{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article7654","name":"Editing to Eulerian Graphs","abstract":"We investigate the problem of modifying a graph into a connected graph in which the degree of each vertex satisfies a prescribed parity constraint. Let ea, ed and vd denote the operations edge addition, edge deletion and vertex deletion respectively. For any S subseteq {ea,ed,vd}, we define Connected Degree Parity Editing (S) (CDPE(S)) to be the problem that takes as input a graph G, an integer k and a function delta: V(G) -> {0,1}, and asks whether G can be modified into a connected graph H with d_H(v) = delta(v)(mod 2) for each v in V(H), using at most k operations from S. We prove that (*) if S={ea} or S={ea,ed}, then CDPE(S) can be solved in polynomial time; (*) if {vd} subseteq S subseteq {ea,ed,vd}, then CDPE(S) is NP-complete and W-hard when parameterized by k, even if delta = 0.\r\n\r\nTogether with known results by Cai and Yang and by Cygan, Marx, Pilipczuk, Pilipczuk and Schlotter, our results completely classify the classical and parameterized complexity of the CDPE(S) problem for all S subseteq {ea,ed,vd}. We obtain the same classification for a natural variant of the cdpe(S) problem on directed graphs, where the target is a weakly connected digraph in which the difference between the in- and out-degree of every vertex equals a prescribed value.\r\n\r\nAs an important implication of our results, we obtain polynomial-time algorithms for Eulerian Editing problem and its directed variant. To the best of our knowledge, the only other natural non-trivial graph class H for which the H-Editing problem is known to be polynomial-time solvable is the class of split graphs.","keywords":["Eulerian graphs","graph editing","polynomial algorithm"],"author":[{"@type":"Person","name":"Dabrowski, Konrad K.","givenName":"Konrad K.","familyName":"Dabrowski"},{"@type":"Person","name":"Golovach, Petr A.","givenName":"Petr A.","familyName":"Golovach"},{"@type":"Person","name":"van 't Hof, Pim","givenName":"Pim","familyName":"van 't Hof"},{"@type":"Person","name":"Paulusma, Daniel","givenName":"Daniel","familyName":"Paulusma"}],"position":10,"pageStart":97,"pageEnd":108,"dateCreated":"2014-12-12","datePublished":"2014-12-12","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Dabrowski, Konrad K.","givenName":"Konrad K.","familyName":"Dabrowski"},{"@type":"Person","name":"Golovach, Petr A.","givenName":"Petr A.","familyName":"Golovach"},{"@type":"Person","name":"van 't Hof, Pim","givenName":"Pim","familyName":"van 't Hof"},{"@type":"Person","name":"Paulusma, Daniel","givenName":"Daniel","familyName":"Paulusma"}],"copyrightYear":"2014","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.FSTTCS.2014.97","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","isPartOf":{"@type":"PublicationVolume","@id":"#volume6232","volumeNumber":29,"name":"34th International Conference on Foundation of Software Technology and Theoretical Computer Science (FSTTCS 2014)","dateCreated":"2014-12-12","datePublished":"2014-12-12","editor":[{"@type":"Person","name":"Raman, Venkatesh","givenName":"Venkatesh","familyName":"Raman"},{"@type":"Person","name":"Suresh, S. P.","givenName":"S. P.","familyName":"Suresh"}],"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article7654","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6232"}}}