Abstract 1 Introduction 2 Preliminaries 3 Bounding the Size of Minimal Obstructions and an Algorithm to Compute it 4 Cubic Vertex Kernel for Vertex Deletion to 𝒅-VCC 5 Linear Vertex Kernel for Edge Deletion to 𝒅-Vertex Cover Components 6 Conclusion References

Kernelization in Almost Linear Time for Clustering into Bounded Vertex Cover Components

Sriram Bhyravarapu ORCID Indian Institute of Technology Guwahati, India Pritesh Kumar ORCID The Institute of Mathematical Sciences, Chennai, India Madhumita Kundu ORCID University of Bergen, Norway Shivesh K. Roy The Institute of Mathematical Sciences, Chennai, India Sahiba Indian Institute of Technology Delhi, New Delhi, India Saket Saurabh ORCID The Institute of Mathematical Sciences, Chennai, India
Abstract

Motivated by the growing interest in graph clustering and the framework proposed during the Dagstuhl Seminar 23331, we consider a natural specialization of this general approach (as also suggested during the seminar). The seminar introduced a broad perspective on clustering, where the goal is to partition a graph into connected components (or “clusters”) that satisfy simple structural integrity constraints – not necessarily limited to cliques.

In our work, we focus on the case where each cluster is required to have bounded vertex cover number. Specifically, a connected component C satisfies this condition if there exists a set SV(C) with |S|d such that CS is an independent set. We study this within the framework of the Vertex Deletion to d-Vertex Cover Components (Vertex Deletion to d-VCC) problem: given a graph G and an integer k, the task is to determine whether there exists a vertex set SV(G) of size at most k such that every connected component of GS has vertex cover number at most d. We also examine the edge-deletion variant, Edge Deletion to d-Vertex Cover Components (Edge Deletion to d-VCC), where the goal is to delete at most k edges so that each connected component of the resulting graph has vertex cover number at most d. We obtain following results.

  1. 1.

    Vertex Deletion to d-VCC admits a kernel with 𝒪(d6k3) vertices and 𝒪(d9k4) edges.

  2. 2.

    Edge Deletion to d-VCC, admits a kernel with 𝒪(d4k) vertices and 𝒪(d5k) edges.

Both of our kernelization algorithms run in time 𝒪(1.253d(kd)𝒪(1)nlogn). It is important to note that, unless the Exponential Time Hypothesis (ETH) fails, the dependence on d cannot be improved to 2o(d), as the case k=0 reduces to solving the classical Vertex Cover problem, which is known to require 2Ω(d) time under ETH.

A key ingredient in our kernelization algorithms is a structural result about the hereditary graph class 𝒢d, consisting of graphs in which every connected component has vertex cover number at most d. We show that 𝒢d admits a finite obstruction set (with respect to the induced subgraph relation) of size 2𝒪(d2), where each obstruction graph has at most 3d+2 vertices. This combinatorial result may be of independent interest.

Keywords and phrases:
Parameterized complexity, Polynomial Kernels, Vertex Cover, Finite Forbidden Characterization
Copyright and License:
[Uncaptioned image] © Sriram Bhyravarapu, Pritesh Kumar, Madhumita Kundu, Shivesh K. Roy, Sahiba, and Saket Saurabh; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms
; Mathematics of computing Graph algorithms
Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał Skrzypczak

1 Introduction

Graph modification problems, especially vertex and edge deletions to achieve a desired structural property, are central to algorithmic graph theory [4, 6, 15, 30, 35]. Formally, given a fixed graph class 𝒢, the goal is to delete at most k vertices or edges from an input graph G so that the resulting graph belongs to 𝒢. This general framework captures a wide variety of well-studied problems, including Vertex Cover [16], Feedback Vertex Set [16], Planar Deletion [26, 28], Multiway Cut [31], Interval Deletion [9], Chordal Deletion [10], and Claw-Free Deletion [15]. A key motivation for studying such problems is that many computationally hard problems become tractable when restricted to graphs in 𝒢 [1, 7, 15, 20]. Among these, the Vertex Cover problem is particularly fundamental. Given a graph G and an integer k, the Vertex Cover problem asks whether G contains a vertex set SV(G), also called vertex cover of G, of size at most k such that GS does not contain an edge.

One of the classical graph modification problems also viewed as a graph clustering problem asks whether a given graph can be transformed into a cluster graph (i.e., a graph in which every connected component is a clique) by deleting at most k vertices or k edges [23, 29]. This blends the perspectives of graph editing and clustering. Building on this line of work, and inspired by the framework proposed during the Dagstuhl Seminar 23331 [27], we consider a natural specialization of this general approach (also suggested during the seminar). The seminar introduced a broad perspective on clustering, where the goal is to partition a graph into connected components (or “clusters”) that satisfy simple structural integrity constraints, not necessarily limited to cliques.

One such question proposed during the seminar is the Vertex Decomposition into Small Dominator Clusters problem. Given a graph G and parameters (k,d), the task is to determine whether at most k vertices can be deleted from G to obtain a graph G such that each connected component of G has domination number at most d [27]. The seminar posed the open question of whether this problem is fixed-parameter tractable (FPT) when parameterized by the combined parameters k and d. Since the problem is known to be W[2]-complete when k=0 [16], it remains computationally hard even in the absence of deletions. Nonetheless, it was natural to ask whether an algorithm exists when the parameter d is allowed to appear in the exponent of n. This question was recently answered in the affirmative by Bentert et al. [5], who presented an algorithm with running time f(k,d)n𝒪(d).

In this work, we investigate two natural variants of this emerging family of vertex-deletion and edge-deletion clustering problems. Specifically, we study the Vertex Deletion to d-Vertex Cover Components and Edge Deletion to d-Vertex Cover Components problems, where the objective is to delete at most k vertices or edges, respectively, so that each connected component of the resulting graph has vertex cover of size at most d.

In the same seminar [27], Karypis et al. also proposed the study of the Vertex Decomposition into Small Vertex Cover Clusters problem, referred to as the Layered Vertex Cover problem. In this problem, the goal is to delete a small number of vertices so that every connected component of the resulting graph can be further reduced by deleting at most d1 vertices, resulting in a graph where each connected component has a vertex cover of size at most d2. This formulation is closely related to our investigation of the Vertex Deletion to d-VCC and Edge Deletion to d-VCC problems.

While in the work of Bentert et al. [5], the classical Dominating Set problem played a central role in characterizing the connected components after the deletion of a small number of vertices, in our work, the Vertex Cover problem serves an analogous foundational role.

The Vertex Cover is one of the most extensively studied problems in parameterized complexity, and has served as a cornerstone in the development of both theoretical frameworks and algorithms especially in the context of kernelization, which is a central theme of this paper [16, 19].

Kernelization is a core technique in parameterized complexity. It focuses on designing polynomial-time preprocessing algorithms that reduce a given instance to an equivalent one of size bounded by a function of the parameter, while preserving correctness guarantees (see Definition 9 for a formal definition). The Vertex Cover problem has inspired a rich toolbox of such techniques, including crown rule reductions, the Nemhauser–Trotter theorem, and LP-based kernelization methods [16, 19, 13, 32, 33, 18, 3, 2, 14, 8, 25].

1.1 Our Results and Methods

From a parameterized complexity perspective, both Vertex Deletion to d-VCC and Edge Deletion to d-VCC exhibit rich algorithmic structure. Our main result is an almost-linear-time kernelization for both problems.

Theorem 1.

Vertex Deletion to d-VCC admits a kernel with at most 𝒪(d6k3) vertices and 𝒪(d9k4) edges. Furthermore, it can be computed in time 𝒪(1.253d(kd)𝒪(1)nlogn).

Theorem 2.

Edge Deletion to d-VCC admits a kernel with at most 𝒪(d4k) vertices and 𝒪(d5k) edges. Furthermore, it can be computed in time 𝒪(1.253d(kd)𝒪(1)nlogn).

In the same report [27] by Dagstuhl, the importance of developing “truly linear-time” FPT algorithms was emphasized – those with running time 𝒪(n+f(k)) – to handle large-scale network data. While recent advances have made progress in this direction [11, 12], the area remains relatively underexplored. We believe that our kernelization results also contribute meaningfully to this growing body of work.

A central ingredient in our kernelization framework is a structural result concerning the hereditary graph class 𝒢d, defined as the class of graphs in which every connected component has vertex cover number at most d. We show that this class admits a finite forbidden induced subgraph characterization: every minimal obstruction has at most 3d+2 vertices, and the total number of such obstructions is bounded by 2𝒪(d2). This structural result may be of independent interest and could find applications in other graph modification problems where the goal is to decompose a graph into connected components with bounded vertex cover number.

Let Obsi(𝒢d) denote the set of minimal forbidden induced subgraphs for 𝒢d. Observe that, since each graph HObsi(𝒢d) has at most 3d+2 vertices, one can design a fixed-parameter tractable (FPT) algorithm for both Vertex Deletion to d-VCC and Edge Deletion to d-VCC with running time d𝒪(k)n𝒪(d). The idea is to enumerate all subsets of V(G) of size at most 3d+2 and check whether any such subset induces a graph in Obsi(𝒢d). If so, the algorithm branches on how to intersect the obstruction using at most k deletions. A natural question that arises is whether we can identify an obstruction graph HObsi(𝒢d) more efficiently than by brute-force enumeration. This leads us to the following algorithmic problem.

We design the following algorithm for the Membership or an Obstruction to 𝒢d problem.

Theorem 3.

Let G be a graph on n vertices. Then, in time 𝒪(1.253dd𝒪(1)nlogn), one can either verify that G𝒢d, or output an induced subgraph HiG such that HObsi(𝒢d) and |V(H)|3d+2.

It is important to note that, while the algorithm of Bentert et al. [5] necessarily incurs an n𝒪(d) dependence in its running time, our results achieve an almost-linear dependence on the input size. At the same time, unless the Exponential Time Hypothesis (ETH) fails, the dependence on d cannot be improved to 2o(d) in our setting either. This is because the special case k=0 reduces to the classical Vertex Cover problem, which is known to require 2Ω(d) time under ETH [24].

Finally, we turn to the Edge Deletion to d-VCC problem. Observe that for d=0, the problem is solvable in polynomial time: in this case, the task reduces to deleting all edges from the input graph, yielding an edgeless graph, which trivially satisfies the vertex cover condition. This stands in contrast to the classical Vertex Cover problem. However, this tractability does not extend beyond d=0. In fact, one can show that Edge Deletion to d-VCC becomes NP-complete already for d=1. Specifically, we can prove that deciding whether one can delete k edges to obtain a graph in which every connected component is a star is NP-complete, via a reduction from the Dominating Set problem.

As a final remark, we observe that the above formulation captures a hierarchy of increasingly general problems. When d=0, the vertex-deletion variant reduces to the classical Vertex Cover problem. For d=1, each connected component becomes a star. As d increases, the allowed components grow in structural complexity, yet remain bounded by a core of size at most d that governs their internal interactions. This hierarchy offers a smooth trade-off between expressiveness and algorithmic tractability.

2 Preliminaries

Graphs.

We use standard graph-theoretic notation, and we refer the reader to Diestel [17] for any undefined terms. We consider simple unweighted undirected graphs. For a positive integer , We use [] to denote the set {1,,}. For a graph G, we use V(G) and E(G) to denote the set of vertices and edges of G, respectively. For vertices u,vV(G), we write uv to indicate that {u,v}E(G). For a graph G and a vertex set SV(G), we define GS to be the graph obtained after deleting the set of vertices S from G. If SV(G) is singleton, that is S={s}, then we use Gs instead of G{s}. Similarly, for a subset of edges SE(G), we define GS to be the graph obtained after deleting the set of edges S from G. If SE(G) is a singleton, that is S={uv}, then we use Guv instead of G{uv}.

For a vertex vV(G), we say that u is a neighbor of v if uv is an edge in G. Further, we denote neighborhood of a vertex v in graph G as 𝖭G(v) to be the set of vertices that are neighbor to v, i.e., we have 𝖭G(v):={uuvE(G)}. For a set of vertices SV(G), the neighborhood of S is denoted by 𝖭G(S) and defined as 𝖭G(S)(vS𝖭G(v))S. Similarly, for a set of vertices SV(G), the closed neighborhood of S is denoted by 𝖭G[S] and defined as 𝖭G[S](vS𝖭G(v))S. We omit the subscript G when the graph is clear from the context. For a graph G and a vertex v, we denote by Ev the set of edges incident to v, that is, Ev{uvuvE(G)}.

We say that a graph H is a subgraph of G if V(H)V(G) and E(H)E(G). Further we say that a graph H is an induced subgraph of G if V(H)V(G) and E(H)={uv{u,v}V(H) and uvE(G)}. We define the neighborhood of H as 𝖭G(V(H))V(H) and denote it by 𝖭G(H). We say that an edge uvE(G) is an internal edge of H if u,vV(H). For a pair of vertices u,vV(G), a uv path is a sequence of vertices (u=x1,x2,,xk=v) such that xixi+1E(G) for all i[k1]. The vertices x2,,xk1 are called the internal vertices of the uv path. The length of a path is defined as the number of vertices it contains.

The distance between two vertices u and v in a graph G, denoted by distG(u,v), is defined as the length of any shortest path between them in G. A subgraph T of G is called a tree if it is connected and acyclic. We say that T is a rooted tree if there is a designated root, and we denote the root of T as root(T).

We denote vc(G) to be the size of a minimum vertex cover of G, and alternately we call it as vertex cover number of G and minvc(G) to be a minimum vertex cover set of G. Further, we denote by 𝒞𝒞(G) the set of connected components in G. Note that every connected component of a graph G is an induced subgraph of G. For a connected component C𝒞𝒞(G), we define vc(C) to be the size of a minimum vertex cover of the connected component C of G.

Further, we define the boundary of a set of vertices in G as follows:

Definition 4 (Boundary of a set of vertices [19]).

For a graph G and a vertex subset SV(G), we define the boundary of S as

G(S)={vSNG(v)S}.

We refer to G(S) as the boundary of S. When the graph G is clear from context, we omit the subscript and write (S).

Now we state the well-known Hall’s theorem which we need in Section 3.

Theorem 5 (Hall’s theorem [17]).

Let G=(AB,E) be a bipartite graph with bipartition A and B. Then, there exists a matching that matches every vertex in A to a distinct vertex in B if and only if for every subset SA, it holds that |NG(S)||S|.

Theorem 6 (Hopcroft-Karp algorithm [22, 16]).

Let G be an undirected bipartite graph with bipartition V1 and V2, on n vertices and m edges. Then we can find a maximum matching as well as a minimum vertex cover of G in time 𝒪(mn). Furthermore, in time 𝒪(mn), either we can find a matching saturating V1, or an inclusion-wise minimal set XV1 such that |N(X)|<|X|.

Definition 7 (Tree Decomposition [16]).

A tree decomposition of a graph G=(V,E) is a pair (𝒯,{XtVtV(𝒯)}), where 𝒯 is a tree and each node t of 𝒯 is assigned a set XtV, called a bag, such that:

  1. 1.

    For every vertex vV, there exists at least one bag Xt such that vXt.

  2. 2.

    For every edge {u,v}E, there exists a bag Xt such that {u,v}Xt.

  3. 3.

    For every vertex vV, the set of nodes {tV(𝒯)vXt} induces a connected subtree of 𝒯.

Definition 8 (Tree Width [16]).

The width of a tree decomposition is the size of its largest bag minus one, i.e., maxtV(𝒯)|Xt|1. The treewidth of G, denoted tw(G), is the minimum width over all possible tree decompositions of G.

It is easy to note that for a graph G, we have tw(G)vc(G), where vc(G) is the size of a minimum vertex cover of G [16].

Let vcc(G) denote the maximum over vertex cover number of all the connected components of G, that is,

vcc(G)max{vc(G[C])C is a connected component of G}.

We say that a graph G satisfies vcc(G)d if every connected component of G has vertex cover number at most d.

Due to space constraints, the proofs of the results marked () will be presented in the full version of the paper.

Parameterized algorithms and Kernelization.

In parameterized complexity, computational problems are analyzed based on two inputs: the main input size n and an additional parameter k, which typically captures some structural aspect of the instance.

Kernelization is a formal framework for polynomial-time preprocessing in parameterized complexity.

Definition 9 (Kernelization).

Given an instance (I,k) of a parameterized problem, a kernelization algorithm transforms it in polynomial time into a new instance (I,k) – called the kernel – such that:

  • the size of (I,k) is bounded by a function f(k) (independent of the original input size), and

  • the new instance is equivalent to the original one; that is, (I,k) is a YES-instance if and only if (I,k) is.

If f(k) is a polynomial function, then the kernel is referred to as a polynomial kernel.

For a detailed introduction to parameterized algorithms and kernelization, we refer the reader to the textbooks [16, 19].

3 Bounding the Size of Minimal Obstructions and an Algorithm to Compute it

For a non-negative integer d, let 𝒢d denote the class of graphs in which every connected component has vertex cover number at most d. That is,

𝒢d={Gvcc(G)d}.

Note that 𝒢d is a hereditary graph class – meaning that if G𝒢d, then every induced subgraph of G also belongs to 𝒢d.

Our problems, Vertex Deletion to d-VCC and Edge Deletion to d-VCC, correspond to deleting at most k vertices or k edges, respectively, to obtain a graph in 𝒢d. A standard approach for designing FPT algorithms or polynomial kernels is to identify a finite forbidden subgraph characterization of the base class 𝒢d. In this section, we pursue this approach. For a fixed integer d, we also develop a recognition algorithm that, given a graph G, runs in near-linear time and either confirms that G𝒢d, or returns a small induced subgraph that certifies G𝒢d (see Theorem 3).

3.1 Finite Forbidden Characterization

To show that 𝒢d admits a finite forbidden characterization under the induced subgraph relation, we begin by defining the notion of minimal obstructions for hereditary graph classes. A graph H is called an obstruction for a graph class  if H. We now formally define the family of minimal such obstructions.

Definition 10 (Family of Minimal Obstructions).

Let  be a hereditary graph class. A graph H is a minimal obstruction for  under the induced subgraph relation if H, but every proper induced subgraph of H belongs to . The set of all such minimal obstructions is denoted by Obsi(), and is defined as:

Obsi()={Hfor all HiH,H}.

Here, HiH indicates that H is a proper induced subgraph of H.

The following lemma establishes that all minimal obstructions for the class 𝒢d are necessarily connected graphs.

Lemma 11.

Let 𝒢d be the graph class defined above. Then every graph HObsi(𝒢d) is connected.

Proof.

Suppose, for the sake of contradiction, that there exists a graph HObsi(𝒢d) that is disconnected and has at least two connected components. Since vcc(H)>d, at least one connected component, say C, must have vertex cover number greater than d. But then H[V(C)] is a proper induced subgraph of H and also violates the condition vcc(G)d, implying H[V(C)]𝒢d. This contradicts the minimality of H, as not all its proper induced subgraphs belong to 𝒢d. Hence, every minimal obstruction must be connected.

Next, we establish several structural properties of the minimal obstructions for 𝒢d. These results will later be combined in Lemma 16 to show that the set of minimal obstructions for 𝒢d is finite and its size is bounded by 2𝒪(d2). Moreover, we show that every such obstruction has a number of vertices linear in d. As a first step, we prove that every minimal obstruction for 𝒢d has vertex cover number exactly d+1.

Lemma 12.

Let 𝒢d be defined as above. Let HObsi(𝒢d) then vc(H)=d+1.

Proof.

By Definition 10, since HObsi(𝒢d), we know that H𝒢d. This implies that vc(H)d+1. To complete the proof, we show that vc(H)d+1. Suppose, for contradiction, that vc(H)d+2.

Let T be a spanning tree of H, and let x be a leaf of T. Then the graph H=H{x} is connected, since removing a leaf from a spanning tree does not disconnect it. Moreover, HiH. Observe that removing a vertex from a graph can decrease the size of a minimum vertex cover by at most one. Therefore,

vc(H)vc(H)1(d+2)1=d+1.

This implies that H𝒢d, contradicting the fact that H is a minimal obstruction – since all proper induced subgraphs of H must belong to 𝒢d.

We conclude that our assumption vc(H)d+2 is false. Hence, vc(H)=d+1, as claimed.

To establish a bound on the size of each graph HObsi(𝒢d), we make use of the following well-known result, which relates the vertex cover number and the connected vertex cover number of a connected graph. While the size bound is well known, we are not aware of any existing implementation that computes the corresponding set efficiently in linear time.

Proofs of the lemmata marked with  are provided in the full version of the paper.

Lemma 13 ().

Let G be a connected graph, and let SV(G) be a vertex cover of G. Then there exists a set YV(G)S with |Y||S|1 such that the induced subgraph G[SY] is connected. Moreover, such a set Y can be computed in 𝒪(m+n) time.

Next, our goal is to establish an upper bound on the size of each minimal obstruction in 𝒢d. To achieve this, we first prove the following lemma, which we use in the subsequent lemma to derive the desired size bound on minimal obstructions.

Lemma 14 ().

Let G be a connected graph with vc(G)=. Suppose we are given sets SS, where S is a vertex cover of size and G[S] is connected. Let I=V(G)S, and suppose II with |I|=+1. Then there exists a vertex vI such that Gv remains connected and vc(Gv)=. Moreover, such a vertex can be found in time 𝒪(2.5).

We are now ready to prove the upper bound on the size of an obstruction.

Lemma 15.

Let 𝒢d be as defined above. Let HObsi(𝒢d) then |V(H)|3d+2.

Proof.

Suppose for contradiction that there exists a graph HObsi(𝒢d) such that |V(H)|3d+3. By the definition of Obsi(𝒢d), we have that H is connected and vc(H)=d+1.

Let S be a minimum vertex cover of H, so |S|=d+1. The complement I:=V(H)S is an independent set, and we have:

|I|=|V(H)||S|(3d+3)(d+1)=2d+2.

Since H is connected and S is a vertex cover, we can apply Lemma 13 to find a subset YI of size at most d such that the subgraph H[SY] is connected. Let S=SY, and observe that G[S] is connected and |S|d+1+d=2d+1.

Now define I:=IY. Then

|I||I||Y|(2d+2)d=d+2.

Now, let II be an arbitrary subset of size exactly +1 where =d+1=vc(H). Thus, all conditions of Lemma 14 are satisfied: H is connected, vc(H)=, S is a vertex cover of size , SS with H[S] connected, and IV(H)S with |I|=+1.

By Lemma 14, there exists a vertex vI such that the graph H:=Hv is connected and vc(H)==d+1. But then H is a proper induced subgraph of H that is still connected and has vertex cover number d+1. This contradicts the assumption that HObsi(𝒢d), since H would not be minimal.

Thus, our assumption was false and we must have |V(H)|3d+2, completing the proof.

We combine the results obtained above in this section to prove the following lemma.

Lemma 16.

Let 𝒢d be as defined above. Then the obstruction set Obsi(𝒢d) contains at most 2𝒪(d2) graphs. Moreover, every graph HObsi(𝒢d) has at most 3d+2 vertices.

Proof.

By Lemma 15, every graph HObsi(𝒢d) has at most 3d+2 vertices and vertex cover number vc(H)=d+1. Therefore, the total number of such obstructions is bounded by the number of connected graphs on at most 3d+2 vertices. This number is at most 2(3d+2)2=2𝒪(d2), yielding the claimed bound on the size of the obstruction set.

3.2 Membership or an Obstruction to 𝓖𝒅

In this section, we present an algorithm for Membership or an Obstruction to 𝒢d parameterized by d. In particular, we prove the following result.

Theorem 3. [Restated, see original statement.]

Let G be a graph on n vertices. Then, in time 𝒪(1.253dd𝒪(1)nlogn), one can either verify that G𝒢d, or output an induced subgraph HiG such that HObsi(𝒢d) and |V(H)|3d+2.

For our algorithm, we require the following result, which combines a linear-time kernel for the classical Vertex Cover problem [34] with the currently known fastest parameterized algorithm for Vertex Cover [21].

Proposition 17.

Vertex Cover can be solved in time 𝒪(1.253ηη𝒪(1)+ηn) or 𝒪(2ηη3+ηn) on an instance (G,η), where |V(G)|=n.

We use this result as a subroutine in our algorithm for Membership or an Obstruction to 𝒢d, where we need to repeatedly solve Vertex Cover on various induced subgraphs of the input graph. Since the parameter d in Membership or an Obstruction to 𝒢d bounds the vertex cover number of each connected component in the target graph, we can apply the proposition with ηd+1, ensuring that each call to Vertex Cover runs efficiently with respect to the parameter d.
Our proof proceeds in the following steps:

Step 0.

We begin by applying a modified breadth-first search (BFS) that either determines that the total number of edges in G is at most dn, or returns a subgraph GG with |E(G)|=dn+1.

Observe that if G𝒢d, then the number of edges in G is upper bounded by dn. Indeed, if a connected component C has vertex cover number at most d, then the number of edges in C is at most d|V(C)|. Summing this bound over all connected components yields the claimed global bound of dn on the total number of edges.

In the latter case, when the algorithm returns a subgraph GG with dn+1 edges, we can immediately proceed to Step 2. This entire step can be executed in time 𝒪(dn).

Step 1.

Given a graph G, we first use Proposition 17 to check whether vcc(G)d. If this test fails, then there exists a connected component CG such that vc(G[C])>d. From this point onward, we focus on the subgraph G[C], and aim to output an obstruction HObsi(𝒢d) with V(H)V(C). Without loss of generality, we refer to G[C] as G itself, as we may assume G is connected.

Step 2.

In the second step, we identify a connected induced subgraph H′′G such that vc(H′′)=d+1.

Step 3.

Next, we obtain a subgraph HH′′ by making the argument of Lemma 15 constructive. This guarantees that |V(H)|3d+1. However, H may not yet belong to Obsi(𝒢d).

Step 4.

Finally, by removing additional vertices from H, we obtain a graph HObsi(𝒢d).

This completes the description of the algorithm for Membership or an Obstruction to 𝒢d. Next, we show the implementation of some of the non-trivial steps below. The implementation of Steps 2, 3 and 4 will be provided in the full version of the paper.

Running time.

The initial graph H has at most 3d+2 vertices. In each iteration, we go over all vertices vV(H) and compute the vertex cover number of Hv. This takes 𝒪(3d+2) vertex cover computations per step as the number of connected component in Hv is 𝒪(3d+2). Since one vertex is removed in each iteration, the total number of steps is at most 3d+2. Hence, the total running time to implement this step is bounded by 1.253dd𝒪(1).

4 Cubic Vertex Kernel for Vertex Deletion to 𝒅-VCC

This section presents a polynomial kernel for Vertex Deletion to d-VCC parameterized by k. As a first step, we compute an 𝒪(d)-approximate solution for Vertex Deletion to d-VCC, which serves as the basis for further reduction.

4.1 Approximation Algorithm for Vertex Deletion to 𝒅-VCC

Lemma 18.

Let (G,k) be an instance of Vertex Deletion to d-VCC. Then, in time 𝒪(k(1.253dd𝒪(1)nlogn)), we can either find a set SV(G) of size at most (3d+2)k such that vcc(GS)d, or correctly conclude that (G,k) is a No-instance of Vertex Deletion to d-VCC.

Proof.

We iteratively construct a solution SV(G) of size at most k(3d+2) by repeatedly identifying a minimal obstruction using Theorem 3. We also maintain a family 𝒫 of induced subgraphs and a counter k0. The procedure proceeds as follows:

  1. 1.

    While G contains a minimal obstruction HObsi(𝒢d) and kk+1, do:

    1. (a)

      Add V(H) to the solution: SSV(H),

    2. (b)

      Add H to the family: 𝒫𝒫{H},

    3. (c)

      Increment the counter: kk+1,

    4. (d)

      Remove V(H) from G.

  2. 2.

    If k=k+1, return that (G,k) is a No-instance of Vertex Deletion to d-VCC.

  3. 3.

    Otherwise, return the set S.

Correctness follows from the fact that the obstructions added to 𝒫 are pairwise vertex-disjoint. Since each obstruction is a minimal forbidden induced subgraph for 𝒢d, any feasible solution must delete at least one vertex from each obstruction to ensure that the resulting graph belongs to 𝒢d. Thus, if we identify k+1 such disjoint obstructions, any solution must contain at least k+1 vertices, implying that (G,k) is a No-instance.

In the other case, we remove at most k disjoint obstructions. By Lemma 15, each obstruction contains at most 3d+2 vertices. Hence, the total number of vertices added to S is at most k(3d+2). Moreover, since GS contains no induced obstruction, we have vcc(GS)d, and therefore GS𝒢d.

Finally, since we invoke Theorem 3 at most k+1 times, the overall running time is bounded accordingly. This concludes the proof.

4.2 Marking and Irrelevant Vertices

From this point onward, we assume that we are given a set SV(G) of size at most (3d+2)k such that vcc(GS)d. We now examine the connected components of the graph GS. Let 𝒞𝒞(GS) denote the set of connected components of GS. We partition 𝒞𝒞(GS) into two subsets based on the size of the components: We now partition the set of connected components 𝒞𝒞(GS) based on their size:

  • Let 𝒞1:={C𝒞𝒞(GS)|V(C)|=1} denote the set of singleton components (i.e., isolated vertices).

  • Let 𝒞2:={C𝒞𝒞(GS)|V(C)|>1} denote the set of components with more than one vertex.

We first introduce the following simple reduction rule, which removes all connected components C of G such that vc(C)d. The safeness of this rule is immediate.

Reduction Rule 1.

Let C𝒞𝒞(GS) be a connected component such that every vertex vV(C) satisfies NG(v)S=. In this case, remove C from the graph. The resulting instance is (GC,k).

Next, we aim to bound the number of connected components in 𝒞𝒞(GS) that contain more than one vertex, i.e., the components in the set 𝒞2. To achieve this, we make use of the Expansion Lemma.

Definition 19 (q-Expansion).

Let G be a bipartite graph with vertex bipartition (A,B), and let XA, YB. We say that X has a q-expansion into Y if there exists a collection of q|X| edges from X to Y such that:

  • Each vertex in X is incident to exactly q of these edges, and

  • The endpoints of these q|X| edges in Y are distinct (i.e., no vertex in Y is incident to more than one of the selected edges).

Equivalently, there exists a collection of q pairwise vertex-disjoint matchings from X into Y.

Lemma 20 (Expansion Lemma [19]).

Let q be a positive integer, and let G be a bipartite graph with vertex bipartition (A,B) such that:

  1. (i)

    |B|q|A|, and

  2. (ii)

    There are no isolated vertices in B.

Then, there exist nonempty vertex sets XA and YB such that:

  • The set X has a q-expansion into Y, and

  • No vertex in Y has a neighbor outside X, that is, 𝖭(Y)X.

Furthermore, the sets X and Y can be found in time 𝒪(mn).

To bound the number of non-trivial connected components in GS, we apply the q-Expansion Lemma. Specifically, we aim to upper-bound the number of components in 𝒞2. To this end, we construct a bipartite graph B=(S𝒞2,EB) that captures the adjacency between the approximate deletion set S and the components in 𝒞2. Formally, the bipartition of B is defined as follows:

  • The left side of the bipartition corresponds to the set SV(G), and

  • The right side contains one representative vertex for each connected component C𝒞2.

We add an edge between a vertex pS and a component C𝒞2 if and only if p is adjacent (in G) to at least one vertex in C; that is, if NG(p)V(C). We slightly abuse notation by referring to both a connected component C𝒞2 and its corresponding vertex in B using the same symbol.

Note that by Reduction Rule 1, every component in 𝒞2 has at least one neighbor in S; hence, there are no isolated vertices on the right side of the bipartite graph B. We now apply the Expansion Lemma (Lemma 20) to this bipartite graph to argue that if |𝒞2| is too large relative to |S|, then the instance must be a No-instance. This leads to the following reduction rule:

Reduction Rule 2.

If |𝒞2|(d+1)|S|, then apply the algorithm guaranteed by the Expansion Lemma to compute sets XS and Y𝒞2 such that X has a (d+1)-expansion into Y and NB(Y)X. Remove the vertices in X from G and reduce the parameter accordingly. The resulting instance is (GX,k|X|).

To establish the correctness of Reduction Rule 2, we prove the following lemma.

Lemma 21 ().

Reduction Rule 2 is safe; that is, the instance (G,k) of Vertex Deletion to d-VCC is a Yes-instance if and only if the reduced instance (GX,k|X|) is a Yes-instance.

After exhaustively applying Reduction Rules 1 and 2, we obtain that the number of non-trivial components in 𝒞2 satisfies the bound |𝒞2|(d+1)(3d+2)k. However, if we remove these connected components one by one as suggested, the overall running time may no longer remain bounded by 𝒪((kd)𝒪(1)nlogn).

To address this, we proceed as follows. Let QS be the subset of vertices in S that have at least k+d+1 neighbors on the right side of the bipartite graph B, i.e., into 𝒞2. We claim that every solution ZV(G) of size at most k must contain all vertices in Q.

Indeed, suppose for contradiction that there exists a vertex vQZ. Since v has at least k+d+1 neighbors in 𝒞2, and Z contains at most k vertices, there are at least d+1 components in 𝒞2 that are completely disjoint from Z. But then, in the graph GZ, the vertex v, along with these d+1 components, induces a subgraph that requires a vertex cover of size at least d+1, contradicting the assumption that Z is a valid solution (i.e., vcc(GZ)d). This proves that all vertices in Q must belong to any valid solution of size at most k.

Reduction Rule 3.

Let QS be the subset of vertices in S that have at least k+d+1 neighbors on the right side of the bipartite graph B, i.e., into 𝒞2. The new instance is (GQ,k|Q|).

Since the number of edges in the bipartite graph B is upper bounded by the number of edges in G, we can compute the set Q in time 𝒪(n(d+k)). After removing Q, let 𝒞0𝒞2 denote the set of components that become isolated on the right side of B. These correspond to all connected components CGQ such that vc(C)d. By applying Reduction Rule 1, we can remove all such components in 𝒞0 simultaneously. This step also takes linear time. Following this reduction, the number of remaining non-trivial components – i.e., the size of 𝒞2, which corresponds to the non-isolated vertices on the right side of the updated bipartite graph B – is upper bounded by (3d+2)k(k+d). We now apply Reduction Rule 2 exhaustively on this reduced bipartite graph to further shrink 𝒞2 to at most (3d+2)kd components. The number of times Reduction Rule 2 needs to be applied is at most 𝒪(k2d), and each invocation takes time 𝒪(|E(B)||V(B)|). Since the number of edges in B is at most 𝒪(d2k3) and the number of vertices is at most 𝒪(k2d), the total time required for this step is bounded by 𝒪(k6d3.5). We summarize our results in the following lemma.

Lemma 22.

Given an instance (G,k) of Vertex Deletion to d-VCC and a set SV(G) of size at most (3d+2)k such that vcc(GS)d, we can compute, in time 𝒪((kd)𝒪(1)n), an equivalent instance (G,k) of Vertex Deletion to d-VCC, where G is an induced subgraph of G, satisfying the following properties:

  • The graph G has no connected component C such that vc(C)d, and

  • The number of non-trivial connected components (i.e., 𝒞2) in GS is at most (3d+2)kd.

Let (G,k) be the equivalent instance of Vertex Deletion to d-VCC obtained from (G,k) by application of Lemma 22. For clarity of presentation, we rename (G,k) back to (G,k). We now enhance the set S to a new set SV(G) such that GS is an independent set; in other words, S is a vertex cover of G. To this end, observe that each connected component in 𝒞2 has a vertex cover of size at most d, and by previous reductions, the number of such components is at most (3d+2)kd. In particular, we get the following.

Lemma 23 ().

Let (G,k) be an instance of Vertex Deletion to d-VCC where G has no connected component with vertex cover at most d, and let SV(G) be a set of size at most (3d+2)k such that vcc(GS)d. Then, in 𝒪(1.253dd𝒪(1)n) time, we can compute a set SS such that:

  • S is a vertex cover of G, and

  • |S|(3d+2)k+d(3d+2)kd=𝒪(d3k).

Next, we apply a marking scheme to bound the size of the independent set GS obtained after augmenting S.

Marking Scheme 1.

The marking procedure is defined as follows:

(1)

For each pS, mark d+k+1 neighbors of p in GS.

(2)

For each pair pi,pjS, mark k+1 common neighbors of pi and pj in GS.

Let 𝖬𝖺𝗋𝗄 be the set of marked vertices. After marking the vertices of GS we give the following reduction rule.

Reduction Rule 4.

Let U=V(G)(S𝖬𝖺𝗋𝗄) be the set of unmarked vertices of GS. The new instance is (GU,k).

To prove the safeness of above Reduction 4, we proof the following lemma.

Lemma 24 ().

The instance (G,k) of Vertex Deletion to d-VCC is a Yes-instance if and only if (GU,k) is a Yes-instance of Vertex Deletion to d-VCC.

We now describe an implementation of Reduction Rule 4.

For every pair of vertices (u,v)S×S, we maintain a set 𝖬𝖺𝗋𝗄(u,v), where u may be equal to v. Along with each such pair, we keep a counter k(u,v) that tracks the size of 𝖬𝖺𝗋𝗄(u,v). Initially, for all (u,v)S×S, we set 𝖬𝖺𝗋𝗄(u,v)= and k(u,v)=0.

Next, we iterate over each vertex xV(G)S and perform the following operations:

  • For every neighbor y𝖭(x), if k(y,y)k+d, then add x to 𝖬𝖺𝗋𝗄(y,y) and increment the counter: k(y,y)k(y,y)+1.

  • For every unordered pair y,z𝖭(x) with yz, if k(y,z)k, then add x to 𝖬𝖺𝗋𝗄(y,z) and increment the counter: k(y,z)k(y,z)+1.

Note that since V(G)S is an independent set, each vertex xV(G)S has all of its neighbors in S. By earlier bounds, we know that |S|=𝒪(d3k), and hence |𝖭(x)|𝒪(d3k). Therefore, for each vertex x, we perform at most 𝒪(|𝖭(x)|2)=𝒪(d6k2) operations.

As a result, the entire marking procedure (Marking Scheme 1) and application of Reduction Rule 4 can be carried out in total time 𝒪((kd)𝒪(1)n).

Lemma 25.

Reduction Rule 4 can be applied in time 𝒪((kd)𝒪(1)n).

The size of the kernel is upper bounded by the number of vertices in S and those in the marked sets. Specifically, the total number of vertices is bounded by:

𝒪(d3k+d6k2(k+1)+d3k(k+d+1))=𝒪(d6k3).

Furthermore, if the number of edges in the reduced graph exceeds 𝒪(d9k4), we can safely return a trivial No-instance, as such a graph cannot admit a solution of size at most k within the class 𝒢d. The running time of the overall algorithm is computed as follows:

  • Approximate solution: Compute the set S, an approximate solution, using Lemma 18, in time 𝒪(k(1.253dd𝒪(1)nlogn)).

  • Vertex cover augmentation: Compute a set SS such that:

    • S is a vertex cover of G, and

    • |S|(3d+2)k+d(3d+2)kd=𝒪(d3k),

    using Lemmas 22 and 23, in time 𝒪(1.253dd𝒪(1)n+(kd)𝒪(1)n).

  • Applying Reduction Rule 4: This is done using Lemma 25, in time 𝒪((kd)𝒪(1)n).

Hence, the overall running time of the algorithm is

𝒪(1.253d(kd)𝒪(1)nlogn).

This gives us the following result.

Theorem 1. [Restated, see original statement.]

Vertex Deletion to d-VCC admits a kernel with at most 𝒪(d6k3) vertices and 𝒪(d9k4) edges. Furthermore, it can be computed in time 𝒪(1.253d(kd)𝒪(1)nlogn).

5 Linear Vertex Kernel for Edge Deletion to 𝒅-Vertex Cover Components

In this section, we design a polynomial kernel for Edge Deletion to d-VCC. Our approach follows the same high-level outline as the one used in Section 4. As a first step, we compute an 𝒪(d2)-approximate solution for Edge Deletion to d-VCC.

5.1 Approximation Algorithm for Edge Deletion to 𝒅-VCC

Lemma 26.

Let (G,k) be an instance of Edge Deletion to d-VCC. Then, in time 𝒪(k(1.253dd𝒪(1)nlogn)), we can either find a set PE(G) of size 𝒪(d2k) such that vcc(GS)d, or correctly conclude that (G,k) is a No-instance of Edge Deletion to d-VCC.

Proof.

We iteratively construct a solution PE(G) of size 𝒪(d2k) by repeatedly enumerating edge-disjoint obstructions of bounded size (in number of edges). This is accomplished by identifying a minimal obstruction for induced subgraph relation using Theorem 3. Note that this may not be minimal obstruction with respect to subgraph relation. From Lemma 15, the number of vertices in the obstruction is upper bounded by 3d+2, hence the number of edges by (9d2+12d+4). We also maintain a family 𝒫 of induced subgraphs and a counter k0. The procedure proceeds as follows:

  1. 1.

    While G contains a minimal obstruction HObsi(𝒢d) and kk+1, do:

    1. (a)

      Add E(H) to the solution: PPE(H),

    2. (b)

      Add H to the family: 𝒫𝒫{H},

    3. (c)

      Increment the counter: kk+1,

    4. (d)

      Remove E(H) from G.

  2. 2.

    If k=k+1, return that (G,k) is a No-instance of Edge Deletion to d-VCC.

  3. 3.

    Otherwise, return the set P.

Correctness follows from the fact that the obstructions added to 𝒫 are pairwise edge-disjoint. Since each obstruction is a minimal forbidden induced subgraph for 𝒢d, any feasible solution must delete at least one edge from each obstruction to ensure that the resulting graph belongs to 𝒢d. Thus, if we identify k+1 such disjoint obstructions, any solution must contain at least k+1 edges, implying that (G,k) is a No-instance.

In the other case, we remove at most k disjoint obstructions. By Lemma 15, each obstruction contains at most 3d+2 vertices. Hence, the total number of edges added to S is at most k(9d2+12d+4)=𝒪(d2k). This is indeed an 𝒪(d2) approximate solution for Edge Deletion to d-VCC. Moreover, since GP contains no induced obstruction, we have vcc(GP)d, and therefore GP𝒢d.

Finally, since we invoke Theorem 3 at most k+1 times, the overall running time is bounded accordingly. This concludes the proof.

5.2 Marking and Irrelevant Vertices

From this point onward, we assume that we are given a set PE(G) of size 𝒪(d2k) such that vcc(GP)d. We now examine the connected components of the graph GP. Let 𝒞𝒞(GP)={C1,C2,,C} denote the set of connected components of GP. Note that for each Ci𝒞𝒞(GP), where i[], we have vc(Ci)d. For each i[], we compute a minimum vertex cover ZiV(Ci) using the best-known FPT algorithm for Vertex Cover parameterized by the solution size d, which runs in time 𝒪(1.253dd𝒪(1)n) (see Proposition 17). We define the set

IiV(Ci)(ZiV(P)),

Let ki denote the number of edges in P that are incident to at least one vertex in Ci. Then iki is at most 2|P|, since each edge in P can be charged to at most two distinct components of GP in the summation, and no edge outside P contributes to iki. We now describe a marking scheme that will be used to identify irrelevant vertices, enabling their removal from G in order to obtain a kernel for the instance (G,k).

Marking Scheme 2.

The marking scheme is defined as follows:

(1)

For all i[], we do the following. For each pair u,uZi with uu, mark ki+1 common neighbors of u and u in Ii.

(2)

For all i[] and vZi, mark ki+d+1 neighbors of v in Ii.

Let 𝖬𝖺𝗋𝗄 be the set of marked vertices obtained from the above marking scheme.

Reduction Rule 5.

Let U=i=1tIi𝖬𝖺𝗋𝗄 be the set of unmarked vertices in i=1tIi. The new instance is (GU,k).

For the correctness of Reduction 5, we state and prove the following lemmata.

Lemma 27 ().

Let (G,k) be a Yes-instance of Edge Deletion to d-VCC, and let PE(G) be a solution such that vcc(GP)d. Let C1,,C be the connected components of GP. Then there exists a solution SE(G) of size at most k such that:

|SE(Ci)|kifor all i[],

where ki denotes the number of edges in P that are incident to at least one vertex in Ci𝒞𝒞(GP).

Finally, we present a lemma that establishes the safeness of the reduction rule.

Lemma 28 ().

(G,k) is a Yes-instance of Edge Deletion to d-VCC if and only if (GU,k) is a Yes-instance of Edge Deletion to d-VCC.

Similar to implementation of Marking 1 and Reduction 4, we can implement Marking 2 and Reduction 5 in time 𝒪((kd)𝒪(1)n).

Lemma 29.

Reduction Rule 5 can be applied in time 𝒪((kd)𝒪(1)n).

Theorem 2. [Restated, see original statement.]

Edge Deletion to d-VCC admits a kernel with at most 𝒪(d4k) vertices and 𝒪(d5k) edges. Furthermore, it can be computed in time 𝒪(1.253d(kd)𝒪(1)nlogn).

Proof.

Let (G,k) be an instance of Edge Deletion to d-VCC. We begin by exhaustively removing all connected components C of G such that vc(C)d. These components already satisfy the target property and require no further edge deletions. After this preprocessing step, every remaining connected component must require at least one edge deletion. This can be performed in 𝒪(1.253dd𝒪(1)n) (see Proposition 17).

Next, we apply Reduction 5 to further simplify the instance in time 𝒪((kd)𝒪(1)n) by Lemma 29. We now analyze the structure of the remaining graph and proceed to bound its size.

  • a d-sized vertex cover Zi of Ci, for all i[]

  • the vertices of Ii those are marked by Marking 2, for all i[].

  • V(P).

Finally, we are ready to bound the number of vertices in the reduced graph. For a fixed i[], Marking 2 marks (|Z|2)(ki+1)+|Z|(ki+d+1) vertices, i.e., (d2)(ki+1)+d(ki+d+1) vertices of Ii. So, the total number of marked vertices in one connected component Ci of GP is at most (d2)(ki+1)+d(ki+d+1). Hence for each i[], there are d+|V(P)V(Ci)|+(d2)(ki+1)+d(ki+d+1) vertices of Ci in the reduced graph. Summing over all the connected components Ci in 𝒞𝒞(GP), we get that the number of vertices in the reduced graph is

i=1(d+|V(P)V(Ci)|+(d2)(ki+1)+d(ki+d+1))=𝒪(d4k).

We now proceed to bound the number of edges. Let Ci be a connected component of GP. There are at most 𝒪(d2) edges in the vertex cover Zi of Ci of size at most d. In Ci, CiZi is an independent set and hence there are no edges in CiZi. Because of the reduction rule, the number of vertices in CiZi is at most d(ki+d+1)+d2(ki+1), and therefore the number of edges between Zi and CiZi is at most d(d(ki+d+1)+d2(ki+1)). So the total number of edges in component Ci is at most d2+d(d(ki+d+1)+d2(ki+1)). Hence, the total number of edges in the graph is |P|+i=1|P|d2+d(d(ki+d+1)+d2(ki+1)), which is 𝒪(d5k) (since iki2|P|). Hence, the number of edges is bounded by 𝒪(d5k). This concludes the theorem.

6 Conclusion

In this paper, we designed an almost-linear-time kernelization algorithm for clustering into components with bounded vertex cover number. An interesting direction for future work is to extend this framework to other notions of structural simplicity in clusters – such as bounded feedback vertex number or bounded odd cycle transversal.

Another natural question is whether our algorithm can be further optimized to achieve fully linear-time preprocessing. Additionally, designing a kernel for the vertex-deletion variant whose size is linear in the number of vertices remains an intriguing open problem.

References

  • [1] Tara Abrishami, Maria Chudnovsky, Cemil Dibek, and Pawel Rzazewski. Polynomial-time algorithm for maximum independent set in bounded-degree graphs with no long induced claws. In Joseph (Seffi) Naor and Niv Buchbinder, editors, Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, SODA 2022, Virtual Conference / Alexandria, VA, USA, January 9 - 12, 2022, pages 1448–1470. SIAM, 2022. doi:10.1137/1.9781611977073.61.
  • [2] Faisal N. Abu-Khzam. An improved kernelization algorithm for r-set packing. Inf. Process. Lett., 110(16):621–624, 2010. doi:10.1016/J.IPL.2010.04.020.
  • [3] Faisal N. Abu-Khzam. A kernelization algorithm for d-hitting set. J. Comput. Syst. Sci., 76(7):524–531, 2010. doi:10.1016/J.JCSS.2009.09.002.
  • [4] Noga Alon, Asaf Shapira, and Benny Sudakov. Additive approximation for edge-deletion problems. Annals of Mathematics, 170(1):371–411, 2009. URL: http://www.jstor.org/stable/40345467.
  • [5] Matthias Bentert, Michael R. Fellows, Petr A. Golovach, Frances A. Rosamond, and Saket Saurabh. Breaking a graph into connected components with small dominating sets. In Rastislav Královic and Antonín Kucera, editors, 49th International Symposium on Mathematical Foundations of Computer Science, MFCS 2024, August 26-30, 2024, Bratislava, Slovakia, volume 306 of LIPIcs, pages 24:1–24:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.MFCS.2024.24.
  • [6] Hans L. Bodlaender, Pinar Heggernes, and Daniel Lokshtanov. Graph modification problems (dagstuhl seminar 14071). Dagstuhl Reports, 4(2):38–59, 2014. doi:10.4230/DAGREP.4.2.38.
  • [7] Andreas Brandstädt, Van Bang Le, and Jeremy P. Spinrad. Graph Classes: A Survey. Society for Industrial and Applied Mathematics, 1999. doi:10.1137/1.9780898719796.
  • [8] Jonathan F. Buss and Judy Goldsmith. Nondeterminism within P. SIAM J. Comput., 22(3):560–572, 1993. doi:10.1137/0222038.
  • [9] Yixin Cao and Dániel Marx. Interval deletion is fixed-parameter tractable. ACM Trans. Algorithms, 11(3):21:1–21:35, 2015. doi:10.1145/2629595.
  • [10] Yixin Cao and Dániel Marx. Chordal editing is fixed-parameter tractable. Algorithmica, 75(1):118–137, 2016. doi:10.1007/S00453-015-0014-X.
  • [11] Jianer Chen, Qin Huang, Iyad Kanj, and Ge Xia. Near-optimal algorithms for point-line covering problems. In Petra Berenbrink and Benjamin Monmege, editors, 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022, March 15-18, 2022, Marseille, France (Virtual Conference), volume 219 of LIPIcs, pages 21:1–21:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.STACS.2022.21.
  • [12] Jianer Chen, Qin Huang, Iyad Kanj, and Ge Xia. Nearly time-optimal kernelization algorithms for the line-cover problem with big data. Algorithmica, 86(8):2448–2478, 2024. doi:10.1007/S00453-024-01231-6.
  • [13] Jianer Chen, Iyad A. Kanj, and Weijia Jia. Vertex cover: Further observations and further improvements. J. Algorithms, 41(2):280–301, 2001. doi:10.1006/JAGM.2001.1186.
  • [14] Benny Chor, Mike Fellows, and David W. Juedes. Linear kernels in linear time, or how to save k colors in o(n2) steps. In Juraj Hromkovic, Manfred Nagl, and Bernhard Westfechtel, editors, Graph-Theoretic Concepts in Computer Science, 30th International Workshop,WG 2004, Bad Honnef, Germany, June 21-23, 2004, Revised Papers, volume 3353 of Lecture Notes in Computer Science, pages 257–269. Springer, 2004. doi:10.1007/978-3-540-30559-0_22.
  • [15] Christophe Crespelle, Pål Grønås Drange, Fedor V. Fomin, and Petr A. Golovach. A survey of parameterized algorithms and the complexity of edge modification. Comput. Sci. Rev., 48:100556, 2023. doi:10.1016/J.COSREV.2023.100556.
  • [16] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
  • [17] Reinhard Diestel. Graph Theory, 5th Edition, volume 173 of Graduate texts in mathematics. Springer, 2017. doi:10.1007/978-3-662-53622-3.
  • [18] Michael R. Fellows. Blow-ups, win/win’s, and crown rules: Some new directions in FPT. In Hans L. Bodlaender, editor, Graph-Theoretic Concepts in Computer Science, 29th International Workshop, WG 2003, Elspeet, The Netherlands, June 19-21, 2003, Revised Papers, volume 2880 of Lecture Notes in Computer Science, pages 1–12. Springer, 2003. doi:10.1007/978-3-540-39890-5_1.
  • [19] F.V. Fomin, D. Lokshtanov, S. Saurabh, and M. Zehavi. Kernelization: Theory of Parameterized Preprocessing. Cambridge University Press, 2019.
  • [20] Martin Charles Golumbic. Algorithmic graph theory and perfect graphs. Elsevier, 2004.
  • [21] David G. Harris and N. S. Narayanaswamy. A faster algorithm for vertex cover parameterized by solution size. In Olaf Beyersdorff, Mamadou Moustapha Kanté, Orna Kupferman, and Daniel Lokshtanov, editors, 41st International Symposium on Theoretical Aspects of Computer Science, STACS 2024, March 12-14, 2024, Clermont-Ferrand, France, volume 289 of LIPIcs, pages 40:1–40:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.STACS.2024.40.
  • [22] John E. Hopcroft and Richard M. Karp. An n5/2 algorithm for maximum matchings in bipartite graphs. SIAM J. Comput., 2(4):225–231, 1973. doi:10.1137/0202019.
  • [23] Falk Hüffner, Christian Komusiewicz, Hannes Moser, and Rolf Niedermeier. Fixed-parameter algorithms for cluster vertex deletion. Theory Comput. Syst., 47(1):196–217, 2010. doi:10.1007/S00224-008-9150-X.
  • [24] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4):512–530, 2001. doi:10.1006/JCSS.2001.1774.
  • [25] Bart M. P. Jansen and Hans L. Bodlaender. Vertex cover kernelization revisited - upper and lower bounds for a refined parameter. Theory Comput. Syst., 53(2):263–299, 2013. doi:10.1007/S00224-012-9393-4.
  • [26] Bart M. P. Jansen, Daniel Lokshtanov, and Saket Saurabh. A near-optimal planarization algorithm. In Chandra Chekuri, editor, Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 1802–1811. SIAM, 2014. doi:10.1137/1.9781611973402.130.
  • [27] George Karypis, Christian Schulz, Darren Strash, Deepak Ajwani, Rob H. Bisseling, Katrin Casel, Ümit V. Çatalyürek, Cédric Chevalier, Florian Chudigiewitsch, Marcelo Fonseca Faraj, Michael R. Fellows, Lars Gottesbüren, Tobias Heuer, Kamer Kaya, Jakub Lacki, Johannes Langguth, Xiaoye Sherry Li, Ruben Mayer, Johannes Meintrup, Yosuke Mizutani, François Pellegrini, Fabrizio Petrini, Frances A. Rosamond, Ilya Safro, Sebastian Schlag, Roohani Sharma, Blair D. Sullivan, Bora Uçar, and Albert-Jan Yzelman. Recent trends in graph decomposition (dagstuhl seminar 23331). Dagstuhl Reports, 13(8):1–45, 2023. doi:10.4230/DAGREP.13.8.1.
  • [28] Ken-ichi Kawarabayashi and Bruce A. Reed. Computing crossing number in linear time. In David S. Johnson and Uriel Feige, editors, Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pages 382–390. ACM, 2007. doi:10.1145/1250790.1250848.
  • [29] Christian Komusiewicz and Johannes Uhlmann. Cluster editing with locally bounded modifications. Discret. Appl. Math., 160(15):2259–2270, 2012. doi:10.1016/J.DAM.2012.05.019.
  • [30] John M. Lewis and Mihalis Yannakakis. The node-deletion problem for hereditary properties is np-complete. J. Comput. Syst. Sci., 20(2):219–230, 1980. doi:10.1016/0022-0000(80)90060-4.
  • [31] Dániel Marx. Parameterized graph separation problems. Theor. Comput. Sci., 351(3):394–406, 2006. doi:10.1016/j.tcs.2005.10.007.
  • [32] N. S. Narayanaswamy, Venkatesh Raman, M. S. Ramanujan, and Saket Saurabh. LP can be a cure for parameterized problems. In Christoph Dürr and Thomas Wilke, editors, 29th International Symposium on Theoretical Aspects of Computer Science, STACS 2012, February 29th - March 3rd, 2012, Paris, France, volume 14 of LIPIcs, pages 338–349. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2012. doi:10.4230/LIPICS.STACS.2012.338.
  • [33] George L. Nemhauser and Leslie E. Trotter Jr. Properties of vertex packing and independence system polyhedra. Math. Program., 6(1):48–61, 1974. doi:10.1007/BF01580222.
  • [34] René van Bevern. Towards optimal and expressive kernelization for d-hitting set. Algorithmica, 70(1):129–147, 2014. doi:10.1007/S00453-013-9774-3.
  • [35] Mihalis Yannakakis. Edge-deletion problems. SIAM J. Comput., 10(2):297–309, 1981. doi:10.1137/0210021.