Abstract 1 Introduction 2 Our techniques 3 Applications 4 Conclusion References

Pushing the Frontiers of Subexponential FPT Time for Feedback Vertex Set

Gaétan Berthe ORCID LIRMM, Université de Montpellier, CNRS, Montpellier, France Marin Bougeret ORCID LIRMM, Université de Montpellier, CNRS, Montpellier, France Daniel Gonçalves ORCID LIRMM, Université de Montpellier, CNRS, Montpellier, France Jean-Florent Raymond ORCID CNRS, ENS de Lyon, Université Claude Bernard Lyon 1, LIP, UMR5668, Lyon, France
Abstract

The paper deals with the Feedback Vertex Set problem parameterized by the solution size. Given a graph G and a parameter k, one has to decide if there is a set S of at most k vertices such that GS is acyclic. Assuming the Exponential Time Hypothesis, it is known that FVS cannot be solved in time 2o(k)n𝒪(1) in general graphs. To overcome this, many recent results considered FVS restricted to particular intersection graph classes and provided such 2o(k)n𝒪(1) algorithms.

In this paper we provide generic conditions on a graph class for the existence of an algorithm solving FVS in subexponential FPT time, i.e. time 2kεpoly(n), for some ε<1, where n denotes the number of vertices of the instance and k the parameter. On the one hand this result unifies algorithms that have been proposed over the years for several graph classes such as planar graphs, map graphs, unit-disk graphs, pseudo-disk graphs, and string graphs of bounded edge-degree. On the other hand it extends the tractability horizon of FVS to new classes that are not amenable to previously used techniques, in particular intersection graphs of “thin” objects like segment graphs or more generally s-string graphs.

Keywords and phrases:
Subexponential FPT algorithms, geometric intersection graphs
Category:
Track A: Algorithms, Complexity and Games
Copyright and License:
[Uncaptioned image] © Gaétan Berthe, Marin Bougeret, Daniel Gonçalves, and Jean-Florent Raymond; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Mathematics of computing Graph algorithms
; Theory of computation Fixed parameter tractability ; Theory of computation Computational geometry
Related Version:
Full Version: https://arxiv.org/abs/2504.17708 [7]
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

1.1 Context

Given an n-vertex graph G and a parameter k, the Feedback Vertex Set problem (FVS for short) asks whether there exists a set S of at most k vertices such that GS has no cycle. This is a fundamental decision problem in graph theory and one of Karp’s 21 NP-complete problems. Because of its hardness in a classical setting, the problem has been widely studied within the realm of parameterized complexity. This line of research aims to investigate the existence of FPT algorithms, i.e., algorithms that run in time f(k)n𝒪(1), for some computable function f. Such algorithms provide a fine-grained understanding on the time complexity of a problem and describe regions of the input space where the problem can be solved in polynomial time. Note that it is crucial here to obtain good bounds on the function f since the (potentially) super-polynomial part of the running time is confined in the f(k) term. In this direction it was proved that under the Exponential Time Hypothesis of Impagliazzo, Paturi and Zane, FVS does not admit an algorithm with running time 2o(n)n𝒪(1) (see [11]). Nevertheless certain classes of graphs (typically planar graphs) have been shown to admit algorithms with running times of the form 2𝒪(kε)n𝒪(1) (for some ε<1), i.e., where the contribution of the parameter k is subexponential. Such algorithms are called subexponential parameterized algorithms and they are the topic of this paper. Given the numerous existing results on this theme, there are two main directions of research: to improve the running times in the classes where an algorithm is already known, or to extend the tractability horizon of FVS by providing more general settings where subexponential FPT algorithms exist. We are here interested by the second direction, that can be summarized by the following question.

 Question 1.

What are the most general graph classes where FVS admits a subexponential parameterized algorithm?

Historically, a primary source of graph classes studied to make progress on the above question was geometric intersection graphs. In an intersection graph, each vertex corresponds to a subset of some ambient space, and two vertices are adjacent if and only if the subsets intersect. Taking the Euclidean plane as the ambient space, many graph classes can been defined by setting restrictions on the subsets used to represent the vertices. One can for instance consider intersection graphs of disks in the plane, or segments, or Jordan arcs111In the following, those are called strings.. With such subsets, one defines the class of disk graphs, segment graphs, and string graphs respectively. It is also often the case that there are conditions dealing with all the n subsets representing the vertices of a given graph. For example, if we consider disks (resp. segments) one can ask those to have the same diameter (resp. to use at most d different slopes), and this defines the class of unit disk graphs (resp. d-DIR graphs). When considering strings, one possible property is that any string has at most d points shared with the other considered strings. This defines string graphs with edge degree at most d. A weaker condition is to ask every pair of the considered strings to intersect on at most s points, this defines s-string graphs. This class generalizes several natural classes such as planar graphs, map graphs, unit-disk graphs, segment graphs, string graphs of bounded edge-degree, and intersection graphs of α-convex bodies that exclude a fixed subgraph (see [25, 18, 3]).

For all these graph classes, FVS is NP-complete, and actually under ETH none of them admits a 2o(n)-time algorithm. Indeed, this lower bound was given in [12] for induced grid graphs, which form a subclass of unit disk graphs and 2-DIR graphs. On the other hand for each of the aforementioned classes there is an algorithm solving FVS in subexponential time. More precisely, this algorithm applies to any string graph and runs in time 2𝒪~(n2/3) [9].222The notation 𝒪~ ignores polylogarithmic factors, i.e. we write g(x)=𝒪~(f(x)) if for some c we have g(x)=𝒪(f(x)logcx). Regarding subexponential parameterized algorithms, the case of unit disk graphs was settled with an algorithm whose running time matches the ETH lower bound [2]. This result uses the fact that these graphs admit vertex partitions into cliques such that each of these cliques is adjacent to only a constant number of the other cliques. Such a property does not hold for the other graph classes mentioned above. However, other techniques have been developed to deal with the other aforementioned classes such as the classes of bounded edge degree string graphs [3], contact-segment and square graphs [5], disk graphs [21, 1], or the pseudo-disk graphs [4]. Note that when dealing with classes of intersection graphs, the representation of the input (if known) could be used by the algorithm. Some of these algorithms are robust, meaning that the input graph G is provided using one of the classical graph data structures, where there is no indication of the intersection model of G. Because the recognition problem is difficult for most of the classes discussed above, robustness is a substantial advantage.

1.2 Our contribution

Toward answering 1, in the same spirit as in [23], which introduces a generic setting where certain hitting problems can be solved in subexponential parameterized time, we identify sufficient conditions for a graph class (then said to be nice) to admit a subexponential parameterized algorithm for FVS. As we will see later these conditions are satisfied by several natural graph classes, some of which were not known to admit a subexponential parameterized algorithm prior to this work.

Let us now provide some intuition behind the conditions we require for a nice graph class. We discuss here the similarities between these conditions and classical studied properties, while the reasons why these conditions help to get a subexponential parameterized algorithm for FVS are examined in Section 2. A starting point is to review known results about the class of string graphs, which constitutes a good candidate to answer the previous question. In particular, the following results are known for string graphs. For a graph H, let us say that a graph is H-free if it does not contain H as subgraph.

Theorem 2 ([20],[14]).

Kr,r-free string graphs on n vertices have treewidth 𝒪(nrlogr).

Theorem 3 ([20]).

There exists a constant c such that for r>0 it holds that every Kr,r-free string graph on n vertices has at most cr(logr)n edges.

These results333Note that an error was found in the proof of the above results in [20], but a claim by the author was made that the proof can be corrected in the case of string graphs (see [10]). Moreover the earlier bound in [24] yields similar results, up to logarithmic factors. are interesting in our case, as a simple folklore branching allows us to reduce the problem to the case where the instance (G,k) of FVS is Kr,r-free for r=kε. Thus, among the conditions required for a graph class to be nice, two of them correspond to a relaxed version of the above theorems.

Our last main condition is related to neighborhood complexity. A graph class 𝒢 has linear neighborhood complexity (with ratio c) if for any graph G𝒢 and any XV(G), |{N(v)X,vV(G)}|c|X|. It is known that bounded-expansion graph classes have linear neighborhood complexity [26] as well as bounded twin-width graphs [8]. In previous work on parameterized subexponential algorithms [22, 1, 4, 5], it appeared useful that the considered graphs have the property that, if G is Kr,r-free (or even Kr-free), then for any XV(G), |{N(v)X,vV(G)}|r𝒪(1)|X|. Notice that this is slightly stronger than requiring that a class that is Kr,r-free (or Kr-free) for a fixed r has linear neighborhood complexity, as it is important for our purpose that the dependency in r is polynomial. We point out that Kr,r-free string graphs have bounded-expansion, hence linear neighborhood complexity, however this does not imply that the dependency in r is polynomial. Thus, our last main condition (called bounded tree neighborhood complexity) can be seen as a slightly stronger version of this “polynomially dependent” neighborhood complexity. Let us now proceed to the formal definitions.

Definition 4.

We say that a graph class 𝒢 has bounded tree neighborhood complexity (with parameters α,f1,f2) if there exist an integer α and two polynomial functions f1,f2 such that the following conditions hold. For every r, every Kr,r-free graph G𝒢, every set AV(G) and every family 𝒯 of disjoint non-adjacent444Two vertex subsets are non-adjacent in a graph if there is no edge from one to the other, see Subsection 1.3. vertex subsets of GA, each inducing a tree:

  • |{NA(T),T𝒯}|f1(r)|A|α, where NA(T) denotes the neighbors of the vertices of T in A, and

  • |{NA(T),T𝒯}|f2(r,p,m)|A|, where p and m denote the maximum over all T𝒯 of |NA(T)| and |T| respectively.

Definition 5.

An hereditary graph class 𝒢 is nice (for parameters α,f1,f2,δ,f,d) if all the following conditions hold:

  1. C1.

    𝒢 is stable by is stable by contraction of an edge between degree-two vertices that do not belong to a triangle.

  2. C2.

    𝒢 has bounded tree neighborhood complexity (for some parameters α,f1,f2).

  3. C3.

    There exist δ<1 and a constant fr that depends polynomially in r such that for any Kr,r-free graph G𝒢, tw(G)=𝒪(frnδ).

  4. C4.

    There is a constant dr that depends polynomially in r such that for any Kr,r-free graph G𝒢, |E(G)|dr|V(G)|. Without loss of generality we will assume drr.

Our main result is the following.

 Main Theorem.

For every nice hereditary graph class 𝒢 there is a constant η<1 such that FVS can be solved in 𝒢 in time 2𝒪(kη)n𝒪(1).

Actually we provide a single generic algorithm for all nice classes (which requires the values of α,f1,f2,d, but not f and δ). The techniques used to prove the above result are discussed in Section 2. For the time being, let us focus on consequences. As hinted above, being nice is a natural property shared by several well-studied classes of graphs. In particular we show that it is the case for s-string graphs and pseudo-disk graphs, hence we have the following applications.

Corollary 6.

There exists η<1, such that for all s there is a robust parameterized subexponential algorithm solving FVS in time 2𝒪~(s𝒪(1)kη)n𝒪(1) for n-vertex s-string graphs.

Corollary 7.

There exists η<1, such that there is a robust parameterized subexponential algorithm solving FVS in time 2𝒪(kη)n𝒪(1) for n-vertex pseudo-disk graphs.

Observe that the two corollaries above encompass a wide range of classes of geometric intersection graphs for which subexponential parameterized algorithms have been given in previous works such as planar graphs, map graphs, unit-disk graphs, disk graphs, or more generally pseudo-disk graphs, and string graphs of bounded edge-degree. In this sense our main result unifies the previous algorithms.

Also, it captures new natural classes such as segment graphs, or more generally s-string graphs, where previous tools were not sufficient (as discussed in Section 2). We point out that before this work, the existence of subexponential parameterized algorithm for FVS was open even for the very restricted class of 2-DIR graphs.

Generality has a cost and the running time bound we obtain for pseudo-disk graphs is worst than the one obtained in [4], which heavily relied on the input pseudo-disk representation. On the other hand our algorithm has the extra property of being robust (i.e., it does not require a geometric representation) which is a relevant advantage for those classes of intersection graphs where computing a representation is difficult.

1.3 Basic notations and organisation of the paper

In this paper logarithms are binary and all graphs are non-oriented and simple. Unless otherwise specified we use standard graph theory terminology, as in [13] for instance. For a graph G, and vV(G), we denote NG(v) the neighbors of v. We omit the subscript when it is clear from the context. For AV(G), we use the notation N(A)=(vAN(v))A and denote G[A] the subgraph induced by G on A. For vV(G) and BV(G), we denote NB(v)=N(v)B and for AV(G) we denote NB(A)=N(A)B, with the additional notation dB(A)=|NB(A)|. For a graph H we say that G is H-free if H is not a subgraph of G. Two disjoint vertex subsets or subgraphs Z,Z of a graph G are said to be non-adjacent (in G) if there is no edge in G with one endpoint in Z and the other in Z.

Organisation

In Section 2 we explain why the approaches developed for other intersection graph classes (mainly in the papers [1, 3, 4, 21]) do not apply here and present the main ideas behind our algorithm. The presentation uses a case study where we are given a small set M such that GM is a forest of paths. This simplifies the arguments but is complex enough to justify the restrictions we put on the classes we consider. In Section 3 we provide applications of our main theorem by showing in particular that s-string graphs are nice. Finally, in Section 4 we discuss open problems and possible extensions of the approach developed here. Due to space constraints, the description of the algorithm in the general case and its analysis can be found in the full version of the paper.

2 Our techniques

2.1 Why bidimensionality fails and differences with classes of “fat” objects

Even if our goal is to abstract from a specific graph class, let us consider in this section the class of 2-DIR graphs, corresponding to the intersection graphs of vertical or horizontal segments in the plane. As these objects are non “fat”555A connected regions R of the plane is said to be α-fat if the radius of smallest disk enclosing R is at most α times larger than the radius of the largest disk enclosed in S. A family of regions of the plane is then said to be fat if there exists α such that all the elements of the family are α-fat. and can cross (unlike pseudo-disks), this class constitutes a good candidate to exemplify the difficulties.

A common approach is as follows. Given an instance (G,k) of FVS, we compute first in polynomial time a 2-approximation, implying that we either detect a no-instance, or define a set M with |M|2k and such that GM is a forest. The goal is then to reduce, using kernelization or subexponential branching rules, to equivalent instances (G,k) with small treewidth, that is tw(G)=𝒪(k1ε). As FVS can be solved in 2𝒪~(tw(G))n𝒪(1) using a classical dynamic programming approach, we get a subexponential parameterized algorithm. Thus, one has to find a way to destroy in G the obstructions preventing a small treewidth. A first type of obstructions is Kr and Kr,r, which are easy to handle as there are folklore subexponential branchings when r=kε. Now, one can see the hard part as destroying Kr,r hidden (as a minor for example) (see Figure 1).

Figure 1: Example of a Kr,r contained as a minor for r=4 in a disk graph (left) and a 2-DIR graph (right). In the case of disk graph, v has a matching of size r2 in its neighborhood, forming a triangle bundle, which can be exploited to branch. The set M are depicted in blue. For the 2-DIR graph, the vertices of the long paths are represented by segments with small variation in their height and not intersecting for better clarity, but are in fact on the same level and intersecting.

A point that seems crucial to us is the following. In intersection graphs of “fat objects” (like disks, squares, or pseudo-disks more generally), the “locally non planar structure” when an object (vertex v in Figure 1) is “traversed” (by v1, v2 in Figure 1) comes to the price of an edge ({v1,v2}) in the neighborhood of v. Thus, the presence of a large Kr,r as a minor implies that a large matching Ev (of size Ω(r)) will appear in the neighborhood of a vertex v. However, as G[{v}Ev] (called a triangle bundle in [22]) contains r triangles pairwise intersecting on exactly one vertex v, the set {v}Ev is a good structure to perform a subexponential branching for FVS. Indeed, [21] proposed a “virtual branching” to handle this structure by either taking v in the solution, or absorbing Ev in M, implying then that the parameter virtually decreases by |Ev| as a solution which does not contain v has to hit all these edges, even if we cannot branch to determine which are exactly the vertices in the solution.

Once no more virtual branching is possible on large triangle bundles, they obtain by some additional specialized techniques that any vertex in M is such that NV(G)M(v) is an independent set. Then, it is proved ([21], Corollary 1.1) that in a disk graph where for any vM, NV(G)M(v) is an independent set, and where there does not exist a vertex in V(G)M whose neighborhood is contained in M, then tw(G)=𝒪(|M|ω(G)2.5), where ω(G) denotes the maximum size of a clique in G. This no longer holds for 2-DIR graphs: the family of pairs (G,M) depicted on the right of Figure 1 is indeed a counter example as they respect the conditions, have ω(G)=2, but tw(G)=Ω(|M|).

More generally, the role of the size of a matching in the neighborhood was studied in [5] which shows how subexponential parameterized algorithms can be obtained for graph classes having the “almost square grid minor property” (ASQGM), corresponding informally666In the correct definition μN(G) is replaced by a slightly more technical parameter. to tw(G)=𝒪(ω(G)𝒪(1)μN(G)(G)) where μN(G) is the maximum size of a matching in a neighborhood of a vertex, and (G) is the largest size of a grid contained as a minor in G. The previous counter example shows that 2-DIR does not have the ASQGM property, implying that we need another approach to handle them.

2.2 A simpler case study: when trees are only paths

To simplify the arguments, but still understand why properties in 5 of a nice graph class are needed, let us assume that the forest GM only contains paths (Pi)i, and use the example of segment graphs. This case remains challenging as a large Kr,r can still be hidden as a minor (as in Figure 1), and we need to destroy it in order to reduce the treewidth of the graph. To keep notations simple, we use the notation poly(.) to denote a polynomial dependency on the parameter, and thus we do not try to compute tight formulas depending on the polynomial f1,f2,f,d given in the definition of a nice class. We assume that we performed folklore branching and that we are left with a Kr,r-free graph G for r=kε. It is known for string graphs (and thus segment graphs) that in this case tw(G)=poly(kε)n1/2 (corresponding to item 3 of the definition of nice). Thus, our goal is to reduce |V(G)| to 𝒪(k2ε) for some ε.

A first obvious rule is to iteratively contract edges of GM whose endpoints have no neighbors in M. This explains why we need the property of item 1 of the definition of nice.

Let us now explain how the property of item 2 (bounded tree neighborhood complexity, abbreviated bounded T-NC) allows to obtain the following “degree-related size property”: for any subpath P of a Pi, |P|poly(r)(dM(P)α+1). Define an independent set 𝒯 of size |P|/2 by picking every second vertex in P. According to the definition of bounded T-NC (item) with A=NM(P), we get |{NM(v),v𝒯}|f1(r)(dM(P))α. Thus, if |P|xf1(r)(dM(P))α, we found x vertices in P having the same neighborhood M in M, and thus a vertex uM adjacent to x vertices in P. If x is large enough (about dM(P)), it is always better to take any arbitrary vertex uM. This leads to a kernelization rule (denoted (KR5) in the full version): if there is a vertex uM adjacent to approximately dM(P) vertices in a subpath P, delete u and decrease k by one. To sum it up, after applying this rule, for any subpath P of a Pi, if we have dM(P)=poly(r), then |P|=poly(r).

Before the next step we need to apply the following “large degree rule” (denoted (KR3) in the full version): if there is a vertex v in a Pi such that dM(v)>t, then add v to M. One can prove that by taking t=2dr, with dr=poly(r) the constant defined in item 4 of the definition of a nice class, M does not grow too much after applying this rule exhaustively: by denoting AM the set of vertices already in M before applying this rule, we always have |A|=poly(r)|MA|. This claim will be discussed in Subsection 2.3.

Observe that at this stage we may still have a large Kr,r as minor, with for example graphs as in Figure 1 where no rule applies. It remains to define a crucial rule to destroy these Kr,r minors. Let us now present a partitioning algorithm of the connected components in GM. For any connected component Pi in GM, we start (see Figure 2) from an endpoint of Pi and collect greedily vertices until we find a subpath Pi1 such that dM(Pi1)t, or that there is no more vertices in Pi. If dM(Pi1)t, then restart a new path starting from the next vertex to create Pi2, and so on. This defines a partition Pi=[x(Pi)](Pi), where dM(Pi)t for any [1,x(Pi)1] and no lower bound for dM(Pix(Pi)). As we applied the large degree rule, we also know that dM(Pi)2t for any [1,x(Pi)], because collecting at each step a new vertex in the path Pi can increase dM(Pi) by at most t. This implies, using the degree-related size property introduced above, that |Pi|poly(r) for any [1,x(Pi)]. Let us denote 𝒯+ the set of Pi such that dM(Pi)t the “large-degree subpaths”. Observe that the last considered subpath Pix(Pi) of each connected component Pi (on the right of each path of GM in Figure 2) may have dM(Pix(Pi))<t as there was no more vertices to complete it, hence it is not contained in 𝒯+. We denote 𝒯 those remaining “small-degree subpaths”.

Figure 2: Example of partition where Pi is partitioned into x(Pi)=3 subpaths, with Pi1 and Pi2 in 𝒯+ and Pi3𝒯.
Figure 3: Example of Kt,t~ for t=4. Here we have XNM(Ti) for 1i4.

Let us now explain how the bounded T-NC property (item) allows to obtain the following “small number of large-degree subpaths” property. By removing half of the 𝒯+’s, we can get a set 𝒯+ of non-adjacent trees (meaning with no edge between the Tis) such that |𝒯+|12|𝒯+|. We can then apply the T-NC property with A=M, 𝒯=𝒯+ and p=m=poly(r) to obtain |{NM(T),T𝒯+}|poly(r)|M|. Thus, if |𝒯+|xpoly(r)|M|, we found x large-degree subpaths (denoted Ti) having the same neighborhood X in M with |X|t. By choosing x=t and considering XX with |X|=t, we found a structure that we call a Kt,t~ (see Figure 3), formally defined as a pair (X,(Ti)1it) where

  1. (P1)

    XM has size t,

  2. (P2)

    (Ti)i a family of t vertex-disjoint non-adjacent subtrees (paths here) of GM such that for all 1it, XNM(Ti), and

  3. (P3)

    for any Ti, |Ti|poly(r).

Now, inspired by the “virtual branching rule” for a triangle bundle, we introduce a branching rule (denoted (BR2) in the full version) that either deletes almost all vertices in X, or is adding to M a subset of t1 of the Tis. The complexity behind this rule is fine as in the second branch, the parameter virtually decreases by t1, and M grows by (t1)maxi{|Ti|}=poly(r). This explains how we deal with the Kt,t-minors.

These rules do not suffice to bound |V(G)M|. Recall that any P𝒯+𝒯 is such that |P|poly(r), and thus we only need to bound |𝒯+𝒯|. As we cannot apply the previous rule, we know that the number of big paths is small: |𝒯+|poly(r)|M|. Now, to bound |𝒯|, observe that we can partition 𝒯=𝒯1𝒯2, where

  • 𝒯1 is the set of small-degree paths Pi for some >1 (belonging to the same path Pi than a large-degree path Pi1).

  • 𝒯2 is the set of small-degree paths which are entire connected components of GM.

As |𝒯1||𝒯+|, it only remains to bound |𝒯2|. Now, we can exploit once again the bounded T-NC property (item) to obtain that, if |𝒯2|xpoly(r)|M|, then we can find x disjoint non-adjacent paths in 𝒯2 having the same neighborhood X in M. This case is different from the Kt,t~ case as X may be arbitrarily small (we only know that |X|<t), and thus unlike Kt,t~ this does not decrease the parameter k by a large amount. However, in this case, paths of 𝒯2 are just connected components of GM, and we use a last rule (denoted KR4 in the full version) that identifies paths that can be safely removed. It can be shown that if x+2 paths have the same neighborhood in M, of size x, one of the paths is redundant. Hence after applying the rule exhaustively we can assume |𝒯2|<xpoly(r)|M|=poly(r)|M|.

This concludes the sketch of proof for this restricted setting where the connected components of GM are paths, as we obtain by taking ε small enough |V(G)M|poly(r)|M|poly(kε)k=𝒪(k2ε) as required.

2.3 Challenges to lift the result from paths to trees

We now consider the real setting where given (G,k) where G is Kr,r-free for r=kε, and given M a feedback vertex set of size at most 2k, we want to reduce the graph to obtain |V(G)M|=𝒪(k2ε). The approach still consists in partitioning GM in an appropriate way (called a t-uniform partition).

A first problem when trying to adapt the approach of Subsection 2.2 is the degree-related size property. Indeed, for trees we are now only able to obtain that for any subtree T of GM, |T|poly(r)μ(T)𝒪(α) where μ(T)=max(dM(T),bM¯(T)) and bM¯(T)=|{vT,N(v)MT}| is the size of the “border of T”. Observe that bM¯(P) is at most 2 for any subpath P of path Pi, whereas bM¯(T) can only be bounded by |T| for a subtree T. Informally, in the path case |P| was only polynomially dependent on dM(P), and now |T| is also polynomially depends on bM¯(T).

A second problem is the large degree rule. Suppose that this rule no longer applies (meaning that for every uV(GM), we have dM(u)t), and suppose now that because of another rule a vertex vV(G)M is added to M, denoting M=M{v}. Then this can create a new large degree vertex v with dM(v)>t (and so dM(v)=t). Then v would need to be added and the problem may arise again for another vertex v′′. This “cascading” can easily be prevented if GM is a forest of paths: it suffices to apply the rule a first time at the start of the algorithm, but with t=t2. We then have for each vV(GM) the bound dM(v)t2, and we do not need to apply the rule again after as adding vertices to M may increase dM(v) by at most 2 ensuring the wanted bound dM(v)t for vV(GM). However, in the case of a tree, we can have in GM a vertex of arbitrarily large degree, so we cannot apply the same solution. The problem is treated with the help of a technical lemma which ensures that throughout the execution of the algorithm we keep |M|=poly(r)k.

Finally, a third problem is the definition of the partition. As in the case of paths we want to partition GM into a “t-uniform partition” 𝒯, where in particular we have 𝒯=𝒯+𝒯, and for any T𝒯, dM(T)2t and |T|poly(r)μ(T)𝒪(α). The greedy approach presented for the case of paths is now more involved, as we have to cut each tree of GM into subtrees that have small border bM¯(T), as otherwise the previous bound |T|poly(r)μ(T)𝒪(α) becomes useless when μ(T) is too large.

This partitioning procedure can either:

  • Fail and find a subtree T with |T|>poly(r)μ(T)Cα, for some constant C, implying that our degree-related size rule can be applied.

  • Fail and find too many subtree Ti𝒯+ with large degree, implying that we found a Kt,t~, and that our Kt,t~ rule can be applied.

  • Produce a t-uniform partition with |𝒯+|poly(r)|M|.

In the third case, we either find another way to apply one more time a reduction rule, or prove that |V(G)M|=𝒪(k2ε).

2.4 An important tool to prove that an intersection graph class is nice

We believe that one important application of our main theorem is the class of s-string graphs (recall that segment graphs are a subclass of 1-string graphs). To prove that s-string graphs is a nice class (and thus captured by our result), one needs to prove that s-string graphs have a bounded tree neighborhood complexity. This property is not straightforward, and we would like to point out the following theorem which seems useful to obtain results related to neighborhood complexity.

Theorem 8 ([16]).

Given a family of pseudo-disks and a finite family of pseudo-disks, consider the hypergraph H(,) whose vertices are the pseudo-disks in and the edges are all subsets of  of the form {D,DS}, with S. Then the number of edges of cardinality at most k1 in H(,) is 𝒪(||k3).

A very important aspect in this result is that it is not required that is a family of pseudo-disks, and thus pseudo-disks of may “cross” pseudo disks of . This is indeed the case in our application where in particular we associate to each tree in GM a pseudo-disk in , and this pseudo disk may cross pseudo-disks associated to vertices of (see proof of 11).

3 Applications

In this section, we prove that s-string graphs and pseudo-disk graphs are nice graph classes for some parameters. We recall that a system of pseudo-disks is a collection of regions in the plane homeomorphic to a disk such that any two of them share at most 2 points of their boundary. Similar arguments are used for both considered classes, but in the case of pseudo-disks the arguments are a bit simpler, we then consider this class in first.

3.1 Application to pseudo-disk graphs

In this section, we prove that the class of pseudo-disk graphs is nice, and so by our main theorem it admits a robust subexponential FPT algorithm for FVS. Note that for this graph class, the existence of such algorithm was already known [4].

Lemma 9.

There exists a constant c such that the class of pseudo-disk graphs has bounded tree neighborhood complexity with parameters α=4,f1(r)=c and f2(r,p,m)=cp3.

Proof.

Let r2, G be a Kr,r-free pseudo-disk graph, (𝒟v)vV(G) a representation of G as pseudo-disks, AV(G), and 𝒯 a family of disjoint non-adjacent trees of GA. We would like to apply Theorem 8 on the set A and the family of subsets of the plane obtained by taking for each tree T𝒯 the union 𝒟T=vT𝒟v. Because we are considering pseudo-disks and trees, this union is homeomorphic to a disk. Moreover as the trees are non-adjacent the obtained unions do not intersect each other, and so are a pseudo-disk system trivially. Now applying Theorem 8 with the families (𝒟v)vA and (𝒟T)T𝒯 directly gives that there exists a constant c2 such that if for all T𝒯 we have dA(T)p then |{NA(T),T𝒯}|c2p3|A| as wanted for the second bound. Observing that we can take p=|A| as an upper bound for dA(T) with T𝒯 gives the first wanted bound.

Lemma 10.

There exist constants c1,c2,c3,c4 such that the class of pseudo-disk graphs is a nice class with parameters α=4,f1(r)=c1,f2(r,p,m)=c2p3, δ=12, fr=c3rlogr and dr=c4rlogr.

Proof.

Most of the conditions were already stated with Theorem 2, Theorem 3 and 9. The only property that remains to check is that in a pseudo-disk graph G, identifying adjacent degree-two vertices u and v obtaining a new vertex w preserves being a pseudo-disk graph. We may assume that the vertices do not have a common neighbor as otherwise we obtain an induced subgraph of G which is trivially a pseudo-disk graph. By considering (𝒟q)qV(G) a pseudo-disk representation of G, we can take 𝒟w=𝒟u𝒟v as it is homeomorphic to a disk and its boundary will cross the second neighbor of u (respectively v) as many time than the boundary of 𝒟u (respectively 𝒟v). And so applying our main theorem we obtain: See 7 Note that our main theorem gives that it suffices to take η>4445 for the result to hold. Sharper results already exist in the literature for pseudo-disk graphs, by generalizing the robust algorithm of [21] dealing with disk graphs to pseudo-disk graphs, or by using the representation as pseudo-disks for obtaining an even better running time. See [6], the full version of [4] for both methods.

3.2 Application to 𝒔-string graphs

We now show how to adapt the arguments from the previous section to the case of s-strings.

Lemma 11.

There exist constants c1,c2 such that the class of s-string graphs has bounded tree neighborhood complexity with parameter α=4,f1(r)=c1s4rlogr and f2(r,p,m)=c2(srlogr)4(p+m)3.

Proof.

The proof is very similar to the proof of 9 with some additional tweaks. Let G be a Kr,r-free s-string graph for some r2 and (𝒮v)vV(G) be an s-string representation of G. For T𝒯, again we consider the region 𝒟T=vV(T)𝒮v. In this case however, even so T is a tree, the complement of this region is not necessarily connected (for example if two strings of T intersect on several points). In order to obtain a region of the plane homeomorphic to a disk, we modify 𝒟T by cutting small sections where no intersections take place (not even with a string of A) and obtain a new set 𝒟T𝒟T that is connected and such that there is exactly one arc-connected region in 2𝒟T and which intersects the same strings in A as 𝒟T (see Figure 4). Moreover we add a small thickness to 𝒟T while preserving the wanted property about the number of regions in 2𝒟T in order to obtain a geometric shape homeomorphic to a disk. Observe that as there are no edges between vertices of distinct members of 𝒯, by taking the thickness small enough the connected sets of the form 𝒟T (for T𝒯) are not crossing and so they trivially form a system of pseudo-disks.

Figure 4: Transformation of a union of s-strings to a region homeomorphic to a disk, while keeping the same neighborhood in A. The strings of A are depicted in black.

Now we would like to construct another system of pseudo-disks representing the vertices of A. We do this by cutting the strings in (𝒮u)uA whenever two of them cross each other. Observe that by Theorem 3 there exists a constant c such that by denoting dr=crlogr we have at most dr|A| intersecting pairs, and remember that each pair intersects each other at most s times as we consider a s-string representation. So we have at most sdr|A| cuts which gives an upper bound of (sdr+1)|A| for the number of sections of strings between intersection points. We denote C the set of such sections. Again we define a family (v)vC by considering the sections (which are disjoint by construction) and giving them some thickness, while preventing the sections to intersect each other. This is clearly a system of pseudo-disks as its elements are disjoint. By Theorem 8, the number of distinct sets NC(𝒟T)={vC,𝒟T intersects v}, for T𝒯, is 𝒪(x3|C|) where x is the maximum, over every T𝒯, of the number of pseudo-disks in (v)vC crossed by DT. This upper bound gives the second result of this lemma by observing that if a pair of pseudo-disks 𝒟T1,𝒟T2 intersect exactly the same set of v, then NA(T1)=NA(T2). We obtain the first result of the lemma by using the trivial bound x|C|.

Lemma 12.

There exist constants c1,c2,c3,c4 such that for every s1 the class of s-string graphs is a nice class with parameters α=4,f1(r)=c1s4rlogr,f2(r,p,m)=c2(srlogr)4(p+m)3, δ=12, fr=c3rlogr and dr=c4rlogr.

Proof.

Again most of the conditions were already stated with Theorem 2, Theorem 3 and 11. The only remaining property to prove is that given an s-string graph G, identifying adjacent degree-two vertices u and v preserves being a s-string graph. We may assume that u and v do not have a common neighbor as otherwise the obtained graph is an induced subgraph of G and so is a s-string graph. We do this by replacing in a s-string representation (𝒮q)qV(G) of G the strings 𝒮u and 𝒮v with a new string 𝒮w while preserving the global property of being an s-string family. 𝒮u contains a Jordan arc au linking its two neighbors, without being intersected by any string in its interior. Let denote pv the extremity of au in 𝒮v. Then 𝒮v contains a Jordan arc av linking pv to the string representing its second neighbor, without being intersected by any other string than 𝒮u. The string 𝒮w is then obtained by taking the union of au and av. This construction ensures that the number of crossings between two strings other than 𝒮u and 𝒮v of the initial representation remain the same. We now have to bound the number of crossing of 𝒮w with others strings. Recalling that u and v do not share a common neighbor, and that by construction w has 2 crossings (one for each distinct neighbor), w does not have more than 1 crossings with another string. So after replacing 𝒮u and 𝒮v by 𝒮w we still have a s-string family.

Refer to caption
Figure 5: Illustration of the construction used in the proof of 12 for contracting an edge between adjacent degree-two vertices without a common neighbor.

And so applying our main theorem we obtain: See 6 More precisely, we can take η=5253.

4 Conclusion

In this paper we gave general sufficient conditions for the existence of subexponential parameterized algorithms for the Feedback Vertex Set problem. Our main theorem unifies the previously known results on several classes of graphs such as planar graphs, map graphs777Map graphs are intersection graphs of interior-disjoint regions of 2 homeomorphic to disks., unit-disk graphs, disk graphs, or more generally pseudo-disk graphs888Pseudo-disk graphs are intersection graphs of a collection of regions in the plane homeomorphic to a disk such that any two of them share at most 2 points of their boundary, and string graphs of bounded edge-degree. It also applies to classes where such algorithms were not known to exist, notably intersection graphs of thin objects such as segment graphs and more generally s-string graphs.

However, we have so far no evidence that our concept of nice class could be an answer to 1. So a natural direction for future research would be to investigate more general graph classes than those listed above or to discover new classes that fit in our framework. There are two natural candidates:

  • Intersection graphs of objects in higher dimensions. However, as proved in [15], under ETH intersection graphs of unit balls in 3 do not admit a subexponential parameterized algorithm for FVS.

  • Graph classes excluding an induced minor.999A graph H is said to be an induced minor of a graph G if it can be obtained from G by deleting vertices and contracting edges. Otherwise, G is said to exclude H as induced minor or to be H-induced minor free. This is more general than string graphs (which exclude a subdivided K5 as an induced minor). In such classes, Korhonen and Lokshtanov [17] recently provided an algorithm solving FVS in time 2𝒪H(n2/3logn), that is, subexponential in the input size n.

Less general than the previous item is the class of string graphs, which is nevertheless the most general class of intersection graphs of (arc-connected) objects in the Euclidean plane. At the time of the writing, it is not excluded that it could be a nice class. So far, we are still missing the property about the bounded tree neighborhood complexity. Note that in our proof for s-strings, the bound on the number s of crossing is only used to prove that the class satisfies this property of bounded tree neighborhood complexity. Obtaining a similar result without using the bound on the number of crossings would thus yield the desired generalization. But an even simpler way could be to prove that the general case of string graphs can be reduced to the case of s-strings graphs for some “small” s function of the problem parameter k. A first idea would be to prove that Kt,t-free string graphs are tc-string graphs for some constant c, however this fails as there are string graphs with n vertices, and so which are Kn,n-free, that require 2cn crossings for some constant c [19].

References

  • [1] Shinwoo An, Kyungjin Cho, and Eunjin Oh. Faster algorithms for cycle hitting problems on disk graphs. In Algorithms and Data Structures: 18th International Symposium, WADS 2023, Montreal, QC, Canada, July 31 – August 2, 2023, Proceedings, pages 29–42, Berlin, Heidelberg, 2023. Springer-Verlag. doi:10.1007/978-3-031-38906-1_3.
  • [2] Shinwoo An and Eunjin Oh. Feedback Vertex Set on Geometric Intersection Graphs. In Hee-Kap Ahn and Kunihiko Sadakane, editors, 32nd International Symposium on Algorithms and Computation (ISAAC 2021), volume 212 of Leibniz International Proceedings in Informatics (LIPIcs), pages 47:1–47:12, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ISAAC.2021.47.
  • [3] Julien Baste and Dimitrios M Thilikos. Contraction bidimensionality of geometric intersection graphs. Algorithmica, 84(2):510–531, 2022. doi:10.1007/S00453-021-00912-W.
  • [4] Gaétan Berthe, Marin Bougeret, Daniel Gonçalves, and Jean-Florent Raymond. Feedback Vertex Set for pseudo-disk graphs in subexponential FPT time. In Daniel Kráľ and Martin Milanič, editors, Graph-Theoretic Concepts in Computer Science, pages 65–78, Cham, 2025. Springer Nature Switzerland.
  • [5] Gaétan Berthe, Marin Bougeret, Daniel Gonçalves, and Jean-Florent Raymond. Subexponential Algorithms in Geometric Graphs via the Subquadratic Grid Minor Property: The Role of Local Radius. In Hans L. Bodlaender, editor, 19th Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2024), volume 294 of Leibniz International Proceedings in Informatics (LIPIcs), pages 11:1–11:18, Dagstuhl, Germany, 2024. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.SWAT.2024.11.
  • [6] Gaétan Berthe, Marin Bougeret, Daniel Gonçalves, and Jean-Florent Raymond. Feedback vertex set for pseudo-disk graphs in subexponential fpt time, 2024. doi:10.48550/arXiv.2410.23878.
  • [7] Gaétan Berthe, Marin Bougeret, Daniel Gonçalves, and Jean-Florent Raymond. Pushing the frontiers of subexponential fpt time for feedback vertex set, 2025. arXiv:2504.17708.
  • [8] Édouard Bonnet, Florent Foucaud, Tuomo Lehtilä, and Aline Parreau. Neighbourhood complexity of graphs of bounded twin-width. European Journal of Combinatorics, 115:103772, 2024. doi:10.1016/J.EJC.2023.103772.
  • [9] Édouard Bonnet and Paweł Rzążewski. Optimality program in segment and string graphs. Algorithmica, 81:3047–3073, 2019. doi:10.1007/S00453-019-00568-7.
  • [10] Edouard Bonnet and Paweł Rzążewski. An 11/6-approximation algorithm for vertex cover on string graphs, 2024. doi:10.48550/arXiv.2409.18820.
  • [11] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Daniel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer Publishing Company, Incorporated, 1st edition, 2015.
  • [12] Mark de Berg, Hans L. Bodlaender, Sándor Kisfaludi-Bak, Dániel Marx, and Tom C. van der Zanden. A framework for exponential-time-hypothesis–tight algorithms and lower bounds in geometric intersection graphs. SIAM Journal on Computing, 49(6):1291–1331, 2020. doi:10.1137/20M1320870.
  • [13] Reinhard Diestel. Graph theory 3rd ed. Graduate texts in mathematics, 173(33):12, 2005.
  • [14] Zdeněk Dvořák and Sergey Norin. Treewidth of graphs with balanced separations. Journal of Combinatorial Theory, Series B, 137:137–144, 2019. doi:10.1016/j.jctb.2018.12.007.
  • [15] Fedor V Fomin, Daniel Lokshtanov, and Saket Saurabh. Excluded grid minors and efficient polynomial-time approximation schemes. Journal of the ACM (JACM), 65(2):1–44, 2018. doi:10.1145/3154833.
  • [16] Balázs Keszegh. Coloring intersection hypergraphs of pseudo-disks. Discret. Comput. Geom., 64(3):942–964, 2020. doi:10.1007/S00454-019-00142-6.
  • [17] Tuukka Korhonen and Daniel Lokshtanov. Induced-minor-free graphs: Separator theorem, subexponential algorithms, and improved hardness of recognition. In Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). SIAM, 2024.
  • [18] Jan Kratochvíl and Jirí Matousek. Intersection graphs of segments. Journal of Combinatorial Theory, Series B, 62(2):289–315, 1994. doi:10.1006/JCTB.1994.1071.
  • [19] Jan Kratochvíl and Jiří Matoušek. String graphs requiring exponential representations. Journal of Combinatorial Theory, Series B, 53(1):1–4, 1991. doi:10.1016/0095-8956(91)90050-T.
  • [20] James R. Lee. Separators in Region Intersection Graphs. In Christos H. Papadimitriou, editor, 8th Innovations in Theoretical Computer Science Conference (ITCS 2017), volume 67 of Leibniz International Proceedings in Informatics (LIPIcs), pages 1:1–1:8, Dagstuhl, Germany, 2017. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2017.1.
  • [21] Daniel Lokshtanov, Fahad Panolan, Saket Saurabh, Jie Xue, and Meirav Zehavi. Subexponential parameterized algorithms on disk graphs (extended abstract). In Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 2005–2031. SIAM, 2022. doi:10.1137/1.9781611977073.80.
  • [22] Daniel Lokshtanov, Fahad Panolan, Saket Saurabh, Jie Xue, and Meirav Zehavi. A framework for approximation schemes on disk graphs. In Nikhil Bansal and Viswanath Nagarajan, editors, Proceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, SODA 2023, Florence, Italy, January 22-25, 2023, pages 2228–2241. SIAM, 2023. doi:10.1137/1.9781611977554.CH84.
  • [23] Daniel Lokshtanov, Fahad Panolan, Saket Saurabh, Jie Xue, and Meirav Zehavi. Subexponential parameterized algorithms for hitting subgraphs. arXiv preprint arXiv:2409.04786, 2024. doi:10.48550/arXiv.2409.04786.
  • [24] Jirí Matousek. Near-optimal separators in string graphs. Comb. Probab. Comput., 23(1):135–139, 2014. doi:10.1017/S0963548313000400.
  • [25] Jiří Matoušek. String graphs and separators. In Geometry, structure and randomness in combinatorics, pages 61–97. Springer, 2014. doi:10.1007/978-88-7642-525-7_5.
  • [26] Felix Reidl, Fernando Sánchez Villaamil, and Konstantinos Stavropoulos. Characterising bounded expansion by neighbourhood complexity. European Journal of Combinatorics, 75:152–168, 2019. doi:10.1016/J.EJC.2018.08.001.