Abstract 1 Introduction 2 Preliminaries 3 Partial Dominating Set and Vertex Cover 4 (#QF) Model Checking 5 Conclusion References

Solving Partial Dominating Set and Related Problems Using Twin-Width

Jakub Balabán ORCID Faculty of Informatics, Masaryk University, Brno, Czech Republic Daniel Mock ORCID Dept. of Computer Science, RWTH Aachen University, Germany Peter Rossmanith ORCID Dept. of Computer Science, RWTH Aachen University, Germany
Abstract

Partial vertex cover and partial dominating set are two well-investigated optimization problems. While they are W[1]-hard on general graphs, they have been shown to be fixed-parameter tractable on many sparse graph classes, including nowhere-dense classes. In this paper, we demonstrate that these problems are also fixed-parameter tractable with respect to the twin-width of a graph. Indeed, we establish a more general result: every graph property that can be expressed by a logical formula of the form ϕx1xkαI#yψα(x1,,xk,y)t, where ψα is a quantifier-free formula for each αI, t is an arbitrary number, and #y is a counting quantifier, can be evaluated in time f(d,k)n, where n is the number of vertices and d is the width of a contraction sequence that is part of the input. In addition to the aforementioned problems, this includes also connected partial dominating set and independent partial dominating set.

Keywords and phrases:
Partial Dominating Set, Partial Vertex Cover, meta-algorithm, counting logic, twin-width
Funding:
Jakub Balabán: Brno Ph.D. Talent Scholarship Holder – Funded by the Brno City Municipality.
Copyright and License:
[Uncaptioned image] © Jakub Balabán, Daniel Mock, and Peter Rossmanith; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms
Related Version:
Full Version: https://arxiv.org/abs/2504.18218 [3]
Acknowledgements:
We would like to thank one of the anonymous reviewers for suggesting a generalization of the logic we considered that also captures the Partial Vertex Cover problem.
Funding:
Daniel Mock and Peter Rossmanith: Supported by the Deutsche Forschungsgemeinschaft (DFG, German Science Foundation) – DFG-927/15-2
Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał Skrzypczak

1 Introduction

Vertex Cover, Independent Set, and Dominating Set are well-known graph problems that have driven significant advancements in parameterized complexity theory. Despite being NP-complete, these problems motivated the development of new approaches, as the difficulty of finding solutions of size k appears to increase significantly from one problem to the next [15]. On general graphs, Vertex Cover has been found to be fixed-parameter tractable, while Independent Set is W[1]-complete and Dominating Set is W[2]-complete. Consequently, researchers have designed faster algorithms for solving Vertex Cover on general graphs [9, 4, 7, 8, 10, 14, 36, 37, 40], while identifying more and more general graph classes that admit fixed-parameter algorithms for the other two problems. This progression started with planar graphs [1] and led to nowhere-dense graph classes via intermediate results [13, 19, 38, 12]. All three problems can be expressed in first-order logic, and significant advances have been made in meta-algorithm design to solve the first-order model-checking problem. This progression begins with bounded-degree graphs, continues through bounded genus, minor-closed, bounded expansion, nowhere-dense, and finally monadically stable classes [39, 22, 20, 11, 25, 16].

Twin-width is a recently introduced width measure that generalizes clique-width [6]. Classes of bounded twin-width do not contain bounded degree graph classes and are not necessarily monadically stable. They are therefore incomparable to the sparsity hierarchy. Bonnet et al. have developed a parameterized algorithm for first-order model-checking on classes of bounded twin-width [6]. Please note that, unlike tree-width, there is no efficient way known to compute or even approximate twin-width. Moreover, most twin-width based algorithms, including first-order model-checking, require as part of the input not only the graph but also a contraction sequence. The contraction sequence proves that the graph has small twin-width and guides an algorithm. This guidance can be compared to that of dynamic programming on tree decompositions. An optimal tree decomposition can, however, be relatively efficiently computed and even faster approximated. In the world of sparsity algorithms operating in classes of bounded expansion or nowhere-dense classes, the situation is even better: no underlying structure is needed; the algorithm works correctly on every graph but becomes slow when applied outside its scope.

While this represents a significant body of work on Vertex Cover, Independent Set, Dominating Set, and many other first-order expressible problems, the story does not end here. In Vertex Cover, you ask for k nodes that cover all edges, and in Dominating Set, you seek k nodes that dominate all other nodes. Generalizations of these problems are the partial versions: given k and t, are there k nodes that cover t edges or are there k nodes that dominate t nodes? These problems are known as Partial Vertex Cover and Partial Dominating Set; note that in the parameterized setting, k is the parameter. As generalizations, they turn out to be harder than their complete counterparts. For example, while Vertex Cover is fixed-parameter tractable on general graphs, Partial Vertex Cover has been shown to be W[1]-hard [26], and while Dominating Set is fixed-parameter tractable on degenerate graphs, Partial Dominating Set is W[1]-hard [24]. However, it is fixed-parameter tractable with respect to t even on general graphs [29]. Another example of how the partial variant can be harder are c-closed graphs, where non-adjacent vertices share at most c neighbors. Dominating Set is fixed-parameter tractable for bounded c [30], while Partial Dominating Set becomes a hard problem even for c=2 [28].

Another sequence of papers has demonstrated that Partial Dominating Set can be solved in time f(k)nO(1) for larger and larger graph classes. Amini, Fomin, and Saurabh developed an algorithm with a running time of O(f(k)tnCH) for the class of H-minor-free graphs, where CH is a constant dependent only on H. The graph classes with bounded expansion and nowhere-dense graph classes introduced in the sparsity project by Nešetřil and Ossona de Mendez [35] contain all H-minor-free classes. For bounded expansion, there exists a meta-algorithm that solves many problems, including Partial Dominating Set in linear fixed-parameter tractable time, i.e., in f(k)n steps [18]. Additionally, for nowhere-dense classes, there is a more restricted meta-algorithm that is general enough to solve Partial Dominating Set in time O(f(k)n1+ϵ) for every ϵ>0 [17].

The “simpler” Partial Vertex Cover has not seen as much attention, but has still been investigated as well; see, for example [32, 21, 33].

Our contribution.

We demonstrate that both Partial Dominating Set and Partial Vertex Cover can be solved efficiently on graph classes with bounded twin-width. To achieve this, we develop two dynamic programming algorithms that work along a contraction sequence provided as part of the input. Interestingly, both algorithms share similarities in their complexity, while usually Partial Vertex Cover is the much easier problem. The algorithms are based on ideas developed by Bonnet et al. in order to solve the (complete) Dominating Set problem on bounded twin-width [5].

Having separate algorithms for related problems is not ideal and it would be beneficial to have them emerge as special cases within a more comprehensive framework. Again, the language of logic could facilitate this. We present a meta-algorithm that solves the model-checking problem for formulas of the form ϕx1xk#yψ(x1,,xk,y)t where ψ must be quantifier-free (this logic was considered in [17]). Such a formula is true in a graph G=(V,E) if it contains nodes v1,,vk such that ψ(v1,,vk,u) holds for at least t many nodes uV. For instance, with ψ(x1,,xk,y)=i=1k(E(xi,y)xi=y), we can solve Partial Dominating Set. With a quantifier-free ψ, we can express numerous other intriguing problems, including Connected Partial Dominating Set and Independent Partial Dominating Set, as well as more exotic ones like “Are there k nodes that are all part of triangles and dominate at least t of all other nodes?” or “How many vertices do we have to delete in order to get a 2-independent set of size k?” (see [27, 2] for applications). The time needed to decide Gϕ is dO(k2d)n, which is linear FPT time. “Linear” means that the input has to be shorter than the classical encoding of the underlying graph as an adjacency list or adjacency matrix. While graphs of bounded twin-width can have a quadratic number of edges, they can still be encoded via their much shorter contraction sequence [6, 23]. Note that our single-purpose algorithm for Partial Dominating Set achieves a better running time of (kd)𝒪(kd)n.

Our meta-algorithm can, in fact, model-check even more general formulas, namely formulas of the form ϕx1xkαI#yψα(x1,,xk,y)t, where ψα is a quantifier-free formula for each αI. Such a formula ϕ is true if the sum of the numbers of vertices y satisfying the formulas ψα is at least t. Using such a formula, we can also express the Partial Vertex Cover problem, see Example 15.

Finally, let us remark that if we take a power of a graph, then its twin-width remains small [6]. This simple observation allows us to tackle the “distance-r” variants of Partial Dominating Set as well by using transductions.

2 Preliminaries

For integers i and j, we let [i,j]:={n:inj} and [i]:=[1,i]. We study finite, simple and undirected graphs with non-empty vertex set.

Twin-width.

A trigraph G is a graph whose edge set is partitioned into a set of black and red edges. The set of red edges is denoted R(G), and the set of black edges B(G); standard graphs are viewed as trigraphs with no red edges. The red graph GR of G is the graph (V(G),R(G)) and the black graph GB of G is the graph (V(G),B(G)). Any graph-theoretic notion with a color adjective (black or red) has its standard meaning applied in the corresponding graph. For example, the red degree of uV(G) in G is its degree in GR.

Given a trigraph G, a contraction of two distinct vertices u,vV(G) is the operation which produces a new trigraph by (1) removing u,v and adding a new vertex w, (2) adding a black edge wx for each xV(G) such that xu, xvB(G), and (3) adding a red edge wy for each yV(G) such that yuR(G), or yvR(G), or y contains only a single black edge to either v or u. A sequence C=(G=G1,,Gn) is a contraction sequence of G if it is a sequence of trigraphs such that |V(Gn)|=1 and for all i[n1], Gi+1 is obtained from Gi by contracting two vertices. The width of a contraction sequence C is the maximum red degree over all vertices in all trigraphs in C. The twin-width of G is the minimum width of any contraction sequence of G. An example of a contraction sequence is provided in Figure 1.

Figure 1: A contraction sequence of width 2 for the leftmost graph, consisting of 6 trigraphs.

If a contraction sequence C=(G1,,Gn) of G is clear from context, then for each i[n] and uV(Gi), we call the set of vertices of G contracted to u the bag of u and we denote it β(u). Formally, β(u)={u} if uV(G), and β(u)=β(v)β(w) if there is i[2,n] such that uV(Gi), v,wV(Gi1), and u is created by contracting v and w. Note that if a vertex appears in multiple trigraphs in C, then its bag is the same in all of them. If TV(Gi) for some i[n], then we use β(T) to denote uTβ(T).

Basic profiles.

Now we define basic profiles, inspired by the k-profiles in the Dominating Set algorithm from [5]. Intuitively, a profile describes a “type” of a subsolution we compute during our dynamic algorithms. For each profile, we will compute a subsolution that is, in some sense, best for the profile. In the end, we can read the answer to our problem from the profiles associated with the last trigraph Gn in the contraction sequence.

In the following sections, we will expand the basic profiles with extra information in two different ways: to extended profiles, which we will use to solve Partial Dominating Set and Partial Vertex Cover in Section 3, and to virtual profiles, which we will use for the model-checking in Section 4. Note that the k-profiles in [5] can also be viewed as extensions of our basic profiles. After defining the basic profiles, we will prove some of their properties, which we will later generalize to the extended and virtual profiles.

Let us fix a graph G, a contraction sequence (G=G1,,Gn) of width d, and an integer k.

Definition 1.

If i[n], then a basic i-profile is a pair (T,D) such that TV(Gi), |T|k(d+1), T is connected in GiR, DT, and |D|k.

For example, in the Partial Vertex Cover algorithm, k will be the number of covering vertices, D will be the set such that the covering vertices are in β(D), and T is the “context” in which the cover is considered, i.e., we are interested in which edges of G[β(T)] are covered (this intuition will be formalized in Definition 5).

Figure 2: Right: A basic i-profile π=(T,D). Vertices of T are colored in gray, and vertices of D have thick boundary. The new vertex of Gi is represented by the bigger disc. Left: A D-decomposition {(T1,D1),,(T4,D4)} of π. The sets T1,,T4 are represented by the colors blue, green, yellow, and pink. Vertices of D have thick boundary, and the two vertices to be contracted are inside a dashed rectangle.

Now we define how a basic i-profile can be decomposed into several basic (i1)-profiles, again inspired by [5]. Later, we will analogously define decompositions for extended and virtual profiles.

Let i[2,n], let vV(Gi) be the new vertex in Gi, let u1,u2V(Gi1) be the two vertices contracted into v, let π=(T,D) be a basic i-profile such that vT, and let T=(Tv){u1,u2}. We say that a set DT is compatible with π if D{v}=D{u1,u2}, |D|k, and vD if and only if u1D or u2D. Note that the condition |D|k is necessary only to prohibit the case |D|=k and u1,u2D.

We say that a set {(T1,D1),,(Tm,Dm)} of basic (i1)-profiles is a D-decomposition of π, see Figure 2, if:

  1. 1.

    The sets T1,,Tm are pairwise disjoint.

  2. 2.

    T=j[m]Tj, D=j[m]Dj, and D is compatible with π.

  3. 3.

    If xTj and yD for j, then xyR(Gi1).

Let us give some intuition behind condition 3. If yD, then there is a dominating (resp. covering) vertex yβ(y). If xyR(Gi1), then we would not know which vertices of β(x) are dominated by y (resp. how many edges in {xy:xβ(x)} are covered by y). Hence, the connections between profiles must be homogeneous (either a black edge or a non-edge).

Now let us prove that a small decomposition always exists (and can be found efficiently).

Lemma 2.

If i[2,n], V(Gi)V(Gi1)={v}, V(Gi1)V(Gi)={u1,u2}, π=(T,D) is a basic i-profile such that vT, T=(Tv){u1,u2}, and DT is compatible with π, then there is a D-decomposition 𝒟 of π containing at most d+2 basic (i1)-profiles. Moreover, 𝒟 can be found in time 𝒪(kd2).

Proof.

Let {T1,,Tm} be the connected components of T in Gi1R and let Dj=TjD for each j[m]. Observe that (Tj,Dj) is a basic (i1)-profile if and only if |Tj|k(d+1). Hence, if |Tj|k(d+1) for each j[m], then {(T1,D1),,(Tm,Dm)} is a D-decomposition of π; condition 3 is satisfied because there are no red edges between distinct Tj and T. Let j[m] and observe that since T is connected in GiR, there is a vertex uTj such that either uvR(Gi) or u{u1,u2}. Since v has red degree at most d in Gi, we have md+2 as required.

Now suppose that |Tj|>k(d+1) for some j[m]. Since |T|k(d+1) and TjT, we deduce that |Tj|=k(d+1)+1, m=j=1, and (Tj,Dj)=(T,D). Since each vertex in D has red degree at most d in Gi1 and |D|k, there is a vertex wTD such that wxR(Gi1) for each xD. Let {T1,,Tp} be the connected components of T{w} in Gi1R and let Dj=TjD for each j[p]. Now observe that {(T1,D1),,(Tp,Dp)}{({w},)} is a D-decomposition of π. Since Tj contains a vertex adjacent to w in Gi1R for each j[p], we have p+1d+2 as required.

Observe that the proof naturally translates into an algorithm finding the desired decomposition and that all the operations can be performed in time linear in |T|+|R(Gi1[T])|. Since |T|k(d+1)+1 and each vertex of T has red degree at most d in Gi1, there are 𝒪(kd2) red edges in Gi1[T], and so the stated running time is achieved.

Now we prove that the number of basic i-profiles containing any fixed vertex of Gi is small.

Lemma 3.

If i[n] and vV(Gi), then the number of basic i-profiles (T,D) such that vT is in d𝒪(kd). Moreover, such profiles can be enumerated in time d𝒪(kd).

3 Partial Dominating Set and Vertex Cover

In this section, we show that the following parameterized problems are fixed-parameter tractable. When a graph G is clear from context, we denote the closed neighborhood of SV(G) in G by N[S], i.e., N[S]=S{uV(G):u has a neighbor in S}.
Partial Dominating Set using twin-width
Input: A graph G, a contraction sequence for G of width d, integers k and t
Question: Is there a set SV(G) of size k such that |N[S]|t?
Parameter: k+d
Partial Vertex Cover using twin-width
Input: A graph G, a contraction sequence for G of width d, integers k and t
Question: Is there a set SV(G) of size k such that at least t edges have an endpoint in S?
Parameter: k+d

Henceforth, we refer to these problems simply as Partial Dominating Set and Partial Vertex Cover.

3.1 Extended Profiles

For both of these problems, we will need a notion of a profile, obtained by extending basic profiles introduced in Section 2. Let us fix a graph G, a contraction sequence (G=G1,,Gn) of width d, and an integer k.

Definition 4.

Let i[n] and let π=(T,D) be basic i-profile. An extended i-profile is a tuple π=(T,D,M,f) such that MT and f:T[0,k] is a function such that uTf(u)k and for each uT, f(u)|β(u)|, and D={uT:f(u)0}.

Informally, the function f specifies the distribution of the dominating (resp. covering) vertices across D, and the set M specifies which bags we want to dominate vertices in. Note that for Partial Vertex Cover, M will not be used, i.e., M= will always hold (this allows us to use the same definition of a profile for both problems). The following definition formalizes this idea.

Definition 5.

Let i[n] and let π=(T,D,M,f) be an extended i-profile. A set Sβ(T) is a solution of π if for every uT, f(u)=|Sβ(u)|. We define the dominating-set-value of S in π as |N[S]β(M)| and the vertex-cover-value of S in π as |{uvE(G):uS,vβ(T)}|.

Note that each set SV(G) can be a solution of more than one extended i-profile for each i[n]. Indeed, S determines only D and f, whereas there are more choices of T and M (T can be any small red-connected set containing D). However, it will always be clear from context which profile a solution belongs to, and so we will often simply say, e.g., the dominating-set-value of S (omitting “in π”).

Let us give a quick informal overview of how the profiles will be used to solve Partial Dominating Set. During the algorithm, we proceed through each time i ranging from 1 to n and compute for each extended i-profile π its optimal value; that is, the maximum value t such that a solution of π dominates t vertices from β(M). To compute the optimal value, we need to decompose the profile: each decomposition is a small set of extended (i1)-profiles, see Section 3.2 for a formal definition. Crucially, each solution of π is described by some decomposition, and the best solution described by a decomposition 𝒟={π1,,πm} can be computed from the optimal solutions of the profiles in 𝒟 (which were computed in the previous iteration). Hence, the optimal solution of π can be computed by trying all possible decompositions. More precisely, we do not try all decompositions but only one decomposition of each “type”. Finally, to determine how many vertices can be dominated by a set of size k in G, it suffices to examine the optimal value of one particular n-profile π (note that Gn consists of a single vertex, and so it is easy to define π explicitly). We get this value at the end of the run of Algorithm 1.

Let us now show that the number of extended i-profiles containing any fixed vertex of Gi is bounded.

Lemma 6.

If i[n] and vV(Gi), then the number of extended i-profiles (T,D,M,f) such that vT is in 2𝒪(kdlog(kd)). Moreover, such profiles can be enumerated in time 2𝒪(kdlog(kd)).

3.2 Extended Decompositions

Now we generalize the D-decompositions defined in Section 2 to extended profiles.

Let i[2,n], let vV(Gi) be the new vertex in Gi, let u1,u2V(Gi1) be the two vertices contracted into v, let π0=(T,D) be a basic i-profile such that vT, let T=T{v}{u1,u2}, and let π=(T,D,M,f) be an extended i-profile. Let M^=M{v}{u1,u2} if vM, and M^=M otherwise. We say that a function f:T[0,k] is compatible with π if f(v)=f(u1)+f(u2), f(u1)|β(u1)|, f(u2)|β(u2)|, and for each uT{v}, f(u)=f(u). Note that there is at least one function compatible with π because f(v)|β(v)|.

Let us fix a function f compatible with π, let D={uT:f(u)0}, and let M be the set defined as follows.

M={uM^:u has no black neighbor in D in Gi1}. (1)

We say that a set of extended (i1)-profiles 𝒟={(Tj,Dj,Mj,fj):j[m]} is an f-decomposition of π if f=j[m]fj, D=j[m]Dj, M=j[m]Mj, and {(T1,D1),,(Tm,Dm)} is a D-decomposition of π0.

 Remark 7.

Equation 1 allows us to avoid double-counting in the algorithm for Partial Dominating Set. Indeed, if uM^ has a black neighbor w in D, then all vertices in β(u) are dominated by some vertex in β(w). Hence, if we added u to some Mj, then vertices in β(u) would be counted as dominated twice.

Now we prove that a small f-decomposition exists for each f compatible with π.

Lemma 8.

If i[2,n], V(Gi)V(Gi1)={v}, V(Gi1)V(Gi)={u1,u2}, π=(T,D,M,f) is an extended i-profile such that vT, T=T{v}{u1,u2}, and f:T[0,k] is a function compatible with π, then there is an f-decomposition 𝒟 of π with cardinality at most d+2. Moreover, 𝒟 can be found in time 𝒪(k2d2).

The following lemma shows that a solution of a profile π can be constructed by “merging” the solutions of profiles in a decomposition of π.

Lemma 9.

If i[2,n], π is an extended i-profile, {πj:j[m]} is an f-decomposition of π, and Sj is a solution of πj for each j[m], then S:=j[m]Sj is a solution of π.

3.3 Partial Dominating Set

Let (G,C=(G1,,Gn),k,t) be an instance of the Partial Dominating Set problem; recall that C is a contraction sequence of width d. In this section, we show that Algorithm 1 solves the problem in time (dk)𝒪(dk)n, see Theorem 13. For an outline of the algorithm, see Section 3.1.

We will use the notion of extended profiles, see Definition 4, and the notion of solutions, see Definition 5. Instead of the dominating-set-value of a solution, we will say simply the value. We say that a solution S is an optimal solution of an extended profile π if no other solution of π has higher value than S.

Before presenting the algorithm, let us make two key observations.

Lemma 10.

Let i[2,n], π be an extended i-profile, {(Tj,Dj,Mj,fj):j[m]} be an f-decomposition of π, S be a solution of π, and Sj=Sβ(Tj) for each j[m]. For each j[m]:

  1. a)

    The value of Sj equals |N[S]β(Mj)|.

  2. b)

    If uTj has a black neighbor in D for some [m], then β(u)N[S].

Proof.

For a), let us fix j[m]. It suffices to prove that N[Sj]β(Mj)=N[S]β(Mj). Suppose for contradiction that there are vertices u0β(Mj) and v0SSj such that u0v0E(G). Let u,vV(Gi1) be such that u0β(u) and v0β(v), and observe that vD for some [m], j. Since uMj, uv is not a black edge in Gi1, see Equation (1). However, uv is not a red edge in Gi1 either, by condition 3 in the definition of a basic decomposition in Section 2. This is a contradiction with u0v0E(G).

For b), let us fix j[m] and uTj that has a black neighbor vD for some [m]. By Definition 4, f(v)0 and there is a vertex wβ(v)S. Hence, β(u)N(w)N[S] as required.

Algorithm 1 Algorithm for Partial Dominating Set.

Now we show that in each iteration of the loop on lines 10-17 in Algorithm 1, a solution of the currently processed profile π and its value are computed. Informally, for each profile πj in the decomposition of π, we avoid double-counting dominated vertices in β(M^Tj) by partitioning M^Tj into two subsets, Mj and Cj: β(Mj) contains vertices dominated “from inside”, i.e., via a red edge considered in one of the previous iterations, and β(Cj) contains those dominated “from outside”, i.e., via a black edge to D.

Lemma 11.

Let i[2,n], π be an extended i-profile, f be a function compatible with π, and ν and S be the values computed by Algorithm 1 on line 16 in the iteration processing f. If for each extended (i1)-profile π, S is a solution of π of value ν, where (S,ν) is the pair computed in σi1(π), then S is a solution of π of value ν.

Proof.

Let π=(T,D,M,f) and let {πj:j[m]} be the f-decomposition of π found on line 11 in the iteration processing f. For each j[m], let Tj,Dj,Mj,fj,Sj,νj, and Cj be the values computed on lines 13 and 14. By Lemma 9, S is a solution of π. To simplify notation, let δ(A):=|N[S]β(A)| for any AV(Gi) or AV(Gi1). Now it suffices to show that ν=δ(M).

Let M^ be defined as in the algorithm, see line 9, and observe that δ(M)=δ(M^). Since T1,,Tm are pairwise disjoint, it suffices to show that for each j[m], valuej computed on line 15 equals δ(M^Tj). Let us fix j[m], and observe that M^Tj=MjCj and MjCj=, see Equation (1) and line 14. By Lemma 10a, we have νj=δ(Mj) because νj is the value of Sj. By Lemma 10b, β(u)N[S] for each uCj, which implies δ(Cj)=|β(Cj)|. Hence, valuej=δ(Mj)+δ(Cj)=δ(M^Tj), and ν=δ(M) as required.

Now we show that we are able to find an optimal solution for each profile. The idea is to describe an optimal solution with a function f compatible with the considered profile, and then to show that the solution found in the iteration processing f is optimal as well.

Lemma 12.

For each i[n] and each extended i-profile π, if the final value of σi(π) computed by Algorithm 1 is (S,ν), then S is an optimal solution of π and ν is the value of S.

Proof.

Let i[n] and π=(T,D,M,f) be an extended i-profile. We proceed by induction on i. First, suppose that i=1. Since there are no red edges in G1=G and T is connected in GR, we know that T={u} for some uV(G). Notice that D,M{,{u}} and f{{(u,0)},{(u,1)}}. In particular, π has only one solution, namely D, and the value of D is |DM| as required, see line 1. Now suppose that i>1. Let vV(Gi) be the new vertex in Gi and let u1,u2V(Gi1) be the two vertices contracted into v. If vT, then π is also an (i1)-profile. By induction hypothesis, σi1(π) is an optimal solution of π, which ensures that σi(π) is also an optimal solution of π, see line 6. Hence, let us assume that vT and let T=(Tv){u1,u2}. By induction hypothesis and Lemma 11, π has a solution since there is a function compatible with π.

Let S be an optimal solution of π, let ν be the value of S, and let f:T[0,k] be defined as f(u)=|Sβ(u)|. Observe that by Definition 5, f(u)=f(u) for each uT{v}, and f(v)=|Sβ(v)|=|Sβ(u1)|+|Sβ(u2)|=f(u1)+f(u2), i.e., f is compatible with π. Let us consider the iteration of the loop on lines 5-17 processing π and the iteration of the loop on lines 10-17 processing f. Let {πj:j[m]} be the f-decomposition of π found on line 11. For each j[m], let Tj,Dj,Mj,fj,Sj,νj, and Cj be as in the algorithm. Let ν and S be the values computed on line 16. By Lemma 11, S is a solution of π with value ν. Similarly to the proof of Lemma 11, we denote δ(A)=|N[S]β(A)| and δ(A)=|N[S]β(A)| for any AV(Gi) or AV(Gi1).

Suppose for contradiction that ν<ν, i.e., δ(M)<δ(M), see Definition 5. Let M^ be as in the algorithm, see line 9, and observe that δ(M)=δ(M^) and δ(M)=δ(M^). Hence, there must be j[m] such that δ(M^Tj)<δ(M^Tj); let us fix such a j. By Lemma 10b, if uCj, then β(u)N[S]N[S]. Hence, δ(Cj)=|β(Cj)|=δ(Cj), which implies δ(Mj)<δ(Mj) because M^Tj=CjMj and MjCj=. Let Sj=Sβ(Tj) and observe that Sj is a solution of πj. By Lemma 10a, δ(Mj) is the value of Sj and δ(Mj) is the value of Sj. By induction hypothesis, Sj is an optimal solution of πj, which is a contradiction with δ(Mj)<δ(Mj). Hence, ν=ν, and S is an optimal solution of π, too.

After the iteration of the loop on lines 10-17 processing f, σi(π)=(S,ν) because S is an optimal solution of π. Observe that the second component of σi(π) cannot change in any of the following iterations because ν is always the value of some solution of π by Lemma 11. Hence, after all functions compatible with π have been processed, σi(π) is indeed an optimal solution of π and its value, as desired.

Using Lemma 12, it is easy to show the correctness of Algorithm 1.

Theorem 13.

Algorithm 1 decides the Partial Dominating Set problem in time 2𝒪(kdlog(kd))n.

Proof.

Let ι=(G,C=(G=G1,,Gn),k,t) be the input instance, where C is contraction sequence of width d. Let V(Gn)={u} and let π=({u},{u},{u},{(u,k)}). Note that π is an extended n-profile unless n<k, in which case, ι is trivially a NO instance. By Lemma 12, S is an optimal solution of π with value ν, where (S,ν) is the pair computed by Algorithm 1 on line 18. By Definition 5, |S|=k and ν=|N[S]β({u})|=|N[S]|. Hence, ι is a YES instance if and only if νt, as required.

Now need to argue that Algorithm 1 achieves the desired running time. As an optimization, we maintain a single function σ (instead of σi for each i[n]). Since there are 𝒪(n) extended 1-profiles, line 1 can be performed in time 𝒪(n). There are n1 iterations of the outermost loop (i.e., the loop on lines 2-17); let us consider the iteration processing i[2,n] and let v be the new vertex in Gi. Let π=(T,D,M,f) be an extended i-profile. Since σ(π) has already been computed if vT, it suffices to consider only profiles such that vT; these profiles can be enumerated in time 2𝒪(kdlog(kd)) by Lemma 6. There are at most k+1 functions f compatible with π and for each of them, we can find an f-decomposition of size at most md+2 in time 𝒪(k2d2) by Lemma 8. Hence, the running time of one iteration of the outermost loop is 2𝒪(kdlog(kd)), which implies that the total running time is 2𝒪(kdlog(kd))n as required.

3.4 Partial Vertex Cover

In this section, we prove the following theorem.

Theorem 14.

There is an algorithm that, given a graph G, a contraction sequence (G1=G,,Gn) of width d, and two integers k and t, decides the Partial Vertex Cover problem in time 2𝒪(kdlog(kd))n.

Because of similarity to the proof of Theorem 13, we only informally discuss the differences. The details can be found in the full version of the paper [3]. One difference mentioned already in Section 3.1 is that it suffices to consider extended i-profiles π=(T,D,M,f) such that M=.

Recall that the vertex-cover-value of a solution Sβ(T) is the number of edges in G[β(T)] covered by S, see Definition 5. Hence, if 𝒟={(Tj,Dj,,fj):j[m]} is a decomposition of π, then the edges in G[β(Tj)] covered by S are covered also by Sβ(Tj). This means that when merging solutions of profiles in 𝒟, we must only add the number δj of covered edges with one endpoint in β(Tj) and the other in β(T) for distinct j,[m]. Since there cannot be a red edge connecting Dj and T by definition of a basic decomposition, we can compute δj by inspecting the black edges between Tj and T. Observe that a black edge uvB(Gi1) semi-induces a complete bipartite graph between β(u) and β(v) in G. Because we have to avoid double-counting, we obtain the following equation:

δj=uTjvT,uvB(Gi1)fj(u)|β(v)|+f(v)|β(u)|fj(u)f(v)

Using this equation, we can compute an optimal solution of π. The rest of the proof of Theorem 14 is analogous to the proof of Theorem 13.

4 (#QF) Model Checking

We now turn our attention to the framework mentioned in the introduction. For a background in (counting) logic, we refer the readers to [31]. We consider a generalization of a fragment of the counting logic FO(>0), namely problems expressible by formulas of the form x1xkαI#yψα(x1,,xk,y)t for some quantifier-free formulas ψα, αI, and t. Such a formula is true in a graph G if there are vertices v1,,vkV(G) such that αI#yψα(v1,vk,y)t, where #yψα(v1,,vk,y) is the number of vertices wV(G) such that ψα(v1,,vk,w) holds in G.

We are interested in giving an FPT algorithm on graph classes of bounded twin-width to solve the model-checking problem for this logic.
(#QF)Model Checking using twin-width
Input: A graph G, a contraction sequence for G of width d, a finite set I, a quantifier-free formula ψα with k+1 free variables for each αI, and t
Question: Are there vertices v1,,vkV(G) such that GαI#yψα(v1vk,y)t?
Parameter: k+d111Note that we assume that each formula ψα is normalized, i.e., there is no shorter formula equivalent to ψα. Without this assumption, the parameter would have to be k+d+αI|ψα|.

It is not hard to express Partial Dominating Set in this logic, see Section 1. Let us illustrate how Partial Vertex Cover can be expressed.

Example 15.

We can express Partial Vertex Cover with I=[k] and the following formulas. For αI, let ψα(x1,,xk,y)E(xα,y)γ[α1]yxγ. Intuitively, ψα counts the number of edges covered by xα. To avoid double-counting, the potential edge xαxγ is counted by ψα only if α<γ (and otherwise it is counted by ψγ).

4.1 Virtual Profiles

In Section 3, we used extended profiles, which were obtained by “extending” basic profiles introduced in Section 2. In our model checking algorithm, we will again “extend” the basic profiles in a certain way. This time, however, these profiles will need to contain even more information than the extended profiles. Intuitively, the reason behind this change is that the k existential variables in the considered formula are not interchangeable, whereas the k vertices in a partial dominating set (or vertex cover) are. Hence, a part of a virtual profile is a function f, which describes where each existential variable should be realized.

However, we need to be able to capture the fact that some variables may be realized in a part of G not covered by the profile; this is done by adding a bounded number of “virtual” vertices and edges (𝒱 and ). Note that the virtual vertices are “new objects”; e.g., V(G)𝒱=. Moreover, we need to remember which atomic formulas (xa=xb, E(xa,xb), and negations of these two) are satisfied by which existential variables: this information is encoded in a vertex-labeled graph H. Note that if a virtual profile has a solution, then H must be compatible with f and .

Definition 16.

Let i[n] and let (T,D) be a basic i-profile. A virtual i-profile is a tuple π=(T,D,𝒱,,f,H), where:

  • 𝒱 is the set of at most k virtual vertices.

  • {uv:u𝒱T,v𝒱} is the set of virtual edges.

  • f:[k]D𝒱 is a surjective function such that |f1(u)||β(u)| for each uD.

  • H is a graph with at most k vertices with vertex set labeled as {h1,,hk}.

The expanded graph of π, denoted Gπ, is the graph with vertex set β(T)𝒱 and edge set E(G[β(T)]){uv:u,v𝒱}{u0v:uv,v𝒱,uT,u0β(u)}. A tuple 𝐬=(s1,,sk)V(Gπ)k is a solution of π if:

  • for each a[k], sa=f(a) if f(a)𝒱, and saβ(f(a)) if f(a)D;

  • the function saha is an isomorphism from Gπ[{s1,,sk}] to H.

The value of 𝐬 is defined as αI|{uβ(T):Gπψα(s1,,sk,u)}|. A solution 𝐬 of π is optimal if no other solution of π has higher value than 𝐬.

The expanded graph Gπ illustrates the concept of virtual profiles: the subgraph of G induced by the bags from T is expanded with the virtual vertices. The virtual vertices are uniformly connected to vertices from each bag in T as dictated by . A solution 𝐬 of π must then adhere to π in the following way: each sa in 𝐬 has to be the correct virtual vertex or a vertex from the correct bag as dictated by f; and 𝐬 has to induce the desired subgraph H in the expanded graph Gπ. When an optimal solution has been computed for each virtual profile, we can find the answer to the problem by inspecting an n-profile π such that 𝒱 and are empty, T=V(Gn) and β(T)=V(G), and f is the unique function from [k] to V(Gn). In contrast to the case of Partial Dominating Set, the profile π is not unique; one has to try all possible choices of H.

Now we show that the number of virtual profiles is bounded.

Lemma 17.

If i[n] and vV(Gi), then the number of virtual i-profiles (T,D,𝒱,,f,H) such that vT is in 2𝒪(k2dlog(d)). Moreover, such profiles can be enumerated in time 2𝒪(k2dlog(d)).

4.2 Virtual Decompositions

To achieve our goal of finding optimal solutions of virtual profiles, we continue similarly as in the previous section about Partial Dominating Set and Partial Vertex Cover. We will again need a notion of a decomposition for our virtual profiles. However, we must ensure that the profiles in the decomposition are “compatible” with each other with respect to the virtual vertices. Informally, the virtual edges must correspond to the black edges between the profiles in Gi1.

Let i[2,n], let vV(Gi) be the new vertex in Gi, let u1,u2V(Gi1) be the two vertices contracted into v, let π0=(T,D) be a basic i-profile such that vT, let π=(T,D,𝒱,,f,H) be a virtual i-profile, let T=T{v}{u1,u2}, and let ={uw:u,wT𝒱}{u1w,u2w:vw}. We say that a function f:[k]T𝒱 is compatible with π if f(a){u1,u2} when f(a)=v, and f(a)=f(a) otherwise.

Figure 3: Leftmost: A graph H with vertex set {h1,,h6}. The circle representing ha contains the digit a. Middle left: A virtual i-profile π=(T,D,𝒱,,f,H) for k=6. Virtual vertices are represented by violet stars and virtual edges by violet lines. T is the set of all non-virtual vertices. For each a[6], the vertex f(a) contains the digit a. D is the set f({2,5}). Middle: The circles, and black and red edges represent Gi1[T], the violet star is the vertex in 𝒱, and the violet lines represent . The digits represent the function f. The set T has two red-connected components: T1 colored in green and T2 colored in orange. Middle right: The profile (T1,D1,𝒱1,1,f1,H). Note that the facts that f1(5)=f1(6) and f1(3)f1(4)1 follow from H; they cannot be deduced from T or T. Rightmost: The profile (T2,D2,𝒱2,2,f2,H).

If a function f is compatible with π, then a set {πj=(Tj,Dj,𝒱j,j,fj,H):j[m]} of virtual (i1)-profiles is an f-decomposition if D=range(f)T, {(T1,D1),,(Tm,Dm)} is a D-decomposition of π0, and for each j[m]:

  • 𝒱j=𝒱{ha:f(a)DDj}.

  • fj(a)=f(a) if f(a)Dj𝒱, and fj(a)=ha if f(a)DDj.

  • j is the union of the following sets.

    • {uw:u,w𝒱Tj}.

    • {uha:u𝒱Tj,f(a)=wDDj,uwB(Gi1)}.

    • {hahbE(H):f(a),f(b)DDj}.

The intuition behind this construction of πj is that for each vertex in DDj, which are the vertices with some variable assigned to them, we add a new virtual vertex to 𝒱j, and j contains “restricted” to Tj (the first term), edges between a new virtual vertex ha and an “old” virtual vertex u𝒱 or a vertex uTj (the second term), and edges between two new virtual vertices (the third term). Note that we used the vertices of H to label the new virtual vertices, which means that two new virtual vertices ha and hb may be equal even when ab; this ensures the possibility of an isomorphism from a solution of πj to H. See Figure 3 for an illustration of a virtual decomposition.

Again, we prove that a small f-decomposition exists for each f compatible with π.

Lemma 18.

If i[2,n], V(Gi)V(Gi1)={v}, V(Gi1)V(Gi)={u1,u2}, π=(T,D,𝒱,,f,H) is a virtual i-profile such that vT, T=T{v}{u1,u2}, and f:[k]T𝒱 is a function compatible with π, then there is an f-decomposition 𝒟 of π with cardinality at most d+2. Moreover, 𝒟 can be found in time 𝒪(k2d2).

4.3 Combining Solutions

In Section 3, we obtained a solution for an extended i-profile π by simply taking the union of solutions of profiles in a decomposition of π. In this section, combining solutions is more complicated because each solution is a tuple, which may contain some virtual vertices.

Definition 19.

Let i[n], let π1=(T1,D1,𝒱1,1,f1,H) and π2=(T2,D2,𝒱2,2,f2,H) be two virtual i-profiles, and let 𝐬1=(s11,,sk1) and 𝐬2=(s12,,sk2) be solutions of π1 and π2, respectively. By 𝐬1𝐬2, we denote the tuple (s1,,sk)(β(D1)V(Gπ2))k such that for each a[k], sa=sa1 if f1(a)D1, and sa=sa2 otherwise.

Note that in general, the operation is neither associative nor commutative. However, we will use it only to combine solutions of profiles in a decomposition (and when restricted to such inputs, is both associative and commutative, which will be implicit in the proof of the following lemma). Let 𝐬=j[m]𝐬j=𝐬1(𝐬2). Formally, 𝐬=𝐬1 if m=1 and 𝐬=𝐬1j[2,m]𝐬j otherwise.

Lemma 20.

If i[2,n], π is a virtual i-profile, {πj:j[m]} is an f-decomposition of π, and 𝐬j is a solution of πj for each j[m], then 𝐬=j[m]𝐬j is a solution of π. Moreover, if νj is the value of 𝐬j, then the value of 𝐬 is j[m]νj.

Proof.

Let π=(T,D,𝒱,,f,H) and 𝐬=(s1,,sk). For each j[m], let πj=(Tj,Dj,𝒱j,j,fj,H) and let 𝐬j=(s1j,,skj). For each j[m], let Gj:=Gπj.

First, let a[k] be such that f(a)𝒱. Observe that for each j[m], f(a)=f(a)=fj(a)=saj, which means that sa=f(a) as desired (because sa=saj for some j[m] by Definition 19). Second, let a[k] be such that f(a)D and let j[m] be the unique index such that u:=f(a)=fj(a)Dj. By Definition 19, sa=sajβ(u) because f(a)D for each [m]{j}. By definition of f, if uV(Gi1)V(Gi), then f(a)=u. Otherwise, f(a) is the new vertex in Gi, and saβ(u)β(f(a)). In both cases, saβ(f(a)) as desired.

Now we need to show that the function saha is an isomorphism from Gπ[{s1,,sk}] to H. Let us fix a,b[k]. Since 𝐬j is a solution of πj for each j[m], it suffices to show that sasbE(Gπ)sajsbjE(Gj) and sa=sbsaj=sbj for some j[m]. First, if sa,sb𝒱 or sa,sbβ(Tj) for some j[m], then sa=saj and sb=sbj, and sasbE(Gπ)sasbE(G)sajsbjE(Gj) as required. Moreover, we clearly have sa=sbsaj=sbj; note that in all other cases, sasb and sajsbj. Second, if sa𝒱 and sbβ(u)β(u) for some uTj, j[m], and uT, then sasbE(Gπ)sausaujsasbE(Gj). Finally, assume that j,[m], j, and saβ(Tj),sbβ(T). Let u=f(a)=fj(a) and v=f(b)=f(b). By definition of a solution, we have saβ(u) and sbβ(v). Recall that D=p[m]Dp, that u,vD, and that {(Tp,Dp):p[m]} is a D-decomposition of the basic i-profile (T,D). Hence, by condition 3 in the definition of a D-decomposition, see Section 2, uvR(Gi1). Now sasbE(Gπ)sasbE(G)uvB(Gi1)uhbjsajsbjE(Gj) as required. Note that after the third equivalence, we could have used hav and continued analogously. We have shown that 𝐬 is a solution of π.

What remains to be shown is that the value of 𝐬 equals j[m]νj. Since β(T)=β(T), where T=j[m]Tj, it suffices to show that for each j[m], uβ(Tj) and αI, Gπψα(s1,,sk,u) if and only if Gjψα(s1j,,skj,u). Using the isomorphisms to H, we obtain that sasaj is an isomorphism from Gπ[{s1,,sk}] to Gj[{s1j,,skj}]. Hence, it suffices to show that for each a[k], (1) u=sau=saj, and (2) usaE(Gπ)usajE(Gj). If sa=saj, then (1) clearly holds, and if sasaj, then saβ(Tj) and saj𝒱j, which implies u{sa,saj}. Now let us focus on (2). Let ujTj and uT be such that uβ(uj)β(u). If sa=sajβ(Tj), then usaE(Gπ)usaE(G)usaE(Gj) as required. If sa=sajβ(Tj), then sa𝒱, and usaE(Gπ)usaujsajusaE(Gj) as required. Finally, suppose sasaj, i.e., saβ(T)β(Tj), and saj=ha𝒱j. Let w=f(a) and observe that, by definition of a solution, saβ(w). Since wD, we have ujwR(Gi1), see condition 3 in the definition of a D-decomposition. Hence, we have usaE(Gπ)usaE(G)ujwB(Gi1)ujhajuha=usajE(Gj) as required. We have proven that the value of 𝐬 is j[m]νj as desired.

4.4 Model Checking Algorithm

Algorithm 2 Algorithm for (#QF)Model Checking.

Now we can start proving the correctness of Algorithm 2. First, let us show that the algorithm computes an optimal solution for each virtual profile π (or it discovers that π has no solution).

Lemma 21.

For each i[n] and each virtual i-profile π, if the final value of σi(π) computed by Algorithm 2 is (𝐬,ν), then 𝐬 is an optimal solution of π and ν is the value of 𝐬. On the other hand, if σi(π)=(null,0), then π has no solution.

Using Lemma 21, it is easy to show the correctness of Algorithm 2.

Theorem 22.

Algorithm 2 decides the (#QF)Model Checking using twin-width problem in time 2𝒪(k2dlog(d))n.

Proof.

Suppose that the algorithm is given a graph G, a contraction sequence (G1=G,,Gn) of width d, and a formula ϕx1xkαI#yψα(x1,,xk,y)t. Let us say that a graph H with vertex set labeled as {h1,,hk} is a template graph. Let us consider an iteration of the loop on lines 19-21 processing a template graph H, let πH=({u},{u},,,f,H) be as on line 20, and let (𝐬H,νH) be the tuple computed on line 20. By Lemma 21, 𝐬H is an optimal solution of πH with value νH, or (𝐬H,νH)=(null,0) if πH has no solution. Since there are no virtual vertices in πH, if πH has a solution, then 𝐬H is a tuple in V(G)k, and νH=αI|{uV(G):Gψα(𝐬,u)}|.

Let (𝐬,ν) the final value of (solution, count) computed by Algorithm 2. If 𝐬=null and ν=0, then πH has no solution for any template graph H, which means that for any tuple 𝐬V(G)k, αI|{uV(G):Gψα(𝐬,u)}|=0, and (G,ϕ) is a YES-instance if and only if t=0. Otherwise, 𝐬V(G)k, ν=αI|{uV(G):Gψα(𝐬,u)}|, and ν=max{νH:H is a template graph}. Clearly, for each tuple (s1,,sk)V(G)k, there is a template graph H such that saha is an isomorphism from G[{s1,,sk}] to H, which means that (G,ϕ) is a YES-instance if and only if νt. This shows the correctness of Algorithm 2.

Now we need to argue that Algorithm 2 achieves the desired running time. As in the proof of Theorem 13, we maintain a single function σ (instead of σi for each i[n]). First, observe that by Lemma 17, there are at most 2𝒪(k2dlog(d))n virtual 1-profiles. Hence, executing the for loop on lines 1-4 takes time at most 2𝒪(k2dlog(d))n. Second, observe that there are n1 iterations of the loop on lines 5-17; let us consider the iteration processing i[2,n] and let v be the new vertex in Gi. Let π=(T,D,𝒱,,f,H) be a virtual i-profile. Since σ(π) has already been computed if vT, it suffices to consider only profiles such that vT; these profiles can be enumerated in time 2𝒪(k2dlog(d)) by Lemma 17. There are at most 2k functions f compatible with π and for each of them, we can find an f-decomposition of size at most md+2 in time 𝒪(k2d2) by Lemma 18. Hence, the running time of one iteration of the loop is 2𝒪(kdlog(kd)). Finally, since there are 2𝒪(k2) choices of H, executing the loop on lines 19-21 takes time 2𝒪(k2). In total, the running time is 2𝒪(k2dlog(d))n as required.

5 Conclusion

We have demonstrated that several optimization problems requiring counting can be efficiently solved on graphs with small twin-width. This encompasses not only well-known problems such as Partial Vertex Cover and Partial Dominating Set, but also all problems expressible by a restricted fragment of first-order counting logic. It would be desirable to extend this result by providing a more comprehensive fragment that accommodates additional problems. For bounded expansion, we can utilize formulas of the form x1xk#yϕ(x1,,xk), where ϕ is an arbitrary first-order formula rather than a quantifier-free one, and even slightly more complex formulas [18, 34]. Can we achieve the same for graphs of bounded twin-width? Moreover, we can handle even more complicated formulas with nested counting quantifiers approximately [18]. Once again, does the same or a similar result hold true for bounded twin-width? It should be noted that the best result for nowhere-dense classes is basically the same as our result for twin-width [17].

References

  • [1] Jochen Alber, Hans L. Bodlaender, Henning Fernau, Ton Kloks, and Rolf Niedermeier. Fixed parameter algorithms for DOMINATING SET and related problems on planar graphs. Algorithmica, 33(4):461–493, 2002. doi:10.1007/S00453-001-0116-5.
  • [2] Hagit Attiya and Jennifer L. Welch. Distributed computing - fundamentals, simulations, and advanced topics (2. ed.). Wiley series on parallel and distributed computing. Wiley, 2004.
  • [3] Jakub Balabán, Daniel Mock, and Peter Rossmanith. Solving partial dominating set and related problems using twin-width. CoRR, abs/2504.18218, 2025. doi:10.48550/arXiv.2504.18218.
  • [4] R. Balasubramanian, Michael R. Fellows, and Venkatesh Raman. An improved fixed-parameter algorithm for vertex cover. Inf. Process. Lett., 65(3):163–168, 1998. doi:10.1016/S0020-0190(97)00213-5.
  • [5] Édouard Bonnet, Colin Geniet, Eun Jung Kim, Stéphan Thomassé, and Rémi Watrigant. Twin-width III: max independent set, min dominating set, and coloring. SIAM J. Comput., 53(5):1602–1640, 2024. doi:10.1137/21M142188X.
  • [6] Édouard Bonnet, Eun Jung Kim, Stéphan Thomassé, and Rémi Watrigant. Twin-width I: tractable FO model checking. In Sandy Irani, editor, 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS 2020, Durham, NC, USA, November 16-19, 2020, pages 601–612. IEEE, 2020. doi:10.1109/FOCS46700.2020.00062.
  • [7] L. Sunil Chandran and Fabrizio Grandoni. Refined memorization for vertex cover. Inf. Process. Lett., 93(3):123–131, 2005. doi:10.1016/J.IPL.2004.10.003.
  • [8] Jianer Chen, Iyad A. Kanj, and Weijia Jia. Vertex cover: Further observations and further improvements. J. Algorithms, 41(2):280–301, 2001. doi:10.1006/JAGM.2001.1186.
  • [9] Jianer Chen, Iyad A. Kanj, and Ge Xia. Improved upper bounds for vertex cover. Theor. Comput. Sci., 411(40-42):3736–3756, 2010. doi:10.1016/J.TCS.2010.06.026.
  • [10] Jianer Chen, Lihua Liu, and Weijia Jia. Improvement on vertex cover for low-degree graphs. Networks, 35(4):253–259, 2000. doi:10.1002/1097-0037(200007)35:4\%3C253::AID-NET3\%3E3.0.CO;2-K.
  • [11] Anuj Dawar, Martin Grohe, and Stephan Kreutzer. Locally excluding a minor. In 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 10-12 July 2007, Wroclaw, Poland, Proceedings, pages 270–279. IEEE Computer Society, 2007. doi:10.1109/LICS.2007.31.
  • [12] Anuj Dawar and Stephan Kreutzer. Domination problems in nowhere-dense classes. In Ravi Kannan and K. Narayan Kumar, editors, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2009, December 15-17, 2009, IIT Kanpur, India, volume 4 of LIPIcs, pages 157–168. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2009. doi:10.4230/LIPIcs.FSTTCS.2009.2315.
  • [13] Erik D. Demaine, Fedor V. Fomin, Mohammad Taghi Hajiaghayi, and Dimitrios M. Thilikos. Subexponential parameterized algorithms on bounded-genus graphs and H-minor-free graphs. J. ACM, 52(6):866–893, 2005. doi:10.1145/1101821.1101823.
  • [14] Rodney G. Downey and Michael R. Fellows. Fixed parameter tractability and completeness III: some structural aspects of the W hierarchy. In Klaus Ambos-Spies, Steven Homer, and Uwe Schöning, editors, Complexity Theory: Current Research, Dagstuhl Workshop, February 2-8, 1992, pages 191–225. Cambridge University Press, 1992.
  • [15] Rodney G. Downey and Michael R. Fellows. Parameterized Complexity. Monographs in Computer Science. Springer, 1999. doi:10.1007/978-1-4612-0515-9.
  • [16] Jan Dreier, Ioannis Eleftheriadis, Nikolas Mählmann, Rose McCarty, Michal Pilipczuk, and Szymon Torunczyk. First-order model checking on monadically stable graph classes. In 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024, pages 21–30. IEEE, 2024. doi:10.1109/FOCS61266.2024.00012.
  • [17] Jan Dreier, Daniel Mock, and Peter Rossmanith. Evaluating restricted first-order counting properties on nowhere dense classes and beyond. In Inge Li Gørtz, Martin Farach-Colton, Simon J. Puglisi, and Grzegorz Herman, editors, 31st Annual European Symposium on Algorithms, ESA 2023, September 4-6, 2023, Amsterdam, The Netherlands, volume 274 of LIPIcs, pages 43:1–43:17. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.ESA.2023.43.
  • [18] Jan Dreier and Peter Rossmanith. Approximate evaluation of first-order counting queries. In Dániel Marx, editor, Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA 2021, Virtual Conference, January 10 - 13, 2021, pages 1720–1739. SIAM, 2021. doi:10.1137/1.9781611976465.104.
  • [19] John A. Ellis, Hongbing Fan, and Michael R. Fellows. The dominating set problem is fixed parameter tractable for graphs of bounded genus. J. Algorithms, 52(2):152–168, 2004. doi:10.1016/J.JALGOR.2004.02.001.
  • [20] Jörg Flum and Martin Grohe. Fixed-parameter tractability, definability, and model-checking. SIAM J. Comput., 31(1):113–145, 2001. doi:10.1137/S0097539799360768.
  • [21] Fedor V. Fomin, Petr A. Golovach, Tanmay Inamdar, and Tomohiro Koana. FPT approximation and subexponential algorithms for covering few or many edges. Inf. Process. Lett., 185:106471, 2024. doi:10.1016/J.IPL.2024.106471.
  • [22] Markus Frick and Martin Grohe. Deciding first-order properties of locally tree-decomposable structures. J. ACM, 48(6):1184–1206, 2001. doi:10.1145/504794.504798.
  • [23] Jakub Gajarský, Michal Pilipczuk, Wojciech Przybyszewski, and Szymon Torunczyk. Twin-width and types. In Mikolaj Bojanczyk, Emanuela Merelli, and David P. Woodruff, editors, 49th International Colloquium on Automata, Languages, and Programming, ICALP 2022, July 4-8, 2022, Paris, France, volume 229 of LIPIcs, pages 123:1–123:21. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ICALP.2022.123.
  • [24] Petr A. Golovach and Yngve Villanger. Parameterized complexity for domination problems on degenerate graphs. In Hajo Broersma, Thomas Erlebach, Tom Friedetzky, and Daniël Paulusma, editors, Graph-Theoretic Concepts in Computer Science, 34th International Workshop, WG 2008, Durham, UK, June 30 - July 2, 2008. Revised Papers, volume 5344 of Lecture Notes in Computer Science, pages 195–205, 2008. doi:10.1007/978-3-540-92248-3_18.
  • [25] Martin Grohe, Stephan Kreutzer, and Sebastian Siebertz. Deciding first-order properties of nowhere dense graphs. In David B. Shmoys, editor, Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 89–98. ACM, 2014. doi:10.1145/2591796.2591851.
  • [26] Jiong Guo, Rolf Niedermeier, and Sebastian Wernicke. Parameterized complexity of vertex cover variants. Theory Comput. Syst., 41:501–520, October 2007. doi:10.1007/s00224-007-1309-3.
  • [27] Mrinmoy Hota, Madhumangal Pal, and Tapan Kumar Pal. An efficient algorithm for finding a maximum weight k-independent set on trapezoid graphs. Comput. Optim. Appl., 18(1):49–62, 2001. doi:10.1023/A:1008791627588.
  • [28] Lawqueen Kanesh, Jayakrishnan Madathil, Sanjukta Roy, Abhishek Sahu, and Saket Saurabh. Further exploiting c-closure for FPT algorithms and kernels for domination problems. SIAM J. Discret. Math., 37(4):2626–2669, 2023. doi:10.1137/22M1491721.
  • [29] Joachim Kneis, Daniel Mölle, and Peter Rossmanith. Partial vs. complete domination: t-dominating set. In Jan van Leeuwen, Giuseppe F. Italiano, Wiebe van der Hoek, Christoph Meinel, Harald Sack, and Frantisek Plasil, editors, SOFSEM 2007: Theory and Practice of Computer Science, 33rd Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 20-26, 2007, Proceedings, volume 4362 of Lecture Notes in Computer Science, pages 367–376. Springer, 2007. doi:10.1007/978-3-540-69507-3_31.
  • [30] Tomohiro Koana, Christian Komusiewicz, and Frank Sommer. Exploiting $c$-closure in kernelization algorithms for graph problems. SIAM J. Discret. Math., 36(4):2798–2821, 2022. doi:10.1137/21M1449476.
  • [31] Dietrich Kuske and Nicole Schweikardt. First-order logic with counting. In 32nd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2017, Reykjavik, Iceland, June 20-23, 2017, pages 1–12. IEEE Computer Society, 2017. doi:10.1109/LICS.2017.8005133.
  • [32] Vahan Mkrtchyan and Garik Petrosyan. On the fixed-parameter tractability of the partial vertex cover problem with a matching constraint in edge-weighted bipartite graphs. J. Graph Algorithms Appl., 26(1):91–110, 2022. doi:10.7155/JGAA.00584.
  • [33] Vahan Mkrtchyan, Garik Petrosyan, K. Subramani, and Piotr Wojciechowski. On the partial vertex cover problem in bipartite graphs - a parameterized perspective. Theory Comput. Syst., 68(1):122–143, 2024. doi:10.1007/S00224-023-10152-W.
  • [34] Daniel Mock and Peter Rossmanith. Solving a family of multivariate optimization and decision problems on classes of bounded expansion. In Hans L. Bodlaender, editor, 19th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2024, June 12-14, 2024, Helsinki, Finland, volume 294 of LIPIcs, pages 35:1–35:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.SWAT.2024.35.
  • [35] Jaroslav Nesetril and Patrice Ossona de Mendez. Sparsity - Graphs, Structures, and Algorithms, volume 28 of Algorithms and combinatorics. Springer, 2012. doi:10.1007/978-3-642-27875-4.
  • [36] Rolf Niedermeier and Peter Rossmanith. Upper bounds for vertex cover further improved. In Christoph Meinel and Sophie Tison, editors, STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6, 1999, Proceedings, volume 1563 of Lecture Notes in Computer Science, pages 561–570. Springer, 1999. doi:10.1007/3-540-49116-3_53.
  • [37] Rolf Niedermeier and Peter Rossmanith. On efficient fixed-parameter algorithms for weighted vertex cover. J. Algorithms, 47(2):63–77, 2003. doi:10.1016/S0196-6774(03)00005-1.
  • [38] Geevarghese Philip, Venkatesh Raman, and Somnath Sikdar. Solving dominating set in larger classes of graphs: FPT algorithms and polynomial kernels. In Amos Fiat and Peter Sanders, editors, Algorithms - ESA 2009, 17th Annual European Symposium, Copenhagen, Denmark, September 7-9, 2009. Proceedings, volume 5757 of Lecture Notes in Computer Science, pages 694–705. Springer, 2009. doi:10.1007/978-3-642-04128-0_62.
  • [39] Detlef Seese. Linear time computable problems and first-order descriptions. Math. Struct. Comput. Sci., 6(6):505–526, 1996. doi:10.1017/s0960129500070079.
  • [40] Ulrike Stege, Iris van Rooij, Alexander Hertel, and Philipp Hertel. An o(pn + 1.151p)-algorithm for p-profit cover and its practical implications for vertex cover. In Prosenjit Bose and Pat Morin, editors, Algorithms and Computation, 13th International Symposium, ISAAC 2002 Vancouver, BC, Canada, November 21-23, 2002, Proceedings, volume 2518 of Lecture Notes in Computer Science, pages 249–261. Springer, 2002. doi:10.1007/3-540-36136-7_23.