechai, Thilikos, Dimitrios M., Julien Baste and Didem Gözüpek and Christophe Paul and Ignasi Sau and Mordechai Shalom and Dimitrios M. Thilikos, Baste, Julien, Gözüpek, Didem, Paul, Christophe, Sau, Ignasi, Shalom, Mordechai, and Thilikos, Dimitrios M.
- Abstract
We study the minimum diameter spanning tree problem under the reload cost model (DIAMETER-TREE for short) introduced by Wirth and Steffan (2001). In this problem, given an undirected edge-colored graph G, reload costs on a path arise at a node where the path uses consecutive edges of different colors. The objective is to find a spanning tree of G of minimum diameter with respect to the reload costs. We initiate a systematic study of the parameterized complexity of the DIAMETER-TREE problem by considering the following parameters: the cost of a solution, and the treewidth and the maximum degree Delta of the input graph. We prove that DIAMETER-TREE is para-np-hard for any combination of two of these three parameters, and that it is FPT parameterized by the three of them. We also prove that the problem can be solved in polynomial time on cactus graphs. This result is somehow surprising since we prove DIAMETER-TREE to be NP-hard on graphs of treewidth two, which is best possible as the problem can be trivially solved on forests. When the reload costs satisfy the triangle inequality, Wirth and Steffan (2001) proved that the problem can be solved in polynomial time on graphs with Delta=3, and Galbiati (2008) proved that it is NP-hard if Delta=4. Our results show, in particular, that without the requirement of the triangle inequality, the problem is NP-hard if Delta=3, which is also best possible. Finally, in the case where the reload costs are polynomially bounded by the size of the input graph, we prove that DIAMETER-TREE is in XP and W[1]-hard parameterized by the treewidth plus Delta.
- Published
- 2018
- Full Text
- View/download PDF
14. Exploring the Complexity of Layout Parameters in Tournaments and Semi-Complete Digraphs
- Author
-
Florian Barbero and Christophe Paul and Michal Pilipczuk, Barbero, Florian, Paul, Christophe, Pilipczuk, Michal, Florian Barbero and Christophe Paul and Michal Pilipczuk, Barbero, Florian, Paul, Christophe, and Pilipczuk, Michal
- Abstract
A simple digraph is semi-complete if for any two of its vertices u and v, at least one of the arcs (u,v) and (v,u) is present. We study the complexity of computing two layout parameters of semi-complete digraphs: cutwidth and optimal linear arrangement (OLA). We prove that: -Both parameters are NP-hard to compute and the known exact and parameterized algorithms for them have essentially optimal running times, assuming the Exponential Time Hypothesis. - The cutwidth parameter admits a quadratic Turing kernel, whereas it does not admit any polynomial kernel unless coNP/poly contains NP. By contrast, OLA admits a linear kernel. These results essentially complete the complexity analysis of computing cutwidth and OLA on semi-complete digraphs. Our techniques can be also used to analyze the sizes of minimal obstructions for having small cutwidth under the induced subdigraph relation.
- Published
- 2017
- Full Text
- View/download PDF
15. Parameterized Algorithms for Min-Max Multiway Cut and List Digraph Homomorphism
- Author
-
Eun Jung Kim and Christophe Paul and Ignasi Sau and Dimitrios M. Thilikos, Kim, Eun Jung, Paul, Christophe, Sau, Ignasi, Thilikos, Dimitrios M., Eun Jung Kim and Christophe Paul and Ignasi Sau and Dimitrios M. Thilikos, Kim, Eun Jung, Paul, Christophe, Sau, Ignasi, and Thilikos, Dimitrios M.
- Abstract
In this paper we design FPT-algorithms for two parameterized problems. The first is List Digraph Homomorphism: given two digraphs G and H and a list of allowed vertices of H for every vertex of G, the question is whether there exists a homomorphism from G to H respecting the list constraints. The second problem is a variant of Multiway Cut, namely Min-Max Multiway Cut: given a graph G, a non-negative integer l, and a set T of r terminals, the question is whether we can partition the vertices of G into r parts such that (a) each part contains one terminal and (b) there are at most l edges with only one endpoint in this part. We parameterize List Digraph Homomorphism by the number w of edges of G that are mapped to non-loop edges of H and we give a time 2^{O(l * log(h) + l^{2 * log(l)}} * n^{4} * log(n) algorithm, where h is the order of the host graph H.We also prove that Min-Max Multiway Cut can be solved in time 2^{O((l * r)^2 * log(l *r))} * n^{4} * log(n). Our approach introduces a general problem, called List Allocation, whose expressive power permits the design of parameterized reductions of both aforementioned problems to it. Then our results are based on an FPT-algorithm for the List Allocation problem that is designed using a suitable adaptation of the randomized contractions technique (introduced by [Chitnis, Cygan, Hajiaghayi, Pilipczuk, and Pilipczuk, FOCS 2012]).
- Published
- 2015
- Full Text
- View/download PDF
16. An FPT Algorithm and a Polynomial Kernel for Linear Rankwidth-1 Vertex Deletion
- Author
-
Mamadou Moustapha Kanté and Eun Jung Kim and O-joung Kwon and Christophe Paul, Kanté, Mamadou Moustapha, Kim, Eun Jung, Kwon, O-joung, Paul, Christophe, Mamadou Moustapha Kanté and Eun Jung Kim and O-joung Kwon and Christophe Paul, Kanté, Mamadou Moustapha, Kim, Eun Jung, Kwon, O-joung, and Paul, Christophe
- Abstract
Linear rankwidth is a linearized variant of rankwidth, introduced by Oum and Seymour [Approximating clique-width and branch-width. J. Combin. Theory Ser. B, 96(4):514-528, 2006.], and it is similar to pathwidth, which is the linearized variant of treewidth. Motivated from the results on graph modification problems into graphs of bounded treewidth or pathwidth, we investigate a graph modification problem into the class of graphs having linear rankwidth at most one, called the Linear Rankwidth-1 Vertex Deletion (shortly, LRW1-Vertex Deletion). In this problem, given an n-vertex graph G and a positive integer k, we want to decide whether there is a set of at most k vertices whose removal turns G into a graph of linear rankwidth at most one and if one exists, find such a vertex set. While the meta-theorem of Courcelle, Makowsky, and Rotics implies thatLRW1-Vertex Deletion can be solved in time f(k) * n^3 for some function f, it is not clear whether this problem allows a runtime with a modest exponential function. We establish that LRW1-Vertex Deletion can be solved in time 8^k * n^{O(1)}. The major obstacle to this end is how to handle a long induced cycle as an obstruction. To fix this issue, we define the necklace graphs and investigate their structural properties. We also show that the LRW1-Vertex Deletion has a polynomial kernel.
- Published
- 2015
- Full Text
- View/download PDF
17. Explicit Linear Kernels via Dynamic Programming
- Author
-
Valentin Garnero and Christophe Paul and Ignasi Sau and Dimitrios M. Thilikos, Garnero, Valentin, Paul, Christophe, Sau, Ignasi, Thilikos, Dimitrios M., Valentin Garnero and Christophe Paul and Ignasi Sau and Dimitrios M. Thilikos, Garnero, Valentin, Paul, Christophe, Sau, Ignasi, and Thilikos, Dimitrios M.
- Abstract
Several algorithmic meta-theorems on kernelization have appeared in the last years, starting with the result [Bodlaender et al., FOCS 2009] on graphs of bounded genus, then generalized by [Fomin et al., SODA 2010] to graphs excluding a fixed minor, and by [Kim et al., ICALP 2013] to graphs excluding a fixed topological minor. Typically, these results guarantee the existence of linear or polynomial kernels on sparse graph classes for problems satisfying some generic conditions but, mainly due to their generality, it is not clear how to derive from them constructive kernels with explicit constants. In this paper we make a step toward a fully constructive meta-kernelization theory on sparse graphs. Our approach is based on a more explicit protrusion replacement machinery that, instead of expressibility in CMSO logic, uses dynamic programming, which allows us to find an explicit upper bound on the size of the derived kernels. We demonstrate the usefulness of our techniques by providing the first explicit linear kernels for r-Dominating Set and r-Scattered Set on apex-minor-free graphs, and for Planar-F-Deletion on graphs excluding a fixed (topological) minor in the case where all the graphs in F are connected.
- Published
- 2014
- Full Text
- View/download PDF
18. Obtaining a Bipartite Graph by Contracting Few Edges
- Author
-
Pinar Heggernes and Pim van 't Hof and Daniel Lokshtanov and Christophe Paul, Heggernes, Pinar, van 't Hof, Pim, Lokshtanov, Daniel, Paul, Christophe, Pinar Heggernes and Pim van 't Hof and Daniel Lokshtanov and Christophe Paul, Heggernes, Pinar, van 't Hof, Pim, Lokshtanov, Daniel, and Paul, Christophe
- Abstract
We initiate the study of the Bipartite Contraction problem from the perspective of parameterized complexity. In this problem we are given a graph G on n vertices and an integer k, and the task is to determine whether we can obtain a bipartite graph from G by a sequence of at most k edge contractions. Our main result is an f(k) n^{O(1)} time algorithm for Bipartite Contraction. Despite a strong resemblance between Bipartite Contraction and the classical Odd Cycle Transversal (OCT) problem, the methods developed to tackle OCT do not seem to be directly applicable to Bipartite Contraction. To obtain our result, we combine several techniques and concepts that are central in parameterized complexity: iterative compression, irrelevant vertex, and important separators. To the best of our knowledge, this is the first time the irrelevant vertex technique and the concept of important separators are applied in unison. Furthermore, our algorithm may serve as a comprehensible example of the usage of the irrelevant vertex technique.
- Published
- 2011
- Full Text
- View/download PDF
19. Kernels for Feedback Arc Set In Tournaments
- Author
-
Stéphane Bessy and Fedor V. Fomin and Serge Gaspers and Christophe Paul and Anthony Perez and Saket Saurabh and Stéphan Thomassé, Bessy, Stéphane, Fomin, Fedor V., Gaspers, Serge, Paul, Christophe, Perez, Anthony, Saurabh, Saket, Thomassé, Stéphan, Stéphane Bessy and Fedor V. Fomin and Serge Gaspers and Christophe Paul and Anthony Perez and Saket Saurabh and Stéphan Thomassé, Bessy, Stéphane, Fomin, Fedor V., Gaspers, Serge, Paul, Christophe, Perez, Anthony, Saurabh, Saket, and Thomassé, Stéphan
- Abstract
A tournament $T = (V,A)$ is a directed graph in which there is exactly one arc between every pair of distinct vertices. Given a digraph on $n$ vertices and an integer parameter $k$, the {\sc Feedback Arc Set} problem asks whether thegiven digraph has a set of $k$ arcs whose removal results in an acyclicdigraph. The {\sc Feedback Arc Set} problem restricted to tournaments is knownas the {\sc $k$-Feedback Arc Set in Tournaments ($k$-FAST)} problem. In thispaper we obtain a linear vertex kernel for \FAST{}. That is, we give apolynomial time algorithm which given an input instance $T$ to \FAST{} obtains an equivalent instance $T'$ on $O(k)$ vertices. In fact, given any fixed $\epsilon > 0$, the kernelized instance has at most $(2 + \epsilon)k$ vertices.Our result improves the previous known bound of $O(k^2)$ on the kernel size for\FAST{}. Our kernelization algorithm solves the problem on a subclass of tournaments in polynomial time and uses a known polynomial time approximation scheme for \FAST.
- Published
- 2009
- Full Text
- View/download PDF
20. Computing Maximum Matchings in Temporal Graphs
- Author
-
Mertzios, George B., Molter, Hendrik, Niedermeier, Rolf, Zamaraev, Viktor, Zschoche, Philipp, Paul, Christophe, Bläser, Markus, and Blaser, Markus
- Subjects
FOS: Computer and information sciences ,History ,General Computer Science ,Polymers and Plastics ,Discrete Mathematics (cs.DM) ,Computer Networks and Communications ,0102 computer and information sciences ,02 engineering and technology ,Computational Complexity (cs.CC) ,01 natural sciences ,Industrial and Manufacturing Engineering ,Theoretical Computer Science ,APX-hardness ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,NP-hardness ,Data Structures and Algorithms (cs.DS) ,Business and International Management ,Approximation Algorithm ,Temporal Graph ,Applied Mathematics ,Independent Set ,Temporal Line Graph ,Fixed-parameter Tractability ,Computer Science - Computational Complexity ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,020201 artificial intelligence & image processing ,Link Stream ,Computer Science - Discrete Mathematics ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
Temporal graphs are graphs whose topology is subject to discrete changes over time. Given a static underlying graph G, a temporal graph is represented by assigning a set of integer time-labels to every edge e of G, indicating the discrete time steps at which e is active. We introduce and study the complexity of a natural temporal extension of the classical graph problem Maximum Matching, taking into account the dynamic nature of temporal graphs. In our problem, Maximum Temporal Matching, we are looking for the largest possible number of time-labeled edges (simply time-edges) (e,t) such that no vertex is matched more than once within any time window of Δ consecutive time slots, where Δ ∈ ℕ is given. The requirement that a vertex cannot be matched twice in any Δ-window models some necessary "recovery" period that needs to pass for an entity (vertex) after being paired up for some activity with another entity. We prove strong computational hardness results for Maximum Temporal Matching, even for elementary cases. To cope with this computational hardness, we mainly focus on fixed-parameter algorithms with respect to natural parameters, as well as on polynomial-time approximation algorithms., LIPIcs, Vol. 154, 37th International Symposium on Theoretical Aspects of Computer Science (STACS 2020), pages 27:1-27:14
- Published
- 2020
21. Stabilization Time in Weighted Minority Processes
- Author
-
Papp, Pál A., Wattenhofer, Roger, Niedermeier, Rolf, and Paul, Christophe
- Subjects
Minority process ,Benevolent model - Abstract
A minority process in a weighted graph is a dynamically changing coloring. Each node repeatedly changes its color in order to minimize the sum of weighted conflicts with its neighbors. We study the number of steps until such a process stabilizes. Our main contribution is an exponential lower bound on stabilization time. We first present a construction showing this bound in the adversarial sequential model, and then we show how to extend the construction to establish the same bound in the benevolent sequential model, as well as in any reasonable concurrent model. Furthermore, we show that the stabilization time of our construction remains exponential even for very strict switching conditions, namely, if a node only changes color when almost all (i.e., any specific fraction) of its neighbors have the same color. Our lower bound works in a wide range of settings, both for node-weighted and edge-weighted graphs, or if we restrict minority processes to the class of sparse graphs., Leibniz International Proceedings in Informatics (LIPIcs), 126, ISSN:1868-8969, 36th International Symposium on Theoretical Aspects of Computer Science (STACS 2019), ISBN:978-3-95977-100-9
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.