ARRIVAL: Recursive Framework & -Contraction
Abstract
ARRIVAL is the problem of deciding which out of two possible destinations will be reached first by a token that moves deterministically along the edges of a directed graph, according to so-called switching rules. It is known to lie in , but not known to lie in . The state-of-the-art algorithm due to Gärtner et al. (ICALP ‘21) runs in time on an -vertex graph.
We prove that ARRIVAL can be solved in time on -vertex graphs of treewidth . Our algorithm is derived by adapting a simple recursive algorithm for a generalization of ARRIVAL called G-ARRIVAL. This simple recursive algorithm acts as a framework from which we can also rederive the subexponential upper bound of Gärtner et al.
Our second result is a reduction from G-ARRIVAL to the problem of finding an approximate fixed point of an -contracting function . Finding such fixed points is a well-studied problem in the case of the -metric and the -metric, but little is known about the -case.
Both of our results highlight parallels between ARRIVAL and the Simple Stochastic Games (SSG) problem. Concretely, Chatterjee et al. (SODA ‘23) gave an algorithm for SSG parameterized by treewidth that achieves a similar bound as we do for ARRIVAL, and SSG is known to reduce to -contraction.
Keywords and phrases:
ARRIVAL, G-ARRIVAL, Deterministic Random Walk, Rotor-Routing, -Contraction, Banach Fixed PointCategory:
Track A: Algorithms, Complexity and Games2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms ; Theory of computation Problems, reductions and completenessAcknowledgements:
I want to thank Bernd Gärtner and Simon Weber for valuable discussions and feedback, and anonymous reviewers for their comments and suggestions.Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele PuppisSeries and Publisher:

1 Introduction
ARRIVAL is a computational problem first introduced by Dohrau et al. [11]. It can be described as a deterministic process (or zero-player game) on a directed graph with a designated origin and two designated destinations and . Every vertex in ARRIVAL has out-degree two, and exactly one outgoing edge at every vertex is marked (we also call it the even edge). We additionally assume that both destinations are reachable from every vertex in the graph. A token is placed on and moved along the edges of the graph according to the following rule: At every vertex, the token continues along the outgoing edge that was used least so far. In case of a tie, the token uses the even edge. This effectively means that the token will alternate between the two outgoing edges at every vertex, starting with the even edge. The task is to decide which of the two destinations or will be visited first by the token.
Dohrau et al. [11] proved that ARRIVAL is contained in . Naturally, they then asked whether it is also in . This open problem has received some attention in recent years and the best algorithm to date, due to Gärtner et al. [16], runs in time on a graph with vertices.
We present two new results for ARRIVAL: Our first result is an algorithm for ARRIVAL that runs in time on graphs with vertices and treewidth . Note that this bound is quasi-polynomial for graphs with bounded treewidth. Our algorithm is obtained by adapting a simple recursive algorithm for G-ARRIVAL, a generalization of ARRIVAL that allows arbitrarily many origins, destinations, and tokens: The recursive algorithm solves an instance with destinations and origins by making recursive calls on instances with destinations and origins. In other words, in each recursive call, a new vertex is made into a destination and origin vertex. By choosing this pivot vertex carefully, we can exploit the underlying graph structure.
It turns out that this simple recursive algorithm for G-ARRIVAL can also be seen as a framework for other algorithms for G-ARRIVAL. Concretely, we explain how the state-of-the-art upper bound due to Gärtner et al. [16] can be derived in this framework as well.
Our second result is a reduction from G-ARRIVAL to the problem of finding an approximate fixed point of a -contracting function . Concretely, we say that a function is contracting with parameter if we have for all . Such a function is guaranteed to have a unique fixed point by Banach’s fixed point theorem [4]. An -approximate fixed point has to satisfy . Given our reduction, any algorithm that can find an -approximate fixed point of in time would imply a polynomial-time algorithm for G-ARRIVAL.
Finding approximate fixed points is a well-studied problem in the case of the -metric and the -metric (see e.g. [24, 8]). In particular, efficient algorithms in the case of the -metric have been known since 1993 [23], and Chen et al. [8] only recently gave the first polynomial query upper bound for the -metric. Even more recently, a generalization of the result by Chen et al. to -contractions for every was announced [18]. Concretely, this means that an approximate fixed point of an -contraction can be found with polynomially many queries to the contraction map.
Unfortunately, the algorithm for -contractions in [18] is only query-efficient (and not time-efficient). Thus, our reduction currently does not imply better algorithms for G-ARRIVAL. We still think that our reduction is interesting: To the best of our knowledge, it provides the first concrete application for the -contraction problem. Moreover, the polynomial query upper bound for -contractions [18] suggests that better (maybe even time-efficient) algorithms could be obtained for -contraction and hence G-ARRIVAL in the future. For this, it might also be interesting to observe that the -contraction map obtained through our reduction from G-ARRIVAL has the additional property of being monotone with respect to the coordinate-wise partial order. Given recent work of Batziou et al. [5] on monotone -contractions, it seems plausible that -contraction and monotonicity could maybe be exploited simultaneously as well.
1.1 Related Work
Since ARRIVAL is contained in , it also naturally fits into the complexity class , which contains total problems with efficiently verifiable solutions. In fact, after a series of results for containment in subclasses of [20, 15], we now know that ARRIVAL is contained in [14].
Going into a slightly different direction, Gärtner et al. [15] proved that ARRIVAL is also contained in and , the analogues of and with unique solutions. In fact, it would not be hard to rederive this using our reduction to -contraction: The idea is that the fixed point acts as an efficient certificate for both YES- and NO-instances and it must be unique due to the contraction property.
It is also known that ARRIVAL can be solved in polynomial time on some restricted graph classes. For example, a result due to Priezzhev et al. [22] implies that ARRIVAL can be solved by simulation in polynomial time on Eulerian graphs. Other results include polynomial-time algorithms on tree-like multigraphs [1] and path-like multigraphs with many tokens [2]. More recently, algorithms running in quasi-polynomial-time were given for the case of tree-like multigraphs with many tokens [17]. Our algorithm effectively generalizes this result to all graphs of bounded treewidth.
Finally, further variants of ARRIVAL have been studied in the past, including a stochastic variant [25], a recursive variant [26], as well as variants with one or two players [13].
Comparison to SSG
As mentioned before, both our results show parallels between ARRIVAL and Simple Stochastic Games (SSG). We will briefly discuss the connections between the two problems. Similarly to ARRIVAL, SSG is contained in [9] and even [6], but no polynomial-time algorithm is known. The state-of-the-art algorithm due to Ludwig [21] runs in randomized subexponential time .
Dohrau et al. [11] already wondered about similarities between ARRIVAL and SSG when they first introduced ARRIVAL. Since then, both problems were shown to reduce to the problem of finding a Tarski fixed point [12, 16], and to be contained in the complexity class [14]. Both our results for ARRIVAL further extend this list of similarities: Our upper bound of for ARRIVAL on -vertex graphs of treewidth is comparable to a similar bound for SSG due to Chatterjee et al. [7]. Moreover, SSG reduces to finding an approximate fixed point of an -contracting function [9], which is analogous to our reduction from ARRIVAL to -contraction.
1.2 Outline
As explained above, our results are actually obtained for a generalization of ARRIVAL called G-ARRIVAL. Thus, we will start Section 2 by formally introducing G-ARRIVAL. We also use Section 2 to recall further terminology and notation from the literature that will be useful for our arguments.
Note that instead of formally introducing the notion of treewidth and tree decompositions, we will directly work with so-called balanced separators instead. The reason for this choice of exposition is that our parameterized algorithm actually exploits the existence of small balanced separators (and not tree decompositions themselves), which are guaranteed to exist in graphs of small treewidth (see Section 2.1 for more details).
We describe our parameterized algorithm in Section 3. We start the exposition with our simple recursive algorithm for G-ARRIVAL (Section 3.1), which provides a framework from which we will derive the parameterized algorithm in Section 3.3. In Section 3.2, we additionally explain how the subexponential upper bound due to Gärtner et al. [16] and polynomial-time upper bounds on graphs with a bounded feedback vertex set [16] can be rederived from our framework.
Finally, Section 4 contains our reduction to the problem of finding an approximate fixed point of a -contraction map. Crucially, given an instance of G-ARRIVAL, we define a function that is contracting and thus has a unique fixed point. We then prove that a reasonably good approximation of this fixed point will give away the solution to the G-ARRIVAL-instance. The function can be restricted to a compact subset of and scaled to fit into , if desired.
2 Preliminaries
We start by recalling G-ARRIVAL, which was first formally defined by Hoang [19]. Note that our formulation slightly deviates from the one by Hoang, but is easily seen to be equivalent.
A switch graph is a directed graph with and . We consider to be a multiset, and two edges to be distinct objects even if we have . Given a switch graph, we call and the even and odd successor of , respectively. Similarly, we refer to edges induced by as even edges, and to edges induced by as odd edges.
In G-ARRIVAL, many tokens traverse the directed graph simultaneously, starting and ending at special vertices that we call terminals or terminal vertices. Concretely, a G-ARRIVAL-instance consists of a switch graph as well as a non-empty subset of terminals. For each terminal , we also get a natural number of tokens starting at . We always assume that at least one terminal is reachable from each non-terminal vertex (otherwise, tokens could loop indefinitely without ever reaching a terminal). We will also always denote the total number of tokens by and assume .
Now consider the following non-deterministic procedure. Initially, for every terminal , move tokens from to , and tokens from to (we do this for every terminal simultaneously). Then, while there exists a token on a non-terminal , non-deterministically choose one such token and move it along the out-edge of that was used fewer times so far. In case of a tie, the token must use the even out-edge . In other words, the even and odd out-edges at will be used in an alternating fashion, starting with the even out-edge. This procedure stops once all tokens have reached a terminal. The goal of G-ARRIVAL is to predict the number of tokens arriving at each terminal .
In order for G-ARRIVAL to be well-defined, we need to make sure that the above procedure terminates and that it always produces the same values for all (independently of the non-deterministic choices). Indeed, both of these properties hold, and this follows by generalizing the arguments of Dohrau et al. [11] to work with multiple tokens, multiple destinations, and multiple origins, as explained by Gärtner et al. [16] and Hoang [19]. To explain this, we first need to recall the concept of switchings flows from the literature.
Given a switch graph with terminals and starting tokens , a function satisfying the three constraints
is called a switching flow. We will refer to the first set of constraints above as switching behavior, and to the second set of constraints as flow conservation.
Dohrau et al. [11] proved the following theorem in the case of ARRIVAL, but we directly state its generalization for G-ARRIVAL (see also [16, 19]).
Theorem 1 (Integral Switching Flows are Certificates [11]).
Given a switch graph with terminals and starting tokens with , the number of tokens arriving at terminal is well-defined and any integral switching flow satisfies , for all .
Concretely, Theorem 1 states that G-ARRIVAL is well-defined and that it can be solved by finding any integral switching flow. Observe that by simulating the non-deterministic procedure outlined before and recording the number of times that each edge is traversed by a token, one can obtain a special integral switching flow that we call the run profile. While the run profile is unique (i.e. it does not depend on non-deterministic choices) [16], Dohrau et al. [11] already observed that in general, integral switching flows are not unique. Concretely, there may be integral switching flows other than the run profile, but Theorem 1 tells us that they still predict the values correctly.
Finally, we will need an upper bound on the total flow in any integral switching flow. Similar upper bounds were used in previous work as well (see e.g. [11, 15, 16, 19]). We sketch a short proof.
Lemma 2 (Upper Bound on Integral Switching Flow [11]).
Let be an arbitrary integral switching flow for the G-ARRIVAL-instance on a switch graph with terminals and starting tokens with . Then we must have and for all .
Proof.
The equation follows from flow conservation of switching flows and Theorem 1. We will now prove the upper bound on the flow values.
Let be arbitrary. Observe that there must exist a simple path with of length from to some (recall that we assume that at least one terminal is reachable from every non-terminal in the graph). Observe that by the switching behavior of switching flows, would imply for all . In particular, we would have , contradicting the equation above.
2.1 Treewidth and Balanced Separators
Treewidth is a well-established graph parameter that plays an important role in parameterized algorithms, and it is intimately related to the notion of balanced separators (see e.g. [10, Chapter 7]). As is the case with many applications on graphs of bounded treewidth, our algorithm actually exploits the existence of balanced separators and can be formulated without computations of tree decompositions. Hence, we will refrain from formally introducing tree decompositions and instead focus on balanced separators.
Given an undirected graph and a subset of its vertices, we use to denote the graph resulting from deleting the vertices in and their incident edges from . We call a balanced separator if each connected component in contains at most vertices. Note that this does not necessarily imply that must have more than one connected component and it could even be an empty graph (despite what the term separator may suggest): Concretely, any set of size at least is a balanced separator, and thus there always exists a balanced separator. Using a brute-force approach, we can find a smallest balanced separator in in time .
The following connection between treewidth and balanced separators is crucial for us.
Lemma 3 (Balanced Separators and Treewidth [10, Lemma 7.19]).
If has treewidth at most , then for every , the subgraph has a balanced separator of size at most .
This lemma allows us to use the treewidth of to infer the existence of small balanced separators in all induced subgraphs of .
All of the previous concepts are defined on undirected graphs. Since we will be working exclusively with directed graphs, we will adopt the following convention: When used on a directed graph, the terms treewidth and balanced separators are to be interpreted with respect to the underlying simple undirected graph.
2.2 Non-Expansive, Contracting, and Monotone Functions
We will be interested in the Manhattan distance, which is induced by the -norm. Concretely, we use to denote the -norm of a vector . The Manhattan distance of is then given by .
We are mainly concerned with the non-negative orthant . A function is called a -contraction (or is -contracting) for some if and only if for all . Banach’s fixed point theorem [4] implies that such a contracting function admits a unique fixed point. If only satisfies the weaker property for all , we call it non-expansive instead.
In Section 4, we reduce G-ARRIVAL to the following computational problem: Given access to a -contraction , find an -approximate fixed point of , i.e. a point such that . We will also point out how the domain of our function can be restricted to , if desired.
Another property that we need in some of our proofs is monotonicity with respect to the coordinate-wise partial order. Concretely, we call a function monotone if and only if implies for all , where denotes coordinate-wise comparison.
Lemma 4 (Monotonicity in G-ARRIVAL [16]).
Consider a switch graph with terminals . Consider the function that maps the vector of starting tokens to the vector of tokens ending at terminals. The function is monotone with respect to the coordinate-wise partial order.
3 A Family of Recursive Algorithms
The main goal of this section is to give a parameterized algorithm for G-ARRIVAL that runs in time on graphs with vertices, treewidth , and a total of starting tokens. Note that for the sake of simplicity, our algorithm recurses by doing a binary search over one vertex at a time. One could instead use algorithms for the so-called Tarski-problem (see e.g. [12]) to recurse by searching over multiple vertices (e.g. all vertices of a balanced separator) at a time. However, with the current best algorithms for Tarski, this would not yield any asymptotic improvements.
3.1 A Simple Recursive Algorithm
We start by explaining a simple recursive algorithm for G-ARRIVAL that is inspired by the approach of Gärtner et al. [16]: The algorithm chooses an arbitrary non-terminal that we call the pivot, and makes a guess for the outflow of in an integral switching flow. In order to verify the guess, is converted to a terminal and tokens are assigned to start at . In this way, we obtain again an instance of G-ARRIVAL with one more terminal. After solving this subinstance, we can check our guess by looking at the number of tokens that arrive at in the subinstance. If we find that , the integral switching flow obtained for the subinstance is also an integral switching flow for the original instance where is not a terminal. Otherwise, we have or and we use this information to adjust our guess in a binary search fashion. We make this precise in Algorithm 1 and use the remainder of this section to prove that Algorithm 1 is correct.
Lemma 5 (Analysis of Algorithm 1).
Given an arbitrary G-ARRIVAL-instance consisting of with terminals and starting tokens with , Algorithm 1 correctly returns an integral switching flow in time .
Proof.
We start by proving correctness by induction over the size of . As a base case, observe that for , the algorithm clearly terminates and produces an integral switching flow . Thus, assume now and let be the pivot that is chosen by the algorithm. By the induction hypothesis, we can assume that all recursive calls correctly return an integral switching flow. Consider now the function that maps the guessed number of tokens to the value returned by the recursive call. We claim that is monotone and maps to itself. Indeed, monotonicity follows directly from Lemma 4. Moreover, we have since by definition, we must have . For the upper bound, we recycle the argument from Lemma 2: There must exist a path of length from to some . Thus, starting tokens at would imply by switching behavior, and hence
using Lemma 2. We conclude that binary search will successfully find a correct guess for in the given set .
Having proved correctness, we move on to the bound on the overall runtime. Observe that the recursion depth of the algorithm is at most . Thus, the total number of tokens starting at terminals in any of the recursive call is always bounded from above by . Let now denote an upper bound on the runtime of the algorithm on subinstances with terminals. We get that
for some constant . Using the definition of and , this yields an overall runtime of , as desired.
3.2 Subexponential Upper Bound
Picking the pivot in Algorithm 1 arbitrarily seems quite naive. In this section, we explain how applying the ideas of Gärtner et al. [16] yields a subexponential upper bound.
Lemma 6 (Algorithm with Diameter-Like Bound [16]).
Consider an arbitrary G-ARRIVAL-instance consisting of with non-empty and starting tokens with . Let , where denotes the shortest path distance from to any vertex in . There is an algorithm that solves G-ARRIVAL in time .
Lemma 7 (Decomposition Lemma [16]).
Let be an arbitrary switch graph with a non-empty set of terminals. There is an algorithm that finds a set of size satisfying in time .
Given those two observations, it is now not hard to adapt Algorithm 1 to run in subexponential-time: We first precompute the set from Lemma 7 in linear time. Then, we run Algorithm 1 with two changes: In the recursive step, we make sure to always pick a pivot from instead of all of . Further, we add a new base case that applies the algorithm from Lemma 6 as soon as the parameter from Lemma 6 has shrunk to , which is guaranteed to happen at the latest once all of the vertices in have been turned into terminals. With these two changes, the recursion depth will become , and since the base case also runs in time exponential only in , we get an overall subexponential runtime.
As observed by Gärtner et al. [16], one can do better on graphs with a small feedback vertex set: The crucial ingredient is that G-ARRIVAL can be solved efficiently on acyclic graphs by greedy simulation of the tokens. Using this as a base case and choosing pivots from a feedback vertex set yields yet another instantiation of the framework provided by the recursive algorithm. Concretely, this yields a polynomial-time algorithm on graphs with a bounded feedback vertex set.
3.3 Exploiting Balanced Separators
We now describe an adaptation of Algorithm 1 that works well on graphs of small treewidth. The general idea is again to pick the pivot appropriately. Concretely, as mentioned in Section 2.1, small treewidth ensures small balanced separators in all induced subgraphs of our input graph. Thus, it seems intuitive that in each step, we should pick the pivot from a balanced separator of the graph induced by the remaining non-terminals. Eventually, this should disconnect the induced graph into independent subinstances, each with a significantly smaller number of non-terminals. Recursing on all subinstances independently yields the desired speedup. We make this precise in Algorithm 2 and analyse the algorithm in the remainder of this section.
Lemma 8 (Correctness of Algorithm 2).
Given an arbitrary G-ARRIVAL-instance consisting of with non-empty , starting tokens with , and a balanced separator for , Algorithm 2 correctly returns an integral switching flow.
Proof.
Correctness of the base case and the binary search case follows from the same arguments as in Lemma 5 (correctness of Algorithm 1). The only thing we changed is that our pivot is chosen from instead of all of .
It remains to argue correctness of the new splitting case. For this, assume that and . In particular, has at least one non-empty connected component. For each connected component of , the algorithm computes the switch graph obtained from by deleting all vertices , their outgoing edges, and replacing edges leaving by self-loops. Moreover, assume that we are given an integral switching flow for each of those G-ARRIVAL-subinstances. Observe that every edge in with appears in exactly one subinstance : Indeed, we must have for some connected component , and thus can only appear in . Hence, we can uniquely assign for each edge with corresponding connected component . If we instead have , then appears in at least one subinstance . However, since , the value must be the same for all subinstances that appears in. Therefore, we can safely assign for any of those connecteced components . This fully defines , and it remains to prove that it is a switching flow. This is not hard to see, again by distinguishing between vertices from and . For any vertex , switching behavior holds at because it holds in all subinstances (where the outgoing edges of have the exact same values even if they were converted into self-loops). Similarly, if we instead have for some connected component , then and are taken from , where switching behavior must hold by the assumption that is a switching flow. Flow conservation only has to hold for non-terminals, and it holds due to the fact that all incoming edges of in must be present in as well, implying that the flow conservation from the subinstance carries over. We conclude that is indeed an integral switching flow.
Lemma 9.
Assume that we run Algorithm 2 on a G-ARRIVAL-instance consisting of with non-empty and starting tokens with . Further assume that we input a smallest balanced separator of the subgraph , and assume that has treewidth at most . Then the algorithm cannot reach recursion depth without at least once recursing in a splitting case. Moreover, if a splitting case is reached, then each connected component satisfies .
Proof.
By Lemma 3, has size at most . Thus, by only using the binary search case, the algorithm can reach a recursion depth of at most . This implies that to reach depth , it must at least once have recursed in a splitting case. This happens once all vertices in have been turned into terminals, and the remaining non-terminals are . Since was chosen as a smallest balanced separator of , each connected component in the graph consists of at most vertices.
Theorem 10.
Given a G-ARRIVAL-instance consisting of with non-empty , starting tokens with , and a smallest balanced separator of , Algorithm 2 computes an integral switching flow in time , where is the treewidth of .
Proof.
As in the analysis of Lemma 5, is an upper bound on the total number of starting tokens in any recursive call (since the recursion depth is still certainly at most ). Compared to the analysis in Lemma 5, we now additionally have to include the splitting case, which also includes finding small balanced separators in time at most . Let denote an upper bound on the runtime of subinstances with non-terminals and a set of size . Observe that by Lemma 9, we get the upper bound
where the last inequality comes from the splitting case and accounts for the search of new balanced separators. Repeating this, we then get
for constants . Using the definition of and , this implies an overall upper bound of , as desired.
4 Reduction to -Contraction
The goal of this section is to prove that G-ARRIVAL reduces to finding an approximate fixed point of an -contracting function. For this, we will frequently use the functions defined as
for all . Observe that both and are continuous and monotone, and that we have as well as for all .
4.1 One-Step Update
Consider a vector and think of it as token mass that is distributed among the vertices of a switch graph, with token mass currently occupying vertex . We want to define a notion of moving all (possibly fractional) tokens by one step each while respecting the switching rules. The following one-step update function captures this idea, with the intuition that is the amount token mass that receives from its predecessors.
Definition 11 (One-Step Update).
Let be a switch graph. The one-step update function associated with this switch graph is defined as
for all .
Lemma 12 (Non-Expansiveness and Monotonicity).
The one-step update associated with the switch graph is monotone and non-expansive.
Proof.
Monotonicity of follows directly from monotonicity of and . Thus, it remains to prove that is non-expansive. Let be arbitrary. By the previously discussed properties of and , we have
for all . With this, we calculate
where we went from summing over every edge by its target to summing over every edge by its source in the inequality-step. Next, we consider what happens if we reintroduce terminals. Concretely, we want to fix for all and consider the resulting function on the non-terminal vertices.
Definition 13 (Extension and Projection).
Let be the one-step update associated with the switch graph . Assume that we are given terminals with starting tokens . For arbitrary , let the extension of denote the vector
obtained by filling in the values for terminals . Moreover, we define the projection of to non-terminals as for all and .
Observe that the projected one-step update is still non-expansive and monotone: In particular, non-expansiveness can be obtained by
for all .
The next lemma says that the fixed points of the projected one-step update reveal the solution to the given G-ARRIVAL-instance.
Lemma 14 (Interpretation of One-Step Update).
Let be the one-step update associated with the switch graph . Assume that we are given terminals with starting tokens , and let be the projection of to non-terminals. Let be arbitrary and consider its extension . Finally, define
for all . Then the following two statements are true:
-
If is a fixed point of and is fractional for some edge , then there exists a directed fractional cycle containing .
-
is an integral fixed point of if and only if is an integral switching flow.
Proof.
Observe first that for every , both and are integral (since by assumption). Similarly, for every , either or is integral.
We are now ready to prove the first statement: Assume that is a fixed point of and that is fractional for some edge . By our previous observation, we know that must be fractional and that . Since is a fixed point, this implies that is fractional as well. By definition of , this means that there must exist some edge with fractional. We can now repeat this argument until we find a fractional cycle . Observe that cannot pass through any terminals and that it must come back to and thus include (because at most one of the two outgoing edges at every non-terminal vertex is fractional).
For the second statement, observe that satisfies the flow conservation constraints if and only if is a fixed point of : Indeed, this follows from
and for all .
Finally, integrality of immediately implies integrality of and vice versa. The definition of also implies that its values on two out-edges satisfy switching behavior. Hence, if is integral, then it must be an integral switching flow (since it automatically satisfies the switching constraints).
4.2 Discounted One-Step Update
As we have seen, the one-step update function and its projection are non-expansive with respect to the Manhattan distance. In this section, we make them contracting by artificially introducing a contraction factor.
Definition 15 (Discounted One-Step Update).
Let be the one-step update function and its projection associated with the switch graph with terminals and token numbers . For , is the -discounted one-step update function and its -discounted projection.
Corollary 16 (Contracting and Monotone Discounted One-Step Update).
Let be arbitrary. The -discounted one-step update function and its -discounted projection associated with the switch graph are monotone and contracting with parameter .
Proof.
Follows from Lemma 12.
Lemma 17.
Let be arbitrary. Assume that is the projected one-step update and its discounted version associated with the switch graph with terminals and token numbers . Assume that is the unique fixed point of . Every fixed point of satisfies .
Proof.
Let be an arbitrary fixed point of . We have
which implies that the function maps the box to itself. In particular, the unique fixed point of must lie inside , and we get .
Lemma 18.
Let be the unique fixed point of the -discounted projected one-step update function associated with the switch graph with terminals and token numbers . Let . With
for all , as well as
for all , we must have
Proof.
Let be an integral switching flow. Let be arbitrary and define the difference . We have
for all and
for all . With , we therefore get
by using our bound on . It remains to observe that this implies
Theorem 19.
Deciding an instance of G-ARRIVAL on vertices with starting tokens reduces to finding a fixed point of the -discounted projected one-step update with .
Proof.
By Lemma 18, we know that the unique fixed point of the -discounted projected one-step update must send a flow of strictly more than to the terminals if . By Lemma 14 and Lemma 17, we know that this implies that any integral switching flow must send at least the same amount of flow to the respective terminals. Since every integral switching flow sends exactly flow to the terminals (Lemma 4), we can infer the values from the unique fixed point (by rounding up). The argument in Lemma 2 yields the upper bound .
Observe that the bound in Lemma 18 can be improved to by choosing . Furthermore, any -approximate fixed point satisfies
and therefore . Thus, we get
which is enough to derive from if .
Finally, capping the function in each coordinate to make it map to itself preserves the contraction property. By Lemma 2, the unique fixed point lies inside . Scaling everything by a factor of yields a -contracting function that maps to itself.
References
- [1] David Auger, Pierre Coucheney, and Loric Duhazé. Polynomial Time Algorithm for ARRIVAL on Tree-Like Multigraphs. LIPIcs, Volume 241, MFCS 2022, 241:12:1–12:14, 2022. doi:10.4230/LIPICS.MFCS.2022.12.
- [2] David Auger, Pierre Coucheney, Loric Duhazé, and Kossi Roland Etse. Generalized ARRIVAL Problem for Rotor Walks in Path Multigraphs. In Reachability Problems, pages 183–198, Cham, 2023. Springer Nature Switzerland. doi:10.1007/978-3-031-45286-4_14.
- [3] David Auger, Pierre Coucheney, and Yann Strozecki. Finding Optimal Strategies of Almost Acyclic Simple Stochastic Games. In Theory and Applications of Models of Computation, volume 8402, pages 67–85. Springer International Publishing, Cham, 2014. doi:10.1007/978-3-319-06089-7_6.
- [4] Stefan Banach. Sur les opérations dans les ensembles abstraits et leur application aux équations intégrales. Fundamenta mathematicae, 3(1):133–181, 1922. doi:10.4064/fm-3-1-133-181.
- [5] Eleni Batziou, John Fearnley, Spencer Gordon, Ruta Mehta, and Rahul Savani. Monotone Contractions, November 2024. doi:10.48550/arXiv.2411.10107.
- [6] Krishnendu Chatterjee and Nathanaël Fijalkow. A Reduction from Parity Games to Simple Stochastic Games. In International Symposium on Games, Automata, Logics, and Formal Verification, GandALF, NA, Italy, 2011. doi:10.4204/EPTCS.54.6.
- [7] Krishnendu Chatterjee, Tobias Meggendorfer, Raimundo Saona, and Jakub Svoboda. Faster Algorithm for Turn-based Stochastic Games with Bounded Treewidth. In Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), Proceedings, pages 4590–4605. Society for Industrial and Applied Mathematics, January 2023. doi:10.1137/1.9781611977554.ch173.
- [8] Xi Chen, Yuhao Li, and Mihalis Yannakakis. Computing a Fixed Point of Contraction Maps in Polynomial Queries. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, pages 1364–1373, New York, NY, USA, June 2024. Association for Computing Machinery. doi:10.1145/3618260.3649623.
- [9] Anne Condon. The Complexity of Stochastic Games. Information and Computation, 96(2):203–224, February 1992. doi:10.1016/0890-5401(92)90048-K.
- [10] Marek Cygan, Fedor V. Fomin, Łukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer International Publishing, Cham, 2015. doi:10.1007/978-3-319-21275-3.
- [11] Jérôme Dohrau, Bernd Gärtner, Manuel Kohler, Jiří Matoušek, and Emo Welzl. ARRIVAL: A Zero-Player Graph Game in NP coNP. In A Journey Through Discrete Mathematics: A Tribute to Jiří Matoušek, pages 367–374. Springer International Publishing, Cham, 2017. doi:10.1007/978-3-319-44479-6_14.
- [12] Kousha Etessami, Christos Papadimitriou, Aviad Rubinstein, and Mihalis Yannakakis. Tarski’s Theorem, Supermodular Games, and the Complexity of Equilibria. In 11th Innovations in Theoretical Computer Science Conference (ITCS 2020), volume 151 of Leibniz International Proceedings in Informatics (LIPIcs), pages 18:1–18:19, Dagstuhl, Germany, 2020. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2020.18.
- [13] John Fearnley, Martin Gairing, Matthias Mnich, and Rahul Savani. Reachability Switching Games. Logical Methods in Computer Science, Volume 17, Issue 2, April 2021. doi:10.23638/LMCS-17(2:10)2021.
- [14] John Fearnley, Spencer Gordon, Ruta Mehta, and Rahul Savani. Unique End of Potential Line. Journal of Computer and System Sciences, 114:1–35, December 2020. doi:10.1016/j.jcss.2020.05.007.
- [15] Bernd Gärtner, Thomas Dueholm Hansen, Pavel Hubácek, Karel Král, Hagar Mosaad, and Veronika Slívová. ARRIVAL: Next Stop in CLS. In 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018), volume 107 of Leibniz International Proceedings in Informatics (LIPIcs), pages 60:1–60:13, Dagstuhl, Germany, 2018. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ICALP.2018.60.
- [16] Bernd Gärtner, Sebastian Haslebacher, and Hung P. Hoang. A Subexponential Algorithm for ARRIVAL. In 48th International Colloquium on Automata, Languages, and Programming (ICALP 2021), volume 198 of Leibniz International Proceedings in Informatics (Lipics), pages 69:1–69:14, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ICALP.2021.69.
- [17] Ebrahim Ghorbani, Jonah Leander Hoff, and Matthias Mnich. A Quasi-Polynomial Time Algorithm for Multi-Arrival on Tree-Like Multigraphs. In 42nd International Symposium on Theoretical Aspects of Computer Science (STACS 2025), volume 327 of Leibniz International Proceedings in Informatics (LIPIcs), pages 39:1–39:19, Dagstuhl, Germany, 2025. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.STACS.2025.39.
- [18] Sebastian Haslebacher, Jonas Lill, Patrick Schnider, and Simon Weber. Query-Efficient Fixpoints of -Contractions, March 2025. doi:10.48550/arXiv.2503.16089.
- [19] Hung P. Hoang. On Two Combinatorial Reconfiguration Problems: Reachability and Hamiltonicity. Doctoral Thesis, ETH Zurich, 2022. doi:10.3929/ethz-b-000572947.
- [20] Karthik C. S. Did the Train Reach its Destination: The Complexity of Finding a Witness. Information Processing Letters, 121:17–21, May 2017. doi:10.1016/j.ipl.2017.01.004.
- [21] W. Ludwig. A Subexponential Randomized Algorithm for the Simple Stochastic Game Problem. Information and Computation, 117(1):151–155, February 1995. doi:10.1006/inco.1995.1035.
- [22] V. B. Priezzhev, Deepak Dhar, Abhishek Dhar, and Supriya Krishnamurthy. Eulerian Walkers as a Model of Self-Organized Criticality. Physical Review Letters, 77(25):5079–5082, December 1996. doi:10.1103/PhysRevLett.77.5079.
- [23] K. Sikorski, C.W. Tsay, and H. Woźniakowski. An Ellipsoid Algorithm for the Computation of Fixed Points. Journal of Complexity, 9(1):181–200, March 1993. doi:10.1006/jcom.1993.1013.
- [24] Krzysztof Sikorski. Computational complexity of fixed points. Journal of Fixed Point Theory and Applications, 6(2):249–283, December 2009. doi:10.1007/s11784-009-0128-3.
- [25] Thomas Webster. The Stochastic Arrival Problem. In Reachability Problems, pages 93–107, Cham, 2022. Springer International Publishing. doi:10.1007/978-3-031-19135-0_7.
- [26] Thomas Webster. The Recursive Arrival Problem. Electronic Proceedings in Theoretical Computer Science, 390:168–184, September 2023. doi:10.4204/EPTCS.390.11.