Abstract 1 Introduction 2 Conflict versus Adjacent Conflicts 3 Dilation 𝟐-Augmentation for 𝓚𝒅,𝒅-free Graphs 4 Dilation t-Augmentation for Bounded Degree Graphs is FPT 5 Dilation 𝟑-Augmentation For Forest and Stars 6 Conclusion References

Multivariate Exploration of Metric Dilation

Aritra Banik ORCID National Institute of Science, Education and Research, An OCC of Homi Bhabha National Institute, Bhubaneswar, India Fedor V. Fomin ORCID University of Bergen, Norway Petr A. Golovach ORCID University of Bergen, Norway Tanmay Inamdar ORCID Indian Institute of Technology Jodhpur, India Satyabrata Jana ORCID University of Warwick, UK Saket Saurabh ORCID The Institute of Mathematical Sciences, HBNI, Chennai, India
University of Bergen, Norway
Abstract

Let G be a weighted graph embedded in a metric space (M,dM). The vertices of G correspond to the points in M, with the weight of each edge uv being the distance dM(u,v) between their respective points in M. The dilation (or stretch) of G is defined as the minimum factor t such that, for any pair of vertices u,v, the distance between u and v – represented by the weight of a shortest u,v-path – is at most tdM(u,v). We study Dilation t-Augmentation, where the objective is, given a metric M, a graph G, and numerical values k and t, to determine whether G can be transformed into a graph with dilation t by adding at most k edges.

Our primary focus is on the scenario where the metric M is the shortest path metric of an unweighted graph Γ. Even in this specific case, Dilation t-Augmentation remains computationally challenging. In particular, the problem is W[2]-hard parameterized by k when Γ is a complete graph, already for t=2. Our main contribution lies in providing new insights into the impact of combinations of various parameters on the computational complexity of the problem. We establish the following.

  • The parameterized dichotomy of the problem with respect to dilation t, when the graph G is sparse: Parameterized by k, the problem is FPT for graphs excluding a biclique Kd,d as a subgraph for t2 and the problem is W[1]-hard for t3 even if G is a forest consisting of disjoint stars.

  • The problem is FPT parameterized by the combined parameter k+t+Δ, where Δ is the maximum degree of the graph G or Γ.

Keywords and phrases:
Metric dilation, geometric spanner, fixed-parameter tractability
Funding:
Fedor V. Fomin: Supported by the Research Council of Norway via the project BWCA (grant no. 314528).
Petr A. Golovach: Supported by the Research Council of Norway via the project BWCA (grant no. 314528).
Tanmay Inamdar: Supported by IITJ Research Initiation Grant (grant number I/RIG/TNI/20240072).
Satyabrata Jana: Supported by the Engineering and Physical Sciences Research Council (EPSRC) via the project MULTIPROCESS (grant no. EP/V044621/1).
Saket Saurabh: The author is supported by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 819416); and he also acknowledges the support of Swarnajayanti Fellowship grant DST/SJF/MSA-01/2017-18.
Copyright and License:
[Uncaptioned image] © Aritra Banik, Fedor V. Fomin, Petr A. Golovach, Tanmay Inamdar, Satyabrata Jana,
and Saket Saurabh; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Design and analysis of algorithms
Related Version:
Full Version: https://arxiv.org/abs/2501.04555 [2]
Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim Thắng

1 Introduction

Consider a finite metric space =(V,dM), and let G be a sparse weighted graph with vertices corresponding to the points in V. The weights assigned to the edges of G represent the distances in between their end-points. That is, the graph G=(V,E) is embedded in a metric space =(V,dM). The graph G is called a t-spanner if, for every pair of vertices u,vV, the distance between them in G is at most tdM(u,v). The concept of spanners, introduced by Peleg and Schäffer [19], has evolved into a fundamental tool in various domains, including algorithms, distributed computing, networking, data structures and metric geometry, as highlighted in [18]. The minimum number t for which G is a t-spanner defines the stretch or dilation of G.

In their book [18, p.474, Problem 9], Narasimhan and Smid presented the problem of enhancing the dilation of a spanner by adding at most k edges: Develop an efficient algorithm to identify the k>1 edges that minimize (or approximately minimize) the stretch factor of the resulting geometric graph. Formally, the problem is defined as follows.

Input:     A graph G=(V,E) embedded in a metric space =(V,dM) and        an integer k.

Question: Does there exist a set of k edges SV×V such that the dilation of        G=(V,ES) is at most t?

The case where k=1, was investigated by Farshi, Giannopoulos, Gudmundsson [8], Luo, Wulff-Nilsen [17], and Wulff-Nilsen [20]. However, for the more general scenario where k>1, the problem becomes significantly more challenging and poorly understood. Giannopoulos et al. [12] and Gudmundsson and Smid [13] demonstrated that obtaining the best dilation spanner by adding k edges to an empty graph is already NP-hard. Gudmundsson and Wong [14] proposed an algorithm that in 𝒪(n3logn) time, identifies k edges whose addition to G results in a graph with a stretch factor within 𝒪(k) of the minimum stretch factor. Related problems have also been studied in geometric settings, e.g., Aronov et al. [1], who showed that, given a set S of n points in 2, and an integer 0k<n, we can construct a geometric graph with vertex set S, at most n1+k edges, maximum degree five, and dilation 𝒪(n/(k+1)) in time 𝒪(nlogn).

We approach the Dilation t-Augmentation problem from the perspective of Multivariate (Parameterized) Complexity – another popular paradigm to deal with intractable problems [4, 6, 10]. The two most natural parameters associated with the problem are the size of the solution k (the size of the augmented set) and the stretch factor t. We are looking for an algorithm with running time f(k)n𝒪(1) or g(k,t)n𝒪(1). Here, n=|V(G)|. These algorithms are called fixed-parameter tractable (FPT) algorithms. There is also an accompanying theory of W-hardness that allows us to show that problems do not admit FPT algorithms (see [4, 6, 10] for further details). The problem of finding a t-spanner for a given graph is considered from the perspective of parameterized complexity in  [15, 16]. Observe that, Dilation t-Augmentation admits an algorithm with running time n𝒪(k) – try all possible subsets of size k of V×V as S. Thus, this naturally leads to the following.

Does Dilation t-Augmentation admit an FPT algorithm?

A simple result shows that, in its full generality, the problem is W[2]-hard. In fact, consider =(V,dM) derived from an unweighted clique K on n vertices. That is, the vertices of the metric correspond to the vertices of K, and dM(u,v) is the length of shortest path between u and v in K, which is 1. Then, for t=2, Dilation 2-Augmentation corresponds to adding edges to G so that the diameter of the augmented graph becomes 2 (see Figure 1 for an illustration). This is the well-known Diameter 2-Augmentation problem which is known to be W[2]-hard [11]. Thus, we do not expect that Dilation t-Augmentation to admit an algorithm with running time g(k)n𝒪(t). This simple hardness result motivates the following set of questions:

  • For which metrics , does Dilation t-Augmentation admit an FPT algorithm?

  • For which family of input graphs 𝒢, does Dilation t-Augmentation admit an FPT algorithm?

  • For which pairs of family of input graphs and metric, (𝒢,), does Dilation t-Augmentation admit an FPT algorithm?

In this article, we specifically concentrate on the fundamental and non-trivial scenario where the metric corresponds to the shortest-path metric of an unweighted graph. Our contribution represents a substantial addition to the limited body of literature that addresses the challenging problem of Dilation t-Augmentation.

1.1 Our Model, Results, and Methods

Figure 1: An instance of Dilation 2-Augmentation with k=2. The edges of the solution S are shown in dashed red. The edge weights in G are derived from the corresponding shortest path in Γ.

Throughout this paper, we deal with the shortest-path metric derived from an unweighted graph, unless otherwise mentioned.111Any metric can be derived from an edge weighted graph. Thus, our assumption represents a simplification. For an edge weighted graph H, let dH(u,v) denote the weighted shortest path distance in the graph H between two vertices u and v. Additionally, we use 𝗁𝗈𝗉H(u,v) to denote the length of the shortest path between u and v when we forget the edge weights. In other words, this denotes the length of the shortest path in H when all edges receive weight 1. We will use dH and 𝗁𝗈𝗉H only when H is edge weighted; otherwise, both dH and 𝗁𝗈𝗉H represent the same thing. Throughout the article, the metric will be derived from an undirected unweighted graph Γ=(V,E). That is, the vertices of the metric correspond to the vertices of Γ, and dM(u,v) is assigned the shortest path distance in Γ, between u and v. Observe that dM(u,v)=dΓ(u,v)=𝗁𝗈𝗉Γ(u,v). We will use (G,Γ,k) as an instance of Dilation t-Augmentation problem. Since is derived from Γ, for ease of notation, we use dΓ(u,v) instead of dM(u,v). Furthermore, recall that G is embedded in the metric space derived from Γ. That is, G is an edge-weighted graph, where the weights assigned to the edges of G represent the distances in Γ between their end-points. That is, w(u,v)=dΓ(u,v) and dG(u,v) denote the weighted shortest path distance in G.

The starting point of our research is the result of Peleg and Schäffer [19] that Dilation t-Augmentation is NP-hard for t=2, where G is an empty graph and the metric is derived from an undirected graph Γ. So, a natural question is whether this special subcase is FPT. Starting with this question, we trace the boundaries of the Dilation t-Augmentation problem by instantiating different graph families to which Γ can belong or by instantiating different graph families to which G can belong. Our results consist of the following.

  1. 1.

    Our main algorithmic result is an FPT algorithm for Dilation 2-Augmentation when G belongs to the family of 𝒦d,d-free graphs. Recall that a graph G is 𝒦d,d-free if it does not contain a complete bipartite graph with d vertices, each on both sides of the bipartition, as a subgraph. However, there is no restriction on Γ.

    We complement this result by showing that this result cannot be extended for t=3. Indeed, we show that when G is a disjoint union of a star and an independent set, and Γ is an arbitrary graph, then Dilation 3-Augmentation is W[1]-hard. In a slight converse we also show that Dilation 3-Augmentation is W[2]-hard when Γ is a star, and G is an arbitrary graph. On the other hand, in a generalization of the latter setting when Γ is a tree, we show that Dilation 2-Augmentation is polynomial-time solvable.

  2. 2.

    Observe that for the families of stars we cannot bound the maximum degree of each graph uniformly. We show that if G (resp. Γ) belongs to the family of graphs with a maximum degree at most d and Γ (resp. G) is an arbitrary graph, then Dilation t-Augmentation admits an algorithm FPT with running time f(k,t,d)n𝒪(1).

    We complement this result by showing that this result cannot be extended for the weighted metric. That is, when G belongs to the family of graphs of maximum degree 3 and the graph Γ is edge-weighted, then the problem becomes intractable. In fact, the edges of Γ get weights from the two-size set {1,w}. We show that Dilation (2+ϵ)-Augmentation is W[1]-hard in this case.

It is important to note that the family of 𝒦d,d-free graphs includes trees, planar graphs, graphs that exclude a fixed graph H as a minor, graphs of bounded expansion, nowhere dense graphs, and graphs of bounded degeneracy.222For a formal definition of many of these graph classes, we refer to standard texts on graph theory, e.g., Diestel [5]. We refer to Table 1 for a quick reference of all the results shown in this article.

Table 1: Complexity of the Dilation t-Augmentation for different G, metric, parameters and t.
𝑮 Metric (𝚪) Parameter(s) 𝒕 Complexity
𝒦d,d-free General k+d 2 FPT (Section 3)
Star forest General k 3 W[1]-hard (Section 5.1)
General Star k 3 W[1]-hard (Section 5.2)
General Tree k 2 P ()
General Bounded degree k+t+Δ t FPT (Section 4.1)
Bounded degree General k+t+Δ t FPT (Section 4.2)
Subcubic (1,w)-weighted k 2+ϵ W[1]-hard ()
Edgeless General k 2 NP-hard ()
General Clique k 2 W[2]-hard ()

Our algorithmic results are based on the structural interaction between Γ and G. We start by defining the notion of conflict pairs (a pair (u,v) in G such that dG(u,v)>tdΓ(u,v)) and show that to resolve these pairs it suffices to focus on those pairs that are adjacent in Γ (that is, (u,v)E(Γ)). We call them adjacent conflicts. Resolving adjacent conflict pairs is the key to our results, both algorithms and hardness.

Our main result regarding Dilation 2-Augmentation when G is 𝒦d,d-free is given in Section 3. Our algorithm can be broadly divided into three separate phases. First, in Section 3.1 we define the notion of a conflict graph and bound the size of the minimum vertex cover in this graph using the restrictions imposed on the solution for Dilation t-Augmentation in the special case of t=2. Then, in Section 3.2, we analyze the interplay between the bounded-size vertex cover, along with the structural properties of G due to the fact that it is 𝒦d,d-free, and use it to design a recursive algorithm that tries to guess a certain kind of edges that must belong to any solution in a yes-instance. At the leaves of this recursive procedure, we can upper bound the total number of vertices involved in conflicts. Nevertheless, we cannot get rid of all other vertices since they may be crucial for certain shortest paths. Finally, in Section 3.3 we bound the size of the instance by carefully eliminating a subset of conflict-free vertices, at which point we can enumerate all possible solutions. For the other two algorithmic results, we obtain a small set of V that contains all the end-points of edges of the solution. The hardness results are shown via parameter preserving reductions from known W-hard problems, using classical gadget constructions. The details of the results/statements marked with can be found in the full version of the paper [2].

Notations.

Let [n] be the set of integers {1,,n}. For any graph G, we denote the set of vertices of G by V(G) and the set of edges by E(G). We denote the set of non-edges by E¯(G), that is, E¯(G)=(V(G)2)E(G), where (V(G)2) is the set of all unordered pairs of distinct vertices in V(G). For notational convenience, even though our edges/non-edges are undirected, we use the notation (a,b) instead of {a,b} – note that due to this convention, (a,b)=(b,a). A graph G=(V,E) is said to be a star, if there exists a vertex cV(G) such that E={(u,c):uV(G){c}}. In this case, we say that c is the center of the star. Vertices of V(G){c} (if any) are said to be the leaves of the star. If every connected component of a graph G is a star, then we say that G is a star forest.

For a graph G=(V,E) and a subset S of edges in E¯(G), we use the notation G+S to mean the graph G=(V,ES). For a graph G, a path is a sequence of distinct vertices v1v such that (vi,vi+1)E(G) for i[1] and this path is denoted by v1,,v. For an undirected unweighted graph H, we use 𝗁𝗈𝗉H(u,v) to denote the length of the shortest path between u and v. For a graph H, a vertex v and an integer , NH(v) denotes all vertices w such that 𝗁𝗈𝗉H(v,w). Similarly, for a graph H, a vertex subset W and an integer , NH(W)=wWNH(w).

2 Conflict versus Adjacent Conflicts

Let (G,Γ,k) be an instance of Dilation t-Augmentation problem. Two vertices u and v in G are in t-conflict if dG(u,v)>tdΓ(u,v). Furthermore, two vertices are said to be in adjacent t-conflict with each other, if u and v are in conflict and u and v are adjacent in Γ. We say that a graph G is (adjacent) t-conflict-free if there is no pair of vertices (u,v) such that u and v are in (adjacent) t-conflict. Throughout the discussion, the value of t will be clear from the context, so we use the terms conflict/conflict-free instead of t-conflict/t-conflict-free. The following lemma shows the relationship between conflict-free and adjacent conflict-free.

Lemma 1 ().

For any set of edges S, G+S is conflict-free iff G+S is adjacent conflict-free.

For our problem, we add edges to G to make it conflict-free. Lemma 1 shows that for this purpose it is sufficient to focus only on adjacent conflicts. Thus, from now on, we only focus on adjacent conflicts. Unless explicitly mentioned otherwise, by conflict, we mean adjacent conflict. Nevertheless, we may use adjacent conflict at some places to emphasize the adjacent-ness of the conflict.

The next result formalizes the fact that the distances in G are lower bounded by the distances in Γ. The proof follows from definition, and hence omitted.

Observation 2.

Let G=(V,E) be a graph embedded in a metric space derived from the undirected graph Γ. Then for any pair of vertices x and y we have dΓ(x,y)dG(x,y).

Let (G,Γ,k) be a yes-instance of Dilation t-Augmentation and S be an (unknown) minimal solution. The set S is also called dilation t-augmentation set. We use VS to denote the set of end-points of the edges in S. Let Vc denote the set of all vertices in G that are in conflict with some other vertex. In the next two sections, Vc and VS will be used repeatedly.

3 Dilation 𝟐-Augmentation for 𝓚𝒅,𝒅-free Graphs

Let (G,Γ,k) be an instance of Dilation 2-Augmentation. In this section, we consider the case where G belongs to the family of 𝒦d,d-free graphs. Recall that a graph G is 𝒦d,d-free if it does not contain a complete bipartite graph with d vertices each on both sides of the bipartition. However, there is no restriction on Γ.

3.1 Conflict Graph and Vertex Cover

We first define a conflict graph on the set of vertices V(G), which captures all adjacent conflicts. We place an edge between two vertices u and v in if and only if u and v are in adjacent conflict with each other. Note that Vc (the set of vertices present in adjacent conflicts) is exactly the set of vertices with degree at least one in . The next result shows that every edge in E() intersects some edge of a dilation 2-augmentation set S.

Lemma 3 ().

Let (G,Γ,k) be a yes-instance of Dilation 2-Augmentation and let S be a minimal solution to the given instance. In addition, let be the corresponding conflict graph. Then, for any edge (u,v)E(), |{u,v}VS|1.

Lemma 3 allows us to bound the size of a minimum vertex cover (set of vertices that intersects all the edges) of . To do so, we propose the next reduction rule and prove its correctness (or safety).

Reduction Rule 1.

If the size of a maximum matching in is more than 2k, return no.

Lemma 4 ().

Reduction Rule 1 is safe.

First, we use a polynomial-time algorithm (e.g., [7]) to find the maximum matching M in and apply Reduction Rule 1. Notice that if the reduction rule 1 is not applicable, then |M|2k, which implies that it has a vertex cover of size at most 4k – in particular, we can take the set of end-points of the edges of in M to be such a vertex cover, call it R.

Let I=VR. Note that I induces an independent set in , but not necessarily in G. Next, we bound the degree of each vertex in R in . This will imply that the number of conflict pairs is bounded.

The set R is at most of size 4k. For our algorithm at this stage, we “guess the edges of S that have both end-points in R”. This results in an equivalent annotated instance, which is now formalized. We first define an “annotated” instance of the problem. An example of the annotated version of the problem is given by the tuple (G,Γ,k,R), where we also provide a vertex cover R of the corresponding conflict graph, which is used mainly for book keeping purposes. The task is still to find a dilation 2-augmentation set S of size at most k. Here, we are not allowed to add an edge to a solution that does not have an end-point outside R.

Let E¯R be the set of non-edges in G[R]. For every subset EjE¯R of size at most k, we create an instance j of the annotated problem, as follows: j(Gj,Γ,kj,R) where Gj=G+Ej and kj=k|Ej|. The following lemma is immediate.

Lemma 5.

(G,Γ,k) is a yes-instance if and only if one of the instances in {(Gj,Γ,kj,R):EjE¯R s.t. kjk} is a yes-instance.

From now on, we assume that we have an annotated instance of Dilation 2-Augmentation. That is, (G,Γ,k,R) is an instance of Dilation 2-Augmentation and we are seeking a dilation 2-augmentation set S such that for any edge (x,y) in S, |{x,y}R|1. That is, every edge added must contain at least one end-point that does not belong to R.

3.2 Bounding the Size of the 𝑽𝒄 in Annotated Instances

We now describe how to solve the annotated version of the problem. As a first step, we give a recursive algorithm such that at the end we obtain instances such that the size of Vc gets upper-bounded by a function of k and d alone. To this end, and to make it easier to understand, we adapt the following technical definition of [3] in the context of our problem.

Definition 6 ([3]).

A decreasing FPT-Turing-reduction is an FPT algorithm which, given an annotated instance (G,Γ,k,R), produces =g(k,d) annotated instances (G1,Γ,k1,R1),,(G,Γ,k,R), such that: (1) (G,Γ,k,R) is a yes-instance iff one of the annotated instances in {(Gi,Γ,kj,Ri):1j} is a yes-instance, and (2) kjk1 for every j[].

We now give a sequence of FPT Turing reductions to solve the problem. At a high level, we will iterate over the vertices in R that have high degrees in , and at each step we will add at least one vertex from I to R, and at least one new edge to G. Thus, in each step, the budget k reduces by at least one. At least one of the resulting instances will correspond to a “correct” set of choices. Note that initially the size of R is at most 4k; however during the sequence of Turing FPT reductions, the size of R may increase. Nevertheless, we will maintain the invariant that |R| remains bounded by 5k.

Let us define an auxiliary function f that is useful for defining some parameters in the upcoming steps. This function is defined as follows.

f(i)={d if i=ddk+k2+k if i=d1dkdi+kdi+1+(2j=2dikj)+k if 0id2

It is easy to verify that f satisfies the following property.

Proposition 7.

For any 1id, f(i1)=(f(i)+k)k+k.

Thus, if each vertex of R has at most f(0) many neighbours in I in , then eventually |Vc| gets bounded by 5kf(0). We then move to the final step described below after Corollary 16.

Now we are in the situation where there is a vertex in R with at least f(0)+1 neighbors in I in . Let v be such a vertex in R. Let U={u1,u2,,uκ}IN(v) be the set of neighbours of v in I, where κ>f(0).

Reduction Rule 2.

If there is no vertex wI such that |UNG(w)|>f(1) then we return no.

Lemma 8.

Reduction Rule 2 is safe.

Proof.

Assume that for every vertex wI, we have |UNG(w)|f(1). Then, we will show that we cannot resolve all conflicts involving v. Suppose (G,Γ,k,R) is a yes-instance of Dilation 2-Augmentation and S be a minimial solution of size at most k. Since each (v,ui) is an adjacent conflict, we have dG+S(v,ui)2. This implies 𝗁𝗈𝗉G+S(v,ui)2. Therefore, the edge of S that resolves the conflict (v,ui) must be adjacent to v or ui or both. Fix an edge (v,w)S. Since S is a solution to the annotated instance of the vertex wI, the number of paths of hop 2 in G+S starting at v, using (v,w) and ending at a vertex in U is upper-bounded by |UNG(w)|+|S|f(1)+k. Therefore, the total number of conflicts that can be resolved by edges of the form (v,w) is at most (f(1)+k)|Z|. Here, ZS contains edges of the form (v,w). Let us now focus on the conflicts that are resolved by edges of the form (w,ui), uiU. This implies that we have paths of the form v,w,ui such that (v,w)E(G) and (w,ui)S. The number of paths of this kind is upper bounded by |S||Z|. This implies that the total number of conflicts in which v participates, and can be resolved by S, is bounded by (f(1)+k)|Z|+|S||Z|f(1)k+k2+k=f(0).

Now, if 2 is not applicable, then there must be a vertex wI such that w has at least f(1) neighbors in U. We use w to identify a small set of edges that must intersect every solution S of size at most k.

Lemma 9.

There exists a polynomial-time algorithm to find a set Wv={w1,w2,,wδ} such that (1) δ<d, and (2) If we have a yes-instance, then any solution S of size at most k satisfies that S{(v,wi):i[δ]}.

Proof.

By our definition of , the vertex v is in adjacent conflict with each vertex in U. First, by Reduction Rule 2 and Lemma 8, we know that for a yes-instance there exists a vertex wI such that |UNG(w)|>dkd. We let this vertex to be w1. Now either (v,w1)S, and then we are done. Else we are in the case when (v,w1)S. Let us define W1{w1}.

Figure 2: Illustration of arguments used in Lemma 9.

Suppose we have inductively found a set Wi1={w1,,wi1} for some i2. Further, inductively assume that Ui1j[i1]UNG(wj) is such that |Ui1|>f(i1). See Figure 2 for an illustration. We prove the following crucial claim which lets us obtain the next vertex in the sequence. Its proof is along the same lines as Lemma 8.

Claim 10.

Suppose (G,Γ,k,R) is a yes-instance of Dilation 2-Augmentation and S be a solution of size at most k. If S{(v,wj):j[i1]}=. Then there exists a vertex wiIWi1 such that wi has more than f(i) neighbours in G, from Ui1.

Proof.

Assume that for every vertex wIWi1, we have |Ui1NG(w)|f(i). Then, we will show that we cannot resolve all conflicts involving v with the vertices from Ui1. Suppose (G,Γ,k,R) is a yes-instance of Dilation 2-Augmentation and S is a solution of size at most k such that S{(v,wj):j[i1]}=. Now we have that for each uUi1, (v,u) is an adjacent conflict but dG+S(v,u)2. This implies 𝗁𝗈𝗉G+S(v,u)2. Therefore, the edge of S that resolves the conflict (v,u) must be adjacent to v or u or both. Fix an edge (v,w)S. Since S is a solution to the annotated instance of the vertex wI, and wWi1 (by assumption), the number of paths of hop 2 in G+S starting at v, using (v,w) and ending at a vertex in Ui1 is upper-bounded by |Ui1NG(w)|+|S|f(i)+k. Therefore, the total number of conflicts (v,u) where uUi1 that can be resolved by edges of the form (v,w) where wWi1 is at most (f(i)+k)|Z|(f(i)+k)k. Here, ZS contains edges of the form (v,w). Let us now focus on the conflicts that are resolved by edges of the form (w,u), uUi1. This implies that we have paths of the form v,w,u such that (v,w)E(G) and (w,u)S. The number of paths of this kind is upper bounded by |S||Z|k. This implies that the total number of conflicts (v,u) where uUi1, and can be resolved by S, is bounded by (f(i)+k)k+k=f(i1), by Proposition 7. Recall that, by induction, |Ui1|>f(i1). This contradicts that S is a solution, and the claim follows.

Thus, if we find a vertex wi satisfying the requirements as mentioned in Claim 10, we define Wi=Wi1{wi} and proceed to the next iteration. Otherwise, if we cannot find wi, then we stop and output the current set Wi1 as the set Wv as required by the lemma. In this case, by Claim 10, we know that, if we have a yes-instance, then S{(v,wj):j[i1]}.

Suppose the iterative procedure goes on for δ iterations, i.e., Wv=Wδ={w1,w2,,wδ}. Observe that if δd then the vertex set {w1,w2,,wd} and j[δ](UNG(wj)) induce a 𝒦d,d in G which contradicts the fact that G is 𝒦d,d-free. Thus, δ<d, and (1) holds.

We use the algorithm in Lemma 9 to find the set Wv of size δ<d as claimed. We know that, if we have a yes-instance, then any minimal solution S contains at least one edge of the form (v,wi), i[δ]. The following reduction rule essentially tries to guess the set WWv for which such edges belong to the solution, and add those vertices to the vertex cover R. Further, due to our invariant, when we add W to R, we also need to guess the edges between W and the vertices already in R. The following reduction rule is a Turing reduction from the annotated version of the problem to itself – we prove later that it is a valid decreasing Turing FPT reduction step.

Reduction Rule 3.

Let vR be any vertex such that deg(v)f(0)+1. For every non-empty subset WWv, and for any subset

E¯x{(p,q)E¯(G):pW,qW(R{v})}

of non-edges in G, we create the following instances. (Gj,Γ,kj,R) where Gj=G+({(v,wa)|waW}E¯x), kj=k|W||E¯x| and R=RW.

Lemma 11.

3 is a valid decreasing FPT-Turing-reduction.

Proof.

First, note that |Wv|d, which implies that the number of subsets WW is at most 2d. Then, for each fixed subset W of size δ, there are at most 2𝒪(klogd) many subset E¯x. So in total the number of instances we created is bounded by 2𝒪(d+klogd). Now we show the safeness of the 3.

Claim 12.

(G,Γ,k,R) is a yes-instance if and only if one of the instances in {(Gj,Γ,kj,R)} is a yes-instance.

Proof.

The backward direction is trivial. In the forward direction, assume that (G,Γ,k,R) is a yes-instance and S is a minimal solution. Due to the Lemma 9 the solution S must satisfy the condition that S{(v,wi):i[δ]}. Let SS{(v,wi):i[δ]}, W′′VS{v}, and S′′S{(w,r):wW′′,rRW′′}. Clearly W′′Wv and S′′{(p,q)E¯(G):eitherp,qW or pW,qR{v}}. Now considering S′′=E¯x,Gj=G+S+S′′,kj=k|S||S′′|, and R=RW′′, we have that (Gj,Γ,kj,R) is a yes-instance. As W is a non-empty subset of Wv so kjk|W|k1. So in each created instance, the value of the parameter decreases by at least one. Hence the lemma follows.

Next we formalize an observation that follows from the definition of FPT-Turing -reduction.

Observation 13.

Starting from an annotated instance (G,Γ,k,R), let (Gj,Γ,kj,Rj) be one of the instances produced by Reduction Rule 3. Then, |Rj||R|+(kkj). In particular, this implies that the size of |R| in any of the instances produced by a sequence of decreasing Turing FPT reductions, remains bounded by 5k.

We keep applying Reduction Rule 3 until each vertex in R has at most f(0) neighbors in I in the graph . In each step, we maintain the invariant that we have included all possible solution edges within R in G and reduced k appropriately. Observe that when Reduction Rule 3 is not applicable, the total number of vertices in the conflict is at most 𝒪(kf(0)).

Let (G,Γ,k,R) be an annotated instance of Dilation 2-Augmentation. Find a dilation 2-augmentation set S such that |{x,y}R|1. That is, every edge added must contain at least one end-point that does not belong to R. In addition, |R|5k and |Vc|=𝒪(kf(0)), where f(0)=dkd+kd+1+(2j=2dkj)+k.

3.3 Solving Annotated Instances with bounded 𝑽𝒄

In the rest of the section, we describe how to solve an annotated instance =(G,Γ,k,R) when the size of Vc is bounded by some function of k and d. Note that although |Vc|h(k,d), we cannot completely forget about the vertices outside Vc – since some conflicts may be resolved by using edges incident to vertices outside Vc. We will argue that we do not need to keep all such vertices, but it suffices to keep one representative from each “equivalence class”, which we formalize below. Note that in this last step, we do not need the vertex cover R.

Let O=V(G)Vc denote the vertices outside Vc. For each A,BVc with AB=, let O(A,B) denote the set of vertices vO satisfying the following two properties:

  1. 1.

    Set of vertices uVc such that dG(u,v)=1 is exactly equal to A, and

  2. 2.

    Set of vertices wVc such that (v,w)E(G), but dΓ(v,w)=1 is exactly equal to B.

We have the following observation.

Observation 14.
  1. 1.

    𝒫={O(A,B):A,BVc,AB=} forms a partition of O.

  2. 2.

    |𝒫| is bounded by 3|Vc|g(k,d) for some computable function g.

For each O(A,B)𝒫 such that O(A,B), we mark an arbitrary vertex v(A,B)O(A,B). Let UO denote the set of unmarked vertices. In the following reduction rule, we eliminate all the vertices of U from G and Γ, and then prove that it is correct.

Reduction Rule 4.

Given the annotated instance 1=(G,Γ,k,R), produce the annotated instance 2=(G,Γ,k,R), where Γ=ΓU and G=GU.

Lemma 15.

Reduction Rule 4 is safe.

Proof.

We argue that 1 is a yes-instance if and only if 2 is a yes-instance. The reverse direction is trivial, since any solution for s is also a solution for 1 (recall that the vertices of U are not involved in any conflict). So we show the forward direction.

Let SE¯(G) be a minimal solution of size k with the set of end-points being VS. From this solution, we define another solution S as follows. Consider any uUVS, and let S(u)={(u,w)S}, and let N(u)={w:(u,w)S(u)}. First, note that N(u)Vc – suppose not, i.e., there exists some wN(u) but wVc, then (u,w) cannot be part of a path of hop length 2 between two vertices in Vc, which contradicts the minimality of S. Now, suppose u belongs to the set O(A,B)𝒪, then O(A,B), which implies that some v(A,B)V(G)U=V(Γ)U. We define another set SSS(u){(v(A,B),w:wS(u)}. Note that |S|=|S|. We prove that S is also a solution.

Consider any path x,u,y in G+S, such that dΓ(x,u)=dΓ(u,y)=1. There are three cases: (i) (x,u)E(G) and (u,y)S. In this case, note that (x,v(A,B))E(G) with dG(x,v(A,B))=dG(x,v(A,B))=1, and dΓ(u,y)=dΓ(v(A,B),y)=1. Further, (v(A,B),y)S. (ii) (x,u)S and (u,y)E(G) is symmetric. (iii) (x,y),(y,u)S. In this case, dΓ(v(A,B),x)=dΓ(u,x)=1, and dΓ(v(A,B),y)=dΓ(u,y)=1. Thus, in all three cases, x,v(A,B),y path exists in G+S, or in other words, the replaced edges incident to v(A,B) can resolve the same set of conflicts as the edges of S(u). By iterating over the vertices of VSU and modifying the solution in this way, we obtain a solution S′′ containing entirely the edges within E(Γ). This completes the forward direction.

Corollary 16.

The number of vertices in the reduced annotated instance (G,Γ,k,R) is bounded by some g(k,d).

Thus, there are at most (g(k,d)2k)=(2𝒪(h(k,d))2k)=2𝒪(kh(k,d)) possibilities for the end-points of the solution edges. For each such subset, we can guess the actual set of at most k edges in time k𝒪(k). Thus, the total number of possibilities is bounded by f(k,d) for some computable function f. We finish the discussion with the following theorem, and its immediate corollary.

Theorem 17.

Dilation 2-Augmentation can be solved in time f(k,d)n𝒪(1) when G is a 𝒦d,d-free graph for any d.

Corollary 18.

Dilation 2-Augmentation can be solved in time f(k)n𝒪(1) when G is a forest, planar graph, bounded-treewidth graph, an H-minor free graph for some fixed H, a nowhere dense graph, or bounded degeneracy graph.

4 Dilation t-Augmentation for Bounded Degree Graphs is FPT

In this section either G is of bounded degree or Γ is of bounded degree. Observe that a 𝒦d,d-free graph generalizes bounded-degree graphs, and thus the result when G is of bounded degree may appear to be subsumed by those presented in Section 3. However, the result presented here works for any value of t, but the result in Section 3 only worked for t=2.

In either case, we will use the following easy lemma to bound the number of vertices in a ball of radius around a vertex subset of small size.

Observation 19.

Let H be a graph with maximum degree Δ. For any subset of vertices UV(H), |NH(U)||U|i=0Δi|U|Δ+1.

4.1 𝚪 is of Bounded Degree

Let (G,Γ,k) be an instance of Dilation t-Augmentation. In this subsection, we consider the case where Γ belongs to the family of graphs of maximum degree at most Δ. However, there is no restriction on G. That is, G is an arbitrary undirected graph. The idea of the proof is to identify a subset of vertices of Γ of size at most f(k,Δ,t) such that VS belongs to balls of radius t around them. Once the set is identified, the algorithm tries all potential solutions of size at most k and returns yes, if either leads to the desired solution. The hypothetical solution S is of size at most k, and hence from Observation 19 we have |NΓt(VS)|2kΔt+1. First, we show that the vertices of VS are in distance t from the vertices of Vc in Γ.

Lemma 20 ().

Let (G,Γ,k) be a yes-instance of Dilation t-Augmentation. Then, VSNΓt(Vc).

Observe that we cannot upper bound the size of NΓt(Vc), as the size of Vc may not be bounded by any function of t,k and Δ. Next, we show a kind of converse of Lemma 20 showing that, in fact, Vc is contained inside the balls of radius t around VS in Γ. The proof is identical to Lemma 20 and is presented separately for clarity.

Lemma 21 ().

Let (G,Γ,k) be a yes-instance of Dilation t-Augmentation. Then, VcNΓt(VS).

Lemma 21, along with Observation 19 implies that in a yes-instance, the size of Vc is bounded by 2kΔt+1. Thus, if |Vc|>2kΔt+1, we say no. Now assume that |Vc|2kΔt+1. Next, via Lemma 20, we have that VSNΓt(Vc)=:Q, say. Again, by Observation 19, |Q||Vc|Δt+12kΔ2t+2. We know we have to add at most k edges between the vertices in Q to resolve all the conflicts. Since the size of Q is bounded by a function of k,Δ, and t, this leads to the following theorem.

Theorem 22.

Dilation t-Augmentation can be solved in time 2𝒪(klogk)Δ𝒪(kt)n𝒪(1), where Δ denotes the maximum degree of the graph Γ.

4.2 𝑮 is of Bounded Degree

Let (G,Γ,k) be an instance of Dilation t-Augmentation. In this subsection, we consider the case where G belongs to the family of graphs of maximum degree at most Δ. However, there is no restriction on Γ. The proof strategy in this section is similar to that used for Theorem 22. As before, the idea is to identify a subset of vertices of G of maximum size f(k,Δ,t) such that VS belongs to balls of radius t2 around them.

Lemma 23 ().

Let (G,Γ,k) be a yes-instance of Dilation t-Augmentation. Then, VcNGt(VS).

As |VS|2k, the next observation follows from Observation 19.

Observation 24.

|NGt(VS)|2kΔt+1.

Lemma 23 and Observation 24 together yield the following reduction rule that yields an upper bound on the size of the conflict set Vc.

Reduction Rule 5.

If |Vc|>2kΔt+1, return no.

To identify the vertices in VS, we show that they lie in the balls of radius t2 around Vc in G.

Lemma 25.

Let (G,Γ,k) be a yes-instance of Dilation t-Augmentation and S be a hypothetical minimal solution. Then, VSNGt2(Vc).

Figure 3: Path in G+S is shown in red (solid lines), path in Γ is shown in green (dashed) and path in G is shown in blue ( dashed-dotted).

Proof.

Let aVS and (a,b) be an edge in S containing a. Due to the minimality of S, for every edge e=(a,b) in S, there exist at least two vertices s1 and s2 such that (i) s1 and s2 are in conflict (again, adjacent conflict) with each other in G, and (ii) e=(a,b) appears in a shortest path P of length at most t between s1 and s2 in G+S. Note that a and b may not be in conflict. We show that there exists a vertex wVc such that w is at most t2 hop distance from the vertex a in G (that is, 𝗁𝗈𝗉G(w,a)t2). Let P be the subpath of length τt between s1 and a (see Figure 3). Since G+S is also a graph embedded in a metric space derived from the undirected graph Γ, by Observation 2 we have dΓ(s1,a)dG+S(s1,a)=τt.

Let Q=s1=a1,a2,aτ+1=a be a path between s1 and a in Γ of length dΓ(s1,a)t. Let j[τ+1] be the largest index such that ajVc. Since s1Vc, an index j always exists. Observe that for all jiτ, ai and ai+1 are not in conflict and ai and ai+1 are adjacent in Γ. Therefore, there exists a path Ri between ai and ai+1, jiτ, in G of maximum length t. Thus, by concatenating the paths RjRj+1Rτ, we get a walk with a weighted length at most t2 between aj and a in G. This implies that there is a path between aj and a in G of length t2. That is, dG(aj,a)t2. Since all the edge weights in G are at least 1, we have 𝗁𝗈𝗉G(aj,a)t2. This implies aNGt2(aj)NGt2(Vc). From Lemma 25 and Reduction Rule 5, and Observation 19, we get the following.

Lemma 26.

Let (G,Γ,k) be a yes-instance of Dilation t-Augmentation. Then, |NGt2(Vc)|2kΔt+1Δt2+1.

We have to add at most k edges between the vertices in NGt2(Vc) to resolve all the conflicts. Since the size of NGt2(Vc) is bounded by f(k,t,Δ), this leads to the following theorem.

Theorem 27.

Dilation t-Augmentation can be solved in time 2𝒪(klogk)Δ𝒪(kt2)n𝒪(1), where Δ denotes the maximum degree of the graph G.

5 Dilation 𝟑-Augmentation For Forest and Stars

In this section, we focus on Dilation 3-Augmentation when G is a forest (Section 5.1), or when Γ is a star (Section 5.2). We show that Dilation 3-Augmentation is W-hard in both cases. In contrast to this, we know that Dilation 2-Augmentation is FPT when G is a forest, due to Theorem 17.

5.1 W[1]-hardness of Dilation 3-Augmentation when 𝑮 is Forest

We sketch a polynomial-time parameter preserving reduction from the Multicolored Clique problem – which is known to be W[1]-hard [9] – to an instance of Dilation 3-Augmentation when G is a disjoint union of a star and an independent set. The input of Multicolored Clique consists of a graph H, an integer k, and a partition 𝒱=(V1,V2,,Vk) of the vertices of H; our aim is to decide if there is a clique of size k containing exactly one vertex from each set Vi,i[k]. We denote this instance by (H,k,𝒱). We can assume that for each ik, Vi is an independent set.

Figure 4: Hardness for t=3 when G is a disjoint union of a star, and a set of isolated vertices.

From an instance (H,k,𝒱) of Multicolored Clique for k2, we construct an instance (G,Γ,k) of Dilation 3-Augmentation with the following way (see Figure 4).

  • For every set Vi,i[k], we introduce a set Ui of k2 vertices and a set Wi of 3k3 vertices.

  • Construction of the graph Γ:

    1. 1.

      The vertex set in Γ consists of vertex set HG{U1Uk}{W1Wk}{c} where HG=V(H).

    2. 2.

      The edge set of Γ is defined by E(Γ)=EHEUEWEc; here EH=E(H), EU={(v,u)|vVi,uUi,i[k]}{(v,u)|vUi,uUj,i,j[k],ij}, EW={(u,w)|uUi,wWi,i[k]} and Ec={(c,v)|vHGW1Wk}.

  • The graph G consists of the vertex set V(Γ) and the edge set Ec.

  • We set k=(k2)+k3.

It is easy to see that in the constructed instance (G,Γ,k) the graph G is indeed a disjoint union of a star and independent set. Also, the construction can be performed in time polynomial in |V(H)| and k. Towards the correctness of our reduction, we prove the following.

Lemma 28.

(H,k,𝒱) is a yes-instance of Multicolored Clique if and only if (G,Γ,k) is a yes-instance of Dilation 3-Augmentation.

Proof.

()In the forward direction, suppose that there is a multicolored clique Q in H. Let the set of vertices in Q be VQ={v1,,vk} where viVi and the edgeset of Q be EQ. Consider the set of edges EVU={(vi,u)|i[k],uUi}. Observe that |EQ|=(k2) and |EVU|=kk2 as |Ui|=k2 for each i[k]. Next, we show that the dilation of G+(EQEVU) is at most 3. Notice that all the edges incident to c in Γ are also present in G. Hence c is not involved in any adjacent conflicts. Now we consider all other pairs of adjacent vertices in Γ, say a and b, and show that there exists a path between them of length at most 3 in G+(EQEVU). This suffices our proof due to Lemma 1. We argue with the following cases.

Case (i): aVi and bVj.

There is a length 2 path between them in G itself which is precisely a,c,b.

Case (ii): aVi and bUi.

If a=vi then a and b are adjacent in G+EVU. Otherwise, there is a length 3 path between them in G+EVU which is precisely a,c,vi,b.

Case (iii): aUi and bUj.

If ij, we use two edges from EQEVU. The vertices a and b are connected by a length 3 path a,vi,vj,b in G+(EQEVU). Suppose that i=j. Then a,vi,b is a path in G+(EQEVU) of length 2.

Case (iv): aUi and bWi.

In this case, we use an edge from EVU. The vertices a and b are connected by a length 3 path a,vi,c,b in G+EVU.

() In the backward direction, let EX be a solution to the instance (G,Γ,k) of Dilation 3-Augmentation, that means dilation of G+EX is at most 3. We start with the following claim.

Claim 29.

For each i[k] and every uUi, the set EX contains an edge (u,v) for vj=1kUj.

Proof.

The proof is by contradiction. Suppose that there are i[k] and uUi such that for every (u,v)EX, vj=1kUj. Because |EX|k=(k2)+k3 and |Wi|=3k3, we have that |Wi|2|EX|1 and, therefore, there is wWi such that w is not incident to any edge of EX. Thus, any shortest (u,w)-path in G+EX contains the edge (w,c) and an edge (u,v) for some vj=1kUj. However, the distance between c and v in Γ is 2. This implies that the length of any (u,w)-path in G+EX is at least 4. Because u and w are adjacent in Γ, this contradicts that the dilation of G+EX is at most 3 and proves the claim. Due to the above claim, summing over all i[k], we have that the set EX contains at least kk2=k3 edges incident to the vertices of i=1kUi whose second end-points are outside i=1kUi. Because |EX|(k2)+k3, we have that for each i[k], there are at least k22(k2)k2 vertices of Ui that are adjacent to exactly one edge of EX. For i[k], we denote by UiUi the set of vertices incident to unique edges of EX. We make the following observation.

Claim 30.

For each i[k], there is uUi such that u is incident to a single edge (u,v)EX such that (u,v)E(Γ).

Proof.

Consider arbitrary uUi. This vertex has a unique neighbor v in G+EX where vj=1kUi by Claim 29. If (u,v)E(Γ), the claim holds. Suppose that (u,v)E(Γ). Recall that |Ui|2. Thus, there is uUi distinct from u. In the same way as above, u has a unique neighbor v in G+EX where vj=1kUi. Then any (u,u)-path in H+EX contains the edges (u,v) and (u,v). Since (u,u)E(Γ) and the dilation of G+EX is at most 3, we have that the length of (u,v) is one. Therefore, (u,v)E(Γ). This concludes the proof.

Using Claim 30, for every i[k], we denote by ui the vertex of Ui that is incident to a single edge of EXE(Γ) and we use vi to denote the second end-point of the edge.

Claim 31.

{v1,,vk} is a clique of H.

Proof.

First, we show that viVi for each i[k]. Consider i[k]. Note that by Claims 29 and 30 and the construction of Γ, either viWi or viVi. Suppose that viWi and consider uj for j[k] distinct from i. We have that (ui,uj)E(Γ). Therefore, G+EX should have a (ui,uj)-path of length at most 3. Any (ui,uj)-path contains the edges (ui,vi) and (uj,vj). Thus, a shortest (ui,uj)-path should contain (vi,vj)E(Γ). However, since viWi and vjVjWj, we have no such an edge by the construction of Γ. This contradiction proves that viVi.

Finally, we show that for all distinct i,j[k], vi and vj are adjacent in H. For this, we again observe that G+EX should have a (ui,uj)-path of length at most 3 that includes (ui,vi) and (uj,vj). This implies that (vi,vj)E(Γ). Because viVi and vjVj, we have that (vi,vj) is in EX and is an edge of H. This proves the claim.

Claim 31 completes the proof of the lemma.

Hence, we have the following theorem.

Theorem 32.

Dilation 3-Augmentation is W[1]-hard parameterized by k when G is star forest.

5.2 W[1]-hardness of Dilation 3-Augmentation when 𝚪 is Star

We present a parameter preserving reduction from the Dominating Set problem.

Let (H,k) be an instance of Dominating Set. We create the instance (G,Γ,k) of the Dilation 3-Augmentation problem as follows. Graphs Γ and G are defined over the vertex sets V(H){c}, where c is a new vertex distinct from the vertices of V(H). Γ is a star with center c and leaves V(H). That is, E(Γ)={(c,v):vV(H)}. Note that in the shortest path metric defined by Γ, dΓ(u,v)=2 for any u,vV(H). We let E(G)=E(H), which implies that G is a disjoint union of H and the singleton vertex c. Note that the weight of each edge in G is 2. The proof of equivalence can be found in the full version.

Observation 33 ().

(H,k) is an yes-instance of Dominating Set if and only if (G,Γ,k) is an yes-instance of Dilation 3-Augmentation.

Hence we have the following theorem.

Theorem 34.

Dilation 3-Augmentation is W[2]-hard parameterized by k even when Γ is star.

6 Conclusion

In this article, we introduced Dilation t-Augmentation and explored its multivariate complexity of the problem by restricting either the graph class to which Γ could belong or the graph class to which G could belong. Other special graph classes that one could consider include geometric intersection graphs such as interval graphs, unit-disk graphs, disk-graphs, or, more generally, string graphs. In an alternate direction, we can consider the problem in its full generality. However, as we saw, the problem in its full generality cannot admit FPT algorithm. So, a next natural question that stems from our work is exploring these problems from the perspective of FPT-approximation.

References

  • [1] Boris Aronov, Mark de Berg, Otfried Cheong, Joachim Gudmundsson, Herman J. Haverkort, Michiel H. M. Smid, and Antoine Vigneron. Sparse geometric graphs with small dilation. Comput. Geom., 40(3):207–219, 2008. doi:10.1016/J.COMGEO.2007.07.004.
  • [2] Aritra Banik, Fedor V. Fomin, Petr A. Golovach, Tanmay Inamdar, Satyabrata Jana, and Saket Saurabh. Multivariate exploration of metric dilation, 2025. arXiv:2501.04555.
  • [3] Édouard Bonnet, Nicolas Bousquet, Stéphan Thomassé, and Rémi Watrigant. When maximum stable set can be solved in FPT time. In Pinyan Lu and Guochuan Zhang, editors, 30th International Symposium on Algorithms and Computation, ISAAC 2019, December 8-11, 2019, Shanghai University of Finance and Economics, Shanghai, China, volume 149 of LIPIcs, pages 49:1–49:22. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2019. doi:10.4230/LIPICS.ISAAC.2019.49.
  • [4] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
  • [5] Reinhard Diestel. Graph theory. Springer (print edition); Reinhard Diestel (eBooks), 2024.
  • [6] Rodney G. Downey and Michael R. Fellows. Parameterized Complexity. Monographs in Computer Science. Springer, 1999. doi:10.1007/978-1-4612-0515-9.
  • [7] Jack Edmonds. Paths, trees, and flowers. Canadian Journal of mathematics, 17:449–467, 1965.
  • [8] Mohammad Farshi, Panos Giannopoulos, and Joachim Gudmundsson. Improving the stretch factor of a geometric network by edge augmentation. SIAM J. Comput., 38(1):226–240, 2008. doi:10.1137/050635675.
  • [9] Michael R Fellows, Danny Hermelin, Frances Rosamond, and Stéphane Vialette. On the fixed-parameter intractability and tractability of multiple-interval graph properties. Theoretical Computer Science. v410, pages 53–61, 2007.
  • [10] Jörg Flum and Martin Grohe. Parameterized Complexity Theory. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2006. doi:10.1007/3-540-29953-X.
  • [11] Yong Gao, Donovan R. Hare, and James Nastos. The parametric complexity of graph diameter augmentation. Discret. Appl. Math., 161(10-11):1626–1631, 2013. doi:10.1016/J.DAM.2013.01.016.
  • [12] Panos Giannopoulos, Rolf Klein, Christian Knauer, Martin Kutz, and Dániel Marx. Computing geometric minimum-dilation graphs is np-hard. Int. J. Comput. Geom. Appl., 20(2):147–173, 2010. doi:10.1142/S0218195910003244.
  • [13] Joachim Gudmundsson and Michiel H. M. Smid. On spanners of geometric graphs. Int. J. Found. Comput. Sci., 20(1):135–149, 2009. doi:10.1142/S0129054109006486.
  • [14] Joachim Gudmundsson and Sampson Wong. Improving the dilation of a metric graph by adding edges. ACM Trans. Algorithms, 18(3):20:1–20:20, 2022. doi:10.1145/3517807.
  • [15] Yusuke Kobayashi. NP-hardness and fixed-parameter tractability of the minimum spanner problem. Theor. Comput. Sci., 746:88–97, 2018. doi:10.1016/J.TCS.2018.06.031.
  • [16] Yusuke Kobayashi. An FPT algorithm for minimum additive spanner problem. In 37th International Symposium on Theoretical Aspects of Computer Science, STACS 2020, March 10-13, 2020, Montpellier, France, volume 154 of LIPIcs, pages 11:1–11:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPICS.STACS.2020.11.
  • [17] Jun Luo and Christian Wulff-Nilsen. Computing best and worst shortcuts of graphs embedded in metric spaces. In Seok-Hee Hong, Hiroshi Nagamochi, and Takuro Fukunaga, editors, Algorithms and Computation, 19th International Symposium, ISAAC 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings, volume 5369 of Lecture Notes in Computer Science, pages 764–775. Springer, 2008. doi:10.1007/978-3-540-92182-0_67.
  • [18] Giri Narasimhan and Michiel Smid. Geometric spanner networks. Cambridge University Press, 2007.
  • [19] David Peleg and Alejandro A. Schäffer. Graph spanners. J. Graph Theory, 13(1):99–116, 1989. doi:10.1002/JGT.3190130114.
  • [20] Christian Wulff-Nilsen. Computing the dilation of edge-augmented graphs in metric spaces. Comput. Geom., 43(2):68–72, 2010. doi:10.1016/J.COMGEO.2009.03.008.