Abstract 1 Introduction 2 Preliminaries 3 Tractability Results for DAGs of Low Depth 4 NP completeness for DAGs of depth 3 5 W[1]-hardness for DAGs of Depth 4 6 FPT when parameterized by Treewidth and k 7 Back to undirected graphs 8 Conclusion References

Token Sliding Reconfiguration on DAGs

Jona Dirks ORCID Université Clermont Auvergne, Clermont Auvergne INP, LIMOS, Clermont-Ferrand, France Alexandre Vigny ORCID Université Clermont Auvergne, Clermont Auvergne INP, LIMOS, Clermont-Ferrand, France
Abstract

Given a graph G and two independent sets of same size, the Independent Set Reconfiguration Problem under token sliding asks whether one can, in a step by step manner, transform the first independent set into the second one. In each step we must preserve the condition of independence. Further, referring to solution vertices as tokens, we are only permitted to slide a token along an edge. Until the recent work of Ito et al. [Ito et al. MFCS 2022] this problem was only considered on undirected graphs. In this work, we study reconfiguration under token sliding focusing on DAGs.

We present a complete dichotomy of intractability in regard to the depth of the DAG, by proving that this problem is 𝖭𝖯-complete for DAGs of depth 3 and 𝖶[1]-hard for depth 4 when parameterized by the number of tokens k, and that these bounds are tight. Further, we prove that it is fixed parameter tractable on DAGs parameterized by the combination of treewidth and k. We show that this result applies to undirected graphs, when the number of times a token can visit a vertex is restricted.

Keywords and phrases:
Graph theory, FPT algorithms, Reconfiguration, Independent Sets
Copyright and License:
[Uncaptioned image] © Jona Dirks and Alexandre Vigny; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Mathematics of computing Graph algorithms
; Theory of computation Fixed parameter tractability
Funding:
This work benefited from state aid managed by the ANR under France 2030 referenced ANR-23-IACL-0006.
Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał Skrzypczak

1 Introduction

A reconfiguration problem asks, given two solutions to a combinatorial problem, whether one can change the first solution in a step-by-step manner in order to reach the second one; while ensuring that the transformed set remains a solution throughout the reconfiguration procedure. The research interest in these topics dates back to the 19th century, as many one player games can be considered in these terms [12]. For a more recent introduction to the topic, we refer to [16].

The complexity of reconfiguration problems is often 𝖯𝖲𝖯𝖠𝖢𝖤-complete. Specific attention has been given to independent set and (connected) dominating set reconfiguration. For these problems, there are two main reconfiguration paradigms: token sliding, and token jumping. In both paradigms, we view the set to be reconfigured as several tokens placed on the vertices of the graph. Token jumping allows, in each step to move one token to be placed to any other vertex of the graph, while token sliding only allows to move a token to an adjacent vertex (to slide along an edge of the graph).

For both paradigms, independent set reconfiguration is 𝖯𝖲𝖯𝖠𝖢𝖤-complete, and remains intractable when parameterized by the size of the set to be reconfigured, or the length of reconfiguration sequence [4, 14]. In order to find efficient algorithms, it is therefore interesting to look at structural restrictions on the graphs over which the sets are being reconfigured. While these problems remain 𝖯𝖲𝖯𝖠𝖢𝖤-hard on planar graphs and graphs of bounded bandwidth, they become polynomial on cographs, forest and interval graphs [10, 13, 18]. We however note that the two paradigms differ in complexity over bipartite graphs, where independent set reconfiguration for token sliding (ISR-TS) is 𝖯𝖲𝖯𝖠𝖢𝖤-complete, independent set reconfiguration for token jumping (ISR-TJ) is only 𝖭𝖯-complete [13].

The two paradigms differ even more when we look at parameterized complexity. For token jumping, we know that reconfiguration for independent set over general sparse graphs classes, such as bounded degeneracy and nowhere dense, becomes 𝖥𝖯𝖳 when parameterized by the size of the sets [6, 13, 17]. These classes are generalizations of many well known classes such as planar graph, graph of bounded treewidth, classes excluding a (topological) minor etc.

For token sliding however, the parameterized complexity of independent set reconfiguration is much less understood. On one hand it is known to be 𝖥𝖯𝖳 on trees [8], graphs of bounded degree [3], and graphs of girth 5 [2], but hard on split graphs [5]. On the other hand, it is still open whether it is tractable on graph of bounded treewidth, or minor-free graphs [6, Question 5]. We refer the readers to the survey [6] for an extensive overview.

We also mention that for both TS and TJ the reconfiguration of every problem that is expressible in 𝖬𝖲𝖮2 is 𝖥𝖯𝖳 when parameterized by treedepth and the number of tokens [9, Theorem 4.1] and 𝖥𝖯𝖳 when parameterized by treewidth, the length of the reconfiguration sequence, and the formula describing the considered problem [15, Theorem 7]

Directed graphs.

In this paper, we consider directed graphs and allow tokens to only slide in the direction of the edges. Note, that token jumping is not well suited for directed graphs, as arbitrary jumps stay the same in the directed setting. So far very little is known for directed graph’s reconfiguration. Recently, Ito et al. [11, Theorem 2] proved that Independent Set Reconfiguration for Directed Token Sliding (ISR-DTS) is 𝖭𝖯-hard on DAGs and 𝖶[1]-hard when parameterized by the number of tokens. On the tractable side of things, they show that it is linear time solvable on orientation of trees [11, Theorem 3]. The hardness extends to 𝖯𝖲𝖯𝖠𝖢𝖤-completeness for oriented planar graphs, split graphs, bipartite graphs and most noticeably bounded treewidth graphs [1].

We improve on both the side of hardness, as well as the side of tractability. We first look at the depth of the DAGs and provide sharp dichotomy in both the classical and parameterized setting. In the following statements, k refers to the number of tokens.

Theorem 1.1.

ISR-DTS is polynomial on DAGs of depth 2 and 𝖥𝖯𝖳 for DAGs of depth 3 when parameterized by k.

Theorem 1.2.

ISR-DTS is 𝖭𝖯-complete on DAGs of depth 3.

Theorem 1.3.

ISR-DTS is W[1]-hard on DAGs of depth 4, when parameterized by k.

Additionally, we show that a combination of the parameters k and treewidth leads to tractability in DAGs. We do so by adapting the recently developed framework of galactic reconfiguration [3] to directed graphs. The following result can be considered our main contribution.

Theorem 1.4.

ISR-DTS is 𝖥𝖯𝖳 on DAGs when parameterized by k+tw.

Finally, we go back to undirected graph, introduce a new parameter (the iteration ι) that measures the maximum number of times a specific token can enter a specific vertex.

Theorem 1.5.

ISR-TS is 𝖥𝖯𝖳 when parameterized by k+tw+ι.

These results for graphs of bounded treewidth is a step toward solving one of the most prominent open problem in this line of work (see [6, Question 5]): is ISR-TS 𝖥𝖯𝖳 when parameterized by k and the treewidth of the graph?

The previous best algorithms only work on the more restricted class of bounded treedepth [9], or require to also parameterize by the length of the reconfiguration sequence [15]. In comparison, our new parameter iteration is much smaller than the length of the reconfiguration sequence. In terms of techniques, parameterizing by enabled the authors of [15] to reduce to the model checking problem for 𝖬𝖲𝖮 formula which is solved using Courcelle’s Theorem. In our case, we do not believe that we can reduce to Courcelle’s theorem. Thus, the presented algorithm is the first to use dynamic programming on graph of bounded treewidth “by hand” for Independent Set Reconfiguration.

Organization.

The rest of the paper is structured as follows. Section 2 provides the required background and fixes notations. Section 3 is devoted to efficient algorithms and the proof of Theorem 1.1. The proof of Theorem 1.2 is provided in Section 4, followed by the proof of Theorem 1.3 in Section 5. In Section 6 we introduce additional notions around galactic reconfiguration for our main algorithm in order to prove Theorem 1.4. Finally, in Section 7 we discuss implications for undirected graphs, and Theorem 1.5.

2 Preliminaries

Graphs.

We use standard graph notations. All graphs are directed and loop-free unless stated otherwise. Unless preferable for readability we abbreviate an edge (u,v) with uv. We denote the open out-neighborhood of a vertex v with N+(v) and the open in-neighborhood with N(v). A graph without cycles is called a DAG. The depth of a DAG is the number of vertices on its longest directed path. Note that if a DAG has depth d, then its vertices can be grouped in d levels with every edge going from a vertex at some level to a vertex at a greater level. One can inductively define the first layer as the vertices of in-degree 0, and the ith layer as the vertices whose entire in-neighborhood is in smaller levels.

For a directed graph G, the underling undirected graph is obtained by disregarding the edge direction and removing all double edges. That is the graph (V(G),{{u,v}uvE(G) or vuE}). A set of vertices of a directed or undirected graph is called independent if the vertices are pairwise nonadjacent.

Parameterized Complexity.

In the parameterized framework, a problem is said to be fixed parameter tractable (𝖥𝖯𝖳), if there exists an algorithm that solves it in time f(k)nc for a computable function f and constant c. An alternative characterization of 𝖥𝖯𝖳 is through the existence of a kernel, that is polynomial time computable function that maps each instance to an instance of size g(k) for some computable function g. The returned instance should be a positive-instance exactly if the inputted instance is. Kernels are commonly presented in the form of data reduction rules, that provide instructions on how to shrink the size of the input.

Under commonly made assumptions, problems that are 𝖶[1]-hard are considered not to be 𝖥𝖯𝖳. Similar to 𝖭𝖯-completeness, we use 𝖥𝖯𝖳-reductions to transfer hardness. However, these reductions may use a longer 𝖥𝖯𝖳 running time but are more restricted in the sense that the parameter of the resulting instance may not depend on the size but only on the parameter of the inputted instance. More background on 𝖥𝖯𝖳 algorithms and 𝖥𝖯𝖳-reduction can be found in the book [7].

Reconfiguration.

A configuration αi is a function from a set of tokens T={t1,t2,,tk} to the set of vertices V.

For two independent sets S and D of size k in a graph G, a reconfiguration-sequence for ISR-DTS is a sequence of configurations (αi)iI such that:

  1. 1.

    α1(T)=S and α|I|(T)=D.

  2. 2.

    For every iI, and for distinct tokens t and t: αi(t)αi(t).

  3. 3.

    For every iI, and for distinct tokens t and t: (αi(t),αi(t))E(G).

  4. 4.

    If αi(t)αi+1(t), then there exists an edge (αi(t),αi+1(t))E(G) and for every other token tt it holds that αi(t)=αi+1(t).

We generally assume that I is a sequence from 1 to |I|. For a configuration αi we call all configurations αj succeeding or a successor, if j>i. If j=i+1 we say that it is a direct successor.

Let t be a token and α=(αi)iI a sequence with α1(t)=u and α|I|(t)=v. We say that the token t comes from u and ends up in v. Similarly we say that a token comes from a subgraph A and ends up in a subgraph B if α1(t)V(A) and α|I|(t)V(B). Additionally, if there is a token on v we say that this token blocks all uN(v).

Galactic Graphs.

Galactic graphs were recently developed to prove that ISR-TS is in 𝖥𝖯𝖳 for undirected graphs of bounded degree [3]. We restate their definition, slightly adapted for directed graphs. A galactic graph is a graph where the vertex set is partitioned V(G)=A(G)B(G) into planets A(G) and black holes B(G).

For a (galactic) graph G and a subsets of its vertices V we say that it collapses to G if GV=Gb with bB(G) and G contains an edge (u,b) (respectively (b,u)) if G contains an edge (u,v) (respectively (v,u)) for some vV. We denote this graph with GV. For the empty set, we define G=G. Intuitively, this operation takes a set of vertices (planets and black holes) and merges them into one black hole.

Note, that this operation takes a graph on the left-hand site and a vertex set on the right-hand site. Thus, multiple applications of this operator are left-associative.

We will assume that the black holes are named (or labeled) in such a way that they are uniquely identified by the planets that collapsed into it in the original graph. Meaning that for example for disjoint V1,V2 it holds GV1V2{b1,b2}=GV1V2, where b1 and b2 are the black holes created when collapsing V1 and V2 respectively. This can be realized by representing planets as sets containing a single element and black holes as the union of the sets representing vertices (planets or black holes) with an additional marker for black holes added.

Galactic Reconfiguration.

For two multisets S and D of size k in a graph G, a galactic reconfiguration sequence for ISR-DTS is a sequence of configurations (αi)iI. Where αi is a function from a set of tokens T={t1,t2,,tk} to V, such that:

  1. 1.

    α1(T)=S and α|I|(T)=D.

  2. 2.

    For distinct tokens t and t: αi(t)αi(t) or αi(t)B(G).

  3. 3.

    All α1(T)A(G),,α(T)A(G) are independent sets.

  4. 4.

    If αi(t)αi+1(t), then there exists an edge (αi(t),αi+1(t))E(G) and for every other token tt it holds αi(t)=αi+1(t).

Note that in a galactic reconfiguration sequence, several tokens are allowed to be on the same vertex (including for the first and last configuration), as long as this vertex is a black hole. When we collapse an instance for ISR-DTS and the collapsed vertex set contains start and end positions, we generally assume that these positions in their multiplicity get assigned to the created black hole.

Definition 2.1.

Given a graph G, a set of vertices V1, we say that a reconfiguration sequence (αi)iI, collapses to (βj)jJ over GV1 if (βj)jJ can be obtained by first creating an intermediate reconfiguration sequence (βi)iI where every βi is mapping to b (the created black hole) every token that αi maps to a vertex of V1 but is otherwise identical. And then removing exhaustively all configurations with an identical direct successor from (βi)iI.

Moreover, if a sequence α on a graph G1, collapses to a sequence β on a graph G2, which itself collapses to a sequence γ on a graph G3, we also say that α collapses to γ on G3.

Note that in the above definition, (βj)jJ is a valid reconfiguration sequence, i.e. the tokens only slide along edges and are only on neighboring vertices if at least one of them is a black hole. Furthermore, form this definition, it might look like a single reconfiguration sequence can collapse to multiple sequences on the same graph (depending on the chain of collapses). We later show in Lemma 6.1 that it is not the case, and the collapse notion (with several successive collapses) is therefore well-defined.

Tree-decomposition.

A tree decomposition of a undirected graph G is a pair 𝒯=(T,𝖻𝖺𝗀) where T is a rooted tree and 𝖻𝖺𝗀:V(T)2V(G) is a mapping that assigns to each node xT its bag 𝖻𝖺𝗀(x)V(G) such that the following conditions are satisfied:

  • For every vertex vV(G), the set of nodes xV(T) satisfying v𝖻𝖺𝗀(x) induces a connected subtree of T.

  • For every edge {u,v}E(G), there exists a node xV(T) such that u,v𝖻𝖺𝗀(x).

We may assume that every internal node of T has exactly two descendants. See [7] for more details on tree decompositions in general. Further, let 𝒯=(T,𝖻𝖺𝗀) be a tree decomposition of a graph G. The adhesion of a node xV(T) is defined as 𝖺𝖽𝗁(x)𝖻𝖺𝗀(𝗉𝖺𝗋𝖾𝗇𝗍(x))𝖻𝖺𝗀(x) and the margin of a node xV(T) is defined as 𝗆𝗋𝗀(x)𝖻𝖺𝗀(x)𝖺𝖽𝗁(x). The cone at a node xV(T) is defined as 𝖼𝗈𝗇𝖾(x)yTx𝖻𝖺𝗀(y) and the component at a node xV(T) is defined as 𝖼𝗈𝗆𝗉(x)𝖼𝗈𝗇𝖾(x)𝖺𝖽𝗁(x)=yTx𝗆𝗋𝗀(y). Here, yTx means that y is a descendant of x in T. The width of a tree decomposition is the maximum number of vertices in each bag (minus one). The treewidth of a graph G, noted tw(G), is the minimum width among all possible tree decompositions of G. For directed graphs, we define these terms over their underlying undirected graphs.

3 Tractability Results for DAGs of Low Depth

This section is devoted to the proof of Theorem 1.1 that we restate here. See 1.1

We prove the first part of the theorem.

Lemma 3.1.

For DAGs of depth 2 ISR-DTS is polynomial solvable.

Proof.

We are given a DAG G and two independent sets S and D both of size k. First, we can assume that SD is the vertex set of the entire graph, as for every other vertex v no token can start in S, go to v and then end in D, contradicting that G is a DAG of depth 2.

If (G,S,D) is a positive instance, there needs to be at least one vertex u in D that has just a single neighbor v in S, as otherwise no token can move. We can therefore start the reconfiguration sequence by moving the token from u to v. We can now remove u,v from G and proceed inductively in the same way. If at any point no token can move, we report that the input is a negative instance to ISR-DTS.

After this small warm up proof, let us now move to the parameterized tractability result. Let us first show, that we can assume the input to have a uniform structure.

Lemma 3.2.

For any instance (G,S,D) if G is a DAG of depth 3 we can in polynomial time find an equivalent instance (G,S,D) such that S is equal to the first layer of G and D to the third and where G is also a DAG of depth 3.

Proof.

First note, that if there is a vertex from SD at the third layer, it can reach nothing, and thus we can return a trivial no instance. While a vertex in SD in the third layer cannot move, blocking its in-neighborhood, so we can safely remove this vertex together with it’s in-neighborhood. By analogous arguments the same holds if there is a vertex from D at the first layer. Additionally, we can remove all vertices without predecessors in S (as they cannot be reached) and all vertices with no successors in D (as a token here cannot reach a destination).

Observe, that after this a vertex from S may not lie on the second layer. If it were so, it would have a predecessor, which then would lie in the first layer. Thus, it would be in S which means that S is not an independent set.

Furthermore, if a vertex vD is in the second layer, it may not have successors. Thus, we can add a new vertex v make it a successor to all predecessors of v as well as v itself. Then, while keeping v in the graph, we remove v from D and add v instead.

Note that all of these basic checks as well as basic graph manipulations can be carried out in polynomial time.

We show that the following reduction rule, when applied exhaustively, yields a kernel:

Rule 3.3.

If a DAG of depth 3 has two vertices u,vSD with N(u)=N(v) then remove u.

Proof of Correctness.

Let G be the graph obtained from applying the reduction rule on G. Clearly if there is a reconfiguration sequence in G one can use the same sequence in G. Thus, we only have to show, that if there is a reconfiguration sequence in G there is one in G.

Let (αi)iI be the reconfiguration. We show that every time (αi)iI places a token on u we can place it on v instead. As u and v have the same neighborhood, the independent set condition is not violated and neither is the requirement of moving tokens only along edges. That is, if there is no token at v at that same step. However, a token on v, blocking all of N(u), would prohibit the placement of a token on u.

Lemma 3.4.

ISR-DTS admits a kernal on DAGs of depth 3 when parameterized by k.

Proof.

We first use Lemma 3.2 to obtain an instance, where the first layer is equal to S and the third layer to D. Then we apply ˜3.3. Note, that now every vertex on the second layer has a distinct neighborhood which is a subset of SD. As there are at most 2|SD| unique subsets, the total number of vertices is bound by |S|+|D|+2|SD|=2k+4k.

Together Lemma 3.4 and Lemma 3.1 complete the proof of Theorem 1.1.

4 NP completeness for DAGs of depth 3

In this section we turn to hardness results, improving the lower bounds of [11]. While they prove that ISR-DTS is 𝖭𝖯-hard on DAGs, their reduction yields DAGs of unbounded depth.

Theorem 1.2. [Restated, see original statement.]

ISR-DTS is 𝖭𝖯-complete on DAGs of depth 3.

The proof of Theorem 1.2 is obtained by reducing from 3-SAT. For a 3-SAT sentence φ we construct the following instance (Gφ,Sφ,Dφ):

  1. 1.

    Add a timing gadget, meaning two vertices wSφ and wDφ as well as an edge ww.

  2. 2.

    For each variable x create four vertices xsSφ, xtDφ, xp and x¯p as well as edges xsxp, xsx¯p, xpxt and x¯pxt. Further, connect this subgraph to the timing gadget with the edge wxt.

  3. 3.

    For each clause c with the literals 1,2,3 add five vertices csSφ, ctDφ and c1,c2,c3. Further, add edges form cs to c1,c2 and c3 as well as from c1,c2 and c3 to ct. Additionally, connect this subgraph to the timing gadget with the edge csw.

  4. 4.

    For every literal add two vertices Sφ and Dφ and edge (,). For all x¯= (note that x¯¯=x) and c containing x add edges (,c) and xp respectively.

This construction is represented in Figure 1

Figure 1: Schematic of the graph resulting from a 3-SAT formula, where the clause c contains the positive literal x.
Lemma 4.1.

If φ is satisfiable then (Gφ,Sφ,Dφ) is a positive instance for ISR-DTS.

Proof.

Let σ be a satisfying assignment of φ. We define the following reconfiguration sequence. In no particular order move a token from xs to xp if σ(x)= True, to x¯p otherwise.

For all literals where it is possible without violating the independent set condition, slide along (,). I.e. this move is possible for every literal of the form x (resp. x¯) where σ sets x to True (resp. to False).

As each clause c has at least one literal that evaluates to true. Move the token from cs to ct over c. This move is possible as the token in the “literal gadget” moved from to . Now one is able to move the token from w to w. Next, move the tokens on all xp or x¯p to xt and finally from all remaining to .

Lemma 4.2.

If (Gφ,Sφ,Dφ) is a positive-instance of ISR-DTS then φ is satisfiable.

Proof.

We first show, that the flow of token is tightly controlled.

Claim 4.3.

The token coming from w will only slide along the edge ww. Further, for all variables x, clauses c and literals the tokens from xs, cs and will end up in xt, ct and respectively.

Proof.

By reachability in Gφ the only possibility where this is not the case would be if some token coming from xs ends up in (for x=). Implying the token from ends up in ct; implying that the token from cs ends up in w; implying that the token from w slides to xt. However, as w blocks w, cs blocks c, blocks and xt locks in xs, so none of these moves is doable.

Let (αi)iI be a reconfiguration sequence certifying that (Gφ,Sφ,Dφ) is a positive-instance. The previous claim implies that the token in w ends up in w, so let αi be the first configuration where a token occupies w. We define the following set X={αi(T) is literal}.

Claim 4.4.

The set X contains one literal from each clause. Further, if is in X, then ¯ is not.

Proof.

By ˜4.3, for all clauses c the token coming from cs is either at some c{c1, c2,c3} or is already on ct and has previously been in one of the c. Thus, no token can be at its neighbor (on the literal gadget). By ˜4.3 there is now a token on .

For the second claim, assume towards a contradiction, that in αi tokens are placed at both and ¯ for some literal . This implies that neither for αi nor for any succeeding configuration a token is at xp or x¯p where x is the variable of the literal . As no token is on xt there is one at xs and by ˜4.3 it cannot reach a valid end position.

We find the following assignment σ(). Set σ(x)= True, if xX and otherwise σ(x)= False. Observe, that all literals in X evaluate to true. As X contains at least one literal per clause all clauses evaluate to true.

This concludes the proof of Theorem 1.2.

5 W[1]-hardness for DAGs of Depth 4

In this section, we prove the second lower bound of this paper. Here, k is the number of tokens.

Theorem 1.3. [Restated, see original statement.]

ISR-DTS is W[1]-hard on DAGs of depth 4, when parameterized by k.

We show this result by providing a 𝖥𝖯𝖳-reduction from Independent Set. That is given an instance for independent set (with parameter k), we build an instance of ISR-DTS with parameter f(k), such that the input instance is a positive instance if and only if the resulting one is. Section 5.1 describes the construction while Lemma 5.1 in Section 5.2 proves the correctness of the reduction.

5.1 Construction

The reduction takes as input an undirected graph G of n vertices and an integer k and outputs the graph as described in the following. This graph is also depicted in Figure 2.

Figure 2: Conceptual view on the graph resulting from the reduction. Arrows represent directed edges between vertices in the two blocs they connected. Unless labeled otherwise the connected is complete. Dashed arrows have no different meaning and are only stylized for clarity.

Vertices.

In total the DAG consists of 10 main blocs and three helping gadgets. Let us commence with the main blocs. Six of these consist of k isolated vertices. Half of the blocs: S1, S2 and S3 contains only starting positions: s1,1 to s3,k. The other half: D1, D2, and D3 only contain target (or destination) vertices: d1,1 to d3,k.

The remaining four components are each made up of k copies of the vertex set of G, i.e. kn isolated vertices. The components are named A, B, C, Q, and, given ik, vV(G), we call ai,v (resp. bi,v, ci,v, qi,v) the copy of v in the ith copy Ai of V(G) in A (resp. BCQ).

Lastly, we have six specific vertices, controlling the flow of tokens in the graph: x, x, y, y, z, z, where x,y,z are starting positions, and x,y,z destinations.

Edges.

The edges of our construction are represented in Figure 2 and are as follows.

  1. 1.

    Full connections: For every ik and v in V(G), connect s1,i (resp. s2,i, s3,i) to ai,v (resp. bi,v, ci,v). Further, connect qi,v (resp. bi,v, ci,v) to d1,i (resp. d2,i, d3,i).

  2. 2.

    Matching connections: For every ik, and v in V(G), connect ai,v to qi,v. I.e. make a matching between Ai and Qi.

  3. 3.

    Co-matching connections: For every ik, and u,v in V(G) if and only if vu, connect ai,v to ci,u and connect bi,v to ci,u. I.e. Make a co-matching between Ai and Ci and between Bi and Ci.

  4. 4.

    Neighborhood connections: For every i,jk, and u,v in V(G) if and only if ij and uNG(v), connect bi,v to qj,u.

  5. 5.

    Gadget connections: Connect x and each vertex in S1, S2, and S3 to x. Connect y to x. Further, connect y to y, and to each vertex in Q and D3. Lastly, connect z to z and to each vertex in D2, and connect z to each vertex in Q.

We define the start positions as S:=S1S2S3{x,y,z} and destination positions as D:=D1D2D3{x,y,z}.

We call our resulting DAG H. Notice that H has 4kn+6k+6 many vertices, and 3k+3 start / destination vertices. Furthermore, the DAG has depth 4 has illustrated in Figure 2.

5.2 Correctness

This section is devoted to the proof of the correctness of the reduction, as stated in the following lemma.

Lemma 5.1.

If the input G,k is a positive instance for the independent set problem if and only if (H,S,D) is a positive ISR-DTS instance.

We now prove the first implication. Assume that X={v1,,vk}V(G) is an independent set of G of size k. We move the tokens in H as follows.

  1. 1.

    For every ik, move the token from s3,i to ci,vi. Similarly, move tokens from s1,i and s2,i to ai,vi, and bi,vi respectively.

  2. 2.

    Move the token from x to x and the token from y to y.

  3. 3.

    For every ik, move the token from ai,vi to qi,vi. And then from qi,vi to d1,i.

  4. 4.

    Move the token from z to z.

  5. 5.

    For every ik, move the token from bi,vi to d2,i and the tokens from ci,vi to d3,i.

The first set of moves is possible because a token on ci,vi blocks in Ai every ai,u with uvi, but ai,vi is free. The same holds for bi,vi. Second, the clocks x,y can move to x,y because S1, S2, and S3, are free of token, freeing D3. Third, X is an independent set in G, and therefore viX is not adjacent to any vjX for ji. Therefore, qi,vi is not adjacent to any bj,vj for ji. Hence, the tokens can move from A to Q and then to D1. Forth, as Q is empty of token, z can move to z, freeing D2. Last, the tokens in B and C can freely move to D2 and D3 respectively.

This shows that (H,S,D) is a positive ISR-DTS instance, and conclude the first part of the proof of Lemma 5.1. The second implication in the statement of Lemma 5.1 is harder to prove. We show that any reconfiguration sequence must follow some structure, from which we derive the existence of an independent set in G. In what follows, we assume that (H,S,D) is a positive ISR-DTS instance.

Claim 5.2.

For any reconfiguration sequence, the tokens in x, y, and z end up in x, y, and z respectively. Furthermore, they move in this order.

Proof.

While other tokens can reach x, the token on x can only reach x. Also, the token in y (resp. z) is the only one that can reach y (resp. z).

Additionally, notice that both y and z block all of Q. As the token reaching D1 need to go through Q, if z moves to z before y moves to y no token can ever reach Q. So y must reach y before z reaches z. And since x blocks y, x must slide to x first.

Claim 5.3.

For any reconfiguration sequence, no token slides along the edge uv, if uv is in A×C, B×C or B×Q.

Proof.

As the tokes coming from the clocks stay within them, we may argue as if these vertices and their respective tokens were not present.

The vertices in D2 can only be reached from S2, thus no token may leave a path from some vertex in S2 to some vertex in D2 which prohibits the use of edges between B and C or B and Q. Consequently and similarly, the only tokens that can end up in D1 are these that start in S1, prohibiting the use of the edges between A and C.

Claim 5.4.

There exists a set X={v1,vk}V(G) such that when y moves to y, there are tokens on vertices ai,vi, bi,vi, and ci,vi for every ik.

Proof.

When y moves to y, x already moved to x, so S1, S2, and S3 are empty of tokens. Furthermore, as y and z did not move yet, D2, D3, Q and therefore D1 are empty of token. So the tokens in S3 moved to C3. We then define vi as the vertex of V(G) such that s3,i moved to ci,vi. Finally, note that ci,vi blocks in Ai every ai,u with uvi. So the token from s1,i must now be in ai,vi, as these tokens may not move to other blocs by ˜5.3. Similarly, the token from s2,i must now be in bi,vi.

Claim 5.5.

X is an independent set of size k in G.

Proof.

When z goes to z, all of Q is blocked, and remains so for the rest of the reconfiguration. So the vertices in D1 are already occupied with tokens. These tokens must be from A by ˜5.3. So before z goes to z each token in ai,vi must go to qi,vi (there is only one outgoing edge from ai,vi), and then to d1,i. During these moves, the tokens in B remains there since D2 is still blocked by z. If ai,vi can freely move to qi,vi it implies that no token on bj,vj is adjacent to qi,vi which implies that no vj (with ji) is adjacent to (or equals) vi in G. As this holds for every ik, we have that X is an independent set in G. In conclusion, the existence of a reconfiguration sequence implies the existence of an independent set in G. This concludes the proof of Lemma 5.1, and therefore of Theorem 1.3.

6 FPT when parameterized by Treewidth and k

Now that we have covered the impact of the depth of a DAG on the tractability of ISR-DTS, we look at other subfamily of DAGs that could enable 𝖥𝖯𝖳 algorithms. Recently, Ito et al.[11, Theorem 3] proved that ISR-DTS is polynomial time solvable on DAGs whose underlying graph is a tree. We extend this results by looking at graph of bounded treewidth.

Theorem 1.4. [Restated, see original statement.]

ISR-DTS is 𝖥𝖯𝖳 on DAGs when parameterized by k+tw.

We first prove several results on galactic reconfiguration and the impact of collapses that we defined in Section 2. Then, we explain how to perform a dynamic algorithm on a tree decomposition.

6.1 Reconfiguration and Collapses

The first lemma shows that a reconfiguration defined on a graph only has one possible collapse on a collapse of the graph. Meaning that it does not matter in which sequence of collapse the new graph is obtained.

Lemma 6.1.

Let G1, G2, G2, and G3 galactic graphs such that both G2 and G2 are obtained from G1 through collapses, and G3 is obtained from both G2 and G2 through collapses.

Let α,β,β,γ be reconfiguration sequences over G1,G2,G2,G3 respectively. If α collapses to β, α collapses to β and β collapses to γ, then β collapses to γ.

Proof.

Let γ be the sequence β collapses to in G3. We show that γ=γ.

Let H1,H2,,H|I| be the sequence of graphs in the chain of collapses from G1 over G2 to G3. For each iI{|I|} let fi denote the function that maps vertices (planets and black holes) from Hi to vertices Hi+1 they correspond to. That is, to itself if they where not collapsed and to the created black hole otherwise.

We have to account for the deletion of consecutive equal configurations, when collapsing reconfiguration sequences. Therefore, let gi be the function that maps indices of the reconfiguration sequence that α collapses to in Hi to the corresponding indices in the reconfiguration sequence that α collapses to in Hi+1.

Let f=f1f2f|I|1 and define g analogously. Further, define f and g analogously for the chain of collapses in from G1 to G2 and finally G3. By definition γg(j)(t)=f(αj(t)) for each configuration αj and each token t. Similarly, the same holds for γ with f and g.

As the resulting graph for both chains of collapses is the same, f=f. Further, as equality classes of configurations only merge when collapsing, we may assume that consecutive equal configurations get resolved only at the end of a chain of collapses. Thus as f=f also g=g. Thus in conclusion, for all token t and steps g(i): γg(i)(t)=f(αi(t))=f(αi(t))=γg(i)(t).

Observe that these lemma can be iterated to obtain the same statement for arbitrary long chains of collapses, essentially proves that the collapsing is transitive.

The next lemma shows that on DAGs, reconfiguration are restricted.

Lemma 6.2.

Let α be a reconfiguration sequence over a DAG G without back holes. Then for every i<j< and every token t we have that αi(t)=α(t) implies αi(t)=αj(t).

Furthermore, if β is a collapse of α, then for all i<j< and token t such that βi(t)=β(t) and βi(t)βj(t), we have that βi(t) is a black hole.

Proof.

The first assertion is trivial. A token returning to a vertex would imply a round walk and thus a cycle. Assume that βi(t)=βA(G) there exists corresponding indices i<j< with αi(t)=α(t)αj(t) – contradicting the first statement.

This in turn bound the number of possible reconfiguration sequences that can be on a DAG or its collapses.

Lemma 6.3.

For a DAG without black holes G and a graph G obtained by collapses from G where additionally G does not contain neighboring black holes; the number and length of reconfiguration sequences over G that are collapses of reconfiguration sequences over G is bounded by |V(G)|2k2|V(G)|.

Proof.

No token can return to a planet after leaving it, due to Lemma 6.2. A token might be at a black hole multiple times. However, as there are no repeating consecutive configurations and by assumption no neighboring black holes, a change for a planet has to happen in between consecutive configurations. This bounds the length of every sequence by 2k|V(G)|.

As there are only |V(G)|k possible configurations the total number of possible reconfiguration sequences is at most (|V(G)|k)2k|V(G)|=|V(G)|2k2|V(G)|.

Our last lemma of this section is a composition lemma that explains how to glue together two reconfiguration sequences defined on distinct collapses of a given graph.

Lemma 6.4 (Composition lemma).

Let G be a graph and U,V disjoint sets of vertices such that U has no neighbors in V and vise versa. Let (αi)iI and (βj)jJ be reconfiguration sequences, for GU and GV respectively, that collapse to the same sequence in GUV. Then there exists a reconfiguration sequence in G that collapses to (αi)iI and (βj)jJ over GU and GV respectively.

Proof.

Let G,U,α=(αi)iI and β=(βj)jJ defined as above. Let bU and bV the black holes in GUV corresponding to the sets U and V respectively and let γ=(γ)L be the shared collapsed reconfiguration sequence in GUV.

We build a configuration sequence (δd)dD over G by concatenating sequences δ (for each L).

Broadly speaking, fix L and the configuration γ, and look at the configurations in (αi)iI and (βj)jJ that correspond to it. All these configurations in α are equivalent when restricted to GUV, therefore tokens only move in V (and are all mapped to bV in γ). Similarly, the configuration in β corresponding to this γ only differ in U. So in δ we can perform all these move independently before moving to the configuration γ+1.

Formally let II the set of index of (αi)iI corresponding to γ, and define J similarly. Let i be the minimum index of I minus one and let j be the minimum index of J. Let δ be the sequence of length |I|+|J|1 such that for every integer d and token t, we have:

δd(t):={αi+d(t) if αi+d(t)bU and if d|I|βj(t) if αi+d(t)=bU and if d|I|βj+d|I|(t) if βj+d|I|(t)bV and if d>|I|αi+|I|(t) if βj+d|I|(t)=bV and if d>|I|

Note that the definition is consistent as αi(t)=βj(t)=γ(t) for every iI and every jJ as soon as γ(t) is not one of the black hole bU or bV. Finally, define δ as the concatenation of every δ for L.

To see that δ is indeed reconfiguration sequence, note that each time only one token moves (according to the move defined in α or β). Furthermore, since U and V are disjoint and non-adjacent the set of tokens has to be an independent set (when only considering planets). Otherwise, this inconsistency already holds in α or β.

By construction, δ and α (resp. β) agree on the positioning of tokens except for bU (resp. bV). And therefore δ collapses to α (resp. β) on GU (resp. GV).

6.2 Dynamic Programming

In a nutshell, our algorithm will try every possible reconfiguration sequence for each bag. Starting from the leaf, the information of what are the possible reconfiguration sequences is computed by a bottom up manner. At every node x the algorithm tries to glue the possible reconfiguration sequences from the left and from the right children, checking that they agree on the overlapping part. Thanks to Lemma 6.3 we only have to consider small sequences at the bag level, and the gluing can be done thanks to Lemma 6.4. We now turn to formal definitions. We consider a DAG G, and it’s tree-decomposition as defined in Section 2.

Let x be a node of the tree-decomposition and y1,y2 its children. We define the significant of x noted 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x) as G(V𝖼𝗈𝗇𝖾(x)). Intuitively, everything that is “above” x in the tree decomposition has been collapsed into one black hole. The right-significant, noted 𝗋𝗂𝗀𝗁𝗍-𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x) as 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x)𝖼𝗈𝗆𝗉(y1) and 𝗁𝗎𝗅𝗅(x) as the graph 𝗋𝗂𝗀𝗁𝗍-𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x)𝖼𝗈𝗆𝗉(y2). I.e. where one (or both) subtrees of x have collapsed into a black hole. Finally, we define 𝗐𝖺𝗋𝗉(x) as 𝗁𝗎𝗅𝗅(x)𝗆𝗋𝗀(x){b1,b2} where b1 (respectively b2) is the black hole obtained from collapsing 𝖼𝗈𝗆𝗉(y1) (resp 𝖼𝗈𝗆𝗉(y2)). Note that 𝗐𝖺𝗋𝗉(x)=𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x)(𝖼𝗈𝗆𝗉(x)). I.e. it is only composed of element of the adhesion of x with two black holes representing everything that is “above”, and “below” in the tree decomposition. Observe that 𝗁𝗎𝗅𝗅(x) can be collapsed to obtain all 𝗐𝖺𝗋𝗉(x), 𝗐𝖺𝗋𝗉(y1) and 𝗐𝖺𝗋𝗉(y2) in a single step. All these notions are represented in Figure 3, and an example of reconfiguration is presented in Figure 4.

Figure 3: Collapsing different graphs into each other.
Figure 4: A graph, its tree-decomposition (left) and reconfiguration sequences with one token (red) over collapsed graphs (right), where y2 is the right child of x. The reconfiguration over 𝗁𝗎𝗅𝗅(x) and 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(y2) can be glued together using Lemma 6.4 as they collapse to the same sequence over 𝗐𝖺𝗋𝗉(y2). The reconfiguration sequences are presented with repeating configuration for clarity.
Definition 6.5.

Let G be a DAG, together with a tree decomposition, let x be a node of the tree decomposition. The profile of x is the set of reconfiguration sequences α over 𝗐𝖺𝗋𝗉(x) such that there is a reconfiguration β over 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x) that collapses to α over 𝗐𝖺𝗋𝗉(x).

Thanks to Lemma 6.3, the profile of each node is bounded by tw2ktw, where tw is the width of the given tree decomposition. Ne now show that we can compute the profile of each node in a bottom up manner.

Proposition 6.6.

Given a tree decomposition of a DAG G of width tw, a node x of the decomposition, and the profile of its children y1 and y2, we can compute the profile of x in time f(k,tw), for some computable function f.

Proof.

For the leaf of the tree-decomposition, it holds trivially, as we can compute all possible sequences in 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x) as it is of size at most tw. Thus, we may assume that x is not a leaf. For every possible reconfiguration sequence α over 𝗐𝖺𝗋𝗉(x) the algorithm adds it to the profile of x if and only if the following holds.

There are reconfiguration sequences β1, β2, and γ over 𝗐𝖺𝗋𝗉(y1), 𝗐𝖺𝗋𝗉(y2), and 𝗁𝗎𝗅𝗅(x) respectively, such that :

  1. 1.

    β1 (resp. β2) belongs to the profile of y1 (resp. y2), and

  2. 2.

    γ collapses to α (resp. β1, β2 ) over 𝗐𝖺𝗋𝗉(x) (resp. 𝗐𝖺𝗋𝗉(y1), 𝗐𝖺𝗋𝗉(y2)).

Claim 6.7.

This checks can be performed in time f(k,tw).

Proof.

By Lemma 6.3, there can be only few possible sequences to consider for γ. We can then compute its collapses in 𝗐𝖺𝗋𝗉(y1) and 𝗐𝖺𝗋𝗉(y2), and check that the results belongs to the profiles of y1 and y2 that have already been computed. All of this can therefore be computed in time f(k,tw).

Claim 6.8.

If there exists a reconfiguration sequence δ over 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x) that collapses to α in 𝗐𝖺𝗋𝗉(x) then the algorithm adds α to the profile of x.

Proof.

We first collapse δ to a reconfiguration γ in the graph 𝗁𝗎𝗅𝗅(x). By Lemma 6.1 we obtain that γ also collapses to α over 𝗐𝖺𝗋𝗉(x).

Now, we collapse δ to a sequence β1 over 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(y1), and both collapse to a sequence β1 over 𝗐𝖺𝗋𝗉(y1). Since β1 is in the significant of y1, β1 is in the profile of y1. We define β2 and β2 similarly for y2.

Note that this triple (γ, β1, and β2) must be considered by the algorithm. Finally, by Lemma 6.1, γ also collapses to β1 and β2. So this triple of reconfiguration sequences passes the checks, and the algorithm selects α to the profile of x.

Claim 6.9.

If the algorithm adds α to the profile of x, then there exists a reconfiguration sequence δ in 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x) that collapses to α in 𝗐𝖺𝗋𝗉(x)

Proof.

Let γ be the guessed sequence in 𝗁𝗎𝗅𝗅(x) and β1,β2 be the sequences that γ collapses to in 𝗐𝖺𝗋𝗉(y1), 𝗐𝖺𝗋𝗉(y2) respectively, where y1 and y2 are the left and right children of x. As β1 and β2 are in the profile of y1 and y2 respectively, by definition of profile, there exist β1 and β2 in 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(y1) and 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(y2) that collapse to β1 and β2 in 𝗐𝖺𝗋𝗉(y1) and 𝗐𝖺𝗋𝗉(y2) respectively.

Now we use the Composition Lemma 6.4 on γ and β2 to first get a reconfiguration sequence γ in 𝗋𝗂𝗀𝗁𝗍-𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x). This is possible because they both collapse to β2 according to the check of the algorithms, and because by construction the vertices in 𝖼𝗈𝗆𝗉(y2) are only adjacent to the vertices of 𝖺𝖽𝗁(y2) (which are in 𝗐𝖺𝗋𝗉(y2)) and not to the other vertices of 𝗋𝗂𝗀𝗁𝗍-𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x).

As γ collapses to γ, and the algorithm checked that γ collapses to β1, by Lemma 6.1, γ also collapses to β1. We can finally use again our Composition Lemma 6.4, because both β1 and γ collapse to β1 over 𝗐𝖺𝗋𝗉(y1). And as before, the vertices of 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(y1) that are not in 𝗐𝖺𝗋𝗉(y1) (i.e. the vertices of 𝖼𝗈𝗆𝗉(y1)) are only adjacent to the vertices of 𝖺𝖽𝗁(y1), which are in 𝗐𝖺𝗋𝗉(y1), and not to the other vertices of 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x). This yields a reconfiguration sequence δ over 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x). With several uses of Lemma 6.1, we obtain that δ which collapses to γ also collapses to γ, and therefore also collapses to α.

In conclusion, this sequence α is indeed in the profile of x.

This therefore concludes the proof of Proposition 6.6.

With all of that in mind, we can also conclude the proof of Theorem 1.4. Thanks to Proposition 6.6, we compute the profile of every node in time linear in the number of nodes in the tree decomposition (with constant factors depending on k and tw). As the significant of the root is the entire graph, the non-emptiness of the profile of the root certifies the existence of a reconfiguration sequence in the entire graph. Such a reconfiguration sequence can be computed in a top-down traversal of the tree decomposition, selecting at each level a sequence from the profile that is compatible with the one selected by the parent.

7 Back to undirected graphs

One of the biggest open problem in token sliding reconfiguration is whether ISR-TS parameterized by k is 𝖥𝖯𝖳 on graphs of bounded treewidth (see [6, Question 5]). Our study of directed graphs and Theorem 1.4 can be seen as a step towards solving this open problem. In fact the techniques that we develop in Section 6 have consequences for undirected graphs.

For example, note that the only place in the proof of Theorem 1.4 where we use that the given graph is directed and is a DAG is in Lemma 6.2. The DAG property is only used to show that a token never goes twice to the same vertex. This in turn bounds the number of possible reconfiguration sequences in collapses of our original DAG (Lemma 6.3).

Our proof then directly provide the following result: Given an (undirected) instance (G,S,D) for ISR-TS, deciding whether there is a reconfiguration sequence where no token goes twice to the same vertex can be decided in 𝖥𝖯𝖳, parameterized by k+tw(G).

To generalize this idea, we introduce another parameter.

Definition 7.1.

Given a reconfiguration sequence (αi)iI, a token t and a vertex v, the iteration of (v,t) is the number of time the token enters v (plus one if t starts in v). The iteration ι of a reconfiguration sequence (αi)iI is the maximum iteration of all pair (v,t):
ι:=max(v,t)V×T|{0|α0(t)=v}{iI| 0<i and αi1(t)αi(t)=v}|.

For galactic graphs, the iteration is only defined on planets, with no constrains on the number of time a token enters a black holes. Observe then that when taking the collapse of a reconfiguration sequence, its iteration does not increase.

Lemma 7.2 (Analogue of Lemma 6.3).

Let G be a (undirected) galactic graph with no neighboring black holes; the number and length of reconfiguration sequences with k tokens and of iteration ι over G is bounded by g(|V(G)|,k,ι) for some computable function g.

Proof.

First observe that with the absence of neighboring black holes, each step introduces a change for a planet (losing or receiving a token). As, a planet only witness 2kι many changes, this bounds the length of every sequence by 2kιn, where n=|V(G)|.

As there are nk possible configurations, the total number of possible reconfiguration sequences of iteration ι is at most (nk)2kιn=n2k2ιn.

We then call the ι-profile of x the set of reconfiguration α of iteration ι over 𝗐𝖺𝗋𝗉(x) such that there is a reconfiguration β over 𝗌𝗂𝗀𝗇𝗂𝖿𝗂𝖼𝖺𝗇𝗍(x) that collapses to α over 𝗐𝖺𝗋𝗉(x).

Proposition 7.3 (Analogue of Proposition 6.6).

Given a tree decomposition of a graph G of width tw, a node x of the decomposition, and the ι-profile of its children y1 and y2, we can compute the ι-profile of x in time f(k,tw,ι).

Which in turn yields the proof for Theorem 1.5.

8 Conclusion

We used galactic graphs, to show that ISR-DTS in DAGs is tractable, when parameterized by treewidth and the number of tokens k. Otherwise the problem becomes hard, unless either the depth is at most 2, or at most 3 and k small. Noticeable, the treewidth result applies to undirected graphs, if the iteration ι is restricted.

Thus, it might be interesting, to study this parameters behavior in graph classes other then DAGs. Interesting further results might also arise from applying the used techniques to other problems (Dominating Set Reconfiguration might be a good candidate) or to generalize to other directed graph classes that resemble DAGs.

References

  • [1] Niranka Banerjee, Christian Engels, and Duc A. Hoang. Directed token sliding, 2024. doi:10.48550/arXiv.2411.16149.
  • [2] Valentin Bartier, Nicolas Bousquet, Jihad Hanna, Amer E. Mouawad, and Sebastian Siebertz. Token sliding on graphs of girth five. Algorithmica, 86(2):638–655, 2024. doi:10.1007/S00453-023-01181-5.
  • [3] Valentin Bartier, Nicolas Bousquet, and Amer E. Mouawad. Galactic token sliding. J. Comput. Syst. Sci., 136:220–248, 2023. doi:10.1016/J.JCSS.2023.03.008.
  • [4] Hans L. Bodlaender, Carla Groenland, and Céline M. F. Swennenhuis. Parameterized complexities of dominating and independent set reconfiguration. In Intl. Symp. on Parameterized and Exact Computation (IPEC), volume 214 of LIPIcs, pages 9:1–9:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.IPEC.2021.9.
  • [5] Marthe Bonamy and Nicolas Bousquet. Token sliding on chordal graphs. In Workshop on Graph-Theoretic Concepts in Computer Science (WG), volume 10520 of Lecture Notes in Computer Science, pages 127–139. Springer, 2017. doi:10.1007/978-3-319-68705-6_10.
  • [6] Nicolas Bousquet, Amer E. Mouawad, Naomi Nishimura, and Sebastian Siebertz. A survey on the parameterized complexity of reconfiguration problems. Comput. Sci. Rev., 53:100663, 2024. doi:10.1016/J.COSREV.2024.100663.
  • [7] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
  • [8] Erik D. Demaine, Martin L. Demaine, Eli Fox-Epstein, Duc A. Hoang, Takehiro Ito, Hirotaka Ono, Yota Otachi, Ryuhei Uehara, and Takeshi Yamada. Polynomial-time algorithm for sliding tokens on trees. In Intl. Symp. on Algorithms and Computation (ISAAC), volume 8889 of Lecture Notes in Computer Science, pages 389–400. Springer, 2014. doi:10.1007/978-3-319-13075-0_31.
  • [9] Tatsuya Gima, Takehiro Ito, Yasuaki Kobayashi, and Yota Otachi. Algorithmic meta-theorems for combinatorial reconfiguration revisited. Algorithmica, 86(11):3395–3424, 2024. doi:10.1007/S00453-024-01261-0.
  • [10] Arash Haddadan, Takehiro Ito, Amer E. Mouawad, Naomi Nishimura, Hirotaka Ono, Akira Suzuki, and Youcef Tebbal. The complexity of dominating set reconfiguration. Theor. Comput. Sci., 651:37–49, 2016. doi:10.1016/J.TCS.2016.08.016.
  • [11] Takehiro Ito, Yuni Iwamasa, Yasuaki Kobayashi, Yu Nakahata, Yota Otachi, Masahiro Takahashi, and Kunihiro Wasa. Independent set reconfiguration on directed graphs. In Intl. Symp. on Mathematical Foundations of Computer Science (MFCS), volume 241 of LIPIcs, pages 58:1–58:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.MFCS.2022.58.
  • [12] Wm. Woolsey Johnson and William E. Story. Notes on the "15" puzzle. American Journal of Mathematics, 2(4):397–404, 1879. URL: http://www.jstor.org/stable/2369492.
  • [13] Daniel Lokshtanov and Amer E. Mouawad. The complexity of independent set reconfiguration on bipartite graphs. ACM Trans. Algorithms, 15(1):7:1–7:19, 2019. doi:10.1145/3280825.
  • [14] Amer E. Mouawad, Naomi Nishimura, Venkatesh Raman, Narges Simjour, and Akira Suzuki. On the parameterized complexity of reconfiguration problems. Algorithmica, 78(1):274–297, 2017. doi:10.1007/S00453-016-0159-2.
  • [15] Amer E. Mouawad, Naomi Nishimura, Venkatesh Raman, and Marcin Wrochna. Reconfiguration over tree decompositions. In Intl. Symp. on Parameterized and Exact Computation (IPEC), volume 8894 of Lecture Notes in Computer Science, pages 246–257. Springer, 2014. doi:10.1007/978-3-319-13524-3_21.
  • [16] Naomi Nishimura. Introduction to reconfiguration. Algorithms, 11(4):52, 2018. doi:10.3390/A11040052.
  • [17] Sebastian Siebertz. Reconfiguration on nowhere dense graph classes. Electron. J. Comb., 25(3):3, 2018. doi:10.37236/7458.
  • [18] Marcin Wrochna. Reconfiguration in bounded bandwidth and tree-depth, 2018. doi:10.1016/J.JCSS.2017.11.003.