Parameterized Algorithms for Matching Integer Programs with Additional Rows and Columns
Abstract
We study integer linear programs (ILP) of the form and analyze their parameterized complexity with respect to their distance to the generalized matching problem, following the well-established approach of capturing the hardness of a problem by the distance to triviality. The generalized matching problem is an ILP where each column of the constraint matrix has -norm of at most . It captures several well-known polynomial time solvable problems such as matching and flow problems. We parameterize by the size of variable and constraint backdoors, which measure the least number of columns or rows that must be deleted to obtain a generalized matching ILP. This extends generalized matching problems by allowing a parameterized number of additional arbitrary variables or constraints, yielding a novel parameter.
We present the following results: (i) a fixed-parameter tractable (FPT) algorithm for ILPs parameterized by the size of a minimum variable backdoor to generalized matching; (ii) a randomized slice-wise polynomial (XP) time algorithm for ILPs parameterized by the size of a minimum constraint backdoor to generalized matching as long as and are encoded in unary; (iii) we complement (ii) by proving that solving an ILP is W[1]-hard when parameterized by even when have coefficients of constant size. To obtain (i), we prove a variant of lattice-convexity of the degree sequences of weighted -matchings, which we study in the light of SBO jump M-convex functions. This allows us to model the matching part as a polyhedral constraint on the integer backdoor variables. The resulting ILP is solved in FPT time using an integer programming algorithm. For (ii), the randomized XP time algorithm is obtained by pseudo-polynomially reducing the problem to the exact matching problem. To prevent an exponential blowup in terms of the encoding length of , we bound the Graver complexity of the constraint matrix and employ a Graver augmentation local search framework. The hardness result (iii) is obtained through a parameterized reduction from ILP with constraints and coefficients encoded in unary.
Keywords and phrases:
Integer Programming, fixed-parameter Tractability, polyhedral Optimization, MatchingsCategory:
Track A: Algorithms, Complexity and GamesCopyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Mathematics of computing Combinatorial optimization ; Theory of computation Complexity classesEditors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele PuppisSeries and Publisher:

1 Introduction
We study integer linear programs (ILPs) and analyze their parameterized complexity with respect to their distance to the generalized matching problem. In general, an ILP is of the form
(G) |
where , and . The underlying integer linear programming problem is to either decide that the system is infeasible, there exists an optimal feasible solution, or it is unbounded and provide a solution with an unbounded direction of improvement.
Integer linear programming is a powerful language that has been applied to many key problems such as graph problems [20, 21], scheduling and bin packing [25, 32], multichoice optimization [19] and computational social choice [5, 34], among others. Unfortunately, solving ILPs is, in general, NP-hard.
However, most ILP formulations of problems are naturally well-structured. See e.g. [20, 25, 26, 32, 34] and the references therein. Motivated by this insight and their daunting general hardness, classes of ILPs with highly-structured constraint matrices and parameterizations have been intensively and successfully studied to obtain polynomial and FPT time algorithms [20, 25, 26, 32, 34]. Arguably most famous is Lenstra’s 1983 algorithm who presented the first FPT time algorithm for constraint matrices with few columns [33]. The body of literature for the over three-decades-long research and the many structures, parameters, and applications are too vast to cover here, we thus refer to [24] for an overview.
Central to this paper is the polynomial time solvable class of the generalized matching problem, which is the ILP restricted to coefficient matrices satisfying , i.e., all columns have -norm at most .
Theorem 1 (Theorem 36.1 in [45]).
When , Equation G can be solved in strongly polynomial time.
The generalized matching problem captures a variety of well-known problems in P such as minimum cost flow, minimum cost (-)matching and certain graph factor problems [45]. This connection becomes apparent by interpreting the variables as values assigned to edges of a graph whose vertices correspond to the constraints of the ILP111Note that, due to the conventions in ILP, the vertices of the graph are the numbers and the edges are identified with the numbers .. In this way, a constraint matrix with can be interpreted as an incidence matrix of a generalized bidirected graph where all endpoints of edges are given signs and where degenerate self-loops and half-edges may be present [14]. An example of a graphic interpretation of an instance of the generalized matching problem is shown in Figure 1.
For instance, a problem such as the minimum cost perfect matching problem on a graph can be cast as a generalized matching ILP. In this scenario, is the incidence matrix of and . That is, if and only if vertex is incident to edge . Here, and denote the all-zero and all-ones vector respectively.
This paper studies the degree to which we can extend the generalized matching problem while maintaining tractability. For this purpose, we study constraint matrices which are similar to the constraint matrix of a generalized matching problem. Such matrix consists of a small corner block , wide block , tall block and matching-like block with and is of the form
We consider the cases where either of or , yielding the ILPs
(T) |
which describes a generalized matching ILP admitting additional variables, and
(W) |
which describes a generalized matching ILP admitting additional constraints. The ILPs T and W represent generalizations of well-known flow and matching problems. See [3] for an application of bipartite matching with additional variables to a scheduling problem.
In the context of the fixed-parameter tractability of ILPs, graphs and corresponding structural parameters associated with the coefficient matrix of an ILP are usually studied. However, in our case, the coefficient matrix of the perfect matching problem may have arbitrary associated primal or dual graphs, unlike the case for two-stage stochastic and -fold ILP, which have associated coefficient matrix graphs with limited tree-depth. See [17] for an overview. In addition, the incidence matrix of an undirected graph may have have arbitrarily large subdeterminants, which makes it unsuited for methods such as the one discussed in [22].
The goal of this paper is to study the complexity of the above integer linear programs T and W, i.e., ILPs where the constraint matrices are nearly generalized matching constraint matrices. For this purpose, we parameterize by the number of variables and constraints that must be deleted from Equation G to obtain a generalized matching problem. Such parameter choice follows the classical approach of studying parameters measuring the distance to triviality, also called (deletion) backdoors to triviality–a concept that was first proposed by Niedermeier [42]. Roughly speaking, this approach introduces a parameter that measures the distance of the given instance from an instance that is solvable in polynomial time. This approach was already used for many different problems such as clique, set cover, power dominating set, longest common subsequence, packing problems, and the satisfiability problem [42, 4, 25, 23].
For some problems, such as satisfiability, having obtained a variable backdoor immediately leads to an FPT algorithm parameterized by the size of the backdoor. For ILP, however, this is not as straightforward as variable domains may be arbitrarily large, which invalidates a brute-force approach to obtain FPT results in terms of variable backdoor size. In fact, solving ILPs in FPT time parameterized by the number of variables is already highly nontrivial [33, 44].
Despite such difficulties, a significant number of results have been obtained in the context of backdoors in ILPs. The complexity of ILPs which become totally unimodular after removing a constant number of columns and rows is actively being researched [2, 41]. In addition, a large line of research has established efficient algorithms for solving ILPs given a variable or constraint backdoor to a remaining ILP which consists of many isolated ILPs with small coefficients [12, 13, 17]. Two-stage stochastic and -fold ILP, which are two important special cases of such block-structured ILPs, may be viewed as ILPs of the form shown in respectively T and W where is a block-diagonal matrix with small nonzero blocks and small coefficients. To relate these results with backdoors and backdoor identification, Dvořák et al. [13] define fracture numbers, which describe the number of variable and/or constraint removals needed to decouple the ILP into small blocks. They give an overview of the parameterized complexity of ILPs parameterized by various backdoor sizes and coefficient sizes of the constraint matrix. Their work and the recent result of Cslovjecsek et al. [12] shows that the complexity of ILPs parameterized by backdoor size is subtle, as ILPs may already become NP-hard when there are only 3 complicating global variables connecting constant dimension, otherwise independent ILPs with unary coefficient size [13]. On the other hand, when additionally parameterizing by the coefficient size of the small blocks, the problem becomes FPT [12]. With this paper, we aim to reveal the parameterized complexity with respect to backdoor sizes to another class of well-known efficiently solvable ILPs, that of the generalized matching problem.
We show that ILP parameterized by , the number of variables that, upon deletion, give a general matching problem, is FPT by designing a corresponding algorithm. Further, we give a randomized, XP time algorithm with respect to , and prove the corresponding W[1]-hardness result for this case.
We note that studying the complexity of ILP with respect to is also motivated by the hardness of the general factor problem with a gap size of [37]. Lovász’s reduction from edge coloring on cubic graphs shows that, even when consists solely of columns with only one nonzero coefficient with value , ILP remains NP-hard. This, together with the tractability of generalized matching and our FPT result, shows that if one were to judge the complexity of an ILP by independently and individually labeling each column as “hard” or “easy”, the easy columns are precisely those with -norm at most .
Finally, given an arbitrary constraint matrix of Equation G, a permutation of the columns or rows to obtain the form Equation T or W with minimum or respectively can be obtained efficiently222Through the use of elementary row operations, a system may be modified to a row-equivalent system admitting smaller backdoors. See [9] for such study on block-structured ILP. We leave this problem open in the context of the parameterizations discussed in this paper.. That is, one can identify a minimum cardinality variable or constraint deletion backdoor to the generalized matching ILP. To obtain the form Equation T, one may greedily move all columns with -norm greater than to the left. The problem of minimizing in Equation W is equivalent to the -uniform hitting set problem, which is NP-hard but FPT in , cf. [23]. For this reason, we will assume that the given ILPs are of the form Equation T or W throughout the rest of the paper.
1.1 Contributions
In this paper, we show that solving integer linear programs is fixed-parameter tractable parameterized by the number of columns of with -norm greater than .
Theorem 2.
Equation T is FPT parameterized by .
This reveals an entirely new class of ILPs that is FPT and adds to the story of parameterized ILPs and distance to triviality paradigm. To obtain this algorithm, we use a remainder guessing strategy introduced by Cslovjecsek et al. [12]. Central in this approach is modeling non-backdoor variables as polyhedral constraints on the backdoor variables. In [12], these polyhedral constraints may be exponentially complex, whereas we exploit the structure of matching problems and employ an efficient description of a global polyhedral constraint. To accomplish this, we study the convexity of degree sequences for which subgraphs with matching degrees exist. These systems have been studied previously, see [1], and are a well-known example of discrete systems known as jump systems [8, 39, 40, 35]. For our application, we prove a new result involving the lattice-convexity of a particular class of jump M-convex functions on the shifted lattice . See Section 2 for a technical overview of this algorithm.
As for the constraint backdoors, we show that matching-like ILPs are solvable in polynomial time with a randomized algorithm for a fixed number of additional complicating constraints if the constraints and the objective are encoded in unary. As Equation W can encode the NP-hard subset sum problem for , we will need to assume that the coefficients of the constraint matrix are small. That is, we assume that they are bounded by in absolute value. The given randomized XP time algorithm unifies the known tractability in terms of membership in RP of multiple classes of constrained problems where the edges of a graph correspond to variables.
Theorem 3.
Equation W can be solved with a randomized XP time algorithm in terms of . More specifically, it can be solved in time .
In this paper, the running time is measured in the number of arithmetic operations on numbers with encoding length polynomial in the encoding length of the instance. The hides polylogarithmic factors of the encoding length of the instance.
Camerini, Galbiati and Maffioli [10] already observed in 1992 that one can solve constrained flow, circulation and matching problems in randomized, pseudo-polynomial time. Theorem 3 differs in that it reveals the tractability of a generalized class of problems by removing the exponential dependency on the encoding length of that would appear in a purely pseudo-polynomial algorithm.
The randomized XP time algorithm is obtained through the use of a Graver augmentation framework, which has been effective in obtaining FPT algorithms for two-stage stochastic and -fold ILP with small coefficients [17]. For those ILPs, the Graver complexity is bounded by a function of the parameters, resulting in FPT algorithms, whereas the XP time dependence on of Theorem 3 is the result of Equation W having a large Graver complexity and proximity. We provide upper and lower bounds for these respective quantities. See Sections 2.2 and 4. The latter section also reveals that Equation T has a similarly large Graver complexity even for binary matrices , which motivates the use of the different technique.
We provide a W[1]-hardness result in terms of the number of additional constraints to match the randomized XP time algorithm in a complexity theoretic sense. The hardness persists even for binary constrained perfect matching on a restricted class of graphs. Theorem 4 additionally shows that parameterizing with in addition to the number of complicating constraints is unlikely to result in an FPT algorithm.
Theorem 4.
Solving Equation W encoded in unary is W[1]-hard parameterized by . This hardness persists when restricting to being the incidence matrix of a graph which is the disjoint union of even length cycles and .
2 Technical Overview
This section gives a technical overview of our results. It aims at presenting the main ideas and new concepts. Therefore, details are omitted.
We first preprocess an ILP instance in Section 2.1, after which both algorithms are covered in Sections 2.2 and 2.3. The W[1]-hardness of Theorem 4 is additionally discussed in the latter section. Section 4 provides lower bounds on the Graver complexity and proximity.
2.1 Reduction to perfect -matching
Before presenting the key components of the algorithms that solve the generalized matching problem with additional variables or constraints, we first discuss a reduction that modifies Equations T and W in a favorable way. By doing so, it suffices to give algorithms for such restricted instances, see Sections 2.2 and 2.3.
In particular, we show that Equations T and W can, in polynomial time, be transformed to equivalent ILPs where the generalized matching submatrix is transformed to the constraint matrix of the perfect -matching problem. Such matrix is a binary matrix with unique columns that each have precisely two nonzero entries, and is the incidence matrix of a simple graph , the constraint graph, with vertices . Since is the incidence matrix of , we may identify a variable with the edge of connecting the vertices such that . Now, a perfect -matching of is a solution to the generalized matching ILP with constraint matrix , nonnegative integral variables , and right-hand-side . That is, assigns a value to every edge such that for every vertex the sum of over the incident edges is exactly .
The used reduction is an extension of the reduction in [45] from generalized matching to -matching. However, we show in Lemma 5 that we can also keep track of the additional general variables and constraints.
Lemma 5.
An ILP of the form
for which and the variable bounds are finite, can be reduced in input+output-linear time to an instance of the same form that additionally satisfies
-
is the incidence matrix of a simple graph,
-
,
-
,
-
,
-
,
-
,
-
if and otherwise,
-
contain the same collections of entries as up to sign changes, the insertion of zeros and the insertion of at most one binary row to .
Here, parameters with primes are used to denote the parameters of the new instance and denotes the absence of upper bounds on . The proof transforms the constraint matrix and variable bounds to the intended form by creating additional constraints and variables. It consists of steps that individually treat columns with negative entries, columns with -norm strictly less than and finite variable upper bounds. Most of these obstacles are circumvented by conceptually subdividing edges or adding redundant constraints. See [36] for the proof.
By virtue of Lemma 5, we can now restrict ourselves to finding algorithms for Equations T and W which represent perfect -matching problems with additional variables or constraints.
2.2 Few arbitrary variables
We now focus on solving Equation T. We first motivate the main idea underlying the algorithm and present the algorithm itself, before we give an outline of remaining parts. The key idea is to treat the backdoor variables and the matching variables separately. Let us first consider the problem of determining the feasibility of Equation T. In essence, we replace the constraint and matching variables with a polyhedral constraint of the form for some polyhedron that models that there must exist a such that , in other words, there must exist a perfect -matching in . To construct such polyhedral constraint on , the first idea may be to use the convex hull of all points such that there exists a perfect -matching–unfortunately, a naive execution of this strategy fails as when , the complete graph on vertices, we have that , and the convex combination are in the hull, but the latter does not admit a perfect -matching. Hence, we attempt to model a discrete set that is not lattice-convex on with a convex constraint, which is impossible.
To contrast this, the work by Cslovjecsek et al. [12] shows that, even for general matrices , one can work around this issue by restricting to a fixed remainder modulo some large integer . That is, one can construct a polyhedron such that for all , we have that is feasible if and only if . Note that through an affine transformation, this may equivalently be posed as a polyhedral constraint directly on . Their choice of may grow with the dimensions of , which calls for a more problem specific approach to solve Equation T in FPT time. When is the incidence matrix of a simple graph, we show that we may restrict the modulus to be the constant , which paves the way for an FPT algorithm. In addition, we show that one may optimize over a linear objective function by encoding the objective contribution of the matching part of the ILP in an additional dimension of . The required convexity property to make this work translates to a lattice-convexity property, see Lemma 7, of the function from Definition 6.
Definition 6.
Let be defined by
That is, is the cost of a minimum -cost perfect -matching of or if has no perfect -matching.
Lemma 7.
Let be given and be real convex multipliers, i.e., , such that . Then .
We use modular congruence on vectors to denote component-wise modular congruence. Next, we show in which way Lemma 7 allows us to reformulate Equation T. First, we perform a binary search on the objective to obtain the problem of finding a feasible point of Equation T subject to an additional linear constraint . We guess the remainder vector of in an optimal solution modulo . It then suffices to search for an integer point restricted to in the box subject to the constraint that there is a perfect -matching with cost at most . This is equivalent to finding a point in the set
In particular, as the parity of is constant for , Lemma 7 shows that there exists a convex set such that the constraint may be replaced with . When we obtain a good representation of , we use the algorithm by Reis and Rothvoss [44] to solve the integer program in FPT time. After guessing all parity vectors , an optimal solution to Equation T is found.
We now discuss the missing ingredients needed to make the previously discussed algorithm work. First, we explain how Lemma 7 is derived. To do so, we consider jump systems, where degree sequences of graphs and functions such as have been studied exhaustively [8, 39, 40, 35]. Murota [40] observed that describes a jump M-convex function, which is a valuated generalization of jump systems. In fact, recent work on the general factor problem [35] reveals that a similar jump M-convex function defined for weighted graph factorizations has additional exploitable properties. Informally, small steps, as in Definition 8, connecting points in the effective domain of such function may be rearranged in any order. For this reason, Kobayashi defines strongly base orderable (SBO) jump systems and a valuated extension. Our function defined over weighted uncapacitated perfect -matchings can be seen to also satisfy the properties of Definition 9. As Lemma 7 holds for general SBO jump M-convex functions, we discuss our proof in terms of this abstract property. We use to denote the conformal partial order defined by if and only if and for all .
Definition 8.
A -step decomposition of a vector is a multiset of steps , satisfying and for all , such that .
Definition 9.
A function is SBO jump M-convex if for every two points in the domain there exist a 2-step decomposition of and real numbers such that
-
,
-
for all it holds that .
The alternating path argument employed by Kobayashi [35] to show that -capacitated perfect -matchings satisfy Definition 9 can be adapted to show the SBO jump M-convexity of . For this, we use a known gadget construction that relates -matchings to perfect matchings [45]. See [36] for the full proof.
Lemma 7 is derived by first showing that a -step decomposition of a difference can be used to construct a small even step by combining some of the steps. Such an even, small step can be used to modify a pair of points closer to each other while remaining on the lattice and without increasing the sum of the function values on these points. Such pairwise modifications may then be exhaustively performed to move the points appearing in a convex combination towards the target as in Lemma 7 and obtain the required result. The proof of Lemma 7 is provided in Section 3.
The final ingredient needed to implement the FPT algorithm for Equation T is a good characterization of a suitable polyhedron that models the matching part of the ILP. We obtain this by letting be the convex hull of the vectors for which and is in some bounding box. That is, is the epigraph of a natural convex extension of restricted to a bounding box. Since proximity arguments allow us to assume that and are finite, it is possible to bound , see [11]. We obtain a polynomial time separation oracle for through the ellipsoid method [27] and by noting that can efficiently be optimized over333We note that it may be possible to derive a combinatorial separation algorithm, but this is not needed to establish the fixed-parameter tractability of Equation T. For a closely related separation problem, see [46].. This follows from the fact that weights associated with a vertex may be transferred to the edge weights of the incident edges, which shows that optimizing over corresponds to solving a minimum cost parity constrained -matching problem. The parity constraints can straightforwardly be translated into constraints compatible with the polynomially solvable generalized matching problem [45, 15].
2.3 Few arbitrary constraints
The randomized XP time algorithm for solving Equation W is obtained through a series of reductions. As a key intermediate step, we will employ a pseudo-polynomial reduction in [45] that transforms the minimum cost perfect -matching to the minimum cost perfect matching problem on a graph with a total of vertices. In order to prevent an exponential blow-up in terms of the encoding size of , we split the solution process up into parts in which may be bounded through the use of the Graver augmentation framework [17]. This is an exact local search framework which iteratively improves a primal solution to an ILP by taking smaller steps solving a similar, but slightly easier ILP. In these easier ILPs, the variable domains may be bounded by a function of the Graver complexity of the constraint matrix of the ILP. By Lemma 5, bounds on the variable domains translate into bounds on the right-hand side . Before providing the required bounds, we first introduce the Graver augmentation framework and relevant definitions.
Definition 10.
The Graver basis of an integer matrix is the set of conformally minimal nonzero integral kernel elements of . That is, if and only if and there is no such that and .
The Graver complexity of refers to norm bounds on , and we are interested in and , referring to the -norm and -norm respectively. An oracle that can compute a single small improving step, used in the local search framework, is called a Graver-best oracle.
Definition 11.
A Graver-best oracle is an oracle that, given a constraint matrix , objective , variable bounds and , finds a Graver-best step. That is, it finds an integral solution to such that
Such an oracle can be implemented by solving an ILP over variable domains of size at most , which we show to be polynomially bounded for fixed for Equation W. In this case, we may employ Lemma 5 to find that implementing a Graver-best oracle can by done by finding a minimum cost constrained -matching where is polynomially bounded. Theorem 12 concludes with how this Graver-best oracle can be used to optimize an ILP.
Theorem 12 (Lemma 12 in [17], Lemma 5 in [16]).
Given a feasible solution to Equation G with finite and , an optimal solution to the ILP can be found with queries of a Graver-best oracle. Here, is the value of an optimal solution.
By constructing an auxiliary ILP with a trivial feasible solution to an ILP of the form W as done in [30], we can use Theorem 12 to find a feasible solution as well as optimize such solution. For this reason, we will assume that we are given a feasible solution to Equation W.
The polynomial bound on for fixed follows from literature: Berndt, Mnich and Stamm [7] show that the Graver basis elements of a matrix with are small.
Theorem 13 (Theorem 13 in [7]).
Let be an integer matrix with . Then and .
Note that we may assume that after preprocessing. Lemma 3 in [16], which proves a Graver complexity bound for -fold ILPs, reveals that Theorem 13 suffices to yield a polynomial bound on the Graver complexity of the composite matrix appearing in Equation W.
Corollary 14.
The number of Graver-best steps that need to be computed in Theorem 12 can be polynomially bounded by computing a solution to the LP relaxation of Equation W and using Theorem 3.14 in [29], which shows that the proximity of an ILP is bounded by times the obtained Graver bound from Corollary 14.
Corollary 15.
Let be an optimal solution to the LP relaxation of Equation W. If the ILP is feasible, then there exists an optimal ILP solution with .
Thus, we may restrict the search of an optimal solution to Equation W to a polynomially bounded domain, which results in the needed bound on to apply Theorem 12. Now, after applying the pseudo-polynomial reduction to a perfect matching problem [45], which is compatible with additional constraints as noted in [10], we find that solving Equation W can be polynomially reduced to finding a minimum cost constrained perfect matching in a graph with polynomially many vertices. As all variables in this resulting problem are binary, we can condense all constraints into a single constraint by encoding the constraints in base- for sufficiently large . This generalizes the reduction steps used in [6, 43] and only increases the coefficient size of the constraint matrix polynomially for fixed . The resulting constrained perfect matching problem can then be solved with a randomized pseudo-polynomial algorithm such as the one by Mulmuley, Vazirani and Vazirani [38]. Combining all steps and binary searching on the values of the variables in an optimal solution yields the randomized XP time algorithm from Theorem 3.
To the best of our knowledge, the complexity of constrained matching where the objective is encoded in binary is still open. It is worth noting that the reduction chain shows that Equation W is polynomially equivalent to the exact matching problem, which aims to find a perfect matching in a graph with exactly a given target weight. Finding a deterministic pseudo-polynomial algorithm for this problem has been a central and intensively studied open problem for over four decades.
Finally, to complement the XP time complexity of the algorithm from Theorem 3, we reveal the W[1]-hardness of solving Equation W parameterized by in Theorem 4. This result is obtained through a parameterized reduction from the ILP problem, which is strongly W[1]-hard when parameterized by the number of constraints [13].
Theorem 16 (Theorem 22 in [13]).
Determining the feasibility of the system
where is encoded in unary and , is W[1]-hard parameterized by . This hardness persists when restricting to where is encoded in unary.
The essence of the reduction is to split every variable into many binary variables. The resulting binary variables can then be duplicated and linked through graph cycles to reduce the unary sized coefficients in and obtain a binary constraint matrix.
3 Lattice convexity of SBO jump M-convex functions on
As the lattice-convexity of plays a key role in the correctness of the algorithm discussed in Section 2.2, we focus on the explicit proof of the lattice-convexity of SBO jump M-convex functions in this extended abstract. The proof is split into two steps. Lemma 17 shows how two points in a convex combination can be pairwise modified without increasing the overall sum of function values. This operation is then exhaustively employed in the proof of the final lattice-convexity result.
Lemma 17.
Let be an SBO jump M-convex function. Let and let be so that . Then, there exist and such that
-
,
-
,
-
,
-
for all ,
-
.
Proof.
W.l.o.g., consider the case where . The general case is equivalent up to changing signs. Consider a -step decomposition of and from Definition 9. We create a multigraph representation of this decomposition with vertex set . For every step that has a component at coordinates and , add an edge that connects and . For a step for which , add a self-loop on . Since each vertex in has an even degree and is not an isolated vertex by assumption, we can pick an arbitrary cycle that contains . Let be the indices of the steps corresponding to the edges of the cycle, which defines an even step from to . We define and . Note that the step is in because the degree of each vertex in the cycle is or . In particular, the degree of is exactly . We conclude that the first, second and third properties are satisfied. The satisfaction of the fourth property follows from that when . Finally, observe that , showing that the fifth requirement is satisfied.
We can now exhaustively employ Lemma 17 pairwise on vectors of a given convex combination to derive the lattice-convexity of . Lemma 18 generalizes Lemma 7.
Lemma 18.
Let be an SBO jump M-convex function. Let be given and be real convex multipliers, i.e., , such that . Then .
Proof.
Since we may assume that is rational, we may additionally assume that after duplicating vectors of the convex combination a suitable number of times.
For every we exhaustively employ the following procedure: if there exist with and , apply Lemma 17 to replace and with the resulting and from this lemma. This preserves the total sum and guarantees that does not increase. Observe that if such and do not exist, w.l.o.g. all . As is the average of , it must hold that . Since the application of Lemma 17 does not modify any at for which for all , exhaustive application will eventually result in .
It is left to show that Lemma 17 can be exhaustively applied. To see this, we employ as progress measure. With respect to the progress made after applying Lemma 17, it holds that
which follows from Lemma 17 that guarantees that and both move strictly closer to . After applying Lemma 17 exhaustively for all , we end up with a situation where for all and that .
4 Lower bounds
In this section, we provide lower bounds for the Graver complexity of the coefficient matrices of Equations T and W and a lower bound for the proximity of Equation W. These results are obtained through explicit constructions of constraint matrices.
First, we observe that it is unlikely that a Graver augmentation procedure along the lines of Theorem 12 will be effective at solving Equation T, even in the case that the coefficients in the block are bounded by a constant.
Proposition 19.
For any fixed positive integer , there exists an infinite family of binary constraint matrices of Equation T with Graver basis elements that have an -norm of order .
Proof.
Consider the matrix
where the vectors and submatrices that comprise the matrix have dimension for a given . Here denotes the all-zero matrix and the identity matrix. By construction, any nonzero kernel element must have that the absolute value of the last entry is times the absolute value of the first entry. Such nonzero kernel element also exists. Therefore, there must be Graver basis elements with -norm at least . We conclude with , i.e., .
We now turn to the Graver complexity of the constraint matrix of Equation W. In this context, Proposition 20 exhibits a construction showing that Corollary 14 is asymptotically tight when is constant.
Proposition 20.
For any fixed positive integer , there exists an infinite family of constraint matrices of Equation W with Graver basis elements that have an -norm of order .
Proof.
We construct a matrix that essentially matches the lower bound example
in [31] for some large by using smaller coefficients of size in the matrix for some fixed . First, define the auxiliary block for by
(1) |
which will ensure that the variables associated with this block have equal value. Then construct the constraint matrix
(2) |
where denotes the unit vector .
Again, all kernel elements have last entry with absolute value equal to times the first entry. A nonzero kernel element with first entry exists. Since , we obtain and the stated lower bound. Note that the constructed matrices use elements from . However, they can be adapted to use only elements from using the ideas from Lemma 5, yielding the same asymptotic lower bound.
A similar construction in Proposition 21 shows that Corollary 15 is tight for constant and . We note that a conjecture posed by Berndt, Mnich and Stamm involving upper bounds of the proximity of ILPs and their relation to the Graver-complexity [7] hints at that the upper bound from Corollary 14 may be able to be improved to , at least for the case where .
Proposition 21.
For any fixed positive integer , there exists an infinite family of constraint matrices of Equation W and vertex LP relaxation solutions to the corresponding Equation W such that the nearest integral solution is at -norm distance .
Proof.
To show this, we use a large part of the matrix in Equation 2 and replace one block with the incidence matrix of a gadget graph. For this let and construct the -matching instance shown in Figure 2. Write the gadget perfect -matching problem from Figure 2 as the ILP for nonnegative integral . Denote where the columns of correspond to the variables , which may be assigned value in a vertex LP relaxation solution, but are forced to take value in an integral solution. Finally, construct the system
using the auxiliary block from Equation 1. A vertex fractional solution exists with the last component of being zero, whereas the only integral solution must assign to this variable. We have that , i.e., . The lower bound follows. The entries can be eliminated through the use of Lemma 5.
We note that constant multiplicative factors of and in the lower bounds of Propositions 19, 20, and 21 are hidden in the .
5 Concluding notes and open problems
We study the complexity of ILP parameterized by the size of variable or constraint backdoors to the generalized matching problem, called and respectively. In particular, we show that solving ILPs is in FPT when parameterized by . We study the convexity of degree sequences in the light of SBO jump M-convex functions to express the non-backdoor variables efficiently as polyhedral constraints. Additionally, we present a randomized XP time algorithm to solve ILPs for fixed when the objective and constraint matrix are encoded in unary. This algorithm employs a Graver augmentation procedure to reduce the problem to the exact matching problem. Finally, we match this latter result by showing that ILP is W[1]-hard parameterized by .
Having studied the case where and where , a natural open question is whether ILP can still be solved in polynomial time when it is a generalized matching problem with a fixed number of both additional variables and constraints. This can be seen as an analogue of -block -fold ILP in the context of block structured ILPs, which are known to be solvable in slice-wise polynomial time [28]. Since the restricted case of in the context of generalized matching is W[1]-hard in terms of , the question is whether also admits a randomized XP time algorithm when are encoded in unary. We note that providing a polynomial Graver-complexity upper bound for Equation T suffices to obtain this result. In such case, the Graver-complexity of the entire constraint matrix will also be polynomially bounded and a Graver-best step can be computed by brute forcing the values of the arbitrary variables, after which a problem of Equation W can be solved efficiently.
In addition, aside from the long-standing open question of whether the exact matching problem is in P, a natural open question coming from Theorem 3 is whether the exponential dependence on the encoding length of is necessary. To answer this question positively, it suffices to restrict to -budgeted perfect matching with its objective in encoded binary. See [36].
References
- [1] Richard P. Anstee and Yunsun Nam. Convexity of degree sequences. Journal of Graph Theory, 30(2):147–156, 1999. doi:10.1002/(SICI)1097-0118(199902)30:2\%3C147::AID-JGT8\%3E3.0.CO;2-C.
- [2] Manuel Aprile, Samuel Fiorini, Gwenaël Joret, Stefan Kober, Miehal T. Seweryn, Stefan Weltge, and Yelena Yuditsky. Integer programs with nearly totally unimodular matrices: the cographic case. In Proceedings of the 2025 ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 2301–2312, 2025. doi:10.1137/1.9781611978322.76.
- [3] Egon Balas and William R. Pulleyblank. The perfectly matchable subgraph polytope of a bipartite graph. Networks, 13(4):495–516, 1983. doi:10.1002/net.3230130405.
- [4] Max Bannach, Sebastian Berndt, Marten Maack, Matthias Mnich, Alexandra Lassota, Malin Rau, and Malte Skambath. Solving packing problems with few small items using rainbow matchings. In Proceedings of the 45th International Symposium on Mathematical Foundations of Computer Science, MFCS, pages 11:1–11:14, 2020. doi:10.4230/LIPIcs.MFCS.2020.11.
- [5] John Bartholdi, Craig A Tovey, and Michael A Trick. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare, 6(2):157–165, 1989. doi:10.1007/BF00303169.
- [6] André Berger, Vincenzo Bonifaci, Fabrizio Grandoni, and Guido Schäfer. Budgeted matching and budgeted matroid intersection via the gasoline puzzle. Mathematical Programming, 128(1-2):355–372, 2011. doi:10.1007/s10107-009-0307-4.
- [7] Sebastian Berndt, Matthias Mnich, and Tobias Stamm. New support size bounds and proximity bounds for integer linear programming. In Proceedings of the 49th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM, pages 82–95, 2024. doi:10.1007/978-3-031-52113-3_6.
- [8] André Bouchet and William H. Cunningham. Delta-matroids, jump systems, and bisubmodular polyhedra. SIAM Journal on Discrete Mathematics, 8(1):17–32, 1995. doi:10.1137/S0895480191222926.
- [9] Marcin Brianski, Martin Koutecký, Daniel Král’, Kristýna Pekárková, and Felix Schröder. Characterization of matrices with bounded graver bases and depth parameters and applications to integer programming. Mathematical Programming, 208(1-2):497–531, 2024. doi:10.1007/s10107-023-02048-x.
- [10] Paolo M. Camerini, Giulia Galbiati, and Francesco Maffioli. Random pseudo-polynomial algorithms for exact matroid problems. Journal of Algorithms, 13(2):258–273, 1992. doi:10.1016/0196-6774(92)90018-8.
- [11] William J. Cook, Albertus M. H. Gerards, Alexander Schrijver, and Éva Tardos. Sensitivity theorems in integer linear programming. Mathematical Programming, 34(3):251–264, 1986. doi:10.1007/BF01582230.
- [12] Jana Cslovjecsek, Martin Koutecký, Alexandra Lassota, Michal Pilipczuk, and Adam Polak. Parameterized algorithms for block-structured integer programs with large entries. In Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 740–751, 2024. doi:10.1137/1.9781611977912.29.
- [13] Pavel Dvořák, Eduard Eiben, Robert Ganian, Dusan Knop, and Sebastian Ordyniak. The complexity landscape of decompositional parameters for ILP: programs with few global variables and constraints. Artificial Intelligence, 300:103561, 2021. doi:10.1016/j.artint.2021.103561.
- [14] Jack Edmonds and Ellis L. Johnson. Matching: A well-solved class of integer linear programs. In Proceedings of the Calgary International Conference on Combinatorial Structures and Their Applications, pages 89–92, 1970. doi:10.1007/3-540-36478-1_3.
- [15] Jack Edmonds and Ellis L. Johnson. Matching, Euler tours and the Chinese postman. Mathematical Programming, 5(1):88–124, 1973. doi:10.1007/BF01580113.
- [16] Friedrich Eisenbrand, Christoph Hunkenschröder, and Kim-Manuel Klein. Faster algorithms for integer programs with block structure. In Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, ICALP, pages 49:1–49:13, 2018. doi:10.4230/LIPIcs.ICALP.2018.49.
- [17] Friedrich Eisenbrand, Christoph Hunkenschröder, Kim-Manuel Klein, Martin Koutecký, Asaf Levin, and Shmuel Onn. An algorithmic theory of integer programming, 2019. arXiv:1904.01361.
- [18] Friedrich Eisenbrand and Thomas Rothvoss. A parameterized linear formulation of the integer hull, 2025. doi:10.48550/arXiv.2501.02347.
- [19] T. Ermolieva, Y Ermoliev, P. Havlik, A. Lessa-Derci-Augustynczik, N. Komendantova, T. Kahil, J. Balkovic, R. Skalsky, C. Folberth, P. S. Knopov, and G. Wang. Connections between robust statistical estimation, robust decision-making with two-stage stochastic optimization, and robust machine learning problems. Cybernetics and Systems Analysis, 59(3):385–397, 2023. doi:10.1007/s10559-023-00573-3.
- [20] Michael R. Fellows, Daniel Lokshtanov, Neeldhara Misra, Frances A. Rosamond, and Saket Saurabh. Graph layout problems parameterized by vertex cover. In Proceedings of the 19th International Symposium on Algorithms and Computation, ISAAC, pages 294–305, 2008. doi:10.1007/978-3-540-92182-0_28.
- [21] Jirí Fiala, Tomas Gavenciak, Dusan Knop, Martin Koutecký, and Jan Kratochvíl. Parameterized complexity of distance labeling and uniform channel assignment problems. Discrete Applied Mathematics, 248:46–55, 2018. doi:10.1016/j.dam.2017.02.010.
- [22] Samuel Fiorini, Gwenaël Joret, Stefan Weltge, and Yelena Yuditsky. Integer programs with bounded subdeterminants and two nonzeros per row. In Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS, pages 13–24, 2021. doi:10.1109/FOCS52979.2021.00011.
- [23] Serge Gaspers and Stefan Szeider. Backdoors to satisfaction. In The Multivariate Algorithmic Revolution and Beyond, pages 287–317. Springer, 2012. doi:10.1007/978-3-642-30891-8_15.
- [24] Tomáš Gavenčiak, Martin Koutecký, and Dušan Knop. Integer programming in parameterized complexity: Five miniatures. Discrete Optimization, 44(Part 1):100596, 2022. doi:10.1016/j.disopt.2020.100596.
- [25] Michel X. Goemans and Thomas Rothvoss. Polynomiality for bin packing with a constant number of item types. Journal of the ACM, 67(6):38:1–38:21, 2020. doi:10.1145/3421750.
- [26] Jens Gramm, Rolf Niedermeier, and Peter Rossmanith. Fixed-parameter algorithms for CLOSEST STRING and related problems. Algorithmica, 37(1):25–42, 2003. doi:10.1007/s00453-003-1028-3.
- [27] Martin Grötschel, László Lovász, and Alexander Schrijver. Geometric Algorithms and Combinatorial Optimization, volume 2 of Algorithms and Combinatorics. Springer, 1988. doi:10.1007/978-3-642-97881-4.
- [28] Raymond Hemmecke, Matthias Köppe, and Robert Weismantel. A polynomial-time algorithm for optimizing over N-fold 4-block decomposable integer programs. In Proceedings of the 14th International Conference on Integer Programming and Combinatorial Optimization, IPCO, pages 219–229, 2010. doi:10.1007/978-3-642-13036-6_17.
- [29] Raymond Hemmecke, Matthias Köppe, and Robert Weismantel. Graver basis and proximity techniques for block-structured separable convex integer minimization problems. Mathematical Programming, 145(1-2):1–18, 2014. doi:10.1007/s10107-013-0638-z.
- [30] Raymond Hemmecke, Shmuel Onn, and Lyubov Romanchuk. n-Fold integer programming in cubic time. Mathematical Programming, 137(1-2):325–341, 2013. doi:10.1007/s10107-011-0490-y.
- [31] Christoph Hunkenschröder, Kim-Manuel Klein, Martin Koutecký, Alexandra Lassota, and Asaf Levin. Tight lower bounds for block-structured integer programs. In Proceedings of the 25th International Conference on Integer Programming and Combinatorial Optimization, IPCO, pages 224–237, 2024. doi:10.1007/978-3-031-59835-7_17.
- [32] Klaus Jansen, Kim-Manuel Klein, Marten Maack, and Malin Rau. Empowering the configuration-ip: new PTAS results for scheduling with setup times. Math. Program., 195(1):367–401, 2022. doi:10.1007/s10107-021-01694-3.
- [33] Hendrik W. Lenstra Jr. Integer programming with a fixed number of variables. Mathematics of Operations Research, 8(4):538–548, 1983. doi:10.1287/moor.8.4.538.
- [34] Dusan Knop, Martin Koutecký, and Matthias Mnich. Voting and bribing in single-exponential time. ACM Transactions on Economics and Computation, 8(3):12:1–12:28, 2020. doi:10.1145/3396855.
- [35] Yusuke Kobayashi. Optimal general factor problem and jump system intersection. In Proceedings of the 24th International Conference on Integer Programming and Combinatorial Optimization, IPCO, pages 291–305, 2023. doi:10.1007/978-3-031-32726-1_21.
- [36] Alexandra Lassota and Koen Ligthart. Parameterized algorithms for matching integer programs with additional rows and columns, 2025. doi:10.48550/arXiv.2503.05548.
- [37] László Lovász. The factorization of graphs. II. Acta Mathematica Academiae Scientiarum Hungarica, 23(1-2):223–246, 1972. doi:10.1007/BF01889919.
- [38] Ketan Mulmuley, Umesh V. Vazirani, and Vijay V. Vazirani. Matching is as easy as matrix inversion. Combinatorica, 7(1):105–113, 1987. doi:10.1007/BF02579206.
- [39] Kazuo Murota. M-convex functions on jump systems: A general framework for minsquare graph factor problem. SIAM Journal on Discrete Mathematics, 20(1):213–226, 2006. doi:10.1137/040618710.
- [40] Kazuo Murota and Ken’ichiro Tanaka. A steepest descent algorithm for M-convex functions on jump systems. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, E89-A(5):1160–1165, 2006. doi:10.1093/ietfec/e89-a.5.1160.
- [41] Martin Nägele, Richard Santiago, and Rico Zenklusen. Congruency-constrained TU problems beyond the bimodular case. Mathematics of Operations Research, 49(3):1303–1348, 2024. doi:10.1287/moor.2023.1381.
- [42] Rolf Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University Press, 2006. doi:10.1093/ACPROF:OSO/9780198566076.001.0001.
- [43] Christos H. Papadimitriou and Mihalis Yannakakis. The complexity of restricted spanning tree problems. Journal of the ACM, 29(2):285–309, 1982. doi:10.1145/322307.322309.
- [44] Victor Reis and Thomas Rothvoss. The subspace flatness conjecture and faster integer programming. In Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS, pages 974–988, 2023. doi:10.1109/FOCS57990.2023.00060.
- [45] Alexander Schrijver. Combinatorial optimization: polyhedra and efficiency, volume 24 of Algorithms and Combinatorics. Springer, 2003. URL: https://link.springer.com/book/9783540443896.
- [46] Fan Zhang. A separation algorithm for b-matching degree-sequence polyhedra. Mathematics of Operations Research, 28(1):92–102, 2003. doi:10.1287/moor.28.1.92.14263.