Sampling with a Black Box: Faster Parameterized Approximation Algorithms for Vertex Deletion Problems
Abstract
In this paper, we present Sampling with a Black Box, a unified framework for the design of parameterized approximation algorithms for vertex deletion problems (e.g., Vertex Cover, Feedback Vertex Set, etc.). The framework relies on two components:
-
A Sampling Step. A polynomial-time randomized algorithm that, given a graph , returns a random vertex such that the optimum of is smaller by than the optimum of , with some prescribed probability . We show that such algorithms exist for multiple vertex deletion problems.
-
A Black Box algorithm which is either an exact parameterized algorithm, a polynomial-time approximation algorithm, or a parameterized-approximation algorithm.
The framework combines these two components together. The sampling step is applied iteratively to remove vertices from the input graph, and then the solution is extended using the black box algorithm. The process is repeated sufficiently many times so that the target approximation ratio is attained with a constant probability.
We use the technique to derive parameterized approximation algorithms for several vertex deletion problems, including Feedback Vertex Set, -Hitting Set and -Path Vertex Cover. In particular, for every approximation ratio , we attain a parameterized -approximation for Feedback Vertex Set, which is faster than the parameterized -approximation of [Jana, Lokshtanov, Mandal, Rai and Saurabh, MFCS 23’]. Furthermore, our algorithms are always faster than the algorithms attained using Fidelity Preserving Transformations [Fellows, Kulik, Rosamond, and Shachnai, JCSS 18’].
Keywords and phrases:
Parameterized Approximation Algorithms, Random SamplingCategory:
Track A: Algorithms, Complexity and GamesFunding:
Ariel Kulik: This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 852780-ERC (SUBMODULAR).Copyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms ; Theory of computation Approximation algorithms analysisEditors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele PuppisSeries and Publisher:

1 Introduction
A vast body of research has been dedicated to basic vertex deletion problems such as Vertex Cover, -Hitting Set and Feedback Vertex Set. In these problems, the objective is to delete a minimum cardinality set of vertices from the input (hyper-)graph so that the remaining (hyper-)graph satisfies a specific property (edge-free, cycle-free, etc.). As many of these problems are NP-hard, multiple algorithmic results focus on either polynomial-time approximations or exact parameterized algorithms. In between these two classes of algorithms lies the class of parameterized approximation algorithms. Such algorithms aim to provide approximation ratios which cannot be attained in polynomial-time, at the expense of a parameterized running time.
In this paper we explore how existing exact parameterized algorithms and polynomial-time approximation algorithms can be used together with sampling steps to derive efficient parameterized approximation algorithms. Informally, a sampling step with success probability is a polynomial-time algorithm which, given an input graph , returns a random vertex . The vertex should, with probability at least , satisfy the condition that removing from reduces the optimum (i.e., the minimum number of vertices that must be removed for the graph to satisfy the property) by 1. As we show in this paper, such algorithms can be easily obtained for various vertex deletion problems.
Our framework, Sampling with a Black Box, applies the sampling step times and subsequently uses the existing parameterized/approximation algorithms to complete the solution. The whole process is executed sufficiently many times so that a -approximate solution is found with a constant probability.
Sampling with a Black-Box is applicable to a wide collection of vertex deletion problems. We show sampling steps exist for every vertex deletion problem for which the property can be described by a finite set of forbidden vertex induced hypergraphs. Some examples for such problems are , and Vertex Cover on graphs with maximal degree . We further provide sampling steps for Feedback Vertex Set (FVS) and Pathwidth One Vertex Deletion, where the set of forbidden hypergraphs is infinite.
We compare Sampling with a Black Box to existing benchmarks.
-
In [24], Jana, Lokshtanov, Mandal, Rai, and Saurabh developed a parameterized -approximation for Feedback Vertex Set (FVS) for every . The objective in FVS is to remove a minimum number of vertices from an undirected graph, so the remaining graph does not contain cycles. We achieve faster parameterized approximation algorithms for FVS for every approximation ratio between and – see comparison in Figure 1(a).
-
In [19], Fellows, Kulik, Rosamond and Shachnai provided a generic technique, called Fidelity Preserving Transformations, which can be applied for every vertex deletion problem in which the property can be described by a finite set of forbidden vertex induced subgraphs. Assuming the maximum number of vertices in a forbidden induced subgraph is , and the problem has an exact parameterized algorithm, the technique of [19] yields a -approximation in time .222The result in [19] was stated for Vertex Cover and -Hitting Set, but can be easily generalized to the stated result. We prove that the running time we obtain for every problem in the class is always faster than the running time attained by [19], for every . Figure 1(b) provides a comparison between the running times we attain and those of [19] for -Path Vertex Cover, in which the objective is to remove vertices from a graph so the remaining graph does not have a path on vertices.
Sampling with a Black-Box builds upon ideas which have been developed in several previous works [20, 16, 18, 26, 24, 19]. The framework overcomes weaknesses of existing techniques in parameterized approximations [19, 26, 24], and utilizes concepts developed for exponential algorithms [20, 16, 18] in a parameterized setting. A key technical contribution of this paper is the analysis of the framework, which effectively leverages the potential of each of its components.
1.1 Related Work
The field of parameterized approximations aims to derive approximation algorithms which run in parameterized running time. In the classic setting, the considered problem is one which is not expected to have an exact parameterized algorithm, and further has a hardness of approximation lower bound which indicates that a polynomial-time -approximation is unlikely to exist, for some . In such a setting, the objective is to derive a -approximation algorithm that runs in parameterized running time for , or to show that such an algorithm cannot exist (subject to common complexity assumptions). In recent years, there has been a surge of breakthrough results in the field, providing both algorithms (e.g., [27, 21, 15, 32, 31, 4, 1, 14, 23]) and hardness of approximation results (e.g., [22, 29, 36, 11, 5, 33, 25, 30, 12]).
Within the broad field of parameterized approximations, a subset of works consider problems which are in FPT. For problems in FPT, there is always a parameterized -approximation algorithm for all , as the exact algorithm is also an approximation algorithm. Therefore, the main focus of these works is on the trade-off between approximation and running time.
A prominent approach to attain such parameterized-approximation algorithms relies on using existing exact parameterized algorithms as black-box. In [6], the authors showed that an exact parameterized algorithm for Vertex Cover implies a parameterized -approximation in time . The same running time has been attained for Vertex Cover by Fellows et al. [19] through a more generic framework which can be applied to additional problems.
Other works focused on directly designing parameterized approximation algorithms. In [8, 7] Brankovic and Fernau provided parameterized approximation algorithms for Vertex Cover and -Hitting Set. The designed algorithms are branching algorithms that involve branching rules aimed at approximation and interleave approximative reduction rules. The works provide, among others, a parameterized -approximation for Vertex Cover in time and a parameterized -approximation for -Hitting Set in time .
In [26], Kulik and Shachnai showed that the use of randomized branching can lead to significantly faster parameterized approximation algorithms. In particular, they attained a parameterized -approximation for Vertex Cover in time and a parameterized -approximation for -Hitting Set in time . The idea in randomized branching is that the algorithm picks one of the branching options at random. Subsequently, a good approximation is attained as long as the randomly picked options are not too far from the correct options. The branching rules used by [26] are fairly involved in comparison to the sampling steps used by this paper and their analysis requires non-trivial mathematical machinery.
While [26] showed that randomized branching is a powerful technique for the design of parameterized approximation algorithms, it has only been applied to a limited set of problems. In [26], the authors provided applications of the technique to Vertex Cover and -Hitting Set. Furthermore, for approximation ratios close to , the randomized-branching algorithms are inferior to the exact algorithms in terms of running times (or to the combination of those with [19]). A central goal of this paper is to overcome some of these difficulties: Sampling with a Black Box leverages the power of randomized branching, it is applicable to a wide set of problems, and always improves upon the running times attained using the best known exact algorithms in conjunction with [19].
In [24], the authors developed parameterized approximation algorithms for FVS using the combination of a randomized branching rule for FVS and existing algorithms as black box. Their work indeed served as a motivation for this paper. While [24] uses randomized branching, the work does not facilitate the full power of randomized branching for approximation. In [24], for the algorithm to succeed, the randomized branching must always select the “correct” branching option, while a main benefit of randomized branching for approximation is that an incorrect option may still lead to an approximate solution 333[24] presents three different algorithms. One of the algorithms does utilize this property of randomized branching. However, the specific algorithm is a plain randomized branching algorithm which does not use an exact parameterized algorithm or a polynomial-time approximation algorithm as a black box. . The faster running times attained in this paper are a result of a better utilization of randomized branching for parameterized approximations. While the approach in [24] can potentially be generalized to other problems, such as , the resulting running time would be inferior to the ones attained by Sampling with a Black Box.
The concept of randomly sampling a partial solution and subsequently extending it using a parameterized algorithm is central to the monotone local search technique of Fomin, Gaspers, Lokshtanov and Saurabh [20]. Later variants of the technique are designed to obtain exponential time approximation algorithms [16, 17, 18]. A central idea in those later variants is that an approximate solution is obtained as long as the initial sampling does not contain too many vertices which do not belong to the optimum. This resembles the use of the sampling step in this paper.
Organization.
Section 2 gives several standard definitions used throughout the paper. In Section 3 we formally state the results of the paper. Section 4 lists applications of the technique for several problems. Section 5 provides our main algorithm. Additional material, including detailed proofs, sampling step constructions, and extended applications, is provided in the full version of the paper.
2 Preliminaries
In this section, we present several standard concepts and notations used throughout this paper.
Graph Notations.
Given an hypergraph we use and to denote the sets of vertices and hyperedges of the graph (respectively).
Vertex Induced Subhypergraphs and Vertex Deletion.
Given a a hypergraph and a subset of vertices , the vertex induced subhypergraph of and is the hypergraph where . We also define the vertex deletion of from by . For a single vertex we use the shorthand .
Hypergraph Properties.
A hypergraph property is a set of hypergraphs such that for every and isomorphic to , it holds that as well. A hypergraph property is called hereditary if for every and it holds that as well. Furthermore, we say that is polynomial-time decidable if given a hypergraph we can decide in polynomial-time whether or not.
In this paper we solely focus on hypergraph properties that are both hereditary and polynomial-time decidable. Although some hypergraph properties do not meet these criteria, Sampling with a Black Box cannot be applied to problems defined by them. For simplicity, we use the term hypergraph property exclusively to refer to properties that are both hereditary and polynomial-time decidable. In other words, whenever we say that is a hypergraph property, we implicitly mean that it satisfies these two conditions.
A closed set of hypergraph.
We say that a set of hypergraphs is closed if every vertex induced subhypergraph of a graph in is also in . That is, for every and it also holds that . A key step in Sampling with a Black Box is removing a vertex from a given hypergraph . The fact that is closed ensures that . In other words, removing a vertex from a hypergraph in results in another hypergraph that also belongs to .
Kullback-Leibler Divergence.
Given two numbers , the Kullback-Leibler divergence of and is defined to be
We follow that standard convention that , which implies
(1) |
3 Our Results
In this section we formally state our results, starting with some formal definitions. The definitions of vertex deletion problems and parameterized approximation algorithms are given in Section 3.1. Section 3.2 provides the definition of sampling steps. Then, we state our main result in Section 3.3. The comparison of our results to those of [19] is finally given in Section 3.4.
3.1 Vertex Deletion Problems
The focus of this paper is the class of problems. For any hypergraph property and a closed set of hypergraphs , the input for ( for short) is a hypergraph . A solution is a subset of vertices such that . We use to denote the set of all solutions. The objective is to find a smallest cardinality solution . In the decision version of the problem, we are given a hypergraph , an integer and we are asked whether there exists a set such that .
The family of problems include many well known problems. Some notable examples are:
-
Vertex Cover. In this case corresponds to graphs, i.e., hypergraphs with edge cardinality exactly 2. The hypergraph property consists of all edgeless graphs.
-
Vertex Cover on graphs with maximal degree . In this case corresponds to graphs of maximal degree or less. The property , again, consists of all edgeless graphs.
-
-Hitting Set. Similar to Vertex Cover, in this case corresponds to hypergraphs with edge cardinality at most . also consists of all edgeless hypergraphs.
-
Feedback Vertex Set. In this case is the set of all graphs and is the set of graphs that have no cycles.
We use to denote the size of an optimal solution for with respect to the problem. That is, . If and are known by context we use OPT instead of .
Our goal is to develop parameterized approximation algorithms for -Vertex Deletion problems, where the parameter is the solution size. Such algorithms return a solution of size or less (with probability at least ) if the optimum of the instance is at most .
Definition 1 (Parameterized Approximation).
Let be a hypergraph property and be a closed set of hypergraphs. An algorithm is a randomized parameterized -approximation algorithm for if it takes a graph and an integer as input, and returns a solution which satisfies the following:
(2) |
Moreover, the running time of is for some function .
We note that the above definition of parameterized approximation algorithms captures the classic definition of exact parameterized algorithms () and polynomial-time approximation algorithms () as special cases. Sampling with a Black Box converts a randomized parameterized -approximation algorithm which runs in time to a randomized parameterized -approximation algorithm that runs in time . The conversion relies on a simple problem dependent sampling step. In all our applications the algorithm is either the state-of-art exact parameterized algorithm (i.e., ), or the state-of-art polynomial-time algorithm (i.e., ) for the problem.
3.2 Sampling Steps
We exploit inherent properties of a specific problem to come up with basic sampling strategies. From a high-level perspective, a sampling step is a polynomial-time algorithm that takes as input a hypergraph and returns a vertex , such that the size of the optimal solution of decreases by , with a prescribed probability.
Definition 2 (Sampling Step).
Let be a closed set of hypergraph, be a hypergraph property and . A sampling step with success probability is a polynomial-time randomized algorithm that takes as input a hypergraph and returns a vertex such that
For example, consider Vertex Cover, which is the problem where is the set of all graphs and consists of all edgeless graphs. The following is a very simple sampling step for Vertex Cover with success probability : pick an arbitrary edge and return each of its endpoints with probability . This algorithm clearly runs in polynomial-time. Moreover, for each Vertex Cover of and for each edge , at least one of the endpoints of belongs to . Therefore, it is a sampling step with success probability for Vertex Cover. We provide sampling steps for the general case where is defined by a finite set of forbidden subgraphs, for Feedback Vertex Set and for Pathwidth One Vertex Deletion.
On their own, sampling steps can be easily used to derive parameterized approximation algorithms. To obtain a -approximation, one may use the sampling step times, where each execution returns a vertex which is removed from the graph and added to the solution . After steps, with some probability , the set of returned vertices is indeed a solution. Thus, by repeating this multiple sampling step for times, one gets a -approximate solution with probability . By carefully tracing the probability in the above argument, we show that , as demonstrated by the following lemma.444Recall stands for the Kullback-Leibler divergence which has been defined in Section 2.
Lemma 3.
Let be a closed set of hypergraphs and be an hypergraph property such that there is a sampling step with success probability for . Then for every there is a randomized parameterized -approximation for which runs in time where .
The proof of Lemma 3 can be found in Section 5. Observe that for every . Thus, Lemma 3 provides a randomized polynomial-time -approximation algorithm for . This justifies the restriction of the lemma to .
While Lemma 3 provides a parameterized -approximation algorithm for essentially any , the resulting algorithms are often far from optimal. For example, for Feedback Vertex Set (FVS) we provide a sampling step with success probability . Thus, by Lemma 3 we get a randomized parameterized -approximation for FVS which runs in time . However, FVS has an exact randomized parameterized algorithm which runs in time . That is, the running time of the approximation algorithm is slower than that of the exact algorithm. Our goal is to combine the sampling step with the exact algorithm to attain improved running time in such cases.
3.3 Sampling with a Black-Box
Our main theorem states the following: a sampling step with success probability , together with a parameterized -approximation algorithm which runs in time , can be used to obtain a -approximation algorithm . By Lemma 3, the sampling step can be used to obtain a randomized parameterized -approximation which runs in time . Our assumption is that is at least as fast as the algorithm provided by Lemma 3, hence we only consider the case in which .
We use the following functions to express the running time of . Define and to be the unique numbers which satisfy
(3) |
We write and if the values of and are clear from the context. The following lemma provides conditions which guarantee that and are well defined in certain domains.
Lemma 4.
For every , and such that , the value of is well-defined. Furthermore, if , then is also well-defined.
The proof of Lemma 4 is included in the full version of the paper. We note that is monotone in the domains and . Hence the values of and can be easily evaluated to arbitrary precision using a simple binary search.
We use and to express the running time of . For every , and such that , we define
(4) |
As we can compute and , it follows we can also compute to arbitrary precision.
Recall that Lemma 3 provides a polynomial-time -approximation algorithm for - Del. Consequently, we restrict our consideration to and values that are less than or equal to . Our main technical result is the following.
Theorem 5 (Sampling with a Black-Box).
Let be a closed set of hypergraphs and be a hypergraph property. Assume the following:
-
There is a sampling step with success probability for .
-
There is a randomized parameterized -approximation algorithm for which runs in time for some , and .
Then, for every , there is a randomized parameterized -approximation for which runs in time .
The proof of Theorem 5 is given in Section 5. For example, by Theorem 5, we can use the sampling step with success probability for FVS, together with the randomized exact parameterized algorithm for the problem which runs in time [28], to get a randomized parameterized -approximation algorithm with running time . The algorithm achieves a better running time than that of the exact parameterized algorithm, as well as the running time which can be attain solely by the sampling step, i.e. (Lemma 3). We note that this running time is also superior to the running time of for the same approximation ratio given in [24].
The running time of the algorithm generated by Theorem 5 (i.e., the value of ) can always be computed efficiently, though this computation requires a binary search for the evaluation of and . For the special cases of and well as ( and ) we provide a closed form expression for .
Theorem 6 (simple formula for ).
For every , and such that it holds that
Theorem 7 (simple formula for and ).
Let and . Then it holds that
Both Theorems 6 and 7 follow from a closed form formula which we can attain for or for the specific values of and considered in the theorems. The proofs of Theorems 6 and 7 are given in the full version of the paper.
3.4 Comparison to Fidelity Preserving Transformations
We compare Sampling with a Black-Box with the technique of [19] for -Vertex Deletion problems in which is defined by a finite set of forbidden vertex induced hypergraphs.
Definition 8.
Let be a finite set of hypergraphs for . Then is the hypergraph property where a hypergraph belongs to if and only if there is no vertex induced subhypergraph of such that is isomorphic to , for some .
We note that is always hereditary and polynomial-time decidable. We also note the the family of graphs properties defined by a finite set of forbidden hypergraph suffices to define many fundamental graph problems such as Vertex Cover, -Hitting Set and -Path Vertex Cover.
For a set of hypergraphs , define , the maximal number of vertices of a hypergraph in . The following result has been (implicitly) given in [19].
Lemma 9 ([19]).
Let be a finite set of hypergraphs and let be a closed set of hypergraphs. Furthermore, assume there is a randomized exact parameterized algorithm for . Then for every there is a randomized parameterized -approximation algorithm for which runs in time
There is a simple and generic way to design a sampling step for . The sampling step finds a set of vertices of the input graph such that is isomorphic for a graph in , and returns a vertex from uniformly at random. This leads to the following lemma.
Lemma 10.
Let be a finite set of hypergraphs and let be a closed set of hypergraphs. There is a sampling step for with success probability .
A formal proof for Lemma 10 is given in the full version of the paper. Together with Theorem 5 the lemma implies the following.
Corollary 11.
Let be a finite set of hypergraphs and be a closed set of hypergraphs. Furthermore, assume there is a randomized exact parameterized algorithms for . Then for every there is a randomized parameterized -approximation algorithm for which runs in time
Observe that Lemma 9 and Corollary 11 only differ in the resulting running time. The following lemma implies that for every the running time of Sampling with a Black Box, as given in Corollary 11, is always strictly better than the running time of [19] as given in Lemma 9.
Lemma 12.
For every such that , and it holds that
The proof of Lemma 12 is given in the full version of the paper.
4 Applications
In this section we will describe some problems to which our results can be applied. For each problem, we utilize a sampling step to obtain a parameterized approximation algorithm. We also compare the running time of our algorithms against a relevant benchmark, when applicable.
4.1 Feedback Vertex Set
Recall that given a graph and integer , the Feedback Vertex Set (FVS) problem asks whether there exists a set of size at most such that is acyclic. FVS can also be described as a problem, where is the set of all graphs and is the set of graphs that have no cycles. First, we demonstrate that there exists a sampling step for FVS.
Lemma 13.
Feedback Vertex Set has a sampling step with success probability .
The proof of Lemma 13, included in the full version of the paper, analyzes a sampling step that begins by removing vertices of degree at most 1. Then, a vertex is sampled from the remaining vertices, where the sampling probability for each vertex is proportional to its degree in the remaining graph. The proof of Lemma 13 relies on ideas from [3], which were also similarly used by [24]. Unlike [3, 24], Lemma 13 avoids the use reduction rules which modify the graph. This technical difference is essential for meeting the formal definition of a sampling step.
In [28], the authors present a randomized parameterized algorithm which runs in time for FVS (i.e., in the terminology of this paper, ). Moreover, FVS also has a 2-approximation algorithm that runs in polynomial-time (i.e., , ) [2]. Using the sampling step together with Theorem 5 we attain the following.
Theorem 14.
For each , Feedback Vertex Set has a randomized parameterized -approximation algorithm which runs in time where
(5) |
The proof of Theorem 14 is provided in the full version of the paper. It leverages the FPT algorithm presented in [28] and the 2-approximation algorithm introduced in [2], alongside Theorems 6 and 7.
In [24], the authors present a -approximation algorithm for each . It can be visually (see Figure 1(a)) and numerically (see Table 1) verified that our algorithms demonstrates a strictly better running-time.
4.2 Pathwidth One Vertex Deletion
Given a graph and integer , the Pathwidth One Vertex Deletion (POVD) problem asks whether there exists a set of size at most such that has pathwidth at most (see [13] for the definition of pathwidth). Initially, we demonstrate that there exists a sampling step for POVD.
Lemma 15.
Pathwidth One Vertex Deletion has a sampling step with probability .
The proof of Lemma 15 can be found in the full version of the paper. The sampling step for POVD is very similar to that for FVS, with a slight modification. This follows from the known property that a graph has pathwidth at most if and only if it is acyclic and does not contain a specific graph of vertices as a vertex induced subgraph. Due to this additional forbidden subgraph, POVD has a sampling step with probability , instead of as in the case of FVS.
To the best of our knowledge, parameterized approximation algorithms have not been studied for POVD. However, there exists an FPT algorithm for POVD with running time () [34]. Next, we demonstrate how combining the aforementioned sampling step with a parameterized algorithm yields a new approximation algorithm. Refer to Figures 2 and 2 for the corresponding running times.
Theorem 16.
For each , Pathwidth One Vertex Deletion has a -approximation algorithm which runs in time where
(6) |
The proof of Theorem 16, included in the full version of the paper, uses the FPT algorithm from [34] together with Theorem 6.
Value | Value | Value | Value | Value | Value | ||||||
1.1 | 3.6412 | 2.1 | 1.9391 | 3.1 | 1.3776 | 4.1 | 1.1573 | 5.1 | 1.0553 | 6.1 | 1.0107 |
1.2 | 3.4100 | 2.2 | 1.8498 | 3.2 | 1.3466 | 4.2 | 1.1433 | 5.2 | 1.0488 | 6.2 | 1.0083 |
1.3 | 3.1936 | 2.3 | 1.7713 | 3.3 | 1.3181 | 4.3 | 1.1303 | 5.3 | 1.0428 | 6.3 | 1.0063 |
1.4 | 2.9908 | 2.4 | 1.7018 | 3.4 | 1.2920 | 4.4 | 1.1183 | 5.4 | 1.0374 | 6.4 | 1.0046 |
1.5 | 2.8010 | 2.5 | 1.6399 | 3.5 | 1.2679 | 4.5 | 1.1071 | 5.5 | 1.0323 | 6.5 | 1.0031 |
1.6 | 2.6232 | 2.6 | 1.5844 | 3.6 | 1.2457 | 4.6 | 1.0968 | 5.6 | 1.0277 | 6.6 | 1.0020 |
1.7 | 2.4567 | 2.7 | 1.5346 | 3.7 | 1.2252 | 4.7 | 1.0871 | 5.7 | 1.0236 | 6.7 | 1.0011 |
1.8 | 2.3007 | 2.8 | 1.4895 | 3.8 | 1.2062 | 4.8 | 1.0782 | 5.8 | 1.0198 | 6.8 | 1.0005 |
1.9 | 2.1604 | 2.9 | 1.4487 | 3.9 | 1.1886 | 4.9 | 1.0700 | 5.9 | 1.0164 | 6.9 | 1.0001 |
2.0 | 2.0417 | 3.0 | 1.4115 | 4.0 | 1.1724 | 5.0 | 1.0624 | 6.0 | 1.0134 |
4.3 -Vertex Deletion for a finite set of forbidden sub-hypergraphs
There are many problems that can be described as -Vertex Deletion problems in which is defined by a finite set of forbidden vertex induced hypergraphs. For each of those problems, by Lemma 10 there exists a sampling step with success probability , where is the maximum number of vertices of a hypergraph in . In the following, we will demonstrate how we can obtain parameterized approximation algorithms for such problems. For the sake of presentation, we will focus on a specific problem called -Path Vertex Cover. We provide additional examples in the full version of the paper.
Given a graph , a subset of vertices is called an if every path of length contains a vertex from . The problem asks whether there exists an of size at most where is the parameter [9]. can be described as a where is the set of graphs and is the set of graphs with maximum path length at most . Alternatively, let be the set of all graphs with vertices such that contains a path on vertices. It holds that is equivalent to . Moreover, by definition of we have that . Therefore, by Lemma 10, there is a sampling step for with success probability .
In the following, we will consider , i.e. the problem -Path Vertex Cover. There exists an FPT algorithm for -Path Vertex Cover which runs in time () [10]. Moreover, there is also a 2-approximation algorithm that runs in polynomial-time () [35].
Theorem 17.
For each , -Path Vertex Cover has a -approximation algorithm which runs in time where
(7) |
The proof of Theorem 17, detailed in the full version of the paper, combines the FPT algorithm from [10] with the polynomial-time 2-approximation algorithm from [35]. Leveraging Theorems 6 and 7, we derive approximation algorithms and select the one with the smaller running time based on the approximation ratio.
Using the technique of [19] (see Lemma 9) one can attain a -approximation algorithm for -Path Vertex Cover with running time , for every . As can be visually (see Figure 1(b)), numerically (see Table 3) or formally (see Lemma 12) verified, our algorithm has a strictly better running time for all values of .
1.1 | 1.2 | 1.3 | 1.4 | 1.5 | 1.6 | 1.7 | 1.8 | 1.9 | |
Our Algorithm (7) | 1.6345 | 1.5641 | 1.4968 | 1.4323 | 1.3707 | 1.3117 | 1.2311 | 1.1487 | 1.0718 |
Fellows et al. [19] | 1.6628 | 1.6189 | 1.5762 | 1.5345 | 1.4940 | 1.4545 | 1.416 | 1.3787 | 1.3423 |
5 Sampling with a Black Box
In this section we present our framework, Sampling with a Black Box, and prove Theorem 5. The technique is designed using three main components, enabling a modular analysis of each part. We use the notion of to abstract the outcome of iteratively executing a sampling step. We use this abstract notion in RandAndExtend which combines the -procedure together with the black box parameterized -approximation algorithm. On its own, RandAndExtend only attains a -approximate solution with a low probability. Our main algorithm, SamplingWithABlackBox, executes RandAndExtend multiple times to get a -approximate solution with a constant probability.
We start with the formal definition of a . The procedure gets a hypergraph and a number as input. The procedure returns a set of size at most such that with probability , the optimum of is smaller than the optimum of by , or reaches zero. The parameters and are used to overcome technicalities in the implementation of the procedure: the guarantees only hold if , and the probability that the optimum decreased is .
Definition 18.
Let be a hypergraph property and be a closed set of hypergraphs. For every , , and , a for is a polynomial-time randomized algorithm that takes as input a hypergraph , an integer and returns a set with the following properties:
-
P1
It holds that .
-
P2
Suppose that for some . If , then with probability at least it holds that has a solution of size at most , i.e.
Additionally, we use the notation to refer to a for some constants .
Observe that if there is a for , then we can make use of it to obtain a -approximation as follows. Suppose has a solution of size . Then, by setting in Item 2, it holds that with probability at least , has a solution of size , i.e. . By our assumption (that is polynomial-time decidable), we can check in polynomial-time whether a graph belongs to the property . By Item 1 it holds that . Additionally, we can repeat this algorithm times to obtain a -approximate solution constant probability. We summarize these insights in the following observation.
Observation 19.
If there is a for , then there is randomized parameterized -approximation algorithm for with running time .
In the remainder of Section 5, we fix the values of , , and to specific numbers such that , unless specified explicitly. For notational simplicity, we omit , , and from the subscript of functions dependent on these variables. Moreover, let be a fixed polynomial-time decidable hypergraph property, be a closed set of hypergraphs and be an randomized parameterized -approximation algorithm for the problem with running time .
Sampling with a Black Box combines the -approximation algorithm with a -procedure to obtain a -approximation. By Observation 19, the -procedure can be interpreted as a -approximation algorithm. Intuitively, this implies that, for the combination to work, should lie between and . We define as the set of values that can take based under this logic.
Definition 20.
For such that , we define the set as
The next component in our technique is RandAndExtend, given in Algorithm 1. The algorithm is configured with a . Given an hypergraph and an integer in the input, the algorithm invokes the procedure which returns a random set of size at most , and then runs the randomized parameterized -approximation algorithm on the remaining hypergraph . The idea is to hope that has a solution of size at most . Note that the parameter for the -approximation algorithm is also , which ensures that the approximation algorithm returns a set of size at most , with high probability. In the event that this holds, by adding to the returned set, we obtain a solution with a size of at most .
Our main algorithm, given in Algorithm 2, begins by selecting a value for . This value ensures the following: if the set in Algorithm 1 contains at least many elements from an optimal solution of size , then has a solution of size at most . Furthermore, the size of the set returned by Algorithm 1 is at most if the above event occurs. Finally, Algorithm 2 utilizes Algorithm 1 and executes it multiple times to ensure a -approximate solution is attained with a constant probability.
Lemma 21.
Let , and a for . Then Algorithm 2 is a randomized parameterized -approximation algorithm for with running time
where is given by
The proof of Lemma 21, included in the full version of the paper, proceeds as follows: for each set , we demonstrate that with non-negligible probability, is of size at most . From this, it follows that the set returned by Algorithm 2 is, with high probability, of size at most . Lastly, the running time of the algorithm is computed through detailed calculations, resulting in an expression of . completing the proof.
Algorithm 2 relies on the existence of a , however, insofar we did not show how to design one. We generate a from a sampling step (Definition 2) via a simple algorithm which iteratively invokes the sampling step. The pseudo-code of the algorithm is given in Algorithm 3.
Lemma 22.
Let and be a sampling step for with success probability . Then, for any , Algorithm 3 is a for .
The proof of Lemma 22, provided in the full version of the paper, shows that Algorithm 3 satisfies the properties of a . It is structured in three steps: first, the algorithm is proven to run in polynomial-time by using the polynomial-time decidability of . Second, Item 1 is shown to hold by observing that the while loop in Algorithm 3 can execute at most times. Finally, Item 2 is shown by deriving a bound on the probability of success using auxiliary results about the behavior of dependent random variables and hereditary properties of hypergraphs. Together, these steps show that the algorithm meets all necessary conditions.
Lemma 22 implies that for , there exists a for . Observe that this serves as a for . Therefore, we make the following observation.
Observation 23.
Let and be a sampling step for with success probability . Then, for any , there is a for .
Furthermore, we can now prove Lemma 3 using Lemma 22 together with Observation 19.
Proof of Lemma 3.
Assume there is a sampling step with success probability for , and let . Then by Lemma 22 there is a for . Hence, by Observation 19 there is a parameterized -approximation for which runs in time where
Using the procedure from Lemma 22 together with Lemma 21 (Algorithm 2) we get the following results.
Lemma 24.
Suppose that:
-
There is a sampling step with success probability for .
-
There is a randomized parameterized -approximation algorithm for which runs in time .
Then, there is a randomized parameterized -approximation algorithm for with running time
where is defined as
Proof.
For each such that , by Lemma 22 there is a for . Therefore, by Lemma 21, there is a randomized parameterized -approximation algorithm for with running time
In particular, one can consider all possible and choose the that minimizes the running time. Therefore, there is a randomized parameterized -approximation algorithm for which runs in time
Lemma 24 provides a -approximation algorithms whose running time is a solution for an optimization problem. The final step towards the proof of Theorem 5 is to upper bound the value of the optimization problem.
Lemma 25.
It holds that
The proof of Lemma 25, which can be found in the full version of the paper, simply selects a value for . We note the selected value is in fact optimal, that is
However, we do not formally show the above equality. With all necessary components in place, we are now ready to proceed with the proof of Theorem 5.
Proof of Theorem 5.
References
- [1] Fateme Abbasi, Sandip Banerjee, Jarosław Byrka, Parinya Chalermsook, Ameet Gadekar, Kamyar Khodamoradi, Dániel Marx, Roohani Sharma, and Joachim Spoerhase. Parameterized approximation schemes for clustering with general norm objectives. In 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), pages 1377–1399. IEEE, 2023. doi:10.1109/FOCS57990.2023.00085.
- [2] Vineet Bafna, Piotr Berman, and Toshihiro Fujito. A 2-Approximation Algorithm for the Undirected Feedback Vertex Set Problem. SIAM Journal on Discrete Mathematics, 12(3):289–297, January 1999. doi:10.1137/S0895480196305124.
- [3] Ann Becker, Reuven Bar-Yehuda, and Dan Geiger. Randomized algorithms for the loop cutset problem. Journal of Artificial Intelligence Research, 12(1):219–234, May 2000. doi:10.1613/JAIR.638.
- [4] Rémy Belmonte, Michael Lampis, and Valia Mitsou. Parameterized (approximate) defective coloring. SIAM Journal on Discrete Mathematics, 34(2):1084–1106, 2020. doi:10.1137/18M1223666.
- [5] Arnab Bhattacharyya, Édouard Bonnet, László Egri, Suprovat Ghoshal, Karthik C. S., Bingkai Lin, Pasin Manurangsi, and Dániel Marx. Parameterized intractability of even set and shortest vector problem. J. ACM, 68(3), March 2021. doi:10.1145/3444942.
- [6] Nicolas Bourgeois, Bruno Escoffier, and Vangelis Th Paschos. Approximation of max independent set, min vertex cover and related problems by moderately exponential algorithms. Discrete Applied Mathematics, 159(17):1954–1970, 2011. doi:10.1016/J.DAM.2011.07.009.
- [7] Ljiljana Brankovic and Henning Fernau. Parameterized Approximation Algorithms for Hitting Set. In Roberto Solis-Oba and Giuseppe Persiano, editors, Approximation and Online Algorithms, pages 63–76, Berlin, Heidelberg, 2012. Springer. doi:10.1007/978-3-642-29116-6_6.
- [8] Ljiljana Brankovic and Henning Fernau. A novel parameterised approximation algorithm for minimum vertex cover. Theoretical Computer Science, 511:85–108, 2013. doi:10.1016/J.TCS.2012.12.003.
- [9] Boštjan Brešar, František Kardoš, Ján Katrenič, and Gabriel Semanišin. Minimum k-path vertex cover. Discrete Applied Mathematics, 159(12):1189–1195, July 2011. doi:10.1016/j.dam.2011.04.008.
- [10] Radovan Červený and Ondřej Suchý. Generating Faster Algorithms for d-Path Vertex Cover. In Daniël Paulusma and Bernard Ries, editors, Graph-Theoretic Concepts in Computer Science, pages 157–171, Cham, 2023. Springer Nature Switzerland. doi:10.1007/978-3-031-43380-1_12.
- [11] Parinya Chalermsook, Marek Cygan, Guy Kortsarz, Bundit Laekhanukit, Pasin Manurangsi, Danupon Nanongkai, and Luca Trevisan. From gap-exponential time hypothesis to fixed parameter tractable inapproximability: Clique, dominating set, and more. SIAM Journal on Computing, 49(4):772–810, 2020. doi:10.1137/18M1166869.
- [12] Yijia Chen, Yi Feng, Bundit Laekhanukit, and Yanlin Liu. Simple combinatorial construction of the -lower bound for approximating the parameterized -clique. arXiv preprint arXiv:2304.07516, 2023. doi:10.48550/arXiv.2304.07516.
- [13] Marek Cygan, Fedor V. Fomin, Łukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer International Publishing, Cham, 2015. doi:10.1007/978-3-319-21275-3.
- [14] Ilan Doron-Arad, Ariel Kulik, and Hadas Shachnai. Budgeted Matroid Maximization: a Parameterized Viewpoint. In Proc. IPEC 2023, pages 13:1–13:17, 2023. doi:10.4230/LIPICS.IPEC.2023.13.
- [15] Pavel Dvorák, Andreas Emil Feldmann, Dusan Knop, Tomás Masarík, Tomas Toufar, and Pavel Veselỳ. Parameterized approximation schemes for steiner trees with small number of steiner vertices. In Proc. STACS, 2018.
- [16] Barış Can Esmer, Ariel Kulik, Dániel Marx, Daniel Neuen, and Roohani Sharma. Faster Exponential-Time Approximation Algorithms Using Approximate Monotone Local Search. In Shiri Chechik, Gonzalo Navarro, Eva Rotenberg, and Grzegorz Herman, editors, Proc. ESA, 2022. doi:10.4230/LIPIcs.ESA.2022.50.
- [17] Barış Can Esmer, Ariel Kulik, Dániel Marx, Daniel Neuen, and Roohani Sharma. Approximate monotone local search for weighted problems. In Neeldhara Misra and Magnus Wahlström, editors, 18th International Symposium on Parameterized and Exact Computation (IPEC 2023), volume 285 of Leibniz International Proceedings in Informatics (Lipics), pages 17:1–17:23, Dagstuhl, Germany, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.IPEC.2023.17.
- [18] Can Barış Esmer, Ariel Kulik, Dániel Marx, Daniel Neuen, and Roohani Sharma. Optimally Repurposing Existing Algorithms to Obtain Exponential-Time Approximations. In Proceedings of the 2024 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), Proceedings, pages 314–345. Society for Industrial and Applied Mathematics, January 2024. doi:10.1137/1.9781611977912.13.
- [19] Michael R Fellows, Ariel Kulik, Frances Rosamond, and Hadas Shachnai. Parameterized approximation via fidelity preserving transformations. Journal of Computer and System Sciences, 93:30–40, 2018. doi:10.1016/J.JCSS.2017.11.001.
- [20] Fedor V Fomin, Serge Gaspers, Daniel Lokshtanov, and Saket Saurabh. Exact algorithms via monotone local search. Journal of the ACM (JACM), 66(2):1–23, 2019. doi:10.1145/3284176.
- [21] Fabrizio Grandoni, Stefan Kratsch, and Andreas Wiese. Parameterized Approximation Schemes for Independent Set of Rectangles and Geometric Knapsack. In Proc. ESA, 2019.
- [22] Venkatesan Guruswami, Bingkai Lin, Xuandi Ren, Yican Sun, and Kewen Wu. Parameterized inapproximability hypothesis under ETH. In Proc. STOC (to appear), 2024.
- [23] Tanmay Inamdar, Daniel Lokshtanov, Saket Saurabh, and Vaishali Surianarayanan. Parameterized Complexity of Fair Bisection: (FPT-Approximation meets Unbreakability). In Proc. ESA, 2023.
- [24] Satyabrata Jana, Daniel Lokshtanov, Soumen Mandal, Ashutosh Rai, and Saket Saurabh. Parameterized Approximation Scheme for Feedback Vertex Set. In Jérôme Leroux, Sylvain Lombardy, and David Peleg, editors, 48th International Symposium on Mathematical Foundations of Computer Science (MFCS 2023), volume 272 of Leibniz International Proceedings in Informatics (LIPIcs), pages 56:1–56:15, Dagstuhl, Germany, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.MFCS.2023.56.
- [25] CS Karthik and Subhash Khot. Almost polynomial factor inapproximability for parameterized k-clique. In 37th Computational Complexity Conference (CCC 2022). Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2022.
- [26] Ariel Kulik and Hadas Shachnai. Analysis of two-variable recurrence relations with application to parameterized approximations. In Proc. FOCS, pages 762–773, 2020. doi:10.1109/FOCS46700.2020.00076.
- [27] Michael Lampis. Parameterized approximation schemes using graph widths. In International Colloquium on Automata, Languages, and Programming, pages 775–786. Springer, 2014. doi:10.1007/978-3-662-43948-7_64.
- [28] Jason Li and Jesper Nederlof. Detecting Feedback Vertex Sets of Size k in O (2.7k) Time. ACM Transactions on Algorithms, 18(4):34:1–34:26, October 2022. doi:10.1145/3504027.
- [29] Bingkai Lin, Xuandi Ren, Yican Sun, and Xiuhan Wang. Constant approximating parameterized k-setcover is W[2]-hard. In Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 3305–3316. SIAM, 2023. doi:10.1137/1.9781611977554.CH126.
- [30] Bingkai Lin, Xuandi Ren, Yican Sun, and Xiuhan Wang. Improved hardness of approximating k-clique under eth. In 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), 2023.
- [31] Daniel Lokshtanov, Saket Saurabh, and Vaishali Surianarayanan. A parameterized approximation scheme for min k-cut. SIAM Journal on Computing, 2022.
- [32] Pasin Manurangsi. A Note on Max k-Vertex Cover: Faster FPT-AS, Smaller Approximate Kernel and Improved Approximation. In Proc. SOSA, 2019.
- [33] Pasin Manurangsi. Tight running time lower bounds for strong inapproximability of maximum k-coverage, unique set cover and related problems (via t-wise agreement testing theorem). In Proc. SODA, pages 62–81. SIAM, 2020. doi:10.1137/1.9781611975994.5.
- [34] Dekel Tsur. Faster algorithm for pathwidth one vertex deletion. Theoretical Computer Science, 921:63–74, June 2022. doi:10.1016/j.tcs.2022.04.001.
- [35] Jianhua Tu and Wenli Zhou. A factor 2 approximation algorithm for the vertex cover problem. Information Processing Letters, 111(14):683–686, July 2011. doi:10.1016/j.ipl.2011.04.009.
- [36] Michał Włodarczyk. Parameterized inapproximability for steiner orientation by gap amplification. In Proc. ICALP, 2020.