Abstract 1 Introduction 2 Overview of Proof of Theorem 2 3 Applications References

Robust Contraction Decomposition for Minor-Free Graphs and Its Applications

Sayan Bandyapadhyay ORCID Portland State University, OR, USA William Lochet ORCID LIRMM, Université de Montpellier, CNRS, France Daniel Lokshtanov ORCID University of California, Santa Barbara, CA, USA Dániel Marx ORCID CISPA Helmholtz Center for Information Security, Saarbrücken, Germany Pranabendu Misra ORCID Chennai Mathematical Institute, India Daniel Neuen ORCID Max Planck Institute for Informatics, SIC, Saarbrücken, Germany Saket Saurabh ORCID The Institute of Mathematical Sciences, Chennai, India Prafullkumar Tale ORCID Indian Institute of Science Education and Research, Pune, India Jie Xue ORCID New York University Shanghai, China
Abstract

We prove a robust contraction decomposition theorem for H-minor-free graphs, which states that given an H-minor-free graph G and an integer p, one can partition in polynomial time the vertices of G into p sets Z1,,Zp such that 𝐭𝐰(G/(ZiZ))=O(p+|Z|) for all i[p] and ZZi. Here, 𝐭𝐰() denotes the treewidth of a graph and G/(ZiZ) denotes the graph obtained from G by contracting all edges with both endpoints in ZiZ.

Our result generalizes earlier results by Klein [SICOMP 2008] and Demaine et al. [STOC 2011] based on partitioning E(G), and some recent theorems for planar graphs by Marx et al. [SODA 2022], for bounded-genus graphs (more generally, almost-embeddable graphs) by Bandyapadhyay et al. [SODA 2022], and for unit-disk graphs by Bandyapadhyay et al. [SoCG 2022].

The robust contraction decomposition theorem directly results in parameterized algorithms with running time 2O~(k)nO(1) or nO(k) for every vertex/edge deletion problems on H-minor-free graphs that can be formulated as Permutation CSP Deletion or 2-Conn Permutation CSP Deletion. Consequently, we obtain the first subexponential-time parameterized algorithms for Subset Feedback Vertex Set, Subset Odd Cycle Transversal, Subset Group Feedback Vertex Set, 2-Conn Component Order Connectivity on H-minor-free graphs. For other problems which already have subexponential-time parameterized algorithms on H-minor-free graphs (e.g., Odd Cycle Transversal, Vertex Multiway Cut, Vertex Multicut, etc.), our theorem gives much simpler algorithms of the same running time.

Keywords and phrases:
subexponential time algorithms, graph decomposition, planar graphs, minor-free graphs, graph contraction
Category:
Track A: Algorithms, Complexity and Games
Funding:
Sayan Bandyapadhyay: The work has been supported by the NSF grant 2311397.
Pranabendu Misra: Supported by SERB StartUp Grant.
Copyright and License:
[Uncaptioned image] © Sayan Bandyapadhyay, William Lochet, Daniel Lokshtanov, Dániel Marx, Pranabendu
Misra, Daniel Neuen, Saket Saurabh, Prafullkumar Tale, and Jie Xue; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Graph algorithms analysis
; Theory of computation Parameterized complexity and exact algorithms ; Mathematics of computing Graph theory
Related Version:
Full Version: https://arxiv.org/abs/2412.04145
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

Baker’s layering technique is a fundamental tool for a certain type of algorithms on planar graphs. It was first used implicitly by Baker [1] and can be formalized as the following statement: given a planar graph G and an integer p, we can find in polynomial-time a partitioning Z1,,Zp of the vertex set of G such that GZi has treewidth O(p) for every i[p]. This decomposition can be used for problems where we can argue that there exist an i[p] such that Zi is irrelevant to the solution (or has negligible contribution to it) and hence Zi can be deleted from G. Then we are left with an instance GZi having treewidth O(p) and techniques for bounded-treewidth graphs can be used. This approach has been used in the design of polynomial-time approximation schemes (PTAS) [1, 6, 19] and parameterized algorithms [4, 10, 12, 15, 16, 29] for planar graphs. Moreover, this decomposition algorithm can be further generalized to H-minor free graphs [6].

Contraction Decomposition Theorems

There are many natural problems where a set Zi cannot be removed even if it is irrelevant to the solution: most notably, problems involving connectivity typically have this property. To handle such problems, Klein [21] introduced a dual version of Baker’s layering technique, which is based on contractions of edges. This (Edge) Contraction Decomposition Theorem was later generalized to H-minor free graphs by Demaine, Hajiaghayi, and Kawarabayashi [7].

Theorem 1 (Demaine, Hajiaghayi, and Kawarabayashi [7]).

Let H be a fixed graph. Given an H-minor-free graph G and an integer p, one can compute in polynomial time a partition of E(G) into p sets Z1,,Zp such that 𝐭𝐰(G/Zi)=O(p) for all i[p], where the constant hidden in O() depends on H.

Contraction decomposition theorems of this form can be used as a building block in designing approximation schemes for, e.g., the Traveling Salesman Problem (TSP) and Subset TSP [4, 7, 8, 20, 21], and parameterized algorithms for Bisection, k-Way Cut, Odd Cycle Transversal, Subset Feedback Vertex Set and many other problems [3, 18, 24].

Subexponential Parameterized Algorithms (Edge Problems)

To illustrate this, let us briefly discuss how Theorem 1 can be used to obtain a subexponential-time parameterized algorithm for Edge Multiway Cut in H-minor-free graphs. In Edge Multiway Cut, we are given a graph G, a set TV(G) of terminals, and an integer k, and the task is to find a set SE(G) of at most k edges such that every component of GS contains at most one terminal.

  1. (1)

    A result of Wahlström [31] gives a randomized quasipolynomial kernel for the problem, which allows us to assume that |V(G)|=kpolylog(k).

  2. (2)

    Given the decomposition Z1,,Zp of Theorem 1 where pk, there is an i[p] such that |ZiS|k for the hypothetical solution S of size k.

  3. (3)

    Guess this i[p] (there are k possibilities) and the set ZiS (there are |V(G)|O(k)=kkpolylog(k) possibilities)

  4. (4)

    Contracting ZiS does not change the problem at hand, since the solution S if not affected.

  5. (5)

    Since the graph G/Zi has treewidth O(k), we get that the graph G/(ZiS) has treewidth O(k+|ZiS|)=O(k) (contracting an edge can decrease treewidth by at most one). Finally, we solve Edge Multiway Cut on G/(ZiS) in time 2O(klogk)|V(G)|O(1) using standard bounded-treewidth techniques.

Overall, we obtain a 2kpolylog(k)nO(1) time randomized algorithm for Edge Multiway Cut. The same approach also works for many other problems [2, 24].

Subexponential Parameterized Algorithms (Vertex Problems)

Let us try to apply a similar technique for the problem Vertex Multiway Cut, where instead of deleting a set of edges, we need to delete now a set of vertices. There are two main difficulties if we try to apply Theorem 1. First, it would be convenient to have a partition Z1,,Zp of vertices such that for every i[p] contracting Zi leaves a graph of treewidth O(p). Here contracting a vertex set Zi amounts to contracting all edges that have both endpoints in the set Zi. Second, in Step 5 above, we exploited that the decomposition of Theorem 1 is inherently robust: if Zi is obtained from Zi by omitting a set of s edges, then the treewidth of G/Zi is at most s higher than the treewidth of G/Zi.

The following example shows that an analogous statements for contracting vertex sets is not true. Let G be obtained from a k×k grid by adding two universal vertices x and y. Let A and B be the two bipartition classes of the k×k grid, and define Z1A{x} and Z2B{y}. Then G/Zi has treewidth 2 for both i[2]. On the other hand, G/(Z1{x})=G/A=G and G/(Z2{y})=G/B=G which means the jump in treewidth can be unbounded even after omitting just a single vertex. Note that G is K7-minor free, so we cannot hope that a vertex partition version of Theorem 1 is inherently robust even on H-minor-free graphs.

Robust Contraction Decomposition Theorem

The above naturally leads to the question of a robust vertex contraction decomposition theorem, where omitting vertices from some Zi increases the treewidth only in a bounded way. Such decomposition theorems were recently introduced independently for planar graphs [24] and for bounded-genus graphs (and more generally, almost-embeddable graphs) [2] by subsets of the authors, who used them to obtain the first subexponential-time (parameterized) algorithms for a number of problems, such as Edge Bipartization, Odd Cycle Transversal, Edge/Vertex Multiway Cut, Edge/Vertex Multicut, and Group Feedback Edge/Vertex Set on the above graph classes. More precisely, [2, 24] design parameterized algorithms with running time f(k)nO(k) or even 2O~(k)nO(1), where k is the size of the solution (and O~() hides logk factors).

The main result of this paper is a vertex contraction decomposition theorem on H-minor-free graphs that is robust in the sense described above.

Theorem 2.

Let H be a fixed graph. Given an H-minor-free graph G and an integer p, one can compute in polynomial time a partition of V(G) into p sets Z1,,Zp such that 𝐭𝐰(G/(ZiZ))=O(p+|Z|) for all i[p] and ZZi, where the constant hidden in O() depends on H.

Theorem 2 generalizes the robust vertex contraction theorem for planar graphs [24] and almost-embeddable graphs [2] to arbitrary H-minor-free graphs. It also generalizes the edge contraction decomposition (Theorem  1) for H-minor free graphs by Demaine et al. [7].

Combined with the results from [24], Theorem 2 directly yields parameterized algorithms of running time 2O~(k)nO(1) or nO(k) for all vertex/edge deletion problems on H-minor-free graphs that can be formulated as Permutation CSP Deletion or 2-Conn Permutation CSP Deletion, two broad classes of problems defined in [24]. Roughly speaking, a permutation CSP instance is a binary CSP instance satisfying certain nice properties, and thus corresponds to a graph in which the vertices are variables and the edges are constraints. The Permutation CSP Edge/Vertex Deletion problem basically asks whether one can delete at most k vertices (resp., edges) from (the graph of) a permutation CSP instance such that every connected component in the resulting graph has a satisfying assignment. The 2-Conn Permutation CSP Edge/Vertex Deletion problem is defined similarly, but we only care about the satisfiability on every 2-connected component (instead of connected component). We refer to Section 3 for the precise definition of these problems. Combining the results from [24] and Theorem 2, we get the following result.

Theorem 3.

Let H be a fixed graph. Then Permutation CSP Edge/Vertex Deletion and 2-Conn Permutation CSP Edge/Vertex Deletion on H-minor-free instances (Γ,w,δ,k) can be solved in (|Γ|+δ)O(k) time.

The above theorem directly gives us parameterized algorithms of running time exponential in O(k) for many problems on H-minor-free graphs. Specifically, we obtain the first subexponential-time parameterized algorithms for the following fundamental problems on H-minor-free graphs.

  • nO(k) time algorithms for Subset Feedback Vertex Set, Subset Odd Cycle Transversal, Subset Group Feedback Vertex Set, 2-Conn Component Order Connectivity, and the edge-deletion version of these problems.

  • 2O~(k)nO(1) time algorithms for Subset Feedback Vertex Set and Subset Feedback Edge Set.

Additionally, the main algorithmic results from [2] (such as subexponential-time parameterized algorithms for Odd Cycle Transversal, Vertex Multiway Cut, Vertex Multicut, etc.), that required a complicated two-layered dynamic programming algorithm over the structural decomposition theorem of Robertson and Seymour [28] for H-minor free graphs, now admit much cleaner and more direct algorithms by exploiting Theorem 2 (these problems belong to the Permutation CSP Deletion category in Theorem 3).

Other Relevant Literature

The study of subexponential-time parameterized algorithms on planar and H-minor free graphs has been one of the most active sub-areas of parameterized algorithms, which led to exciting results and powerful methods. Examples include Bidimensionality [5], applications of Baker’s layering technique [4, 10, 12, 15, 29], bounds on the treewidth of the solution [14, 22, 23, 25], and pattern coverage [15, 26]. The central theme of all these results is that planar graphs exhibit the “ square root phenomenon”: parameterized problems whose fastest parameterized algorithm run in time f(k)nO(k) or 2O(k)nO(1) on general graphs admit f(k)nO(k) or even 2O(k)nO(1) time algorithms when input is restricted to planar or H-minor free graphs. However, these techniques do not apply for designing subexponential time parameterized algorithms for cut and cycle hitting problems such as Multiway Cut, Multicut, or Odd Cycle Transversal. Robust vertex contraction decomposition theorems, first obtained in [2, 24], provide the necessary tools to design subexponential-time parameterized algorithms for some of the cut and cycle hitting problems on H-minor free graphs.

On the decomposition front, apart from edge contraction decomposition theorems, there are several other kind of decomposition theorems that have been used to design polynomial-time approximation schemes (PTASs) and FPT algorithms on planar graphs or more generally on H-minor free graphs. Most of these decomposition theorems prove strengthening of the classic Baker’s layering technique [1]. This generally yields, in what is known as (Vertex) Edge Decomposition Theorems [1, 6, 9, 11, 13] (see [27] for a detailed introduction).

Finally, let us also point to some recent developments on the structural theory of H-minor-free graphs [17, 30]. Our current proof of Theorem 2 mostly relies on the original Robertson-Seymour decomposition for H-minor-free graphs [28], and is independent of [17, 30]. Reformulating some of our arguments in the language of [17, 30] may allow us to obtain a more streamlined proof in the future.

2 Overview of Proof of Theorem 2

In this section, we give an informal overview of our proof of Theorem 2. For convenience, we say Z1,,Zp is a robust contraction decomposition (RCD) of a graph G if Z1,,Zp is a partition of V(G) satisfying 𝐭𝐰(G/(ZiZ))=O(p+|Z|) for all i[p] and ZZi. A p-RCD simply refers to an RCD of size p. Our goal is to compute a p-RCD of an H-minor-free graph G for a given integer p1.

Our starting point is the well-known Robertson-Seymour decomposition for H-minor-free graphs. The Robertson-Seymour decomposition of an H-minor-free graph G is a tree decomposition (T,β) of G in which the torso of each node tV(T) is h-almost-embeddable and the adhesion of each node tV(T) is of size at most h, for some constant h depending on H. Here, the adhesion of t, denoted by σ(t), is the intersection of the bag β(t) and the bag of the parent of t. The torso of t, denoted by 𝗍𝗈𝗋(t), is a supergraph of G[β(t)] (the subgraph of G induced by β(t)), obtained by adding edges to G[β(t)] to make the adhesion of each child of t a clique. Almost-embeddable graphs generalize bounded-genus graphs. Roughly speaking, an h-almost-embeddable graph has its main part embedded in a surface of genus at most h, and the remaining part consists of at most h well-structured subgraphs (called vortices) and a set of at most h “bad” vertices (called apex vertices or apices). In this overview, the reader can feel free to ignore the vortices/apices of an almost-embeddable graph and think about it as a graph embedded in a surface of bounded genus. The formal definitions of tree decompositions and almost-embeddable graphs can be found in the full version of the paper.

Intuitively, the Robertson-Seymour decomposition partitions an H-minor-free graph into almost-embeddable “pieces”. Since it is known that almost-embeddable graphs admit RCDs [2], a natural idea comes: Can we exploit Robertson-Seymour decomposition to somehow “lift” the RCDs of the almost-embeddable pieces to the H-minor-free graph? To explore this idea, let us consider an H-minor-free graph G and the Robertson-Seymour decomposition (T,β) of G. Since the torsos of (T,β) are h-almost-embeddable, we can compute a p-RCD Z1(t),,Zp(t)β(t) for each torso 𝗍𝗈𝗋(t) using the results of [2]. Ideally, if these RCDs are consistent in the sense that for every vertex vV(G) there exists an index i[p] such that vZi(t) for all nodes tV(T) whose bag contains v, then we can combine them to obtain a partition Z1,,Zp of V(G) where Zi=tV(T)Zi(t) and hope it to be an RCD of G. (Of course, as we will see later, such a naïve construction of Z1,,Zp does not work. But it can provide us some useful intuition towards a proof of the theorem.) Obtaining consistent RCDs for the torsos is actually not difficult, by properly using the small adhesion size of (T,β). The basic idea is the following. For each node tV(T), instead of computing a p-RCD for 𝗍𝗈𝗋(t), we only compute a p-RCD for 𝗍𝗈𝗋(t)σ(t), and how the vertices in σ(t) belong to the p classes is determined by the RCDs on the ancestors of t. The decompositions constructed in this way are consistent. Furthermore, since |σ(t)|h, given a p-RCD for 𝗍𝗈𝗋(t)σ(t), no matter how we assign the vertices in σ(t) to the p classes, the resulting decomposition is always a p-RCD for 𝗍𝗈𝗋(t). Thus, we obtain consistent RCDs for the torsos, which give us the aforementioned partition Z1,,Zp of V(G). The remaining question is then whether Z1,,Zp is an RCD of G, i.e., whether 𝐭𝐰(G/(ZiZ))=O(p+|Z|) for all i[p] and ZZi.

The only reason for why Z1,,Zp could be an RCD of G is clearly the fact that every Zi satisfies the RCD condition “locally”, i.e., when restricted to a torso. Specifically, let i[p] and ZZi. Set Z=ZiZ for convenience. What we want is 𝐭𝐰(G/Z)=O(p+|Z|). For each tV(T), we have Zβ(t)=Zi(t)(ZZi(t)), and thus 𝐭𝐰(𝗍𝗈𝗋(t)/(Zβ(t)))=O(p+|Z|). How can we go from the locally bounded treewidth of each 𝗍𝗈𝗋(t)/(Zβ(t)) to the global treewidth of G/Z? The following observation seems useful.

  • If a graph admits a tree decomposition 𝒯 in which each torso is of treewidth at most w, then the graph itself is of treewidth O(w). Indeed, we can “glue” the width-w tree decompositions of the torsos along the given tree decomposition 𝒯 to obtain a width-O(w) tree decomposition of the graph (mainly because in a torso the adhesions of the children are cliques).

This observation allows us to go from the treewidth of the torsos to the treewidth of the entire graph. At the first glance, it does not directly apply to our situation here, because we are working on the contracted graphs instead of the original ones: our goal is to lift the treewidth bound from the contracted torsos 𝗍𝗈𝗋(t)/(Zβ(t)) to the contracted graph G/Z. However, it is a well-known fact that a tree decomposition of G naturally induces a tree decomposition of the contracted graph G/Z by “contracting” each bag. Specifically, consider the quotient map π:V(G)V(G/Z) which maps each vertex of G to the corresponding vertex of G/Z. Set β(t)=π(β(t)) for all tV(T). Then (T,β) is a tree decomposition of G/Z. Intuitively, the tree decomposition (T,β) should allow us to apply the above observation to lift the treewidth bound from 𝗍𝗈𝗋(t)/(Zβ(t)) to G/Z, and eventually show that Z1,,Zp is an RCD of G.

Although the above argument seems promising, a closer inspection reveals that it actually has a fatal issue, which is also the main barrier to proving Theorem 2. The issue comes from a somewhat counter-intuitive fact: the contracted torsos are not identical to the torsos of the contracted graph! Formally, let 𝗍𝗈𝗋(t) denote the torso of tV(T) in the tree decomposition (T,β) of G/Z. Then we have 𝗍𝗈𝗋(t)/(Zβ(t))𝗍𝗈𝗋(t) in general, and even worse, the treewidth of 𝗍𝗈𝗋(t) can be unbounded even if the treewidth of 𝗍𝗈𝗋(t)/(Zβ(t)) is bounded. The main reason for why this happens is the following. The edges of 𝗍𝗈𝗋(t) do not necessarily appear in G: some of them are manually added to make the adhesions of the children of t cliques (for convenience, we call them fake edges). When we contract G to G/Z, only the edges appearing in G can get contracted. However, when we contract 𝗍𝗈𝗋(t) to 𝗍𝗈𝗋(t)/(Zβ(t)), all fake edges in 𝗍𝗈𝗋(t)[Zβ(t)] also get contracted. This over-contracting can make 𝗍𝗈𝗋(t)/(Zβ(t)) much “smaller” than 𝗍𝗈𝗋(t). To see an example, suppose G is the graph obtained from an m×m grid by subdividing each edge into two edges (with an intermediate vertex); see Figure 1. So we have n=O(m2). Consider a tree decomposition (T,β) of G defined as follows. The tree T consists of a root with some children. The bag of the root contains the m2 grid vertices. Each child of the root corresponds to an edge e of the grid, whose bag contains the two endpoints of e (two grid vertices) and the intermediate vertex for subdividing e. Now the adhesion of each child of the root consists of the two endpoints of the corresponding grid edge. Let tV(T) be the root and ZV(G) consist of the grid vertices. Then 𝗍𝗈𝗋(t) is an m×m grid and 𝗍𝗈𝗋(t)/(Zβ(t))=𝗍𝗈𝗋(t)/Z is a single vertex. However, Z is actually an independent set in G. Thus, G/Z=G and we have 𝗍𝗈𝗋(t)=𝗍𝗈𝗋(t), which is of treewidth m. In fact, this simple example not only demonstrates that 𝗍𝗈𝗋(t) can have much higher treewidth than 𝗍𝗈𝗋(t)/(Zβ(t)), but also directly shows that a partition Z1,,Zp satisfying the RCD condition locally (i.e., at each torso) may be not a global RCD in general (and thus our previous construction fails). Suppose now we have an RCD Z1(t),,Zp(t) of 𝗍𝗈𝗋(t) for the root tV(T). For each child s of t, we arbitrarily assign the only vertex in β(s)σ(s) to a class Zi different from the classes the two vertices in σ(s) belong to. Note that, since |β(s)|=3, every partition of β(s) is actually an RCD of 𝗍𝗈𝗋(s). In this way, we obtain a partition Z1,,Zp of V(G) that is an RCD when restricted to every torso. However, each Zi is an independent set of G, and thus G/Zi=G. So unless p=Ω(n), Z1,,Zp is not an RCD of G.

Figure 1: An m×m grid with subdivided edges. The black vertices are the grid vertices.

The main technical contribution in our proof is to break the above barrier by constructing Z1,,Zp in a much more sophisticated way. On a high-level, we still follow the idea of constructing RCDs locally for each torso and combine them to obtain Z1,,Zp. So in what follows, we always use Z1(t),,Zp(t) to denote the restriction of Z1,,Zp to 𝗍𝗈𝗋(t), i.e., Zi(t)Ziβ(t). To avoid ambiguity, for a subset ZV(G), we use (T,βZ) to denote the tree decomposition of G/Z induced by (T,β), and use 𝗍𝗈𝗋Z(t) to denote the torso of a node tV(T) in (T,βZ). We have seen that the main reason for why 𝗍𝗈𝗋Z(t) can have a much higher treewidth than 𝗍𝗈𝗋(t)/(Zβ(t)) is the fake edges in 𝗍𝗈𝗋(t). So ideally, if 𝗍𝗈𝗋(t)/(Zβ(t)) does not contract any fake edge in 𝗍𝗈𝗋(t), we are happy. But this is unlikely, because in the worst case (e.g., the grid example above) every edge in 𝗍𝗈𝗋(t) is fake. Fortunately, the fake edges in 𝗍𝗈𝗋(t) are not always “uncontractable”. Indeed, if a fake edge in 𝗍𝗈𝗋(t) has two endpoints lying in the same connected component of G[Z], then we can safely contract it because its two endpoints are also contracted to one vertex in G/Z. Therefore, it is enough to guarantee that 𝗍𝗈𝗋(t)/(Zβ(t)) only contracts these safe fake edges, which is equivalent to saying that the two endpoints of every edge of 𝗍𝗈𝗋(t)[Zβ(t)] lie in the same connected component of G[Z]. (If this holds, we should be able to somehow relate 𝐭𝐰(𝗍𝗈𝗋Z(t)) to 𝐭𝐰(𝗍𝗈𝗋(t)/(Zβ(t))) and make the previous proof work.) However, this is still too difficult, because we are not dealing with a single set Z. Instead, we have to take care of Z=ZiZ for all i[p] and ZZi, i.e., all subsets of Z1,,Zp. Even if the construction of Zi makes every fake edge uv of 𝗍𝗈𝗋(t)[Ziβ(t)] have its endpoints u and v in the same connected component of G[Zi], when a fraction ZZi is taken away from Zi, it can happen that u and v lie in different connected components of G[ZiZ] (for example, when Z is a cut of u and v in G[Zi]) and thus the fake edge uv is no longer safe for contraction when considering Z=ZiZ.

The key observation to get rid of this issue is that we do not necessarily need to make every fake edge of 𝗍𝗈𝗋(t)[(ZiZ)β(t)]=𝗍𝗈𝗋(t)[Zi(t)Z] safe. Indeed, the desired bound for 𝐭𝐰(𝗍𝗈𝗋ZiZ(t)) and 𝐭𝐰(G/(ZiZ)) is O(p+|Z|), which also depends on |Z|. It turns out that as long as 𝗍𝗈𝗋(t)[Zi(t)Z] only contains O(|Z|) “unsafe” fake edges (i.e., those with two endpoints in different connected components of G[ZiZ]), we can obtain the bound 𝐭𝐰(𝗍𝗈𝗋ZiZ(t))=O(p+|Z|). To see this, let Z′′(ZiZ)β(t)=Zi(t)Z consist of the endpoints of the O(|Z|) unsafe fake edges in 𝗍𝗈𝗋(t)[Zi(t)Z], so we have |Z′′|=O(|Z|). Now every edge in 𝗍𝗈𝗋(t)[Zi(t)(ZZ′′)] has its two endpoints in the same connected component of G[ZiZ], and is thus safe. Since 𝗍𝗈𝗋(t)/(Zi(t)(ZZ′′)) only contracts safe edges, it can be shown that 𝗍𝗈𝗋ZiZ(t) is (almost111More precisely, 𝗍𝗈𝗋ZiZ(t) is a minor of a graph obtained from 𝗍𝗈𝗋(t)/(Zi(t)(ZZ′′)) by adding few edges.) a minor of 𝗍𝗈𝗋(t)/(Zi(t)(ZZ′′)). Thus, we can bound 𝐭𝐰(𝗍𝗈𝗋ZiZ(t)) using 𝐭𝐰(𝗍𝗈𝗋(t)/(Zi(t)(ZZ′′)), where the latter is O(p+|ZZ′′|)=O(p+|Z|), under the assumption that Z1(t),,Zp(t) is an RCD of 𝗍𝗈𝗋(t). To summarize, Z1,,Zp is an RCD of G if the following conditions hold.

  1. (A)

    Z1,,Zp is an RCD when restricted to every torso, i.e., Z1(t),,Zp(t) is an RCD of 𝗍𝗈𝗋(t).

  2. (B)

    All but at most O(|Z|) edges in 𝗍𝗈𝗋(t)[Zi(t)Z] have both endpoints in the same connected component of G[ZiZ], for all tV(T), i[p], and ZZi.

Condition A naturally holds as long as we insist on constructing Z1,,Zp by combining local RCDs. So the crucial question now is how to satisfy condition B.

From Global to Local

Condition B is not tractable, because it is a global constraint on Z1,,Zp. So we need to somehow reduce it to a local constraint on the RCD of each torso. Let us fix a node tV(T) and an index i[p]. To have condition B, the first thing we need is that (almost) every edge of 𝗍𝗈𝗋(t)[Zi(t)] has its endpoints in the same connected component of G[Zi], which is the special case Z=. But only having this is not enough. We need in addition that loosing k vertices in Zi only makes O(k) fake edges become “unsafe”. To achieve this, our main idea is to require the two endpoints of every edge in 𝗍𝗈𝗋(t)[Zi(t)] to be connected in G[Zi] by only the vertices “strictly below t” in the tree decomposition (T,β), that is, the vertices that only appear in the bags of descendants of t. Formally, for every child s of t, denote by γ(s) the union of all bags in Ts, the subtree of T rooted at s. Then our requirement is that for every edge uv of 𝗍𝗈𝗋(t)[Zi(t)], u and v lie in the same connected component of G[((γ(s)σ(s))Zi){u,v}] for every child s of t such that u,vσ(s). Note that every non-fake edge trivially satisfies the requirement.

We show that this requirement is sufficient to guarantee condition B above for all ZZi. The definition of tree decompositions guarantees that the sets γ(s)σ(s) are disjoint for different children s of t. We say a child s of t is bad if Z contains at least one vertex in γ(s)σ(s). By the disjointness of the sets γ(s)σ(s), the number of bad children of t is at most |Z|. For convenience, we say a child s of t witnesses an edge uv of 𝗍𝗈𝗋(t)[Zi(t)] if u,vσ(s). Note that each child s of t can witness at most O(h2) edges, because |σ(s)|h. Due to our requirement, if an edge uv of 𝗍𝗈𝗋(t)[Zi(t)Z] violates condition B above, i.e., u and v lie in different connected components of G[ZiZ], then Z must contain at least one vertex in γ(s)σ(s) for every child s of t satisfying u,vσ(s), and in particular (u,v) is witnessed by a bad node. Since t has at most |Z| bad children and each of them can witness O(h2) edges, the total number of edges of 𝗍𝗈𝗋(t)[Zi(t)Z] violating condition B is bounded by O(|Z|).

Based on the above argument, it now suffices to construct p-RCDs for each torso of (T,β) such that the partition Z1,,Zp obtained by combining these local RCDs satisfies the aforementioned requirement for all i[p] and tV(T). However, the current form of our requirement is global, because whether it is satisfied at a node t depends on the construction at not only t but also all descendants of t in T. So next, let us transform it to a “local” form which can be checked by looking at the construction at each torso independently. We first observe that the following condition implies our previous requirement (which can be shown by a simple induction argument).

  • For every edge uv of 𝗍𝗈𝗋(t)[Zi(t)], the endpoints u and v lie in the same connected component of 𝗍𝗈𝗋(s)[(Zi(s)σ(s)){u,v}] for every child s of t such that u,vσ(s).

The above is actually equivalent to saying that for every child s of t, all u,vσ(s)Zi(s) lie in the same connected component of 𝗍𝗈𝗋(s)[(Zi(s)σ(s)){u,v}]. Importantly, this condition only depends on the construction of Z1(s),,Zp(s), the RCD of 𝗍𝗈𝗋(s). If this condition holds on every node of T, then our previous requirement is also satisfied for every node of T. Therefore, we have our new goal. For every node tV(T), we want the following.

  1. (A)

    Z1(t),,Zp(t) is an RCD of 𝗍𝗈𝗋(t).

  2. (B)

    For all i[p], any two vertices u,vσ(t)Zi(t) lie in the same connected component of 𝗍𝗈𝗋(t)[(Zi(t)σ(t)){u,v}].

Now the new conditions above are both local, which allows us to consider each torso individually. We shall construct the RCDs of the torsos in a top-down manner from the root of T to the leaves. Suppose we are at the node tV(T) and going to construct the RCD Z1(t),,Zp(t) of 𝗍𝗈𝗋(t), At this point, the RCD at the parent of t has been constructed, so each vertex in σ(t) has already been assigned to one of the p classes Z1(t),,Zp(t). We then compute a p-RCD of 𝗍𝗈𝗋(t)σ(t) with an additional property that the i-th class of the RCD “connects” the vertices in σ(t)Zi(t) for all i[p]. Combining this with the partition of σ(t) gives us the desired Z1(t),,Zp(t) satisfying the above two conditions. As long as such a single step can be achieved, we can eventually construct Z1,,Zp. So from now, we can restrict ourselves to one torso.

RCD with a Connectivity Constraint

Before discussing how to construct the desired RCD of 𝗍𝗈𝗋(t)σ(t), we need another twist to simplify the task in hand. We notice that constructing an RCD of 𝗍𝗈𝗋(t)σ(t) satisfying the additional connectivity property is actually impossible if we do not add any assumption on how the vertices in σ(t) belong to the p classes. To see this, consider the following simple example where 𝗍𝗈𝗋(t) is a star of 5 vertices, one central vertex connecting with 4 other vertices. All vertices are contained in σ(t) except the central vertex. In σ(t), two vertices belong to the class Z1(t) and the other two vertices belong to Z2(t). Now in order to connect the two vertices in σ(t)Z1(t), the RCD of 𝗍𝗈𝗋(t)σ(t) must assign the central vertex to Z1(t). But if this is the case, we fail to connect the two vertices in σ(t)Z2(t). Therefore, in this example, it is impossible to construct the desired RCD of 𝗍𝗈𝗋(t)σ(t). In order to fix this issue, we have to somehow guarantee the “connectivity task” that σ(t) leaves to us is not too complicated.

Fortunately, using a stronger version of Robertson-Seymour decomposition, we are able to reach a nice situation where only one class of vertices in σ(t) need to be connected by the RCD of 𝗍𝗈𝗋(t)σ(t). This version of Robertson-Seymour decomposition, as stated in [6, 9], guarantees that for every node tV(T) and every child s of t, the adhesion σ(s) contains at most three vertices in the embeddable part of 𝗍𝗈𝗋(t) (recall that 𝗍𝗈𝗋(t) is an h-almost-embeddable graph consisting of an embeddable part, vortices, and apices). To see why this result helps us, let us consider an ideal case where every torso in the Robertson-Seymour decomposition has no vortices and apices. In this case, every adhesion σ(t) is of size at most three, because all vertices in the torso 𝗍𝗈𝗋(t) of the parent t of t are in the embeddable part of 𝗍𝗈𝗋(t) and thus σ(t) can contain at most three of them. Since |σ(t)|3, there can be at most one class Zi(t) that contains at least two vertices in σ(t). Therefore, when constructing the RCD of 𝗍𝗈𝗋(t)σ(t), we only need the i-th class to connect the vertices in σ(t)Zi(t). In the general case where the torsos have vortices and apices, the situation becomes complicated. But we can still manage to achieve this, which requires us to construct the RCD of each torso more carefully and then use the “three-vertex” property as above.

Now our goal becomes to construct an RCD of 𝗍𝗈𝗋(t)σ(t) in which one class is required to connect the corresponding vertices in σ(t). Essentially, we achieve this by proving the following.222The actual result is more complicated, in which the sets Z1,,Zp have some additional properties and also there is an additional assumption on the almost-embeddable graph G. As we are not going to cover these technical details in this overview, considering this simplified version should be enough.

Lemma 4 (simplified version).

Given a connected h-almost-embeddable graph G, a set ΦV(G) of size c, and a number p, one can compute in polynomial time p disjoint sets Z1,,ZpV(G) such that the following two conditions hold.

  1. (1)

    𝐭𝐰(G/(ZiZ))=Oh,c(p+|Z|) for all i[p] and ZZi.

  2. (2)

    Φ is contained in one connected component of Gi=1pZi.

To see why the above lemma achieves our goal, note that 𝗍𝗈𝗋(t)σ(t) is h-almost-embeddable. Furthermore, by constructing the Robertson-Seymour decomposition (T,β) carefully, we can always make 𝗍𝗈𝗋(t)σ(t) connected and make every vertex in σ(t) have a neighbor in β(t)σ(t) in the torso 𝗍𝗈𝗋(t). Without loss of generality, suppose we want to connect the vertices in σ(t)Zk(t) using the k-th class of the RCD of 𝗍𝗈𝗋(t)σ(t). For each vσ(t)Zi(t), we mark a vertex vβ(t)σ(t) that is neighboring to v in 𝗍𝗈𝗋(t). Let Φβ(t)σ(t) be the set of marked vertices. Now apply Lemma 4 with G=𝗍𝗈𝗋(t)σ(t) and the set Φ. We then get the disjoint sets Z1,,Zpβ(t)σ(t). The vertices in Zi are assigned to the class Zi(t) for all i[p]. Finally, the vertices in (β(t)σ(t))(i=1pZi) are assigned to the class Zk(t). Then condition 1 of Lemma 4 implies that Z1(t),,Zp(t) is an RCD of 𝗍𝗈𝗋(t) and condition 2 guarantees that all u,vσ(t)Zk(t) lie in the same connected component of 𝗍𝗈𝗋(s)[(Zk(t)σ(t)){u,v}]. Next, we summarize our ideas for proving Lemma 4.

Proof Sketch of Lemma 4

As mentioned at the beginning, the recent work [2] already gives RCDs for almost-embeddable graphs, that is, it proves the special case of Lemma 4 without the set Φ and condition 2. Therefore, it is natural to ask whether one can directly generalize (possibly with slight modifications) the proof in [2] to obtain a proof of Lemma 4. Unfortunately, this is not the case. A close look at the proof in [2] reveals that the construction of Z1,,Zp in [2] “inherently” prevents us from having condition 2 of Lemma 4. To see this, we need to briefly review how [2] constructs the sets Z1,,Zp.

For convenience, we discuss the proof of [2] on a surface-embedded graph instead of an almost-embeddable graph. In fact, the most difficult part of the work [2] also lies in decomposing a surface-embedded graph (specifically, the embeddable part of an almost-embeddable graph), and generalizing to almost-embeddable graphs is somehow easy. In [2], the construction of Z1,,Zp itself is simple, while the analysis of the RCD condition is involved. In the first step, it generalizes the outerplanar layering for planar graphs to surface-embedded graphs. Recall that the outerplanar layering partitions the vertices of a planar graph G into layers L1,,LmV(G), where Li consists of the vertices on the outer boundary of Gj=1i1Lj. Thus, L1 is outer boundary of G, L2 is the outer boundary of GL1, and so forth. If G is a graph embedded in a surface Σ, the same layering procedure still applies. Indeed, we can fix a reference point x0Σ and define the outer boundary of a Σ-embedded graph as the boundary of the face containing x0 (assuming the image of the embedding is disjoint from x0). Given this, we can layer G in the same way as above, by defining Li to be the vertices on the outer boundary of Gj=1i1Lj. We call this generalization radial layering for surface-embedded graphs. Now let L1,,Lm be the radial layering of G. The analysis in [2] implies the following property of the layers (though not stated explicitly in [2]).

Lemma 5.

If Z=Li1Lik where i1<<ik and |ijij1|=O(p) for all j[k+1] (set i0=0 and ik+1=m for convenience), then 𝐭𝐰(G/(ZZ))=O(p+|Z|) for all ZZ.

Then [2] simply defines each set Zi as the union of equidistant layers with distance O(p) apart, that is, Zi=LqiLΔ+qiL2Δ+qi for some number qi[Δ] where Δ=O(p). If the choices of q1,,qp are different, Z1,,Zp are disjoint. By Lemma 5, Z1,,Zp satisfy the RCD condition.

Now let us see what is the difficulty to generalize this construction so that it further satisfies condition 2 of Lemma 4. Consider the given set Φ in Lemma 4, which is of size c. We want Φ to be contained in the complement Gi=1pZi, and more importantly, Φ has to be in one connected component of Gi=1pZi. To make Φ contained in Gi=1pZi is easy. We can mark the layers Li intersecting Φ as “bad” layers. There can be at most c bad layers. When constructing Z1,,Zp, we do not include these bad layers. According to Lemma 5, we can still guarantee that Z1,,Zp satisfy condition 1 of Lemma 4 even if we miss all bad layers, because the constant hidden in the bound of condition 1 can depend on c. However, to further require the vertices in Φ lying in the same connected component of Gi=1pZi is impossible. Indeed, one can easily see that each layer Li is a separator in G that separates the layers L1,,Li1 from the layers Li+1,,Lm. The layers in Z1,,Zp separate the remaining part of G into many “small” pieces where each piece consists of at most O(p) consecutive layers. This highly-disconnected structure of Gi=1pZi naturally prevents the vertices in Φ from lying in the same connected component, unless the layers containing Φ are all close to each other.

Based on the above discussion, in order to satisfy both conditions in Lemma 4, we need to significantly modify the construction of [2] with various new ideas. As we have seen, in the previous construction, the layers in Z1,,Zp serve as “barriers” that prevent the vertices in Φ from being connected in the complement graph. Therefore, a natural idea is to “break” these layers a little bit (i.e., remove some vertices from Z1,,Zp) so that the vertices in Φ can go across the barriers to connect with each other. However, by doing this, the layers in each Zi become broken, and thus the new Zi might violate the RCD condition, i.e., condition 1 of Lemma 4 (as we have fewer vertices to contract). As such, we have to break the layers in some structured way such that the vertices in Φ can be connected in the complement graph and simultaneously the RCD condition of Z1,,Zp preserves, which is the main challenge in our construction. At this point, it is totally not clear how to achieve this goal. So next, we begin with some simple intuitions.

Figure 2: Monotone path vs. back-and-forth path.

Let us consider the simplest case where Φ only contains two vertices s and t. In this case, it suffices to properly find an (s,t)-path π in G and then remove the vertices in Z1,,Zp on this path. Since we do not want to lose the RCD condition of Z1,,Zp, π should break each layer in Z1,,Zp as “little” as possible. So intuitively, a path that visits the layers L1,,Lm monotonely (left part of Figure 2) is preferable to a path that goes back and forth across the layers many times (right part of Figure 2). If we do not have any requirement on the embedding of G in Σ, it is not always possible to find a monotone (or mostly monotone) path connecting s and t. Thus, at the beginning (before the radial layering), we need to first modify the embedding of G to a nice one, and do everything with respect to the nice embedding. For surface graphs, a 2-cell embedding, in which each face is homeomorphic to a disk, is the nice embedding we need. One can always compute a 2-cell embedding for G in polynomial time as long as the genus of G is a constant. (For almost-embeddable graphs, however, the situation is more involved, as we are not able to arbitrarily change the embedding of the embeddable part because of the vortices. We have to define another type of embedding for which we can safely modify a given embedding of the embeddable part to.) Now if L1,,Lm are the radial layers for a 2-cell embedding of G, then one can go from every vertex in a layer Lj to the previous layer Lj1 by walking around the boundary of a face in between Lj1 and Lj. It turns out that for every vertex vLj and index ij, there exists a path from v to (some vertex in) Li that visits Lj,Lj1,,Li monotonely. Suppose sLi and tLj where ij. Note that although we can go from t to Li monotonely, there does not necessarily exist a monotone path from t to s. So the key idea here is to, instead of using one path connecting s and t, construct two monotone paths πs and πt, where πs (resp., πt) goes from s (resp., t) to L1. Then we do not include the layer L1 in any of Z1,,Zp (which is fine according to Lemma 5). Because L1 is the outer boundary of G and the embedding of G is 2-cell, G[L1] is connected. Therefore, L1 together with the two paths πs and πt connects s and t. The same idea directly generalizes to the case where Φ has more than two vertices. For each vertex vΦ, we try to construct a path πv which goes monotonely from v to L1. Now L1 together with all the paths connect everything in Φ. It then remains to show how to construct these c monotone paths carefully so that they do not break the layers in Z1,,Zp too much.

Since c is treated as a constant in Lemma 4, if we are able to construct one path, it is not surprising that the same idea generalizes to constructing c paths. Thus, in what follows, we focus on the case c=1. We have Φ={v}. Since the path π from v to L1 we are going to construct is monotone, it crosses each layer Li at most once, that is, after it leaves Li for Li1, it never comes back to Li. Therefore, we construct each part Liπ of π from larger i to smaller i iteratively. When constructing Liπ, we basically need to consider how to walk in the layer Li from an arbitrary starting vertex sLi to an “exit” vertex that is adjacent to Li1 so that the walk does not break Li too much. To this end, we have to figure out what “too much” means. In other words, how much can we break each layer Li so that Z1,,Zp still satisfy the RCD condition? By checking the proof of Lemma 5 in [2], we see that the bound in Lemma 5 mainly relies on the following two properties of each layer Li (where L>i is the union of Li+1,,Lm and Li is the union of L1,,Li).

  1. (I)

    The neighbors of each connected component of G[L>i] lie in one face of G[Li].

  2. (II)

    For every LLi, each connected component of G[L>i] is adjacent to O(|L|) vertices in the graph G/(LiL).

Using the above two properties and the fact that the layers in each of Z1,,Zp are only O(p) distance apart, one can finally show that Z1,,Zp satisfies the RCD condition. Now we have the path π that breaks Li. So we can only include in Z1,,Zp the part Liπ. In this case, in order to make the proof work, we need the modified version of condition II above: for every LLiπ, each connected component of G[L>i] is adjacent to O(|L|) vertices in the graph G/((Liπ)L). However, it is easy to see that this is impossible. Consider the simplest case where L=. We want each connected component of G[L>i] to have O(1) neighbors in G/(Liπ). But in the worst case, after π reaches Li, it needs to go inside Li for a long distance in order to arrive at an exit vertex to leave Li for Li1. Therefore, it can happen that π contains a large fraction of Li in which many vertices can be adjacent to the same connected component C of G[L>i]. As these vertices are not contracted in G/(Liπ), the number of neighbors of C in G/(Liπ) can be unbounded.

Going deeper into the proof of [2] shows that the reason for why the above two properties help is basically the following. These two properties allow us to partition G into two parts G[Li] and G[L>i] such that the connection between these two parts becomes “weak” after contracting a large subset of Li, namely, each connected component of G[L>i] is only adjacent to few vertices in G[Li] which lie in one face of G[Li] (before contraction). Now because the part in Liπ cannot be contracted, we are no longer able to have a weak connection between G[Li] and G[L>i]. To get rid of this issue, our key idea here is to partition G into two parts in a different way. Specifically, when determining the part of π contained in Li, we also compute another subset Li+Li. Then we partition G into two parts G[LiLi+] and G[L>iLi+], that is, we move Li+ from the part G[Li] to the part G[L>i]. The choice of Li+ will guarantee the aforementioned weak connection between the two new parts. Formally, Li+ (and π) satisfies the following properties.

  1. (I)

    The neighbors of each connected component of G[L>iLi+] lie in one face of G[Li] (and therefore one face of G[LiLi+]).

  2. (II)

    For every LLiπ, each connected component of G[L>iLi+] is adjacent to O(|L|) vertices in the graph G/((Li{πLi+})L).

Note that such a set Li+ does not always exist for an arbitrary path π. Therefore, we have to construct Liπ and Li+ simultaneously, and both of them need to be constructed carefully. As this step is technical and requires insights for surface-embedded graphs, we are not going to discuss it in detail. Essentially, once we are able to construct each part Liπ of π and the corresponding set Li+ satisfying the above two conditions, we can combine them to obtain the desired path π from v to L1 and show that 𝐭𝐰(G/((Ziπ)Z))=O(p+|Z|) for all ZZiπ. The sets Li+ are only used in the analysis of the treewidth bounds, and the analysis is built on the argument in [2]. The same idea generalizes to the case where we need to construct c paths (with a bit more work). With this in hand, we are finally able to prove Lemma 4 for surface-embedded graphs. Of course, for almost-embeddable graphs, there are more technical details to be dealt with, but the basic idea remains the same.

Minimal Embeddings of Almost-Embeddable Graphs

In the last part of this overview, we discuss an interesting intermediate result achieved in our proof. As aforementioned, we can modify the embedding of a (connected) surface graph to a 2-cell embedding. However, for an almost-embeddable graph, we cannot require its embeddable part is 2-cell embedded. There are two reasons. First, when we change the embedding of the embeddable part, the structure of the vortices might be lost. Second, even if the graph itself is connected, the subgraph excluding the apices is not necessarily connected, and thus does not admit a 2-cell embedding. In order to make our proof work, we define a variant of 2-cell embedding, which we call minimal embedding. Basically, an almost-embeddable graph G whose embeddable part is embedded with a minimal embedding satisfies the following condition. Let f be a face of the embeddable part of G, and ~f be the subgraph of G consisting of the boundary of f and all vortices contained in f. Then different connected components of ~f belong to different connected components of GA where A is the set of apices of G. If G does not have vortices and apices (i.e., G is a surface graph), then the above condition is equivalent to saying that the boundary of every face of G is connected. We show that given an almost-embeddable graph G, we can compute (in polynomial time) a new almost-embeddable structure for G in which the embeddable part is embedded with a minimal embedding. This result is important for our proof, and might be of independent interest.

3 Applications

In this section, we brielfy discuss some applications of Theorem 2 in parameterized complexity building on [2, 24]. Indeed, Theorem 2 directly results in parameterized algorithms of running time nO(k) or 2O~(k)nO(1) for a broad class of vertex/edge deletion problems on H-minor-free graphs. For example, this includes all problems that can be formulated as Permutation CSP Deletion or 2-Conn Permutation CSP Deletion [24].

An instance of the (binary) CSP problem is specified by a triple Γ=(X,D,𝒞) where X is a finite set of variables, D is a finite domain, and 𝒞 is a set of constraints each of which is of the form c=(x,y,R) where x,yX and RD2. We say Γ is a permutation CSP instance if for every constraint c=(x,y,R)𝒞 it holds that |{bD(a,b)R}|1 and |{bD(b,a)R}|1 for all aD. We write |Γ|=|X|+|D| as the size of Γ. An assignment of Γ is a function α:YD on a subset YX, and we say α is satisfying if for all c=(x,y,R)𝒞 such that x,yY, we have (α(x),α(y))R. A permutation CSP instance Γ=(X,D,𝒞) naturally induces a graph GΓ with vertex set X in which two variables x,yX are connected by an edge if there exists c𝒞 such that c=(x,y,R) for some RD2. We say the permutation CSP instance Γ is H-minor-free if its underlying graph GΓ is H-minor-free. For a subset 𝒞𝒞 of constraints, we write Γ𝒞=(X,D,𝒞\𝒞). For a subset XX of variables, we write ΓX=(X\X,D,𝒞\𝒞X), where 𝒞X𝒞 consists of all constraints that involve at least one variable from X.

Let Γ=(X,D,𝒞) be a permutation CSP instance. A size constraint for Γ is a pair (w,δ) where w:X×D is a weight function and δ is a threshold. We say an assignment α:YD of Γ respects the size constraint (w,δ) if yYw(y,α(y))δ. We say Γ is satisfiable subject to (w,δ) on a subset YX if there is a satisfying assignment α:YD of Γ that respects (w,δ).

3.1 Permutation CSP Deletion Problems

In [24] a subset of the authors define the problems Permutation CSP Vertex Deletion and Permutation CSP Edge Deletion. These problems essentially ask whether one can remove from a given permutation CSP instance a small number of variables (resp., constraints), or equivalently vertices (resp., edges) in the underlying graph, such that the resulting instance is satisfiable on every connected component of the underlying graph. The formal definitions are the following333We remark that our definition of (2-connected) permutation CSP deletion is a simplified version of the original definition in [24], which is already sufficient for our applications. The original definition is more complicated and allows multiple size constraints of a more general form..

The Permutation CSP Vertex Deletion problem is a parameterized problem that takes as input a tuple (Γ,w,δ,k), where Γ=(X,D,𝒞) is a permutation CSP instance, (w,δ) is a size constraint for Γ, and k is the solution size parameter. The goal is to find a subset XX with |X|k such that ΓX is satisfiable subject to (w,δ)444Strictly speaking, (w,δ) is a size constraint for Γ instead of ΓX. But it naturally induces a size constraint for ΓX by restricting w to (X\X)×D. For convenience, we still denote it by (w,δ) here. on every subset YX\X satisfying that GΓX[Y] is a connected component of GΓX.

Similarly, the Permutation CSP Edge Deletion problem takes the same input, but the goal is to find a subset 𝒞𝒞 with |𝒞|k such that Γ𝒞 is satisfiable subject to (w,δ) on every subset YX satisfying that GΓ𝒞[Y] is a connected component of GΓ𝒞.

Theorem 6.

Let H be a fixed graph. Then the Permutation CSP Vertex Deletion (or the Permutation CSP Edge Deletion) problem on H-minor-free instances (Γ,w,δ,k) can be solved in (|Γ|+δ)O(k) time.

Proof.

It is shown in [24] that if Theorem 2 (which is stated as a conjecture in [24]) is true, then Permutation CSP Vertex/Edge Deletion on H-minor-free instances can be solved in (|Γ|+δ)O(k) time, which completes the proof. In the following, we briefly sketch the details (the same ideas are also used in [2]).

We focus on the vertex-deletion version. Let (Γ,w,δ,k) be the input instance and let G=GΓ be the underlying graph of Γ which is H-minor-free. Using Theorem 2, we can compute the partition Z1,,ZpV(G) for p=k. Suppose SV(G) is an unknown solution for (Γ,w,δ,k). Since |S|k there exists some i[p] such that |ZiS|k. We guess the index i and the vertices in ZiS. Note that the number of guesses is bounded by k|Γ|k=|Γ|O(k). Now suppose we already know i and ZiS. Thus, we know that there exists a feasible solution that is disjoint from Zi\(ZiS). We can find such a solution by applying the standard dynamic programming approach on a tree decomposition of G/(Zi\(ZiS)) with running time (|D|+δ)O(w)|Γ|O(1) where w is the width of the tree decomposition and D is the domain of Γ. By Theorem 2, 𝐭𝐰(G/(Zi\(ZiS)))=O(k) and the desired (|Γ|+δ)O(k)-time follows.

The key insight for the DP on the tree decomposition is the following. Since Zi\(ZiS) is disjoint from the solution, these vertices are “undeletable” variables of Γ. Since we restrict our attention to permutation CSP, each connected component of G[Zi\(ZiS)] can have only |D| satisfying assignments (since the value of one variable already determines the values of the others). This essentially allows us to treat each connected component of G[Zi\(ZiS)] as a single vertex (or variable). Equivalently, we can contract the part Zi\(ZiS) in G and do DP on a tree decomposition of G/(Zi\(ZiS)).

Many natural problems can be formulated as Permutation CSP Vertex/Edge Deletion problems including the following examples (see [24] for more details), which leads us to the following corollary.

Corollary 7.

There exist algorithms with running time nO(k) for Odd Cycle Transversal, Vertex Multiway Cut, Vertex Multicut, Group Feedback Vertex Set, Component Order Connectivity, and the edge-deletion version of these problems on H-minor-free graphs, where n is the number of vertices of the input graph and k is the solution-size parameter.

Proof.

All problems except Vertex Multicut (and Edge Multicut) can be formulated as Permutation CSP Vertex/Edge Deletion problems, so the nO(k)-time algorithms directly follow from Theorem 6. The problem Vertex Multicut (and Edge Multicut) can be solved in exactly the same way as described in the proof of Theorem 6 (see also [2, Section 5.3]).

Using the minor-preserving (quasi-)polynomial kernels from [24] or the (quasi-)polynomial-size candidate sets given in [2], we can also obtain (randomized) subexponential-time FPT algorithms for these problems. Here the notation O~() hides logk factors.

Corollary 8.

There exist randomized algorithms with running time 2O~(k)nO(1) for Odd Cycle Transversal, Vertex Multiway Cut, Group Feedback Vertex Set (for a fixed group), and the edge-deletion version of these problems on H-minor-free graphs, where n is the number of vertices of the input graph and k is the solution-size parameter.

3.2 Two-Connected Permutation CSP Deletion Problems

To extend the scope of problems covered by this approach, [24] also considers the 2-Conn Permutation CSP Deletion problem. The problem is similar to Permutation CSP Deletion defined above, but the satisfiability we care about is on the 2-connected components of the underlying graph (after deletion), instead of connected components.

The 2-Conn Permutation CSP Vertex Deletion problem is a parameterized problem that takes as input a tuple (Γ,w,δ,k), where Γ=(X,D,𝒞) is a permutation CSP instance, (w,δ) is a size constraint for Γ, and k is the solution size parameter. The goal is to find a subset XX with |X|k such that ΓX is satisfiable subject to (w,δ)555Strictly speaking, (w,δ) is a size constraint for Γ instead of ΓX. But it naturally induces a size constraint for ΓX by restricting w to (X\X)×D. For convenience, we still denote it by (w,δ) here. on every subset YX\X satisfying that GΓX[Y] is a 2-connected component of GΓX.

Similarly, the 2-Conn Permutation CSP Edge Deletion problem takes the same input, but the goal is to find a subset 𝒞𝒞 with |𝒞|k such that Γ𝒞 is satisfiable subject to (w,δ) on every subset YX satisfying that GΓ𝒞[Y] is a 2-connected component of GΓ𝒞.

Theorem 9.

Let H be a fixed graph. Then the 2-Conn Permutation CSP Vertex Deletion (or the 2-Conn Permutation CSP Edge Deletion) problem on H-minor-free instances (Γ,w,δ,k) can be solved in (|Γ|+δ)O(k) time.

Proof.

Again, it is shown in [24] that if Theorem 2 (which is stated as a conjecture in [24]) is true, then 2-Conn Permutation CSP Vertex/Edge Deletion on H-minor-free instances can be solved in (|Γ|+δ)O(k) time, which completes the proof. Unlike Theorem 6, the algorithm for 2-Conn Permutation CSP Vertex/Edge Deletion is rather complicated. Roughly speaking, it is designed by first applying Theorem 2 to obtain a so-called “body guessing” lemma and then using the body guessing lemma to (essentially) guess the 2-connected components in the solution (together with a DP on the tree decomposition). Discussing the technical details of this algorithm is out of the scope of this paper, and we refer the interested reader to [24].

The following problems can be formulated as 2-connected permutation CSP deletion problems (see [24] for more details), which leads us to the following corollary.

Corollary 10.

There exist algorithms with running time nO(k) for Subset Feedback Vertex Set, Subset Odd Cycle Transversal, Subset Group Feedback Vertex Set, 2-Conn Component Order Connectivity, and the edge-deletion version of these problems on H-minor-free graphs, where n is the number of vertices of the input graph and k is the solution-size parameter.

Using the minor-preserving (quasi-)polynomial kernels for Subset Feedback Vertex Set and a reduction from Subset Feedback Edge Set to Subset Feedback Vertex Set given in [24], we can also obtain (randomized) subexponential-time FPT algorithms for these two problems.

Corollary 11.

There exist randomized algorithms with running time 2O~(k)nO(1) for Subset Feedback Vertex Set and Subset Feedback Edge Set on H-minor-free graphs, where n is the number of vertices of the input graph and k is the solution-size parameter.

References

  • [1] Brenda S. Baker. Approximation algorithms for np-complete problems on planar graphs. J. ACM, 41(1):153–180, 1994. doi:10.1145/174644.174650.
  • [2] Sayan Bandyapadhyay, William Lochet, Daniel Lokshtanov, Saket Saurabh, and Jie Xue. Subexponential parameterized algorithms for cut and cycle hitting problems on H-minor-free graphs. In Joseph (Seffi) Naor and Niv Buchbinder, editors, Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, SODA 2022, Virtual Conference / Alexandria, VA, USA, January 9 - 12, 2022, pages 2063–2084. SIAM, 2022. doi:10.1137/1.9781611977073.82.
  • [3] Sayan Bandyapadhyay, William Lochet, Daniel Lokshtanov, Saket Saurabh, and Jie Xue. True contraction decomposition and almost eth-tight bipartization for unit-disk graphs. ACM Trans. Algorithms, 20(3):20, 2024. doi:10.1145/3656042.
  • [4] Thang Nguyen Bui and Andrew Peck. Partitioning planar graphs. SIAM J. Comput., 21(2):203–215, 1992. doi:10.1137/0221016.
  • [5] Erik D. Demaine, Fedor V. Fomin, Mohammad Taghi Hajiaghayi, and Dimitrios M. Thilikos. Subexponential parameterized algorithms on bounded-genus graphs and H-minor-free graphs. J. ACM, 52(6):866–893, 2005. doi:10.1145/1101821.1101823.
  • [6] Erik D. Demaine, Mohammad Taghi Hajiaghayi, and Ken-ichi Kawarabayashi. Algorithmic graph minor theory: Decomposition, approximation, and coloring. In 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings, pages 637–646. IEEE Computer Society, 2005. doi:10.1109/SFCS.2005.14.
  • [7] Erik D. Demaine, MohammadTaghi Hajiaghayi, and Ken-ichi Kawarabayashi. Contraction decomposition in h-minor-free graphs and algorithmic applications. In Lance Fortnow and Salil P. Vadhan, editors, Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, San Jose, CA, USA, 6-8 June 2011, pages 441–450. ACM, 2011. doi:10.1145/1993636.1993696.
  • [8] Erik D. Demaine, MohammadTaghi Hajiaghayi, and Bojan Mohar. Approximation algorithms via contraction decomposition. Comb., 30(5):533–552, 2010. doi:10.1007/s00493-010-2341-5.
  • [9] Matt DeVos, Guoli Ding, Bogdan Oporowski, Daniel P. Sanders, Bruce A. Reed, Paul D. Seymour, and Dirk Vertigan. Excluding any graph as a minor allows a low tree-width 2-coloring. J. Comb. Theory B, 91(1):25–41, 2004. doi:10.1016/j.jctb.2003.09.001.
  • [10] Frederic Dorn, Fedor V. Fomin, Daniel Lokshtanov, Venkatesh Raman, and Saket Saurabh. Beyond bidimensionality: Parameterized subexponential algorithms on directed graphs. Inf. Comput., 233:60–70, 2013. doi:10.1016/j.ic.2013.11.006.
  • [11] Zdenek Dvorák. Thin graph classes and polynomial-time approximation schemes. In Artur Czumaj, editor, Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018, New Orleans, LA, USA, January 7-10, 2018, pages 1685–1701. SIAM, 2018. doi:10.1137/1.9781611975031.110.
  • [12] David Eppstein. Subgraph isomorphism in planar graphs and related problems. J. Graph Algorithms Appl., 3(3):1–27, 1999. doi:10.7155/jgaa.00014.
  • [13] David Eppstein. Diameter and treewidth in minor-closed graph families. Algorithmica, 27(3):275–291, 2000. doi:10.1007/s004530010020.
  • [14] Fedor V. Fomin, Daniel Lokshtanov, Sudeshna Kolay, Fahad Panolan, and Saket Saurabh. Subexponential algorithms for rectilinear Steiner tree and arborescence problems. ACM Trans. Algorithms, 16(2):21:1–21:37, 2020. doi:10.1145/3381420.
  • [15] Fedor V. Fomin, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Subexponential parameterized algorithms for planar and apex-minor-free graphs via low treewidth pattern covering. In Irit Dinur, editor, IEEE 57th Annual Symposium on Foundations of Computer Science, FOCS 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, USA, pages 515–524. IEEE Computer Society, 2016. doi:10.1109/FOCS.2016.62.
  • [16] Martin Grohe. Local tree-width, excluded minors, and approximation algorithms. Comb., 23(4):613–632, 2003. doi:10.1007/s00493-003-0037-9.
  • [17] Ken-ichi Kawarabayashi, Robin Thomas, and Paul Wollan. Quickly excluding a non-planar graph. CoRR, abs/2010.12397, 2020. arXiv:2010.12397.
  • [18] Ken-ichi Kawarabayashi and Mikkel Thorup. The minimum k-way cut of bounded size is fixed-parameter tractable. In Rafail Ostrovsky, editor, IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Palm Springs, CA, USA, October 22-25, 2011, pages 160–169. IEEE Computer Society, 2011. doi:10.1109/FOCS.2011.53.
  • [19] Sanjeev Khanna and Rajeev Motwani. Towards a syntactic characterization of PTAS. In Gary L. Miller, editor, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996, pages 329–337. ACM, 1996. doi:10.1145/237814.237979.
  • [20] Philip N. Klein. A subset spanner for planar graphs, with application to subset TSP. In Jon M. Kleinberg, editor, Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, pages 749–756. ACM, 2006. doi:10.1145/1132516.1132620.
  • [21] Philip N. Klein. A linear-time approximation scheme for TSP in undirected planar graphs with edge-weights. SIAM J. Comput., 37(6):1926–1952, 2008. doi:10.1137/060649562.
  • [22] Philip N. Klein and Dániel Marx. Solving planar k -terminal cut in O(nck) time. In Artur Czumaj, Kurt Mehlhorn, Andrew M. Pitts, and Roger Wattenhofer, editors, Automata, Languages, and Programming - 39th International Colloquium, ICALP 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part I, volume 7391 of Lecture Notes in Computer Science, pages 569–580. Springer, 2012. doi:10.1007/978-3-642-31594-7_48.
  • [23] Philip N. Klein and Dániel Marx. A subexponential parameterized algorithm for subset TSP on planar graphs. In Chandra Chekuri, editor, Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 1812–1830. SIAM, 2014. doi:10.1137/1.9781611973402.131.
  • [24] Dániel Marx, Pranabendu Misra, Daniel Neuen, and Prafullkumar Tale. A framework for parameterized subexponential algorithms for generalized cycle hitting problems on planar graphs. In Joseph (Seffi) Naor and Niv Buchbinder, editors, Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, SODA 2022, Virtual Conference / Alexandria, VA, USA, January 9 - 12, 2022, pages 2085–2127. SIAM, 2022. doi:10.1137/1.9781611977073.83.
  • [25] Dániel Marx, Marcin Pilipczuk, and Michal Pilipczuk. On subexponential parameterized algorithms for Steiner tree and directed subset TSP on planar graphs. In Mikkel Thorup, editor, 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pages 474–484. IEEE Computer Society, 2018. doi:10.1109/FOCS.2018.00052.
  • [26] Jesper Nederlof. Detecting and counting small patterns in planar graphs in subexponential parameterized time. In Konstantin Makarychev, Yury Makarychev, Madhur Tulsiani, Gautam Kamath, and Julia Chuzhoy, editors, Proccedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, IL, USA, June 22-26, 2020, pages 1293–1306. ACM, 2020. doi:10.1145/3357713.3384261.
  • [27] Fahad Panolan, Saket Saurabh, and Meirav Zehavi. Contraction decomposition in unit disk graphs and algorithmic applications in parameterized complexity. In Timothy M. Chan, editor, Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2019, San Diego, California, USA, January 6-9, 2019, pages 1035–1054. SIAM, 2019. doi:10.1137/1.9781611975482.64.
  • [28] Neil Robertson and Paul D. Seymour. Graph minors. XVI. excluding a non-planar graph. J. Comb. Theory B, 89(1):43–76, 2003. doi:10.1016/S0095-8956(03)00042-X.
  • [29] Siamak Tazari. Faster approximation schemes and parameterized algorithms on (odd-)h-minor-free graphs. Theor. Comput. Sci., 417:95–107, 2012. doi:10.1016/j.tcs.2011.09.014.
  • [30] Dimitrios M. Thilikos and Sebastian Wiederrecht. Excluding surfaces as minors in graphs. CoRR, abs/2306.01724, 2023. arXiv:2306.01724.
  • [31] Magnus Wahlström. On quasipolynomial multicut-mimicking networks and kernelization of multiway cut problems. In Artur Czumaj, Anuj Dawar, and Emanuela Merelli, editors, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020, July 8-11, 2020, Saarbrücken, Germany (Virtual Conference), volume 168 of LIPIcs, pages 101:1–101:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPIcs.ICALP.2020.101.