Abstract 1 Introduction 2 Preliminaries 3 Metric Dimension: Algorithms for Vertex Cover Parameterization 4 Metric Dimension: Lower Bounds Regarding Vertex Cover 5 Geodetic Set: Algorithms for Vertex Cover Parameterization 6 Geodetic Set: Lower Bounds Regarding Vertex Cover 7 Conclusion References

Metric Dimension and Geodetic Set Parameterized by Vertex Cover

Florent Foucaud ORCID Université Clermont Auvergne, CNRS, Mines Saint-Étienne, Clermont Auvergne INP, LIMOS, 63000 Clermont-Ferrand, France Esther Galby ORCID Department of Computer Science and Engineering, Chalmers University of Technology and University of Gothenburg, Sweden Liana Khazaliya ORCID Technische Universität Wien, Austria Shaohua Li ORCID School of Computer Science and Engineering, Central South University, Changsha, China Fionn Mc Inerney ORCID Telefónica Scientific Research, Barcelona, Spain Roohani Sharma ORCID University of Bergen, Norway Prafullkumar Tale ORCID Indian Institute of Science Education and Research Pune, India
Abstract

For a graph G, a subset SV(G) is called a resolving set of G if, for any two vertices u,vV(G), there exists a vertex wS such that d(w,u)d(w,v). The Metric Dimension problem takes as input a graph G on n vertices and a positive integer k, and asks whether there exists a resolving set of size at most k. In another metric-based graph problem, Geodetic Set, the input is a graph G and an integer k, and the objective is to determine whether there exists a subset SV(G) of size at most k such that, for any vertex uV(G), there are two vertices s1,s2S such that u lies on a shortest path from s1 to s2.

These two classical problems are known to be intractable with respect to the natural parameter, i.e., the solution size, as well as most structural parameters, including the feedback vertex set number and pathwidth. We observe that both problems admit an 𝖥𝖯𝖳 algorithm running in 2𝒪(𝚟𝚌2)n𝒪(1) time, and a kernelization algorithm that outputs a kernel with 2𝒪(𝚟𝚌) vertices, where 𝚟𝚌 is the vertex cover number. We prove that unless the Exponential Time Hypothesis (ETH) fails, Metric Dimension and Geodetic Set, even on graphs of bounded diameter, do not admit

  • an 𝖥𝖯𝖳 algorithm running in 2o(𝚟𝚌2)n𝒪(1) time, nor

  • a kernelization algorithm that does not increase the solution size and outputs a kernel with 2o(𝚟𝚌) vertices.

We only know of one other problem in the literature that admits such a tight algorithmic lower bound with respect to 𝚟𝚌. Similarly, the list of known problems with exponential lower bounds on the number of vertices in kernelized instances is very short.

Keywords and phrases:
Parameterized Complexity, ETH-based Lower Bounds, Kernelization, Vertex Cover, Metric Dimension, Geodetic Set
Funding:
Florent Foucaud: ANR project GRALMECO (ANR-21-CE48-0004), French government IDEX-ISITE initiative 16-IDEX-0001 (CAP 20-25), International Research Center “Innovation Transportation and Production Systems” of the I-SITE CAP 20-25.
Liana Khazaliya: Vienna Science and Technology Fund (WWTF) [10.47379/ICT22029]; Austrian Science Fund (FWF) [10.55776/Y1329]; European Union’s Horizon 2020 COFUND programme [LogiCS@TUWien, grant agreement No. 101034440].
Shaohua Li: National Natural Science Foundation of China under Grant 62472449.
Fionn Mc Inerney: Smart Networks and Services Joint Undertaking (SNS JU) under the EU’s Horizon Europe and innovation programme under Grant Agreement No. 101139067 (ELASTIC).
Copyright and License:
[Uncaptioned image] © Florent Foucaud, Esther Galby, Liana Khazaliya, Shaohua Li, Fionn Mc Inerney,
Roohani Sharma, and Prafullkumar Tale; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms
Related Version:
Full Version: https://arxiv.org/abs/2405.01344 [19]
Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim Thắng

1 Introduction

In this article, we study two metric-based graph problems, one of which is defined through distances, while the other relies on shortest paths. Metric-based graph problems are ubiquitous in computer science; for example, the classical (Single-Source) Shortest Path, (Graphic) Traveling Salesperson or Steiner Tree problems fall into this category. Those are fundamental problems, often stemming from applications in network design, for which a considerable amount of algorithmic research has been done. Metric-based graph packing and covering problems, like Distance Domination [29] or Scattered Set [30], have recently gained a lot of attention. Their non-local nature leads to non-trivial algorithmic properties that differ from most graph problems with a more local nature. We focus here on the Metric Dimension and Geodetic Set problems, which arise from network monitoring and network design, respectively. These two problems have far-reaching applications, as exemplified by, e.g., the recent work [3] where it was shown that enumerating minimal solution sets for Metric Dimension and Geodetic Set in (general) graphs and split graphs, respectively, is equivalent to the enumeration of minimal transversals in hypergraphs, whose solvability in total-polynomial time is arguably the most important open problem in algorithmic enumeration. Formally, these two problems are defined as follows.

Metric Dimension Input: A graph G on n vertices and a positive integer k. Question: Does there exist SV(G) such that |S|k and, for any pair of vertices u,vV(G), there exists a vertex wS with d(w,u)d(w,v)?

Geodetic Set Input: A graph G on n vertices and a positive integer k. Question: Does there exist SV(G) such that |S|k and, for any vertex uV(G), there are two vertices s1,s2S such that u lies on a shortest path from s1 to s2?

Metric Dimension dates back to the 1970s [26, 38], whereas Geodetic Set was introduced in 1993 [25]. The non-local nature of these problems has since posed interesting algorithmic challenges. Metric Dimension was first shown to be 𝖭𝖯-complete in general graphs in Garey and Johnson’s book [22], and this was later extended to many restricted graph classes (see “Related work” below). Geodetic Set was proven to be 𝖭𝖯-complete in [25], and later shown to be 𝖭𝖯-hard on restricted graph classes as well.

As these two problems are 𝖭𝖯-hard even in very restricted cases, it is natural to ask for ways to confront this hardness. In this direction, the parameterized complexity paradigm allows for a more refined analysis of a problem’s complexity. In this setting, we associate each instance I of a problem with a parameter , and are interested in algorithms running in f()|I|𝒪(1) time for some computable function f. Parameterized problems that admit such an algorithm are called fixed-parameter tractable (𝖥𝖯𝖳 for short) with respect to the considered parameter. Under standard complexity assumptions, parameterized problems that are hard for the complexity class 𝖶[1] or 𝖶[2] do not admit such algorithms.

This approach, however, had limited success for these two problems. In the seminal paper [28], Metric Dimension was proven to be 𝖶[2]-hard parameterized by the solution size k, even on subcubic bipartite graphs. Similarly, Geodetic Set is 𝖶[2]-hard parameterized by the solution size [15, 31], even on chordal bipartite graphs. These initial hardness results drove the ensuing meticulous study of the problems under structural parameterizations: we present an overview in the “Related work” below. In this article, we focus on the vertex cover number, denoted by 𝚟𝚌, of the input graph and prove the following positive results.

Theorem 1.

Metric Dimension and Geodetic Set admit

  • 𝖥𝖯𝖳 algorithms running in 2𝒪(𝚟𝚌2)n𝒪(1) time, and

  • kernelization algorithms that output kernels with 2𝒪(𝚟𝚌) vertices.

The second set of results follows from simple reduction rules, and was also observed in [28] for Metric Dimension. The first set of results builds on the second set by using a simple, but critical observation. For Metric Dimension, this also improves upon the 22𝒪(𝚟𝚌)n𝒪(1) algorithm mentioned in [28]. However, our main technical contribution is in proving that these results are optimal assuming the Exponential Time Hypothesis (ETH).

Theorem 2.

Unless the ETH fails, Metric Dimension and Geodetic Set do not admit

  • 𝖥𝖯𝖳 algorithms running in 2o(𝚟𝚌2)n𝒪(1) time, nor

  • kernelization algorithms that do not increase the solution size and output kernels with 2o(𝚟𝚌) vertices,

even on graphs of bounded diameter.

Both these statements constitute a rare set of results. Indeed, we know of only one other problem that admits a lower bound of the form 2o(𝚟𝚌2)n𝒪(1) and a matching upper bound [1], whereas such results parameterized by pathwidth are mentioned in [36, 37]. Very recently, the authors in [7] also proved a similar result with respect to solution size. Similarly, the list of known problems with exponential lower bounds on the number of vertices in kernelized instances is very short. To the best of our knowledge, the only known results of this kind (i.e., ETH-based lower bounds on the number of vertices in a kernel) are for Edge Clique Cover [13], Biclique Cover [9], Steiner Tree [35], Strong Metric Dimension [20], B-NCTD+ [8], Locating Dominating Set [7], and Telephone Broadcasting [39]. For Metric Dimension, the above also improves a result of [24], which states that Metric Dimension parameterized by k+𝚟𝚌 does not admit a polynomial kernel unless the polynomial hierarchy collapses to its third level. Indeed, the result of [24] does not rule out a kernel of super-polynomial or sub-exponential size.

Recently, Foucaud et al. [20] proved that, unless the ETH fails, Metric Dimension and Geodetic Set on graphs of bounded diameter do not admit 22o(𝚝𝚠)n𝒪(1)-time algorithms, thereby establishing one of the first such results for 𝖭𝖯-complete problems. Note that n𝚟𝚌𝚏𝚟𝚜𝚝𝚠 and n𝚟𝚌𝚝𝚍𝚙𝚠𝚝𝚠 in the parameter hierarchy, where n is the order, 𝚏𝚟𝚜 is the feedback vertex set number, 𝚝𝚍 is the treedepth, 𝚙𝚠 is the pathwidth, and 𝚝𝚠 is the treewidth of the graph. They further proved that their lower bound also holds for 𝚏𝚟𝚜 and 𝚝𝚍 in the case of Metric Dimension, and for 𝚝𝚍 in the case of Geodetic Set [20]. A simple brute-force algorithm enumerating all possible candidates runs in 2𝒪(n) time for both of these problems. Thus, the next natural question is whether such a lower bound for Metric Dimension and Geodetic Set can be extended to larger parameters, in particular 𝚟𝚌. Our first results answer this question in the negative. Together with the lower bounds with respect to 𝚟𝚌, this establishes the boundary between parameters yielding single-exponential and double-exponential running times for Metric Dimension and Geodetic Set.

Before moving forward, we highlight the parallels and differences between Foucaud et al. [20] and our work. Their aim was to establish double-exponential lower bounds for 𝖭𝖯-complete problems, and to do so they focused on the restriction of the problems to graphs of bounded treewidth and diameter. Our objective is to closely examine one of the very few tractable results for Metric Dimension and Geodetic Set on general graphs by focusing on the vertex cover parameter. While we use some gadgets from [20], overall our reductions significantly differ from the corresponding reductions in that article. Note that we need to “control” the vertex cover number of the reduced graph, whereas the corresponding reductions by Foucaud et al. [20] only need to “control” the treewidth.

Related Work.

We mention here results concerning structural parameterizations of Metric Dimension and Geodetic Set, and refer the reader to the full version of [20] for a more comprehensive overview of applications and related work regarding these two problems.

As previously mentioned, Metric Dimension is 𝖶[2]-hard parameterized by the solution size k, even in subcubic bipartite graphs [28]. Several other parameterizations have been studied for this problem, on which we elaborate next (see also [21, Figure 1]). It was proven that there is an 𝖷𝖯 algorithm parameterized by the feedback edge set number [18], and 𝖥𝖯𝖳 algorithms parameterized by the max leaf number [17], the modular-width and the treelength plus the maximum degree [2], the treedepth and the clique-width plus the diameter [23], and the distance to cluster (co-cluster, respectively) [21]. Recently, an 𝖥𝖯𝖳 algorithm parameterized by the treewidth in chordal graphs was given in [5]. On the negative side, Metric Dimension is 𝖶[1]-hard parameterized by the pathwidth even on graphs of constant degree [4], para-𝖭𝖯-hard parameterized by the pathwidth [33], and 𝖶[1]-hard parameterized by the combined parameter feedback vertex set number plus pathwidth [21].

The parameterized complexity of Geodetic Set was first addressed in [31], in which it was observed that the reduction from [15] implies that the problem is 𝖶[2]-hard parameterized by the solution size (even for chordal bipartite graphs). This motivated the authors of [31] to investigate structural parameterizations of Geodetic Set. They proved the problem to be 𝖶[1]-hard for the combined parameters solution size, feedback vertex set number, and pathwidth, and 𝖥𝖯𝖳 for the parameters treedepth, modular-width (more generally, clique-width plus diameter), and feedback edge set number [31]. The problem was also shown to be 𝖥𝖯𝖳 on chordal graphs when parameterized by the treewidth [6].

2 Preliminaries

For an integer a, we let [a]={1,,a}.

Graph theory.

We use standard graph-theoretic notation and refer the reader to [14] for any undefined notation. For an undirected graph G, the sets V(G) and E(G) denote its set of vertices and edges, respectively. Two vertices u,vV(G) are adjacent or neighbors if (u,v)E(G). The open neighborhood of a vertex uV(G), denoted by N(u):=NG(u), is the set of vertices that are neighbors of u. The closed neighborhood of a vertex uV(G) is denoted by N[u]:=NG[u]:=NG(u){u}. For any XV(G) and uV(G), NX(u)=NG(u)X. Any two vertices u,vV(G) are true twins if N[u]=N[v], and are false twins if N(u)=N(v). For a subset S of V(G), we say that the vertices in S are true (false, respectively) twins if, for any u,vS, u and v are true (false, respectively) twins. The distance between two vertices u,vV(G) in G, denoted by d(u,v):=dG(u,v), is the length of a (u,v)-shortest path in G. For a subset S of V(G), we define N[S]=vSN[v] and N(S)=N[S]S. For a graph G, a set XV(G) is said to be a vertex cover if V(G)X is an independent set. We denote by 𝚟𝚌(G) the size of a minimum vertex cover in G. When G is clear from the context, we simply say 𝚟𝚌. A vertex is simplicial if its neighborhood forms a clique. Observe that any simplicial vertex v does not belong to any shortest path between any pair x,y of vertices (both distinct from v). Hence, the following holds.

Observation 3 ([10]).

If a graph G contains a simplicial vertex v, then v belongs to any geodetic set of G. Specifically, every degree-1 vertex belongs to any geodetic set of G.

Metric Dimension.

A subset of vertices SV(G) resolves a pair of vertices u,vV(G) if there exists a vertex wS such that d(w,u)d(w,v). A vertex uV(G) is distinguished by a subset of vertices SV(G) if, for any vV(G){u}, there exists a vertex wS such that d(w,u)d(w,v).

Parameterized Complexity.

An instance of a parameterized problem Π comprises an input I, which is an input of the classical instance of the problem, and an integer , which is called the parameter. A problem Π is said to be fixed-parameter tractable or in 𝖥𝖯𝖳 if given an instance (I,) of Π, we can decide whether or not (I,) is a Yes-instance of Π in f()|I|𝒪(1) time, for some computable function f whose value depends only on .

A kernelization algorithm for Π is a polynomial-time algorithm that takes as input an instance (I,) of Π and returns an equivalent instance (I,) of Π, where |I|,f(), where f is a function that depends only on . If such an algorithm exists for Π, we say that Π admits a kernel of size f(). If f is a polynomial or exponential function of , we say that Π admits a polynomial or exponential kernel, respectively. If Π is a graph problem, then I contains a graph, say G, and I contains a graph, say G. In this case, we say that Π admits a kernel with f() vertices if the number of vertices of G is at most f().

It is typical to describe a kernelization algorithm as a series of reduction rules. A reduction rule is a polynomial-time algorithm that takes as an input an instance of a problem and outputs another (usually reduced) instance. A reduction rule said to be applicable on an instance if the output instance is different from the input instance. A reduction rule is safe if the input instance is a Yes-instance if and only if the output instance is a Yes-instance.

The Exponential Time Hypothesis (ETH) roughly states that n-variable 3-SAT cannot be solved in 2o(n) time. For more on parameterized complexity and related terminologies, we refer the reader to the recent book by Cygan et al. [12].

3-Partitioned-3-SAT.

Our lower bound proofs consist of reductions from the 3-Partitioned-3-SAT problem. This version of 3-SAT was introduced in [32] and is defined as follows.

3-Partitioned-3-SAT Input: A formula ψ in 3-CNF form, together with a partition of the set of its variables into three disjoint sets Xα, Xβ, Xγ, with |Xα|=|Xβ|=|Xγ|=N, and such that no clause contains more than one variable from each of Xα,Xβ, and Xγ. Question: Determine whether ψ is satisfiable.

Organization of the paper.

We start with the results for Metric Dimension, which are then followed by those for Geodetic Set. For each, we first present the algorithms and then the reductions. Since space requirements prohibit us from presenting our reductions in detail, we give an outline that discusses the main technical ideas behind our reductions for getting the lower-bound results for both Metric Dimension and Geodetic Set. For the complete formal proofs, we refer the reader to the full version of this paper [19].

3 Metric Dimension: Algorithms for Vertex Cover Parameterization

In this section, we prove Theorem 1 for Metric Dimension. The kernelization algorithm exhaustively applies the following reduction rule.

Reduction Rule 1.

If there exist three vertices u,v,xI such that u,v,x are false twins, then delete x and decrease k by one.

Proof that Reduction Rule 1 is safe..

Since u,v,x are false twins, N(u)=N(v)=N(x). This implies that, for any vertex wV(G){u,v,x}, d(w,v)=d(w,u)=d(w,x). Hence, any resolving set that excludes at least two vertices in {u,v,x} cannot resolve all three pairs {u,v}, {u,x}, and {v,x}. As the vertices in {u,v,x} are distance-wise indistinguishable from the remaining vertices, we can assume, without loss of generality, that any resolving set contains both u and x. Hence, any pair of vertices in V(G){u,x} that is resolved by x is also resolved by u. In other words, if S is a resolving set of G, then S{x} is a resolving set of G{x}. This implies the correctness of the forward direction. The correctness of the reverse direction trivially follows from the fact that we can add x into a resolving set of G{x} to obtain a resolving set of G.

Lemma 4.

Metric Dimension, parameterized by the vertex cover number 𝚟𝚌, admits a polynomial-time kernelization algorithm that returns an instance with 2𝒪(𝚟𝚌) vertices.

Proof.

Given a graph G, let XV(G) be a minimum vertex cover of G. If such a vertex cover is not given, then we can find a 2-factor approximate vertex cover in polynomial time. Let I:=V(G)X. By the definition of a vertex cover, the vertices of I are pairwise non-adjacent.

The kernelization algorithm exhaustively applies Reduction Rule 1. Now, consider an instance on which 1 is not applicable. If the budget is negative, then the algorithm returns a trivial No-instance of constant size. Otherwise, for any YX, there are at most two vertices u,vI such that N(u)=N(v)=Y. This implies that the number of vertices in the reduced instance is at most |X|+22|X|=2𝚟𝚌+1+𝚟𝚌.

Next, we present an 𝖷𝖯-algorithm parameterized by the vertex cover number. This algorithm, along with the kernelization algorithm above, imply111Note that the application of 1 does not increase the vertex cover number. that Metric Dimension admits an algorithm running in 2𝒪(𝚟𝚌2)n𝒪(1) time.

Lemma 5.

Metric Dimension admits an algorithm running in n𝒪(𝚟𝚌) time.

Proof.

The algorithm starts by computing a minimum vertex cover X of G in 2𝒪(𝚟𝚌)n𝒪(1) time using an 𝖥𝖯𝖳 algorithm for the Vertex Cover problem, for example the one in [11] or [27]. Let I:=V(G)X. Then, in polynomial time, it computes a largest subset F of I such that, for every vertex u in F, IF contains a false twin of u. By the arguments in the previous proof, if there are false twins in I, say u,v, then any resolving set contains at least one of them. Hence, it is safe to assume that any resolving set contains F. If k|F|<0, then the algorithm returns No. Otherwise, it enumerates every subset of vertices of size at most |X| in X(IF). If there exists a subset AX(IF) such that AF is a resolving set of G of size at most k, then it returns AF. Otherwise, it returns No.

In order to prove that the algorithm is correct, we prove that XF is a resolving set of G. It is easy to see that, for a pair of distinct vertices u,v, if uXF and vV(G), then the pair is resolved by u. It remains to argue that every pair of distinct vertices in (IF)×(IF) is resolved by XF. Note that, for any two vertices u,vIF, N(u)N(v) as otherwise u can be moved to F, contradicting the maximality of F. Hence, there is a vertex in X that is adjacent to u, but not adjacent to v, resolving the pair u,v. This implies the correctness of the algorithm. The running time of the algorithm easily follows from its description.

4 Metric Dimension: Lower Bounds Regarding Vertex Cover

In this section, we prove Theorem 2 for Metric Dimension. The first integral part of our technique is to reduce from a variant of 3-SAT known as 3-Partitioned-3-SAT [32]. In this problem, the input is a 3-CNF formula ψ, together with a partition of the set of its variables into three disjoint sets Xα, Xβ, Xγ, with |Xα|=|Xβ|=|Xγ|=N, and such that no clause contains more than one variable from each of Xα, Xβ, and Xγ. The objective is to determine whether ψ is satisfiable. Unless the ETH fails, 3-Partitioned-3-SAT does not admit an algorithm running in 2o(N) time [32, Theorem 3]. Our key result is the following.

Theorem 6.

There is an algorithm that, given an instance ψ of 3-Partitioned-3-SAT on N variables, runs in 2𝒪(N) time, and constructs an equivalent instance (G,k) of Metric Dimension such that 𝚟𝚌(G)+k=𝒪(N) (and |V(G)|=2𝒪(N)).

The above theorem, along with the arguments that are standard to prove the ETH-based lower bounds, immediately imply the following results.

Corollary 7.

Unless the ETH fails, Metric Dimension does not admit an algorithm running in 2o(𝚟𝚌2)n𝒪(1) time.

Corollary 8.

Unless the ETH fails, Metric Dimension does not admit a kernelization algorithm that does not increase the solution size k and outputs a kernel with 2o(k+𝚟𝚌) vertices.

Proof.

Toward a contradiction, assume that such a kernelization algorithm exists. Consider the following algorithm for 3-Partitioned-3-SAT. Given a 3-Partitioned-3-SAT formula on N variables, it uses Theorem 6 to obtain an equivalent instance of (G,k) such that 𝚟𝚌(G)+k=𝒪(N) and |V(G)|=2𝒪(N). Then, it uses the assumed kernelization algorithm to construct an equivalent instance (H,k) such that H has 2o(𝚟𝚌(G)+k) vertices and kk. Finally, it uses a brute-force algorithm, running in |V(H)|𝒪(k) time, to determine whether the reduced instance, or equivalently the input instance of 3-Partitioned-3-SAT, is a Yes-instance. The correctness of the algorithm follows from the correctness of the respective algorithms and our assumption. The total running time of the algorithm is 2𝒪(N)+(|V(G)|+k)𝒪(1)+|V(H)|𝒪(k)=2𝒪(N)+(2𝒪(N))𝒪(1)+(2o(N))𝒪(N)=2o(N). But this contradicts the ETH.

The reduction, presented in Section 4.2, uses tools introduced in the next subsection.

4.1 Preliminary Tools

Figure 1: Set Identifying Gadget (left). The blue box represents bit-rep(X). The yellow lines represent that all possible edges exist between bit-rep(X)bits(X) and nullifier(X), nullifier(X) and N(X), and y and X. Note that G is not necessarily restricted to the graph induced by the vertices in XN(X). Vertex Selector Gadget (right). For X{B,A}, the blue box represents bit-rep(X), the blue link represents the connection with respect to the binary representation, and the yellow line represents that nullifier(X) is adjacent to each vertex in bit-rep(X)bits(X). Dotted lines highlight absent edges.

4.1.1 Set Identifying Gadget

We redefine a gadget introduced in [20]. Suppose we are given a graph G and a subset XV(G) of its vertices. Further, suppose that we want to add a vertex set X+ to G in order to obtain a new graph G such that (1) each vertex in XX+ will be distinguished by vertices in X+ that must be in any resolving set S of G, and (2) no vertex in X+ can resolve any pair of vertices in V(G)(XX+) that are in the same distance class with respect to X.

The graph induced by the vertices of X+, along with the edges connecting X+ to G, is the Set Identifying Gadget for X [20]. Given a graph G and a non-empty subset XV(G) of its vertices, to construct such a graph G, we add vertices and edges to G as follows:

  • The vertex set X+ that we are aiming to add is the union of a set bit-rep and a special vertex denoted by nullifier(X).

  • Let X={xii[|X|]} and set q:=log(|X|+2)+1. We select this value for q to (1) uniquely represent each integer in [|X|] by its bit-representation in binary (note that we start from 1 and not 0), (2) ensure that the only vertex whose bit-representation contains all 1’s is nullifier(X), and (3) reserve one spot for an additional vertex y.

  • For every i[q], add three vertices yia,yi,yib, and add the path (yia,yi,yib).

  • Add three vertices ya,y,yb, and add the path (ya,y,yb). Add all the edges to make {yii[q]}{y} a clique. Make y adjacent to each vertex vX. Let bit-rep(X):={yi,yia,yibi[q]}{y,ya,yb} and bits(X):={yia,yibi[q]}{ya,yb}.

  • For every integer j[|X|], let bin(j) denote the binary representation of j using q bits. Connect xj with yi if the ith bit (going from left to right) in bin(j) is 1.

  • Add a vertex, denoted by nullifier(X), and make it adjacent to every vertex in {yii[q]}{y}. One can think of nullifier(X) as the only vertex whose bit-representation contains all 1’s.

  • For every vertex uV(G)(XX+) such that u is adjacent to some vertex in X, add an edge between u and nullifier(X). We add this vertex to ensure that vertices in bit-rep(X) do not resolve any pairs of vertices in V(G)(XX+) that are in the same distance class with respect to X.

This completes the construction of G. See Figure 1 for an illustration.

4.1.2 Gadget to Add Critical Pairs

Any resolving set needs to resolve all pairs of vertices in the input graph. As we will see, some pairs are harder to resolve than others.

Suppose that we need to have m such “hard” pairs in a graph G. So, for each i[m], we make a pair of vertices ci,ci critical as follows. Define C:={ci,cii[m]}. We then add bit-rep(C) and nullifier(C) as mentioned above (taking C as the set X), with the edges between {ci,ci} and bit-rep(C) defined by bin(i), i.e., connect both ci and ci with the j-th vertex of bit-rep(C) if the jth bit (going from left to right) in bin(i) is 1. Hence, bit-rep(C) can resolve any pair of the form ci,c, ci,c, or ci,c as long as i. As before, bit-rep(C) can also resolve all pairs with one vertex in Cbit-rep(C){nullifier(C)}, but no critical pair of vertices.

4.1.3 Vertex Selector Gadgets

Suppose that we are given a collection of sets A1,A2,,Aq of vertices in a graph G, and we want to ensure that any resolving set of G includes at least one vertex from Ai for every i[q]. In the following, we construct a gadget that achieves a slightly weaker objective.

  • Let A=i[q]Ai. Add a set identifying gadget for A as mentioned in Subsection 4.1.1.

  • For every i[q], add two vertices bi and bi. Use the gadget mentioned in Subsection 4.1.2 to make all the pairs of the form bi,bi critical pairs (in the way it was introduced for ci,ci).

  • For every aAi, add an edge (a,bi). We highlight that we do not make a adjacent to bi by a dotted line in Figure 1. Also, add the edges (a,nullifier(B)), (bi,nullifier(A)), (bi,nullifier(A)), and (nullifier(A),nullifier(B)).

This completes the construction. Note that the only vertices that can resolve a critical pair bi,bi, apart from bi and bi, are the vertices in Ai (see Figure 1, all other vertices are equidistant from both vertices of the pair). Hence, every resolving set contains at least one vertex in {bi,bi}Ai.

4.2 Reduction

Consider an instance ψ of 3-Partitioned-3-SAT with Xα,Xβ,Xγ the partition of the variable set, where each part contains N variables. By adding dummy variables in each of these sets, we can assume that N is an integer. From ψ, we construct the graph G as follows. We describe the construction of the part of the graph G that corresponds to Xα, with the parts corresponding to Xβ and Xγ being analogous. Rename the variables in Xα to xi,jα for i,j[N].

  • We partition the variables of Xα into buckets X1α,X2α,,XNα such that each bucket contains N variables. Let Xiα={xi,jα|j[N]} for all i[N].

  • For every Xiα, we construct a set Aiα of 2N new vertices, Aiα={ai,α[2N]}. Each vertex in Aiα corresponds to a certain possible assignment of variables in Xiα. Let Aα be the collection of all the vertices added in the above step, that is, Aα={ai,αAi|i[N] and [2N]}. We add a set identifying gadget as mentioned in Subsection 4.1.1 in order to resolve every pair of vertices in Aα.

  • For every Xiα, we construct a pair biα,,biα, of vertices. Then, we add a gadget to make the pairs {biα,,biα,i[N]} critical as mentioned in Subsection 4.1.2. Let Bα={biα,,biα,|i[N]} be the collection of vertices in the critical pairs. We add edges in Bα to make it a clique.

  • We would like that any resolving set contains at least one vertex in Aiα for every i[N], but instead we add the construction from Subsection 4.1.3 that achieves the slightly weaker objective as mentioned there. However, for every Aiα, instead of adding two new vertices, we use biα,,biα, as the necessary critical pair. Formally, for every i[N], we make biα, adjacent to every vertex in Aiα. We add edges to make nullifier(Bα) adjacent to every vertex in Aα, and nullifier(Aα) adjacent to every vertex in Bα. Recall that there is also the edge (nullifier(Bα),nullifier(Aα)).

  • For every clause Cq in ψ, we have a pair of vertices cq,cq. Let C be the collection of vertices in such pairs. We add portals that transmit information from vertices corresponding to assignments, i.e., vertices in Aα, to pairs corresponding to clauses. A portal is a clique on N vertices in the graph G. We add three portals, the truth portal (denoted by Tα), false portal (denoted by Fα), and validation portal (denoted by Vα). Let Tα={t1α,t2α,,tNα}, Fα={f1α,f2α,,fNα}, and Vα={v1α,v2α,,vNα}. Moreover, let Pα=VαTαFα.

  • We add a set identifying gadget for Pα as mentioned in Subsection 4.1.1. We add an edge between nullifier(Aα) and every vertex of Pα; and the edge (nullifier(Pα),nullifier(Aα)). However, we note that we do not add edges between nullifier(Pα) and Aα, as can be seen in Figure 2. Lastly, we add edges in Pα to make it a clique.

  • We add edges between Aα and the portals as follows. For i[N] and [2N], consider a vertex ai,α in Aiα. Recall that this vertex corresponds to an assignment π:Xiα{True,False}, where Xiα is the collection of variables {xi,jα|j[N]}. If π(xi,jα)=True, then we add the edge (ai,α,tjα). Otherwise, π(xi,jα)=False, and we add the edge (ai,α,fjα). We add the edge (ai,α,viα) for every [2N].

Then, we repeat the above steps to construct Bβ,Aβ,Pβ, Bγ,Aγ,Pγ.

Figure 2: Overview of the reduction. Sets in ellipses are independent sets and sets in rectangles are cliques. For X{Bα,Aα,Pα,C}, the blue rectangle attached to it via the blue edge represents bit-rep(X), and the yellow line between a vertex and bit-rep(X) indicates that vertex is connected to every vertex in bit-rep(X)bits(X). The remainder of the yellow lines represent that vertex is connected to every vertex in the set the edge goes to. Note the exception of nullifier(Pα) which is not adjacent to any vertex in Aα. Purple lines between two sets denote adjacencies with respect to indexing, i.e., biα, is adjacent only with all the vertices in Aiα, and all the vertices in Aiα are adjacent with viα in validation portal Vα. Gray lines also indicate adjacencies with respect to indexing, but in a complementary way. If Cq contains a variable in Biα, then cq and cq are adjacent with all vertices vjαVα such that ji. Green and red lines between the Aα and Tα and Fα roughly transfer, for each ai,αAα, the underlying assignment structure. If the jth variable by ai,α is assigned to True, then we add the green edge (ai,α,tjα), and otherwise the red edge (ai,α,fjα). Similarly, we add edges for each ciC depending on the assignment satisfying the variable from the part Xδ of a clause ci, and in which block Bjδ it lies, putting either an edge (ci,tjδ) or (ci,fjδ) accordingly (δ{α,β,γ}).
Figure 3: An example to illustrate the reduction (bit-rep and nullifier are omitted for the sets).

Now, we are ready to proceed through the final steps to complete the construction.

  • For every clause Cq in ψ, as it has been already introduced above, we have a pair of vertices cq,cq and C is the collection of vertices in such pairs. Then, we add a gadget as was described in Subsection 4.1.2 to make each pair cq,cq a critical one.

  • For each δ{α,β,γ}, we add an edge between nullifier(Pδ) and every vertex of C, and we add the edge (nullifier(Pδ),nullifier(C)). Now, we add edges between C and the portals as follows for each δ{α,β,γ}. Consider a clause Cq in ψ and the corresponding critical pair cq,cq in C. As ψ is an instance of 3-Partitioned-3-SAT, there is at most one variable in Xδ that appears in Cq. If Cq does not contain a variable in Xδ, then we make cq and cq adjacent to every vertex in Vδ, and they are not adjacent to any vertex in TδFδ. Otherwise, suppose that Cq contains the variable xi,jδ for some i,j[N]. The first subscript decides the edges between cq,cq and the validation portal, whereas the second subscript decides the edges between cq,cq and either the truth portal or false portal in the following sense. We add all edges of the form (viδ,cq) and (viδ,cq) for every i[N] such that ii. If xi,jδ appears as a positive literal in Cq, then we add the edge (tjδ,cq). Otherwise, xi,jδ appears as a negative literal in Cq, and we add the edge (fjδ,cq).

This concludes the construction of G. The reduction returns (G,k) as an instance of Metric Dimension where

k=3(N+(log(|Bα|/2+2)+1)+(log(|Aα|+2)+1)+(log(|Pα|+2)+1))+log(|C|/2+2)+1.

We give an informal description of the proof of correctness here. See Figure 3. Suppose N=3 and the vertices in the sets are indexed from top to bottom. For legibility, we omit some edges and only show 4 out of 8 vertices in each Aiα for i[3]. We also omit bit-rep and nullifier for these sets. The vertex selection gadget and the budget k ensure that exactly one vertex in {biα,,biα,}Aiα is selected for every i[3]. If a resolving set contains a vertex from Aiα, then it corresponds to selecting an assignment of variables in Xiα. For example, the vertex a2,2α corresponds to the assignment π:X2α{True,False}. Suppose X2α={x2,1α,x2,2α,x2,3α}, π(x2,1α)=π(x2,3α)=True, and π(x2,2α)=False. Hence, a2,2α is adjacent to the first and third vertex in the truth portal Tα, whereas it is adjacent with the second vertex in the false portal Fα. Suppose the clause Cq contains the variable x2,1α as a positive literal. Note that cq and cq are at distance 2 and 3, respectively, from a2,2α. Hence, the vertex a2,2α, corresponding to the assignment π that satisfies clause Cq, resolves the critical pair cq,cq. Now, suppose there is another assignment σ:X3α{True,False} such that σ(x3,1α)=σ(x3,3α)=True and σ(x3,2α)=False. As ψ is an instance of 3-Partitioned-3-SAT and Cq contains a variable in X2α (Xα), Cq does not contain a variable in X3α (Xα). Hence, σ does not satisfy Cq. Let a3,2α be the vertex in X3α corresponding to σ. The connections via the validation portal Vα ensure that both cq and cq are at distance 2 from a3,2α, and hence, a3,2α cannot resolve the critical pair cq,cq. Hence, finding a resolving set in G corresponds to finding a satisfying assignment for ψ. These intuitions are formalized in the following subsection.

4.3 Correctness of the Reduction

Suppose, given an instance ψ of 3-Partitioned-3-SAT, that the reduction of this subsection returns (G,k) as an instance of Metric Dimension. We first prove the following lemma which will be helpful in proving the correctness of the reduction.

Lemma 9.

For any resolving set S of G and for all X{C}{Bδ,Aδ,Pδδ{α,β,γ}},

  1. 1.

    S contains at least one vertex from each pair of false twins in bits(X).

  2. 2.

    Vertices in bits(X)S resolve any non-critical pair of vertices u,v when uXX+ and vV(G).

  3. 3.

    Vertices in X+S cannot resolve any critical pair of vertices biδ,,biδ, nor cq,cq for all i[N], δ{α,β,γ}, and q[m].

Proof.
  1. 1.

    Let G be a graph. For any false twins u,vV(G) and any wV(G){u,v}, d(u,w)=d(v,w), and so, for any resolving set S of G, S{u,v}. Hence, the statement follows for all X{C}{Bδ,Aδ,Pδδ{α,β,γ}}.

  2. 2.

    For all X{C}{Bδ,Aδ,Pδδ{α,β,γ}}, nullifier(X) is distinguished by bits(X)S as it is the only vertex in G at distance 2 from each vertex in bits(X). We do a case analysis for the remaining non-critical pairs of vertices u,v assuming that nullifier(X){u,v} (also, suppose that neither u nor v is in S, as otherwise, they are obviously distinguished):

    Case i: u,vXX+.
    Case i(a): u,vX or u,vbit-rep(X)bits(X).

    In the first case, let j be the bit in the binary representation of the subscript of u that is not equal to the jth bit in the binary representation of the subscript of v (such a j exists since u,v is not a critical pair). In the second case, without loss of generality, let u=yi and v=yj. By the first item of the statement of the lemma (1.), without loss of generality, yjaSbits(X). Then, in both cases, d(yja,u)d(yja,v).

    Case i(b): uX and vbit-rep(X).

    Without loss of generality, yaSbits(X) (by 1.). Then, d(ya,u)=2 and, for all vbits(X){yb}, d(ya,v)=3. Without loss of generality, let yi be adjacent to u and let yiaSbits(X) (by 1.). Then, for v=yb, 3=d(yia,v)d(yia,u)=2. If vbit-rep(X)bits(X), then, without loss of generality, v=yj and yjaSbits(X) (by 1.), and 1=d(yja,v)<d(yja,u).

    Case i(c): u,vbits(X).

    Without loss of generality, u=yib and yiaS (by 1.). Then, 2=d(yia,u)d(yia,v)=3.

    Case i(d): ubits(X) and vbit-rep(X)bits(X).

    Without loss of generality, v=yi and yiaS (by 1.). Then, 1=d(yia,v)<d(yia,u).

    Case ii: uXX+ and vV(G)(XX+).

    For each uXX+, there exists wbits(X)S such that d(u,w)2, while, for each vV(G)(XX+) and wbits(X)S, we have d(v,w)3.

  3. 3.

    For all X{Bδ,Aδ,Pδδ{α,β,γ}}, uX+, v{cq,cq}, and q[m], we have that d(u,v)=d(u,nullifier(Pδ))+1. Further, for X=C and all uX+ and q[m], either d(u,cq)=d(u,cq)=1, d(u,cq)=d(u,cq)=2, or d(u,cq)=d(u,cq)=3 by the construction in Subsection 4.1.2 and since bit-rep(X)bits(X) is a clique. Hence, for all X{C}{Bδ,Aδ,Pδδ{α,β,γ}}, vertices in X+S cannot resolve a pair of vertices cq,cq for any q[m].

    For all δ{α,β,γ}, if vBδ, then, for all X{C}{Bδ,Aδ,Pδδ{α,β,γ}} such that δδ, and uX+, we have that d(u,v)=d(u,nullifier(Aδ))+1. Similarly, for all δ{α,β,γ}, if vBδ, then, for all X{Aδ,Pδ} and uX+, we have that d(u,v)=d(u,nullifier(Aδ))+1. Lastly, for each biδ,,biδ,, δ{α,β,γ}, and i[N], if X=Bδ, then, for all uX+, either d(u,biδ,)=d(u,biδ,)=1, d(u,biδ,)=d(u,biδ,)=2, or d(u,biδ,)=d(u,biδ,)=3 by the construction in Subsection 4.1.2 and since bit-rep(X)bits(X) is a clique.

Lemma 10.

If ψ is a satisfiable 3-Partitioned-3-SAT formula, then G admits a resolving set of size k.

Lemma 11.

If G admits a resolving set of size k, then ψ is a satisfiable 3-Partitioned-3-SAT formula.

Proof of Theorem 6..

In Subsection 4.2, we presented a reduction that takes an instance ψ of 3-Partitioned-3-SAT and returns an equivalent instance (G,k) of Metric Dimension (by Lemmas 10 and 11) in 2𝒪(N) time, where

k=3(N+(log(|Bα|/2+2)+1)+(log(|Aα|+2)+1)+(log(|Pα|+2)+1))+(log(|C|/2+2)+1)=𝒪(N).

Note that V(G)=2𝒪(N). Further, note that taking all the vertices in Bδ and Pδ for all δ{α,β,γ}, and X+bits(X) for all X{C}{Bδ,Aδ,Pδδ{α,β,γ}}, results in a vertex cover of G. Hence,

𝚟𝚌(G)3((log(|Bα|/2+2)+2)+(log(|Aα|+2)+2)+(log(|Pα|+2)+2))+3(|Bα|+|Pα|)+(log(|C|/2+2)+2)=𝒪(N).

Thus, 𝚟𝚌(G)+k=𝒪(N).

5 Geodetic Set: Algorithms for Vertex Cover Parameterization

To prove Theorem 1 for Geodetic Set, we start with the following fact about false twins.

Lemma 12.

If a graph G contains a set T of false twins that are not true twins and not simplicial, then any minimum-size geodetic set contains at most four vertices of T.

Proof.

Let T={t1,,th} be a set of false twins in a graph G, that are not true twins and not simplicial. Thus, T forms an independent set, and there are two non-adjacent vertices x,y in the neighborhood of the vertices in T. Toward a contradiction, assume that h5 and G has a minimum-size geodetic set S that contains at least five vertices of T; without loss of generality, assume {t1,,t5}S. We claim that S=(S{t1,t2,t3}){x,y} is still a geodetic set, contradicting the choice of S as a minimum-size geodetic set of G.

To see this, notice that any vertex from V(G)T that is covered by some pair of vertices in TS is also covered by t4 and t5. Similarly, any vertex from V(G)T covered by some pair ti,z in (ST)×(ST), is still covered by t4 and z. Moreover, x and y cover all vertices of T, since they are at distance 2 from each other and all vertices in T are their common neighbors. Thus, S is a geodetic set, as claimed.

Lemma 13.

Geodetic Set, parameterized by the vertex cover number 𝚟𝚌, admits a polynomial-time kernelization algorithm that returns an instance with 2𝒪(𝚟𝚌) vertices.

Proof.

Given a graph G, let XV(G) be a minimum-size vertex cover of G. If this vertex cover is not given, then we can find a 2-factor approximate vertex cover in polynomial time. Let I:=V(G)X; I forms an independent set. The kernelization algorithm exhaustively applies the following reduction rules in a sequential manner.

Reduction Rule 2.

If there exist three simplicial vertices in G that are false twins or true twins, then delete one of them from G and decrease k by one.

Reduction Rule 3.

If there exist six vertices in G that are false twins but are not true twins nor simplicial, then delete one of them from G.

To see that Reduction Rule 2 is correct, assume that G contains three simplicial vertices u,v,w that are twins (false or true). We show that G has a geodetic set of size k if and only if the reduced graph G, obtained from G by deleting u, has a geodetic set of size k1. For the forward direction, let S be a geodetic set of G of size k. By Observation 3, S contains each of u,v,w. Now, let S=S{u}. This set of size k1 is a geodetic set of G. Indeed, any vertex of G that was covered in G by u and some other vertex z of S, is also covered by v and z in G. Conversely, if G has a geodetic set S′′ of size k1, then it is clear that S′′{u} is a geodetic set of size k in G.

For Reduction Rule 3, assume that G contains six false twins (that are not true twins nor simplicial) as the set T={t1,,t6}, and let G be the reduced graph obtained from G by deleting t1. We show that G has a geodetic set of size k if and only if G has a geodetic set of size k. For the forward direction, let S be a minimum-size geodetic set of size (at most) k of G. By Lemma 12, S contains at most four vertices from T; without loss of generality, t1 and t2 do not belong to S. Since the distances among all pairs of vertices in G are the same as in G, S is still a geodetic set of G. Conversely, let S be a minimum-size geodetic set of G of size (at most) k. Again, by Lemma 12, we may assume that one vertex among t2,,t6 is not in S, say, without loss of generality, that it is t2. Note that S covers (in G) all vertices of G. Thus, t2 is covered by two vertices x,y of S. But then, t1 is also covered by x and y, since we can replace t2 by t1 in any shortest path between x and y. Hence, S is also a geodetic set of G.

Now, consider an instance on which the reduction rules cannot be applied. If k<0, then we return a trivial No-instance (for example, a single-vertex graph). Otherwise, notice that any set of false twins in I contains at most five vertices. Hence, G has at most |X|+52|X|=2𝒪(𝚟𝚌) vertices.

Next, we present an 𝖷𝖯-algorithm parameterized by the vertex cover number. Together with Lemma 13, they imply Theorem 1 for Geodetic Set.

Lemma 14.

Geodetic Set admits an algorithm running in n𝒪(𝚟𝚌) time.

Proof.

The algorithm starts by computing a minimum vertex cover X of G in 2𝒪(𝚟𝚌)n𝒪(1) time using an 𝖥𝖯𝖳 algorithm for the Vertex Cover problem, for example the one in [11] or [27]. Let I:=V(G)X.

In polynomial time, we compute the set S of simplicial vertices of G. By Observation 3, any geodetic set of G contains all simplicial vertices of G. Note that XS is a geodetic set of G. Indeed, any vertex v from I that is not simplicial has two non-adjacent neighbors x,y in X, and thus, v is covered by x and y (which are at distance 2 from each other).

Hence, to enumerate all possible minimum-size geodetic sets, it suffices to enumerate all subsets S of vertices of size at most |X| in (XI)S, and check whether SS is a geodetic set. If one such set is indeed a geodetic set and has size at most k, we return Yes. Otherwise, we return No. The statement follows.

6 Geodetic Set: Lower Bounds Regarding Vertex Cover

In this section, we follow the same template as in Section 4 and first prove the following theorem.

Theorem 15.

There is an algorithm that, given an instance ψ of 3-Partitioned-3-SAT on N variables, runs in 2𝒪(N) time, and constructs an equivalent instance (G,k) of Geodetic Set such that 𝚟𝚌(G)+k=𝒪(N) (and |V(G)|=2𝒪(N)).

The proofs of the following two corollaries are analogous to those for Metric Dimension.

Corollary 16.

Unless the ETH fails, Geodetic Set does not admit an algorithm running in 2o(𝚟𝚌2)n𝒪(1) time.

Corollary 17.

Unless the ETH fails, Geodetic Set does not admit a kernelization algorithm that does not increase the solution size k and outputs a kernel with 2o(k+𝚟𝚌) vertices.

6.1 Reduction

Consider an instance ψ of 3-Partitioned-3-SAT with Xα,Xβ,Xγ the partition of the variable set, where |Xα|=|Xβ|=|Xγ|=N. By adding dummy variables in each of these sets, we can assume that N is an integer. Further, let 𝒞={C1,,Cm} be the set of all the clauses of ψ. From ψ, we construct the graph G as follows. We describe the construction for the part of the graph G corresponding to Xα, with the parts corresponding to Xβ and Xγ being analogous. We rename the variables in Xα to xi,jα for i,j[N].

Figure 4: Overview of the reduction. Sets in ellipses are independent sets, and sets in rectangles are cliques. For each δ{α,β,γ}, the sets Vδ and U almost form a complete bipartite graph, except for the matching (marked by dotted edges) that is excluded. Yellow lines from a vertex to a set denote that this vertex is connected to all the vertices in that set. The green and red lines between the Aiα and TαFα transfer, in some sense, for each wAiα, the underlying assignment structure. If an underlying assignment w sets the jth variable to True, then we add the green edge (w,tjα), and otherwise, we add the red edge (w,fjα). For all q[m] and δ{α,β,γ}, let xi,jδ be the variable in Xδ that is contained in the clause Cq in ψ. So, for all q[m], if assigning True (False, respectively) to xi,jδ satisfies Cq, then we add the edge (cq,tjδ) ((cq,fjδ), respectively).
  • We partition the variables of Xα into buckets X1α,X2α,,XNα such that each bucket contains N many variables. Let Xiα={xi,jα|j[N]} for all i[N].

  • For every bucket Xiα, we add an independent set Aiα of 2N new vertices, and we add two isolated edges (ai,1α,bi,1α) and (ai,2α,bi,2α). Let Bα={ai,jα,bi,jαi[N],j{1,2}}. For all i[N] and uAiα, we make both ai,1α and ai,2α adjacent to u (see Figure 4).

    Each vertex in Aiα corresponds to a certain possible assignment of variables in Xiα.

  • Then, we add three independent sets Tα, Fα, and Vα on N vertices each: Tα={tiαi[N]}, Fα={fiαi[N]}, and Vα={viαi[N]}.

  • For each i[N], we connect viα with all the vertices in Aiα.

  • For each i[N], we add edges between Aiα and Tα and between Aiα and Fα as follows. Consider a vertex wAiα. Recall that this vertex corresponds to an assignment π:Xiα{True,False}, where Xiα is the collection of variables {xi,jα|j[N]}. If π(xi,jα)=True, then we add the edge (w,tjα), and otherwise, we add the edge (w,fjα).

  • For each i[N], we add a special vertex giα (also referred to as a g-vertex later on) that is adjacent to each vertex in TαFα. Further, giα is also adjacent to both ai,1α and ai,2α (see Figure 4).

This finishes the first part of the construction. The second step is to connect the three previously constructed parts for Xα, Xβ, and Xγ.

  • We introduce a vertex set U={uii[N]} that forms a clique. Then, for each ui, we add an edge to a new vertex ui. Thus, we have a matching {(ui,ui)i[N]}. Let U={uii[N]}.

  • For each δ{α,β,γ}, we add edges so that the vertices of UVδ almost form a complete bipartite graph, i.e., E(G) contains edges between all pairs v,w where vU and wVδ, except for the matching {(viδ,ui)i[N]}.

  • For each δ{α,β,γ} and i[N], we make giδ adjacent to each vertex in U.

  • For each Cq𝒞, we add a new vertex cq. Let C={cqq[m]}. Since we are considering an instance of 3-Partitioned-3-SAT, for each δ{α,β,γ}, there is at most one variable in Cq that lies in Xδ. If there is one, then without loss of generality, let it be xi,jδ and do the following. Make cq adjacent to ui and if xi,jδ=True (xi,jδ=False, respectively) satisfies Cq, then (cq,tjδ)E(G) ((cq,fjδ)E(G), respectively).

This concludes the construction of G. The reduction returns (G,k) as an instance of Geodetic Set where k=10N.

6.2 Correctness of the Reduction

Suppose, given an instance ψ of 3-Partitioned-3-SAT, that the reduction above returns (G,k) as an instance of Geodetic Set. We first prove the following lemmas which will be helpful in proving the correctness of the reduction, and note that we use distances between vertices to prove that certain vertices are not contained in shortest paths.

Lemma 18.

For all δ,δ{α,β,γ}, the shortest paths between any two vertices in BδUU do not cover any vertices in C nor Vδ.

Lemma 19.

For all i[N] and δ{α,β,γ}, viδ can only be covered by a shortest path from a vertex in Aiδ{viδ} to another vertex in G.

Lemma 20.

If G admits a geodetic set of size k, then ψ is a satisfiable 3-Partitioned-3-SAT formula.

Lemma 21.

If ψ is a satisfiable 3-Partitioned-3-SAT formula, then G admits a geodetic set of size k.

Proof of Theorem 15..

In Section 6.1, we presented a reduction that takes an instance ψ of 3-Partitioned-3-SAT and returns an equivalent instance (G,k) of Geodetic Set (by Lemmas 20 and 21) in 2𝒪(N) time, where k=10N. Note that V(G)=2𝒪(N). Further, note that taking all the vertices in Bδ, Vδ, Tδ, Fδ, U, C, and giδ for all i[N] and δ{α,β,γ}, results in a vertex cover of G. Hence,

𝚟𝚌(G)3(|Bα|+|Vα|+|Tα|+|Fα|+N)+|U|+|C|=𝒪(N).

Thus, 𝚟𝚌(G)+k=𝒪(N).

7 Conclusion

We have seen that both Metric Dimension and Geodetic Set have a non-trivial 2Θ(𝚟𝚌2) running-time dependency (unless the ETH fails) in the vertex cover number parameterization. Both problems are 𝖥𝖯𝖳 for related parameters, such as vertex integrity, treedepth, distance to (co-)cluster, distance to cograph, etc., as more generally, they are 𝖥𝖯𝖳 for cliquewidth plus diameter [23, 31]. For both problems, it was proved that the correct dependency in treedepth (and treewidth plus diameter) is in fact double-exponential [20], a fact that is also true for feedback vertex set plus diameter for Metric Dimension [20]. For distance to (co-)cluster, algorithms with double-exponential dependency were given for Metric Dimension in [21]. For the parameter max leaf number , the algorithm for Metric Dimension from [17] uses ILPs, with a dependency of the form 2𝒪(6log) (a similar algorithm for Geodetic Set with dependency 2𝒪(flogf) exists for the feedback edge set number f [31]), which is unknown to be tight. What is the correct dependency for all these parameters? In particular, it seems interesting to determine for which parameter(s) the jump from double-exponential to single-exponential dependency occurs.

For the related problem Strong Metric Dimension, the correct dependency in the vertex cover number is known to be double-exponential [20]. It would be nice to determine whether similarly intriguing behaviors can be exhibited for related metric-based problems, such as Strong Geodetic Set, whose parameterized complexity was recently adressed in [16, 34]. Perhaps our techniques are applicable to such related problems.

References

  • [1] A. Agrawal, D. Lokshtanov, S. Saurabh, and M. Zehavi. Split contraction: The untold story. ACM Trans. Comput. Theory, 11(3):18:1–18:22, 2019. doi:10.1145/3319909.
  • [2] R. Belmonte, F. V. Fomin, P. A. Golovach, and M. S. Ramanujan. Metric dimension of bounded tree-length graphs. SIAM J. Discrete Math., 31(2):1217–1243, 2017. doi:10.1137/16M1057383.
  • [3] B. Bergougnoux, O. Defrain, and F. Mc Inerney. Enumerating minimal solution sets for metric graph problems. In Proc. of the 50th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2024), volume 14760 of Lecture Notes in Computer Science, pages 50–64. Springer, 2024.
  • [4] E. Bonnet and N. Purohit. Metric dimension parameterized by treewidth. Algorithmica, 83:2606–2633, 2021. doi:10.1007/S00453-021-00808-9.
  • [5] N. Bousquet, Q. Deschamps, and A. Parreau. Metric dimension parameterized by treewidth in chordal graphs. In Proc. of the 49th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2023), volume 14093 of Lecture Notes in Computer Science, pages 130–142. Springer, 2023. doi:10.1007/978-3-031-43380-1_10.
  • [6] D. Chakraborty, S. Das, F. Foucaud, H. Gahlawat, D. Lajou, and B. Roy. Algorithms and complexity for geodetic sets on planar and chordal graphs. In Proc. of the 31st International Symposium on Algorithms and Computation (ISAAC 2020), volume 181 of LIPIcs, pages 7:1–7:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPICS.ISAAC.2020.7.
  • [7] D. Chakraborty, F. Foucaud, D. Majumdar, and P. Tale. Tight (double) exponential bounds for identification problems: Locating-dominating set and test cover. In Proc. of the 35th International Symposium on Algorithms and Computation (ISAAC 2024), volume 322 of LIPIcs, pages 19:1–19:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ISAAC.2024.19.
  • [8] J. Chalopin, V. Chepoi, F. Mc Inerney, and S. Ratel. Non-clashing teaching maps for balls in graphs. In Proc. of the 37th Annual Conference on Learning Theory (COLT 2024), volume 247 of Proceedings of Machine Learning Research, pages 840–875. PMLR, 2024. URL: https://proceedings.mlr.press/v247/chalopin24a.html.
  • [9] L. S. Chandran, D. Issac, and A. Karrenbauer. On the parameterized complexity of biclique cover and partition. In Proc. of the 11th International Symposium on Parameterized and Exact Computation (IPEC 2016), volume 63 of LIPIcs, pages 11:1–11:13. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016. doi:10.4230/LIPICS.IPEC.2016.11.
  • [10] G. Chartrand, F. Harary, and P. Zhang. On the geodetic number of a graph. Networks, 39(1):1–6, 2002. doi:10.1002/NET.10007.
  • [11] J. Chen, I. A. Kanj, and W. Jia. Vertex cover: Further observations and further improvements. J. Algorithms, 41(2):280–301, 2001. doi:10.1006/JAGM.2001.1186.
  • [12] M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Parameterized Algorithms. Springer, 2015.
  • [13] M. Cygan, M. Pilipczuk, and M. Pilipczuk. Known algorithms for edge clique cover are probably optimal. SIAM J. Comput., 45(1):67–83, 2016. doi:10.1137/130947076.
  • [14] R. Diestel. Graph Theory, 6th Edition, volume 173 of Graduate texts in mathematics. Springer, 2024.
  • [15] M. C. Dourado, F. Protti, D. Rautenbach, and J. L. Szwarcfiter. Some remarks on the geodetic number of a graph. Discrete Mathematics, 310(4):832–837, 2010. doi:10.1016/J.DISC.2009.09.018.
  • [16] M. Dumas, F. Foucaud, A. Perez, and I. Todinca. On graphs coverable by k shortest paths. SIAM J. Discrete Math., 38(2):1840–1862, 2024. doi:10.1137/23M1564511.
  • [17] D. Eppstein. Metric dimension parameterized by max leaf number. Journal of Graph Algorithms and Applications, 19(1):313–323, 2015. doi:10.7155/JGAA.00360.
  • [18] L. Epstein, A. Levin, and G. J. Woeginger. The (weighted) metric dimension of graphs: Hard and easy cases. Algorithmica, 72(4):1130–1171, 2015. doi:10.1007/S00453-014-9896-2.
  • [19] F. Foucaud, E. Galby, L. Khazaliya, S. Li, F. Mc Inerney, R. Sharma, and P. Tale. Metric dimension and geodetic set parameterized by vertex cover. CoRR, abs/2405.01344, 2024. doi:10.48550/arXiv.2405.01344.
  • [20] F. Foucaud, E. Galby, L. Khazaliya, S. Li, F. Mc Inerney, R. Sharma, and P. Tale. Problems in NP can admit double-exponential lower bounds when parameterized by treewidth or vertex cover. In Proc. of the 51st International Colloquium on Automata, Languages, and Programming (ICALP 2024), volume 297 of LIPIcs, pages 66:1–66:19. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ICALP.2024.66.
  • [21] E. Galby, L. Khazaliya, F. Mc Inerney, R. Sharma, and P. Tale. Metric dimension parameterized by feedback vertex set and other structural parameters. SIAM J. Discrete Math., 37(4):2241–2264, 2023. doi:10.1137/22M1510911.
  • [22] M. R. Garey and D. S. Johnson. Computers and Intractability - A guide to NP-completeness. W.H. Freeman and Company, 1979.
  • [23] T. Gima, T. Hanaka, M. Kiyomi, Y. Kobayashi, and Y. Otachi. Exploring the gap between treedepth and vertex cover through vertex integrity. Theoretical Comp. Sci., 918:60–76, 2022. doi:10.1016/J.TCS.2022.03.021.
  • [24] G. Z. Gutin, M. S. Ramanujan, F. Reidl, and M. Wahlström. Alternative parameterizations of metric dimension. Theoretical Comp. Sci., 806:133–143, 2020. doi:10.1016/J.TCS.2019.01.028.
  • [25] F. Harary, E. Loukakis, and C. Tsouros. The geodetic number of a graph. Mathematical and Computer Modelling, 17(11):89–95, 1993.
  • [26] F. Harary and R. A. Melter. On the metric dimension of a graph. Ars Comb., 2:191–195, 1976.
  • [27] D. G. Harris and N. S. Narayanaswamy. A faster algorithm for vertex cover parameterized by solution size. In Proc. of the 41st International Symposium on Theoretical Aspects of Computer Science (STACS 2024), volume 289 of LIPIcs, pages 40:1–40:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.STACS.2024.40.
  • [28] S. Hartung and A. Nichterlein. On the parameterized and approximation hardness of metric dimension. In Proc. of the 28th Conference on Computational Complexity, CCC 2013, pages 266–276. IEEE Computer Society, 2013. doi:10.1109/CCC.2013.36.
  • [29] L. Jaffke, O.-J. Kwon, T. J. F. Strømme, and J. A. Telle. Mim-width III. Graph powers and generalized distance domination problems. Theoretical Comp. Sci., 796:216–236, 2019. doi:10.1016/J.TCS.2019.09.012.
  • [30] I. Katsikarelis, M. Lampis, and V. Th. Paschos. Structurally parameterized d-scattered set. Discrete Applied Mathematics, 308:168–186, 2022. doi:10.1016/J.DAM.2020.03.052.
  • [31] L. Kellerhals and T. Koana. Parameterized complexity of geodetic set. Journal of Graph Algorithms and Applications, 26(4):401–419, 2022. doi:10.7155/JGAA.00601.
  • [32] M. Lampis, N. Melissinos, and M. Vasilakis. Parameterized max min feedback vertex set. In Proc. of the 48th International Symposium on Mathematical Foundations of Computer Science (MFCS 2023), volume 272 of LIPIcs, pages 62:1–62:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.MFCS.2023.62.
  • [33] S. Li and M. Pilipczuk. Hardness of metric dimension in graphs of constant treewidth. Algorithmica, 84(11):3110–3155, 2022. doi:10.1007/S00453-022-01005-Y.
  • [34] C. V. G. C. Lima, V. F. dos Santos, J. H. G. Sousa, and S. A. Urrutia. On the computational complexity of the strong geodetic recognition problem. RAIRO Oper. Res., 58(5):3755–3770, 2024. doi:10.1051/RO/2024120.
  • [35] D. Marx, M. Pilipczuk, and M. Pilipczuk. On subexponential parameterized algorithms for steiner tree and directed subset TSP on planar graphs. In Proc. of the 59th IEEE Annual Symposium on Foundations of Computer Science (FOCS 2018), pages 474–484, 2018.
  • [36] M. Pilipczuk. Problems parameterized by treewidth tractable in single exponential time: A logical approach. In Proc. of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS 2011), volume 6907 of Lecture Notes in Computer Science, pages 520–531. Springer, 2011. doi:10.1007/978-3-642-22993-0_47.
  • [37] I. Sau and U. dos Santos Souza. Hitting forbidden induced subgraphs on bounded treewidth graphs. Inf. Comput., 281:104812, 2021. doi:10.1016/J.IC.2021.104812.
  • [38] P. J. Slater. Leaves of trees. In Proc. of the 6th Southeastern Conf. on Combinatorics, Graph Theory, and Computing, pages 549–559. Congressus Numerantium, No. XIV. Util. Math., 1975.
  • [39] P. Tale. Double exponential lower bound for telephone broadcast. CoRR, abs/2403.03501, 2024. doi:10.48550/arXiv.2403.03501.