Abstract 1 Introduction 2 Overview of Our Proofs 3 Conclusion References

(Almost-)Optimal FPT Algorithm and Kernel for T-CYCLE on Planar Graphs

Harmender Gahlawat ORCID Université Clermont Auvergne, CNRS, Clermont Auvergne INP, Mines Saint-Étienne, LIMOS, 63000 Clermont-Ferrand, France
G-SCOP, Grenoble-INP, Grenoble, France
Abhishek Rathod ORCID Ben-Gurion University of the Negev, Beersheba, Israel Meirav Zehavi ORCID Ben-Gurion University of the Negev, Beersheba, Israel
Abstract

Research of cycles through specific vertices is a central topic in graph theory. In this context, we focus on a well-studied computational problem, T-Cycle: given an undirected n-vertex graph G and a set of k vertices T⊆V⁢(G) termed terminals, the objective is to determine whether G contains a simple cycle C through all the terminals. Our contribution is twofold: (i) We provide a 2O⁢(k⁢log⁡k)⋅n-time fixed-parameter deterministic algorithm for T-Cycle on planar graphs; (ii) We provide a kO⁢(1)⋅n-time deterministic kernelization algorithm for T-Cycle on planar graphs where the produced instance is of size k⁢logO⁢(1)⁡k.

Both of our algorithms are optimal in terms of both k and n up to (poly)logarithmic factors in k under the ETH. In fact, our algorithms are the first subexponential-time fixed-parameter algorithm for T-Cycle on planar graphs, as well as the first polynomial kernel for T-Cycle on planar graphs. This substantially improves upon/expands the known literature on the parameterized complexity of the problem.

Keywords and phrases:
FPT Algorithms, Kernelization, T-Cycle, Subexponential Algorithmms
Category:
Track A: Algorithms, Complexity and Games
Copyright and License:
[Uncaptioned image] © Harmender Gahlawat, Abhishek Rathod, and Meirav Zehavi; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation → Parameterized complexity and exact algorithms
; Mathematics of computing → Graph algorithms
Related Version:
Full Version: https://arxiv.org/abs/2504.19301 [19]
Funding:
This research was supported by the European Research Council (ERC) grant titled PARAPATH (101039913) and by the ISF grant with number ISF-1470/24 and the IDEX-ISITE initiative CAP 20-25 (ANR-16-IDEX-0001), the International Research Center “Innovation Transportation and Production Systems” of the I-SITE CAP 20-25, and the ANR project GRALMECO (ANR-21-CE48-0004).
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, JoĂŤl Ouaknine, and Gabriele Puppis

1 Introduction

Combinatorial properties of (simple) cycles passing through a specific set of vertices (along with, possibly, other vertices) in a graph – and, in particular, combinatorial properties of the graphs containing them – have been intensively explored for over six decades. As observed by Björklund et al. [5], the public interest in this topic can even be dated back to 1898, when Lewis Carroll challenged the readers of Vanity Fair with a riddle linked to this problem. However, the flurry of scientific results on this topic has, roughly, begun with Dirac’s result [13] from 1960, stating that given k vertices in a k-connected (undirected) graph G, G has a cycle through all of them. For a few illustrative examples of works in Graph Theory that followed up on this result, we refer to [8, 21, 23, 40, 15, 35, 36, 20, 22]. Indeed, as stated by Kawarabayashi [24]: “Since 1960’s, cycles through a vertex set or an edge set are one of central topics in all of graph theory.”

Computationally, given an undirected n-vertex graph G and a set of k vertices T⊆V⁢(G) referred to as terminals (for any k∈{1,2,…,n}), the objective of the T-Cycle problem is to determine whether G contains a (simple) cycle C that passes through all (but not necessarily only) the terminals. Henceforth, such a cycle is referred to as a T-loop. Due to the immediate relation between the T-Cycle and Disjoint Paths problems (formalized later in this introduction), the T-Cycle problem has been long known (since the seminal work of Robertson and Seymour [34]) to be fixed-parameter tractable, that is, solvable in time f⁢(k)⋅nc for some computable function f of k and some fixed constant c. However, here, the best known f is galactic, satisfying f⁢(k)≥22222k, and c=2 [25]. Still, already in 1980, LaPaugh and Rivest [29] provided a linear time algorithm for T-Cycle when k=3, which involved no large hidden constants.

The first breakthrough for the general case – having k as part of the input – was established in 2008 by Kawarabayashi [24], who proved that:111Kawarabayashi [24] states that when k is a fixed constant, the dependency on n in the runtimes of his algorithms can be made linear, but no details of a proof to support this statement are given.

  • ■

    The T-Cycle problem is solvable in time 22O⁢(k10)⋅n2. We remark that using the developments in [10] on the Grid-Minor Theorem that were first published shortly after the work of Kawarabayashi, it can be easily seen that his algorithm can be made to run in time 2O⁢(kc)⋅n2 for some large constant c.

  • ■

    Restricted to planar graphs, the T- Cycle problem is solvable in time 2O⁢(k⁢log4⁡k)⋅n2.

We note that all algorithms mentioned so far are deterministic. In 2010, by making novel use of the idea behind the breakthrough technique of algebraic fingerprints [3, 4], Björklund et al. [5] developed a randomized algorithm for T-Cycle that runs in time O⁢(2k⋅n), which, prior to this manuscript, has remained the fastest known algorithm for this problem even if restricted to planar graphs. We note that however, prior to this manuscript, both of Kawarabayashi’s algorithms have remained the best-known deterministic ones for the problem even if restricted to planar graphs.

With the above context in mind, the first of the two main contributions of our manuscript can be summarized in the following theorem. Specifically, we present the first subexponential-time fixed-parameter algorithm for the T-Cycle problem on planar graphs.

Theorem 1.

Restricted to planar graphs, the T-Cycle problem is solvable in time 2O⁢(k⁢log⁡k)⋅n.

Notably, under the Exponential Time Hypothesis (ETH), the time complexity in Theorem 1 is tight up to the logarithmic factor in the exponent, and, on general graphs, no sub-exponential-time (fixed-parameter or not) algorithm exists for T-Cycle. This can be seen from the fact that Hamiltonicity is the special case of T-Cycle when T is the entire vertex set of the graph, and Hamiltonicity is not solvable in times 2o⁢(n) and 2o⁢(n) on planar and general graphs, respectively, under the ETH [12].

The existence of a subexponential-time fixed-parameter algorithm for the T-Cycle problem on planar graphs might seem surprising when considered in the context of two other well-known “terminals-based” problems on planar graphs: Specifically, under the ETH, the Steiner Tree problem on planar graphs is not solvable in time 2o⁢(k)⋅nO⁢(1) [32], and the Disjoint Paths problem was only recently shown to be solvable in time 2kO⁢(1)⋅n [11], where, in both cases, k denotes the number of terminals.

Following-up on the work of Björklund et al. [5], Wahlström [38] studied the compressability of T-Cycle. To discuss Wahlström’s contribution, let us first present the definitions of compression and kernelization. Formally, we say that a (decision) parameterized problem Π admits a compression into a (decision, not necessarily parameterized) problem Π′ if there exists a polynomial-time algorithm (called a compression algorithm) that, given an instance (I,k) of Π, produces an equivalent instance J of Π′ such that |J|≤f⁢(k) for some computable function f of k. When f is polynomial, then the compression is said to be polynomial-sized (or, for short, polynomial), and when Π′=Π, then the compression is termed kernelization. Kernelization is, perhaps, the most well-studied research subarea of Parameterized Complexity after that of fixed-parameter tractability [17]. In fact, kernelization was termed “the lost continent of polynomial time” [16] by one of the two fathers of the field of parameterized complexity. Indeed, kernelization is, essentially, the only mathematical framework to rigorously reason about the effectiveness of preprocessing procedures, which are ubiquitous in computer science in general. Here, the focus is on polynomial-sized kernels (and compressions), since the existence of a (not necessarily polynomial) kernel for a problem is equivalent to that problem being fixed-parameter tractable [9], while, on the other hand, there exist numerous problems known to be fixed-parameter tractable but which do not admit a polynomial kernel unless the polynomial hierarchy collapses [17] (with the first examples having been discovered already in 2008 [6]).

Wahlström [38] proved that T-Cycle admits a compression of size O⁢(k3). The target problem is a somewhat artificial algebraic problem, which, in particular, is not known to be in NP, and hence this compression does not imply the existence of a polynomial-sized kernelization. Over the years, Wahlström’s result on the compressability of T-Cycle has become an extremely intriguing finding in the field of Parameterized Complexity: Since its discovery and until this day, T-Cycle remains the only natural problem known to admit a polynomial-sized compression but not known to admit a polynomial-sized kernelization! In fact, the resolution of the kernelization complexity of T-Cycle (on general graphs) is one of the biggest problems in the field. We remark that the ideas behind this compression also yield an alternative O⁢(2k⋅n)-time algorithm for T-Cycle (in [38]), which is, similarly to Björklund et al. [5]’s algorithm, also randomized and based on algebraic arguments.

With the above context in mind, the second of the two main contributions of our manuscript can be summarized in the following theorem.

Theorem 2.

Restricted to planar graphs, the T- Cycle problem admits a kO⁢(1)⋅n-time kernelization algorithm of size k⋅logO⁢(1)⁡k.

Again, the bounds in the theorem are almost tight in terms of both time complexity and, more importantly, the size of the reduced instance. First, we cannot expect a time complexity of o⁢(n) as we need to, at least, read the input. (We note that the kO⁢(1) factor is essentially negligible because the time complexity of an exact algorithm to solve this problem afterwards will, anyway, have at least a 2Ω⁢(k) factor under the ETH as argued earlier). Second, we cannot expect the reduced instance to be of size o⁢(k) (or even of size k−1), else we can repeatedly reapply the kernelization algorithm until it will yield a constant-sized instance that is solvable in constant time, thereby solving the (NP-hard) problem in polynomial time.

As a side note, we remark that our proof might shed light on the kernelization complexity of T-Cycle on general graphs as well: We believe that the scheme that we employ – on a high-level, the usage of a polynomial-time treewidth reduction to a polynomial function of k coupled with a polynomial kernel for the combined parameter k plus treewidth, and on a lower level, the specific arguments used in our proofs to implement both procedures – might be liftable to general graphs.

Combining Theorems 1 and 2, we conclude the following corollary, which is, up to a logarithmic factor in the exponent, essentially the best one can hope for.

Corollary 3.

Restricted to planar graphs, the T-Cycle problem is solvable in time 2O⁢(k⁢log⁡k)+kO⁢(1)⋅n.

1.1 Related Problems

We first note that when the T-Cycle problem is extended to directed graphs, it becomes NP-hard already when k=2 [18]. Various other extensions/generalizations of T-Cycle were studied in the literature, including from the perspective of parameterized complexity. For example, Kawarabayashi et al. [26] developed an algorithm for detecting a T-loop whose length has a given parity; for fixed k, the running time is polynomial in n, but the dependency on k is unspecified. For another example, Kobayashi and Kawarabayashi [27] developed an algorithm for detecting an induced T-loop in a planar graph in time 2O⁢(k3/2⁢log⁥k)⁢n2. The survey of additional results of this nature is beyond the scope of this paper.

Highly relevant to the T-Cycle problem is the Disjoint Paths problem. Here, given a graph G and a set T={(si,ti):i∈{1,2,…,k}} of pairs of vertices (termed terminals) in G, the objective is to determine whether G contains k vertex-disjoint222With the exception that a vertex can occur in multiple paths if it is an endpoint in all of them. paths P1,P2,…,Pk so that the endpoints of Pi are si and ti. The T-Cycle problem can be reduced to the Disjoint Paths problem with an overhead of k!=kO⁢(k): Given an instance (G,T) of T-Cycle, for every ordering v0,v1,…,vk−1 of T, create an instance (G,T′) of Disjoint Paths where T′={(vi,v(i+1)modk):i∈{0,1,…,k−1}}; then, (G,T) is a yes-instance of T-Cycle if and only if at least one of the constructed instances of Disjoint Paths is. Being foundational to the entire graph minor theory [30], the Disjoint Paths problem is of great importance to both algorithm design and graph theory, and has been intensively studied for several decades. Most relevant to this manuscript is to mention that, currently, the fastest algorithms for Disjoint Paths run in f⁢(k)⋅n2 time for f⁢(k)>22222k on general graphs [25], and in 2kO⁢(1)⋅n time on planar graphs [11]. It is worth mentioning that Korhonen, Pilipczuk, and Stamoulis [28] recently provided an FPT algorithm for Disjoint Paths with almost-linear running time dependence on the number of vertices and edges, i.e., with running time f⁢(k)⋅(m+n)1+o⁢(1). Also, the Disjoint Paths problem does not admit a polynomial kernel w.r.t. k even on planar graphs [39], but it admits a polynomial kernel w.r.t. k plus the treewidth of the input graph on planar graphs [39] (on general graphs, it is unknown whether Disjoint Paths admits a polynomial kernel w.r.t. k plus treewidth).

Also quite relevant to the T-Cycle problem is the k-Cycle (or k-Path) problem, which is also, perhaps, the second or third most well-studied problem in Parameterized Complexity (see, e.g., the dozens of papers cited in [31]). Here, given a graph G and a nonnegative integer k, the objective is to determine whether G contains a simple cycle (or path) on k vertices. The techniques used to solve k-Cycle can be trivially lifted to solve T-Cycle when parameterized by the sought size of a solution ℓ (given as an extra parameter in the input), which can be arbitrarily larger than T (e.g., in the extreme case where the entire graph is a single cycle, ℓ=n while k=1). In particular, this means that, on general graphs, T-Cycle is solvable in time O⁢(2k⁢1.66ℓ−k⋅(n+m)) by a randomized algorithm [4] (or time O⁢(2.56k⁢1.66ℓ−k⋅(n+m)) by a deterministic algorithm [37]), and on planar graphs, T-Cycle is solvable in time 2O⁢(ℓ)⋅(n+m) by a deterministic algorithm (e.g., via [14]).

1.2 Techniques

We present a high-level overview of our proofs in the next section. Here, we only briefly highlight (in a very informal manner) the novelties in our proofs, and put them in the context of the known literature. Essentially, the following theorem reveals some of the core combinatorial arguments that underlie our algorithmic results. Thus, we believe that this result may be of independent interest.

Theorem 4.

There exists a kO⁢(1)⋅n-time algorithm that, given an instance (G,T) of T-Cycle on planar graphs, outputs an equivalent instance (G′,T) of T-Cycle on planar graphs along with a set of vertices U such that:

  1. 1.

    G′ is a subgraph of G whose treewidth is bounded by O⁢(k⁢log⁡k), and

  2. 2.

    |U|∈O⁢(k⁢log⁡k) and the treewidth of G′−U is bounded by O⁢(log⁡k).

Indeed, from here, Theorem 1 directly follows by using a 2O⁢(t⁢w)⋅n-time algorithm for T-Cycle parameterized by the treewidth t⁢w of the planar graph G′ as a black box (e.g., via [14]), while Theorem 2 requires additional non-trivial work, described later in this section.

Our proof of Theorem 4 consists of three main ingredients. Towards the first ingredient, we consider a sequence of concentric cycles, and classify the “segments” of an (unknown) solution T-loop that go inside this sequence into types, similarly to how it is done in [2] for the Disjoint Paths problem. Here, a cheap solution is one that uses as few edges as possible that do not belong to the sequence of concentric cycles. Then, we prove the following result, which is the first ingredient.

Lemma 5 (Informal Statement of Lemma 8).

For a “cheap” solution T-loop and a sequence of concentric cycles that does not contain any terminal, there can be at most constantly many segments of the same type.

We note that in [2], it is proved that the number of segments of the same type for a Disjoint Paths solution is 2O⁢(k). Our proof of Lemma 5 is based on an elegant (and novel) re-routing argument (see Section 2), which has no relation to that in [2]. This argument is, in particular, perhaps the cornerstone of the proof of Theorem 4.

With Lemma 5 at hand, we then turn to prove our second ingredient.

Lemma 6 (Informal Statement of Lemma 9).

For a “cheap” solution T-loop and a sequence of concentric cycles that does not contain any terminal, no segment goes more than O⁢(log⁡k) cycles deep into the sequence.

We note that in [2], it is proved that no segment (for a Disjoint Paths solution) goes more than 2O⁢(k) cycles deep into the sequence. For the proof of our lemma, we make use of one intermediate result from [2] about Disjoint Paths solutions, which states that there can be O⁢(k) segments of different types. However, besides that, the proof of our lemma is different, based on a simple analysis of the “segment-tree” induced by the segments (see Section 2). We note that rerouting arguments have been used for other terminal-based routing problems [27]. But, in our knowledge, our rerouting arguments are first to achieve a sublinear bound on the number of concentric cycles used by a cheap solution. Further, we believe that another strength of our result is that the arguments used to prove Lemma 6 are rather simple, and therefore easy to reuse in future works.

In particular, Lemma 6 implies that within a c⁢log⁡k-sized (for some constant c) sequence of concentric cycles that does not contain any terminal, every vertex that lies inside the innermost cycles is irrelevant, that is, can be deleted without turning a yes-instance into a no-instance. In particular, this implies that within a c⁢log⁡k×c⁢log⁡k-grid minor that does not contain any terminal, the “middle-most” vertex is irrelevant. Here, it is important to mention that the main component in the proof of Kawarabayashi [24] is a lemma that (essentially) states that within a c⁢k×c⁢k-grid minor that does not contain any terminal, the “middle-most” vertex is irrelevant. Our proof (that is, the arguments briefly described so far) is completely different, and, in particular, yields an exponential improvement (from c⁢k to c⁢log⁡k).

From here, it is easy to provide a kO⁢(1)⋅n2-time algorithm that given an instance (G,T) of T-Cycle on planar graphs, outputs an equivalent instance (G′,T) of T-Cycle on planar graphs such that G′ is a subgraph of G whose treewidth is bounded by O⁢(k⁢log⁡k). Indeed, this can be done by, as long as possible, computing a c⁢log⁡k×c⁢log⁡k grid minor that does not contain any terminal, and removing its “middle-most” vertex, where each iteration requires time kO⁢(1)⋅n, and where O⁢(n) iterations are performed in total.

To reduce the time complexity to be linear in n, we make use of Reed’s [33] approach of dividing the plane and working on each “piece” simultaneously, together with an argument by Cho et al. [11] that further simplifies the pieces such that none of the piece contains a sequence of “too many” concentric cycles. Here, the proof is mostly based on a similar approach described in the aforementioned two papers with minor adaptations. However, we need to add one novel and critical step. Briefly, by applying the known approach (with the minor adaptations to our case) we directly obtain pieces such that: (i) the total number of vertices on their boundaries is O⁢(k⁢log⁡k); (ii) no piece contains a sequence of more than c⁢log⁡k many concentric cycles. This already yields a set of vertices U such that |U|∈O⁢(k⁢log⁡k) and the treewidth of G′−U (where G′ is the current graph) is bounded by O⁢(log⁡k), by taking the union of boundaries (that is what we need for the second item in Theorem 4). However, from this, the aforementioned two papers (i.e., [33] and [11]) directly get their tree decomposition of G′ by (implicitly) creating a tree decomposition for each piece, gluing them together, and putting the vertices of U in all bags. For these two previous papers, this was sufficient – they get pieces of treewidth 2O⁢(k) and U of size 2O⁢(k), and thus by doing this, they do not lose anything. However, for us, this yields a tree decomposition of width O⁢(k⁢log⁡k), while we need width O⁢(k⁢log⁡k). We overcome this by adding a new step, where we attempt to remove (possibly many) boundary vertices, and after performing this step, we are able to directly argue that the graph G′ itself (rather than just each one of its pieces individually) does not have a sequence of more than c⁢log⁡k many concentric cycles that do not contain any terminal (see Section 2). Thus, we get the bound O⁢(k⁢log⁡k).

Lastly, having Theorem 4 at hand, let us address the additional work we need to perform in order to prove Theorem 2. Here, we use two powerful theorems/machineries:

  • ■

    Machinery I [7] (see also [17]): Suppose we are given a set of vertices U with |U|∈O⁢(k⁢log⁡k) so that the treewidth of G′−U is bounded by O⁢(log⁡k). Then, one can construct in kO⁢(1)⋅n-time a so-called protrusion decomposition of G′ with “very good parameters”. That is, roughly speaking, the vertex set of G′ can be partitioned into a “universal” part U⋆⊇U of size O⁢(k⁢log2⁡k) and O⁢(k⁢log2⁡k) additional “protrusion” parts such that each protrusion part induces a graph of treewidth O⁢(log⁡k), has O⁢(log⁡k) many vertices that have neighbors in U⋆, while having no neighbors in the other protrusions.

  • ■

    Machinery II [39]: A generalization of the Disjoint Paths problem on planar graphs, where, roughly speaking, we need to preserve the yes/no answer for every possible pairing of the terminals vertices, admits a kernel of size O⁢((k′⋅w′)12) where k′ is the number of terminals and w′ is the treewidth of the graph, and the output graph is a minor of the input graph.

Thus, we can compute the protrusion decomposition using the set obtained from Theorem 1 (which, in particular, contains all terminals), and then kernelize each of the protrusions individually using Machinery II, where the terminal set is defined as those vertices having neighbors outside the protrusion. However, this will not yield a time complexity of kO⁢(1)⋅n since Machinery II only specifies a polynomial (rather than linear) dependency on n, and, furthermore, this will yield a huge polylogarithmic dependency on k in the size of the reduced instance.

To overcome this, we employ two novel twists in this approach. First, we create a “nested” protrusion decomposition, or, alternatively, one can think about this as “bootstrapping” the entire proof for each protrusion. In more details, for each protrusion P, we yet again apply all the arguments in our proofs so far to now find a set of vertices UP with |UP|∈O⁢(log⁡k⁢log⁡log⁡k) so that the treewidth of P−UP is bounded by O⁢(log⁡log⁡k). Then, for each protrusion, we yet again compute a protrusion decomposition, but now with each “subprotrusion” having only O⁢(log⁡log⁡k) many vertices with neighbors outside the subprotrusion, and with treewidth O⁢(log⁡log⁡k). Then, the second twist is that instead of directly kernelizing the subprotrusion, we think of Machinery II as an existential rather than an algorithmic result – we know that there exists a logO⁢(1)⁡log⁡k-sized graph that can replace our subprotrusion. Then, we simply guess this replacement! That is, we generate all possible logO⁢(1)⁡log⁡k-sized graphs. For each generated graph P′, we test whether:

  1. 1.

    P′ is equivalent to the subprotrusion with the same terminal set. That is, we must preserve the yes/no answers to the instances corresponding to all possible terminal pairings.

  2. 2.

    P′ is a minor of P.

This test can be done using a standard dynamic programming-based algorithm over tree decomposition, since both the treewidth of the subprotrusion and the size of P′ are bounded by logO⁢(1)⁡log⁡k. Specifically, we have 2logO⁢(1)⁡log⁡k<kO⁢(1) many guesses for the replacement, and the “validity” of each can be checked in time kO⁢(1)⋅nP where nP is the number of vertices in P. We believe that this concept of “nested” protrusion decomposition can find applications in improving kernelization algorithms, in terms of both kernel size and running time, for other terminal-based problems.

Additional discussion and related open problems can be found in Section 3.

2 Overview of Our Proofs

In this section, we provide an overview of our proofs. We will only informally define notions required to explain the overview. The full proofs of our results and the required notions deferred to the full version to respect the space constraints.

2.1 FPT Algorithm

Our first contribution is an FPT algorithm for T-Cycle in planar graphs that has a running time subexponential in k (which is, 2O⁢(k⁢log⁥k)) and linear in n. Since T-Cycle can be solved in 2O⁢(tw)⁢n time (e.g., using [14]), a natural way to attack our problem is via the technique of treewidth reduction by removal of some irrelevant vertices. In fact, this technique was used by Kawarabayashi [24] to reduce the treewidth to be polynomial in k. To get the algorithm that we desire, we need to

  1. 1.

    reduce the treewidth to O⁢(k⁢log⁥k) by removal of some irrelevant vertices, and

  2. 2.

    to ensure that this entire removal procedure is performed in kO⁢(1)⋅n time.

Irrelevant vertices.

We begin with establishing that if there is a vertex v that is “sufficiently separated” from each vertex in T, then v is irrelevant. A set of cycles 𝒞=(C0,…,Cr) is concentric if the cycles in 𝒞 are vertex disjoint and cycle Ci−1 is contained in the interior of Ci (for i∈[r]). See Figure 1(a) for an illustration. If there exists a sequence of ℓ+1 concentric cycles C0,…,Cℓ such that v in the interior of C0 and T is in the exterior of Cℓ, then we say that v is ℓ-isolated. Let Di denote the disk corresponding to the interior of Ci.

(a) Concentric cycles.
(b) CL-configuration.
Figure 1: (a) A set 𝒞 of concentric cycles and v is r-isolated. (b) A CL-configuration (𝒞,L). The segments of L are represented in green and the edges of L outside of Dr are shown in blue. Hence, the green edges along with the blue edges combine to give the loop L. In both subfigures, the terminal vertices are highlighted in red.

The first component of our algorithm is a proof that establishes that there exists some g⁢(k)∈O⁢(log⁡k), which we explicitly compute, such that each g⁢(k)-isolated vertex is irrelevant, and hence, can be removed from G safely. To this end, we use a notion called CL-configuration, which is a pair 𝒬=(𝒞,L), where 𝒞=(C0,…,Cr) is a set of concentric cycles such that Dr∩T=∅, and L is a T-loop. We say that 𝒬=(𝒞,L) has depth r if 𝒞 consists of r+1 concentric cycles. See Figure 1(b) for an illustration. The connected components of Di∩L are said to be Ci-segments. Intuitively, we say that a Cj-segment Sa is in the zone of a Cj-segment Sb if Sa lies in the region encompassed by Sb and the cycle Cj that excludes C0. This can be used to define a partial order ≺ on the Cj-segments of the set of CL-configuration 𝒬 as follows: we say that Sa≺Sb if and only if Sa lies in the zone of Sb. We need the following notion of segment types (see Figure 2(a) for an illustration.).

Definition 7 (Segment types).

Let 𝒬=(𝒞,L) be a depth r CL-configuration of G. Moreover, let S1 and S2 be two Cj-segments of 𝒬 such that Si, for i∈[2], has endpoints ui and vi. We say that S1 and S2 have the same Cj-type if:

  1. 1.

    there exist paths P and P′ on Cj connecting an endpoint of S1 with an endpoint of S2 such that these paths do not pass through the other endpoints of S1 and S2,

  2. 2.

    no segment of 𝒬 has both endpoints on P or on P′, and

  3. 3.

    the closed-interior of the cycle P∪S1∪P′∪S2 does not contain the disk D0.

A Cj-type of segment is an equivalence class of segments of 𝒬. See Figure 2(b) for an illustration of segment types.

(a) Segments with the same type.
(b) Segment types.
Figure 2: (a) S1 and S2 are Cj-segments with endpoints u1,v1 and u2,v2, respectively. Moreover, P and P′ are the (u1,u2)-path and (v1,v2)-path along Cj, respectively. Here, S1 and S2 have the same Cj-type. (b) Here, segments S1,…,S10 are Cj-segments such that segment Si has endpoints ui and vi. Segments S4 and S7 are not of the same Cj-type because of condition (3) in Definition 7, and S6 and S2 are not of the same Cj-type because of condition (2) in Definition 7. Further, when S6 and S2 are restricted to Dj−2, they have the same Cj−2-type. Finally, S10≺S9≺S8≺S7, and similarly, S6≺S5≺S4.

Finally, for any T-loop, say L, we define a cost function that corresponds to the number of edges in L that are not contained in any cycle of 𝒞. The main idea behind this is that a T-loop has to “pay” every time it goes to a “deeper” cycle of 𝒞. Then, a T-loop L is cheap if there is no other loop with cost strictly lesser than that of L. We would then like to show that any cheap T-loop will not go “very deep” in 𝒞, deeming the deeper cycles of 𝒞 irrelevant.

Now, consider a CL-configuration 𝒬=(𝒞,L) of depth r. We are ready to explain our first main lemma, which says that if L is a cheap T-loop, then there cannot be more than 3 segments with the same Cj-type, for j∈{0,…,r}. To prove this, we show that if we have more than 3 segments with the same Cj-type, then we can reroute L in such a manner that we get a new T-loop L′ which is cheaper than L. See Figure 3 for an illustration of the intuition. In particular, we have the following lemma. (This gives us Lemma 5 from Section 1.)

Lemma 8.

Let 𝒬=(𝒞,L) be a depth r convex CL-configuration of G. Moreover, let 𝒮 be a set of segments of the same Cj-type, for some j∈[r]. If |𝒮|>3, then L is not a 𝒞-cheap T-loop.

(a) L.
(b) L′.
Figure 3: (a) Here, Si is the Cj segment with endpoints ui and vi, segments S1,S2,S3 are illustrated in red, and segments S1,…,S8 have the same Cj-type. (b) In the rerouting, we remove the segment S2 completely (reducing the cost) and use a part of the segment S1 (not increasing the cost), and additionally use some paths along concentric cycles Cj and Cj−1 that have cost 0.

The next component of the proof is to establish, using our above result, that a cheap T-loop will not go beyond O⁢(log⁡k) levels deep, and we compute a g⁢(k)∈O⁢(log⁡k) such that every vertex that is g⁢(k)-isolated, i.e., contained in Dr−g⁢(k)−1 is irrelevant. To this end, we use a novel idea based on segment forests. In the discussion that follows, 𝒬 is a CL-configutation of depth r.

For every j∈[r], we use the hierarchy induced by ≺ to associate a forest structure called a segment forest. To begin with, if a Cj-segment Sa is in the zone of a Cj segment Sb, then we say that Sb is an ancestor of Sa and (Sa is a descendant of Sb). If Sb is an ancestor of Sa such that there is no Cj-segment Sc that satisfies Sa≺Sc≺Sb, then Sb is a parent of Sa (and Sa is a child of Sb). Modeling all parent child relationships with edges gives rise to a forest that we call the j-th segment forest of 𝒬. See Figure 4 for an example. A Cj-segment Sp is an m-th generation ancestor of Sq if Sp is an ancestor of Sq and the length of the path from Sp to Sq in the j-th segment forest is m. The height of a segment forest is the length of the longest path from a leaf segment to a segment that has no ancestors. The width m j-subtree of a Cj-segment S is the tree induced by all Cj-segments that are descendants of S at a distance of at most m in the j-th segment forest.

For a segment S, its eccentricity e is defined as e=mini⁡V⁢(Ci∩S)≠∅. Let m be any positive integer. We now make the observation that in the width m e-subtree T rooted at the k-th generation ancestor of S, either all ancestors of S in T have the same type or there is a segment in T that is not an ancestor of S. This follows from the fact that if there exists a segment S of eccentricity e that has an ancestor A that is not of the same type as S, then there exist two paths P and P′ on Ce connecting an endpoint of S with an endpoint of A that do not pass through the other endpoint of A. Since A and S are not of the same type, there exists a segment R with both endpoints in P or both endpoints in P′. By the definition of segment types, such as segment R cannot be an ancestor of A.

The above observation coupled with Lemma 5 tells us that the width three e-subtree rooted at the 3-rd generation ancestor of a segment S of eccentricity e has a segment that is not an ancestor of S. The fact that the height of the r-segment forest of 𝒬 is at most logarithmic follows then from an inductive argument. In [2, Lemma 5], it is shown that a cheap solution for Disjoint Paths has at most O⁢(k) different types of segments. Using this result, it is easy to check that the same holds true for T-Cycle. Leveraging this fact, we deduce that the height of the r-segment forest of 𝒬 is O⁢(log⁡k). This gives us Lemma 6 from Section 1.

Lemma 9.

There exist constants c1 and c2 such that in a CL-configuration 𝒬=(𝒞,L) of depth r, if the eccentricity of a segment is less than r−(c1⁢log⁡k+c2), then there exists an irrelevant vertex in 𝒬=(𝒞,L).

(a) Cj segments.
(b) j-th segment forest.
Figure 4: Subfigure (a) depicts Cj segments of a CL configuration 𝒬 of depth r. Here, segments S1,…,S10 are Cj-segments such that segment Si has endpoints ui and vi. All Cj-segments of the same type are depicted in a common color. The colors red, blue green and yellow are used to distinguish segment types. Subfigure (b) shows the j-th segment forest of 𝒬.

Fast Removal of Irrelevant Vertices.

Since we have established that all g⁢(k)-isolated vertices are irrelevant, our next task is to remove g⁢(k)-isolated vertices in kO⁢(1)⋅n time. Note that there is a rather straightforward way to remove such vertices by, as long as possible, computing a g⁢(k)×g⁢(k) grid minor that does not contain any terminal, and removing its “middle-most” vertex. Here, each iteration requires kO⁢(1)⋅n time, and hence, in total, this algorithm requires kO⁢(1)⋅n2 time.

To remove the irrelevant vertices in kO⁢(1)⋅n time, we use Reed’s [33] approach of “cutting” the plane into more “manageable” planes, and then working on these pieces simultaneously. To this end, we consider the “punctured” planes, where, intuitively, a c-punctured plane means a punctured plane with c connected components in its boundary. Note that it is desirable that all terminals lie on the boundary of a punctured plane. This can be achieved, to begin with, by considering the graph to be embedded on a k-punctured plane, where each terminal is a trivial hole. Then, the idea of Reed is to recursively cut the plane along some curves of “bounded” size into “nice” subgraphs, where a subgraph H is nice if every vertex of H that is g⁢(k)-isolated from the boundary of H is also g⁢(k)-isolated in H. More specifically, we use the following result of Reed.

Proposition 10 (Lemma 2 in [33]).

Let H be a nice subgraph of G embedded on a c-punctured plane ⊡ such that c>2. Then, we can compute both a non-crossing proper closed curve J contained in ⊡ and a (possibly empty) set X of vertices that are g⁢(k)-isolated from the boundary of ⊡ in O⁢(|V⁢(H)|) time such that

  1. 1.

    the number of vertices of H−X intersected by J is at most 6⁢g⁢(k)+6, and

  2. 2.

    ⊡∖J contains at most 3 components each of which has less than c holes.

A careful analysis shows that by a recursive application of this cut reduction procedure, we finally get at most 4⁢k+8 components, each of which is embedded on either a 2-punctured plane or a 1-punctured plane and the total number of vertices on the boundaries of these punctured planes is O⁢(k⁢g⁢(k)), i.e., O⁢(k⁢log⁡k). Since we apply this cut reduction O⁢(k) times, the cutting-plane procedure takes O⁢(k⋅n) time in total.

The novel component of this part of our algorithm is to decide for each vertex v on the boundary of these punctured planes if v is g⁢(k)-isolated in G, and remove if it is. We can perform this check in O⁢(n) time for one vertex, and since there are O⁢(k⁢log⁡k) vertices altogether on the boundaries of punctured planes, we can remove all g⁢(k)-isolated vertices from the boundaries of punctured planes in O⁢(k⁢log⁡k⋅n) time. After this step, no vertex on the boundary of a punctured plane is g⁢(k)-isolated. Finally, we use the irrelevant vertex removal algorithm of Cho et al. [11] which, given a c-punctured plane ⊡ where c≤2, removes all vertices from ⊡ that are 4⁢g⁢(k)-isolated from the boundary of ⊡. Their algorithm in total requires O⁢(n) time for each c-punctured plane (c∈[2]), and since there are O⁢(k) such planes, this step requires O⁢(k⋅n) time in total.

At this point, we prove that no vertex in G is 5⁢g⁢(k)-isolated. In particular,we show that if a vertex v in ⊡ is 5⁢g⁢(k)-isolated, then there exists a vertex on the boundary of ⊡ that is g⁢(k)-isolated. An illustration of the proof is provided in the Figure 5.

Figure 5: A 2-punctured plane ⊡ is depicted (in blue) by its two holes highlighted in bold. v is a vertex in ⊡ which is 5⁢g⁢(k)+1-isolated in G, and hence there is a sequence of C0,…,C5⁢g⁢(k)+1 concentric cycles separating v and T. Since v is not 4⁢g⁢(k)-isolated from boundary of ⊡, there is some boundary vertex w of ⊡ such that w∈D4⁢g⁢(k). In this case, a sequence of concentric cycles C4⁢g⁢(k)+1,…,C5⁢g⁢(k)+1 separate w from T, implying that w is g⁢(k)-isolated.

Finally, using a result of Adler et al. [1, Lemma 1], it follows that if there is no vertex in a planar graph G that is 5⁢g⁢(k)-isolated from a set of vertices T of size k, then the treewidth of G is O⁢(k⁢g⁢(k)), i.e., O⁢(k⁢log⁡k). This gives us Theorem 4 from Section 1. Indeed, the treewidth of the reduced graph, say G′, obtained after removing irrelevant vertices from G, is O⁢(k⁢log⁡k). Moreover, let U be the set of all boundary vertices of all O⁢(k) many punctured planes (|U|∈O⁢(k⁢log⁡k)), then observe that in G′−U, there is no sequence of 4⁢g⁢(k)+1 concentric cycles, and hence the treewidth of G′−U is upper bounded by 4⁢g⁢(k), i.e., O⁢(log⁡k). Now, a dynamic-programming based algorithm can be used to solve our problem in 2O⁢(k)⁢log⁡k⋅n time. We refer to the procedure described in the above steps as Reed decomposition algorithm.

2.2 Kernelization Algorithm

The main tool used in our kernelization algorithm is the so-called protrusion decomposition. Please refer to [17, Chapter 15] for a detailed discussion on this topic. Below, we provide a brief overview starting with a few definitions.

Let G be a graph. Given a vertex set U⊆V⁢(G), its boundary ∂U, is the set of vertices in U that have at least one neighbor outside of U. A vertex set W⊆V⁢(G) is called a treewidth-η-modulator if tw⁢(G−W)≤η. A vertex set Z⊆V⁢(G) is a q-protrusion if tw⁢(Z)≤q and |∂Z|≤q. Finally, given a vertex set S⊂V⁢(G), we use S+=NG⁢[S] to denote the set of vertices that are in the closed neighborhood of S in G.

A partition X0,X1,…,Xℓ of vertex set V⁢(G) of a graph G is called an (α,β,γ)-protrusion decomposition of G if α, β and γ are integers such that:

  • ■

    |X0|≤α,

  • ■

    ℓ≤β,

  • ■

    Xi for every i∈[ℓ] is a γ-protrusion of G,

  • ■

    for i∈[ℓ], NG⁢(Xi)⊆X0 (here, NG⁢(Xi) denotes the open neighborhood of Xi in G).

For i∈[ℓ], the sets Xi are called protrusions. For every i∈[ℓ], we set Bi = Xi+∖Xi.

A central result about protrusions is that if a planar graph G has a treewidth-η modulator S, then G has a (O⁢(|η|⋅|S|),O⁢(|η|⋅|S|),O⁢(|η|))-protrusion decomposition with X0⊇S [17, Lemma 15.14]. Moreover, such a protrusion can be computed efficiently using Algorithm 1 outlined in Figure 6. The key motivation behind our use of protrusion decompositions for kernelization is Theorem 4, which readily gives us a graph G~ and a vertex set U⊂V⁢(G~) of size O⁢(k⁢log⁡k) that is a treewidth-O⁢(log⁡k)-modulator of G~, where (G,T) and (G~,T) are equivalent as T-Cycle instances.

Apart from protrusions, the other main tool we use is a blackbox from [39]. In [39], the authors define the notion of B-linkage equivalence. Specifically, two graphs G1,G2 with a common vertex set B are said to be B-linkage equivalent w.r.t. Disjoint Paths if for every set of pairs of terminals M∈B2, the disjoint path instances (G1,M) and (G2,M) are equivalent. The key result we use from [39] is that a planar graph G can be replaced by a smaller planar graph H that is B-linkage equivalent w.r.t. Disjoint Paths, where the size of H is polynomial in the treewidth of G and |B|. This leads us to our first kernelization algorithm outlined in Figure 6 that serves as a forerunner to the linear time algorithm summarized in Figure 7.

Figure 6: Here, we depict the Steps in Kernelization Algorithm-I. The arrows are labelled with the Step# and the tool used, and every box contains the output data associated to that box.

One of the key insights behind the linear time kernelization algorithm is to treat the black box result from [39] as an existential result rather than an algorithmic one. Thus, instead of using the algorithm from [39] for replacing graphs with smaller B-linkage equivalent counterparts, one could guess the replacement graph instead. One obstacle in doing this is that |Bi| where Bi=Xi+∖Xi and the treewidth of G~⁢[Xi+] for i∈[ℓ] are both O⁢(log⁡k) making the guesses expensive. A potential remedy, which is our other key insight, is to apply a nested protrusion decomposition. However, a roadblock to this remedy is that we do not have a small treewidth modulator for graphs G~⁢[Xi+] right away. This is fixed by adapting the Reed decomposition algorithm for T-Cycle to Bi-linkage equivalence w.r.t. T-Cycle. We stress here that the notion of linkage equivalence w.r.t. Disjoint Paths differs from the notion of linkage equivalence w.r.t. T-Cycle. Below, we give an intuitive definition for linkage equivalence w.r.t. T-Cycle.

Figure 7: Here, we depict the Steps in Kernelization Algorithm-II. The arrows are labelled with the Step# and the tool used, and every box contains the output data associated to that box.

Given a T-Cycle instance (G,T), let G1 and G1′ be subgraphs of G with a common set of vertices B⊂V⁢(G1)∩V⁢(G1′). Then, G1 is B-linkage equivalent w.r.t. T-Cycle to G1′ if

  • ■

    a T-loop in G can be written as a union of collections of paths 𝒫1∪𝒫2 with endpoints of paths in 𝒫1∪𝒫2 lying in B such that paths in 𝒫1 use edges that belong to G1 and paths in 𝒫2 use edges outside of G1 if and only if in the graph H obtained by replacing G1 with G1′ in G there is a T-loop that can be written as a union of collections of paths 𝒫1′∪𝒫2 where paths in 𝒫1′ use edges that belong to G1′.

A vertex v∈G1 is B-linkage irrelevant if G1−v is B-linkage equivalent w.r.t. T-Cycle to G1. It is easy to check that vertices that are B-linkage irrelevant in G1 are also irrelevant for the T-Cycle problem in G.

Returning to our discussion, an adaptation of the Reed decomposition algorithm allows us to delete Bi-linkage irrelevant vertices from G~⁢[Xi+] for every i∈[ℓ]. This has two important outcomes. First, for every i∈[ℓ], we get smaller graphs Gi′ that are Bi-linkage equivalent to G~⁢[Xi+]. Second, for every i∈[ℓ], the Reed decomposition algorithm also computes sets Bi′⊇Bi such that the sets Bi′ are treewidth-O⁢(log⁡log⁡k)-modulators of Gi′. In fact, the sets Bi′ are boundary vertices in the Reed decomposition algorithm.

With that at hand, we can apply protrusion decomposition to graphs Gi′ giving us “subprotrusions”. Specifically, computing a protrusion decomposition of Gi′ for every i∈[ℓ], gives a partition {Yi,0,…,Yi,mi} of V⁢(Gi′). For i∈[ℓ], j∈[mi], let Gi⁢j′=Gi′⁢[Yi,j+], where Yi,j+=NGi′⁢[Yi,j], and Bi,j=Yi,j+∖Yi,j. Also, let Gi,0′=Gi′⁢[Yi,0] for i∈[ℓ].

To now apply [39] as an existential result, we need to guess graphs of size logO⁢(1)⁡log⁡k. Checking if a guessed graph is Bi,j linkage equivalent w.r.t. Disjoint Paths to a subprotrusion Gi,j′ and replacing it while preserving planarity involves the use of two dynamic programming subroutines: Minor Containment and Disjoint Paths, the details of which can be found in Section 7 of the extended version of the paper [19]. We do these replacements for all i∈[ℓ], j∈[mi]. The replacement graphs for Gi,j′ are denoted by Hi,j′.

The kernel for the T-Cycle problem is given by assembling the graph K′ where

V⁢(K′)=V⁢(G0′)⁢⋃i∈[ℓ]V⁢(Gi,0′)⁢⋃i∈[ℓ]j∈[mi]V⁢(Hi,j′)⁢ and ⁢E⁢(K′)=E⁢(G0′)⁢⋃i∈[ℓ]E⁢(Gi,0′)⁢⋃i∈[ℓ]j∈[mi]E⁢(Hi,j′).

Figure 7 outlines the key steps in the linear time kernelization algorithm. We show in Section 7 of the extended version of the paper [19] that |V⁢(K′)|≤k⁢log4⁡k, and K′ can be computed in kO⁢(1)⋅n time.

3 Conclusion

In this paper, we considered the T-Cycle problem on planar graphs. We begin by providing an FPT algorithm with running time 2O⁢(k⁢log⁡k)⋅n. Most subexponential time FPT algorithms on planar graphs use Bidimensionality in a naive fashion: If the treewidth of the input graph is large, then we trivially know whether our instance is a yes or no instance, and when the treewidth is small (sublinear), we use dynamic programming using the tree decomposition. Unfortunately, this fails on T-Cycle (and related terminal-based routing problems) as large treewidth neither blocks a T-loop nor guarantees it. We bypass this roadblock using a clever rerouting argument and new variations of several techniques in the literature to deal with planar graphs. Further, to the best of our knowledge, T-Cycle is the first natural terminal-based routing problem that admits a subexponential algorithm for planar graphs. We believe that this may pave the road for new subexponential algorithms for planar graphs for problems that cannot be solved by naive application of bidimensionality. Further, we perform non-trivial work to reduce the running time dependence on n to linear.

Next, we provided a linear time kernelization algorithm for T-Cycle on planar graphs of size k⋅logO⁢(1)⁡k. As pointed in the Introduction section, the kernelization complexity of T-Cycle on general graphs is one of the biggest open problems in the field. Our result shows that for planar graphs, we have an almost linear kernel. This raises the natural and important question as to whether our kernel for T-Cycle can be lifted to more general non-planar graphs, or even to general graphs. To obtain our kernel, we use Reed’s technique of plane cutting. This is perhaps the first application of this technique in kernelization. Further, we obtain the kernelization to be almost-optimal combining Theorem 4 with a “nested” protrusion decomposition technique, which is novel to this paper. Perhaps these techniques can be combined to obtain new/improved kernelization results for other terminal-based problems.

As discussed in [30], algorithms for terminal-based routing problems on planar graphs serve as a crucial step in designing algorithms for general case. Indeed, this was the case for Disjoint Paths. All known algorithms for Disjoint Paths are based on distinguishing the cases when the graph contains a large clique as a minor and when it does not. Furthermore, when the input graph does not contain a large clique as a minor, the graph either has low treewidth (leading towards a DP) or contains a large flat wall that necessitates the study of these problems on planar and “almost-planar” graph classes. As mentioned in the Introduction, it would be interesting to see if it is possible to extend our results for “almost-planar graphs”.

Finally, we wish to point out that our arguments may be relevant for the resolution of the problem on general graphs as well. In this direction, the first step should be to generalize our results to flat walls towards the resolution of T-Cycle on minor-free graphs.

References

  • [1] Isolde Adler, Stavros G Kolliopoulos, Philipp Klaus Krause, Daniel Lokshtanov, Saket Saurabh, and Dimitrios Thilikos. Tight bounds for linkages in planar graphs. In Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part I 38, pages 110–121. Springer, 2011. doi:10.1007/978-3-642-22006-7_10.
  • [2] Isolde Adler, Stavros G Kolliopoulos, Philipp Klaus Krause, Daniel Lokshtanov, Saket Saurabh, and Dimitrios M Thilikos. Irrelevant vertices for the planar disjoint paths problem. Journal of Combinatorial Theory, Series B, 122:815–843, 2017. doi:10.1016/J.JCTB.2016.10.001.
  • [3] Andreas BjĂśrklund. Determinant sums for undirected hamiltonicity. SIAM J. Comput., 43(1):280–299, 2014. doi:10.1137/110839229.
  • [4] Andreas BjĂśrklund, Thore Husfeldt, Petteri Kaski, and Mikko Koivisto. Narrow sieves for parameterized paths and packings. J. Comput. Syst. Sci., 87:119–139, 2017. doi:10.1016/J.JCSS.2017.03.003.
  • [5] Andreas BjĂśrklund, Thore Husfeldt, and Nina Taslaman. Shortest cycle through specified elements. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012, pages 1747–1753, 2012. doi:10.1137/1.9781611973099.139.
  • [6] Hans L. Bodlaender, Rodney G. Downey, Michael R. Fellows, and Danny Hermelin. On problems without polynomial kernels. J. Comput. Syst. Sci., 75(8):423–434, 2009. doi:10.1016/J.JCSS.2009.04.001.
  • [7] Hans L Bodlaender, Fedor V Fomin, Daniel Lokshtanov, Eelko Penninkx, Saket Saurabh, and Dimitrios M Thilikos. (meta) kernelization. Journal of the ACM (JACM), 63(5):1–69, 2016. doi:10.1145/2973749.
  • [8] John Adrian Bondy and LĂĄszlĂł LovĂĄsz. Cycles through specified vertices of a graph. Combinatorica, 1:117–140, 1981. doi:10.1007/BF02579268.
  • [9] Liming Cai, Jianer Chen, Rodney G Downey, and Michael R Fellows. Advice classes of parameterized tractability. Annals of pure and applied logic, 84(1):119–138, 1997. doi:10.1016/S0168-0072(95)00020-8.
  • [10] Chandra Chekuri and Julia Chuzhoy. Polynomial bounds for the grid-minor theorem. J. ACM, 63(5):40:1–40:65, 2016. doi:10.1145/2820609.
  • [11] Kyungjin Cho, Eunjin Oh, and Seunghyeok Oh. Parameterized algorithm for the disjoint path problem on planar graphs: Exponential in k2 and linear in n. In Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 3734–3758. SIAM, 2023. doi:10.1137/1.9781611977554.CH144.
  • [12] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, DĂĄniel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
  • [13] Gabriel Andrew Dirac. In abstrakten graphen vorhandene vollständige 4-graphen und ihre unterteilungen. Mathematische Nachrichten, 22(1-2):61–85, 1960.
  • [14] Frederic Dorn, Fedor V. Fomin, and Dimitrios M. Thilikos. Catalan structures and dynamic programming in h-minor-free graphs. J. Comput. Syst. Sci., 78(5):1606–1622, 2012. doi:10.1016/J.JCSS.2012.02.004.
  • [15] PĂŠter L Erdős and Ervin Győri. Any four independent edges of a 4-connected graph are contained in a circuit. Acta Mathematica Hungarica, 46:311–313, 1985.
  • [16] Michael R. Fellows. The lost continent of polynomial time: Preprocessing and kernelization. In Parameterized and Exact Computation, Second International Workshop, IWPEC 2006, ZĂźrich, Switzerland, September 13-15, 2006, Proceedings, pages 276–277, 2006. doi:10.1007/11847250_25.
  • [17] Fedor V Fomin, Daniel Lokshtanov, Saket Saurabh, and Meirav Zehavi. Kernelization: theory of parameterized preprocessing. Cambridge University Press, 2019.
  • [18] Steven Fortune, John Hopcroft, and James Wyllie. The directed subgraph homeomorphism problem. Theoretical Computer Science, 10(2):111–121, 1980. doi:10.1016/0304-3975(80)90009-2.
  • [19] Harmender Gahlawat, Abhishek Rathod, and Meirav Zehavi. (almost-)optimal fpt algorithm and kernel for t-cycle on planar graphs, 2025. arXiv:2504.19301.
  • [20] Roland Häggkvist and Carsten Thomassen. Circuits through specified edges. Discrete mathematics, 41(1):29–34, 1982. doi:10.1016/0012-365X(82)90078-4.
  • [21] Derek A. Holton, Brendan D. McKay, Michael D. Plummer, and Carsten Thomassen. A nine point theorem for 3-connected graphs. Combinatorica, 2:53–62, 1982. doi:10.1007/BF02579281.
  • [22] Ken-ichi Kawarabayashi. One or two disjoint circuits cover independent edges: LovĂĄsz–woodall conjecture. Journal of Combinatorial Theory, Series B, 84(1):1–44, 2002. doi:10.1006/JCTB.2001.2059.
  • [23] Ken-ichi Kawarabayashi. Cycles through a prescribed vertex set in n-connected graphs. Journal of Combinatorial Theory, Series B, 90(2):315–323, 2004. doi:10.1016/J.JCTB.2003.08.002.
  • [24] Ken-ichi Kawarabayashi. An improved algorithm for finding cycles through elements. In Integer Programming and Combinatorial Optimization: 13th International Conference, IPCO 2008 Bertinoro, Italy, May 26-28, 2008 Proceedings 13, pages 374–384. Springer, 2008. doi:10.1007/978-3-540-68891-4_26.
  • [25] Ken-ichi Kawarabayashi, Yusuke Kobayashi, and Bruce A. Reed. The disjoint paths problem in quadratic time. J. Comb. Theory B, 102(2):424–435, 2012. doi:10.1016/J.JCTB.2011.07.004.
  • [26] Ken-ichi Kawarabayashi, Zhentao Li, and Bruce Reed. Recognizing a totally odd k 4-subdivision, parity 2-disjoint rooted paths and a parity cycle through specified elements. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, pages 318–328. SIAM, 2010. doi:10.1137/1.9781611973075.27.
  • [27] Yusuke Kobayashi and Ken-ichi Kawarabayashi. Algorithms for finding an induced cycle in planar graphs and bounded genus graphs. In Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1146–1155. SIAM, 2009. doi:10.1137/1.9781611973068.124.
  • [28] Tuukka Korhonen, Michał Pilipczuk, and Giannos Stamoulis. Minor containment and disjoint paths in almost-linear time. FOCS, 2024.
  • [29] Andrea S. LaPaugh and Ronald L. Rivest. The subgraph homeomorphism problem. J. Comput. Syst. Sci., 20(2):133–149, 1980. doi:10.1016/0022-0000(80)90057-4.
  • [30] Daniel Lokshtanov, Saket Saurabh, and Meirav Zehavi. Efficient graph minors theory and parameterized algorithms for (planar) disjoint paths. In Treewidth, Kernels, and Algorithms - Essays Dedicated to Hans L. Bodlaender on the Occasion of His 60th Birthday, pages 112–128, 2020. doi:10.1007/978-3-030-42071-0_9.
  • [31] Daniel Lokshtanov, Saket Saurabh, and Meirav Zehavi. Efficient computation of representative weight functions with applications to parameterized counting (extended version). In Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA 2021, Virtual Conference, January 10 - 13, 2021, pages 179–198, 2021. doi:10.1137/1.9781611976465.13.
  • [32] DĂĄniel Marx, Marcin Pilipczuk, and Michal Pilipczuk. On subexponential parameterized algorithms for steiner tree and directed subset TSP on planar graphs. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pages 474–484, 2018. doi:10.1109/FOCS.2018.00052.
  • [33] Bruce Reed. Rooted routing in the plane. Discrete Applied Mathematics, 57(2-3):213–227, 1995. doi:10.1016/0166-218X(94)00104-L.
  • [34] Neil Robertson and Paul D. Seymour. Graph minors .xiii. the disjoint paths problem. J. Comb. Theory B, 63(1):65–110, 1995. doi:10.1006/JCTB.1995.1006.
  • [35] Daniel P Sanders. On circuits through five edges. Discrete Mathematics, 159(1-3):199–215, 1996. doi:10.1016/0012-365X(95)00079-C.
  • [36] Carsten Thomassen. Note on circuits containing specified edges. Journal of Combinatorial Theory, Series B, 22(3):279–280, 1977. doi:10.1016/0095-8956(77)90073-9.
  • [37] Dekel Tsur. Faster deterministic parameterized algorithm for k-path. Theor. Comput. Sci., 790:96–104, 2019. doi:10.1016/J.TCS.2019.04.024.
  • [38] Magnus WahlstrĂśm. Abusing the tutte matrix: An algebraic instance compression for the k-set-cycle problem. In 30th International Symposium on Theoretical Aspects of Computer Science, STACS 2013, February 27 - March 2, 2013, Kiel, Germany, pages 341–352, 2013. doi:10.4230/LIPICS.STACS.2013.341.
  • [39] Michal Wlodarczyk and Meirav Zehavi. Planar disjoint paths, treewidth, and kernels. In 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023, Santa Cruz, CA, USA, November 6-9, 2023, pages 649–662, 2023. doi:10.1109/FOCS57990.2023.00044.
  • [40] Douglas R Woodall. Circuits containing specified edges. J. Comb. Theory, Ser. B, 22(3):274–278, 1977. doi:10.1016/0095-8956(77)90072-7.