Abstract 1 Introduction 2 Preliminaries 3 NP-hardness Results 4 Fixed-parameter Algorithms 5 Parameterized Approximation Results 6 Lower Bounds with Respect to Structural Parameters 7 Conclusion References

Broadcasting Under Structural Restrictions

Yudai Egami Kyushu University, Fukuoka, Japan Tatsuya Gima ORCID Hokkaido University, Sapporo, Japan Tesshu Hanaka ORCID Kyushu University, Fukuoka, Japan Yasuaki Kobayashi ORCID Hokkaido University, Sapporo, Japan Michael Lampis ORCID Université Paris-Dauphine, PSL University, CNRS UMR7243, LAMSADE, Paris, France Valia Mitsou Université Paris Cité, IRIF, CNRS, 75205, Paris, France Edouard Nemery ORCID Université Paris-Dauphine, PSL University, CNRS UMR7243, LAMSADE, Paris, France Yota Otachi ORCID Nagoya University, Japan Manolis Vasilakis ORCID Université Paris-Dauphine, PSL University, CNRS UMR7243, LAMSADE, Paris, France Daniel Vaz ORCID LIGM, Université Gustave Eiffel, CNRS, ESIEE Paris, 77454 Marne-la-Vallée, France
Abstract

In the Telephone Broadcast problem we are given a graph G=(V,E) with a designated source vertex sV. Our goal is to transmit a message, which is initially known only to s, to all vertices of the graph by using a process where in each round an informed vertex may transmit the message to one of its uninformed neighbors. The optimization objective is to minimize the number of rounds.

Following up on several recent works, we investigate the structurally parameterized complexity of Telephone Broadcast. In particular, we first strengthen existing NP-hardness results by showing that the problem remains NP-complete on graphs of bounded tree-depth and also on cactus graphs which are one vertex deletion away from being path forests. Motivated by this (severe) hardness, we study several other parameterizations of the problem and obtain FPT algorithms parameterized by vertex integrity (generalizing a recent FPT algorithm parameterized by vertex cover by Fomin, Fraigniaud, and Golovach [TCS 2024]) and by distance to clique, as well as FPT approximation algorithms parameterized by clique-cover and cluster vertex deletion. Furthermore, we obtain structural results that relate the length of the optimal broadcast protocol of a graph G with its pathwidth and tree-depth. By presenting a substantial improvement over the best previously known bound for pathwidth (Aminian, Kamali, Seyed-Javadi, and Sumedha [ICALP 2025]) we exponentially improve the approximation ratio achievable in polynomial time on graphs of bounded pathwidth from 𝒪(4pw) to 𝒪(pw).

Keywords and phrases:
Parameterized Complexity, Structural Graph Parameters, Telephone Broadcast
Funding:
Tatsuya Gima: JSPS KAKENHI Grant Numbers JP24K23847, JP25K03077.
Tesshu Hanaka: JSPS KAKENHI Grant Numbers JP21H05852, JP21K17707, JP22H00513, JP23H04388, JP25K03077, and JST, CRONOS, Japan Grant Number JPMJCS24K2.
Yasuaki Kobayashi: JSPS KAKENHI Grant Numbers JP20H00595, JP23K28034, JP24H00686, and JP24H00697
Yota Otachi: JSPS KAKENHI Grant Numbers JP21K11752, JP22H00513, JP24H00697, JP25K03076, JP25K03077.
Copyright and License:
[Uncaptioned image] © Yudai Egami, Tatsuya Gima, Tesshu Hanaka, Yasuaki Kobayashi, Michael Lampis, Valia Mitsou, Edouard Nemery, Yota Otachi, Manolis Vasilakis, and Daniel Vaz; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms
Related Version:
Full Version: https://arxiv.org/abs/2504.13669
Funding:
This work is partially supported by ANR project ANR-21-CE48-0022 (S-EX-AP-PE-AL).
Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał Skrzypczak

1 Introduction

Broadcasting in graphs is a well-studied field, with one of the most basic models being the telephone model [25]: at the start of the broadcasting process exactly one vertex of the graph (the source vertex) is informed (i.e., knows the message), and at the beginning of each round each informed vertex can send the message to at most one of its uninformed neighbors which receives the message by the end of that round. To fix some notation, let G be a connected graph on n vertices and sV(G) denote the source vertex. Then, b(G,s) denotes the minimum number of rounds needed to disseminate the message to all vertices of G under the previously described model. As an example, if G is a path and s is one of the degree-1 vertices, then b(G,s)=n1, while if G is a complete graph, then b(G,s)=logn. Notice that for any graph G it holds that lognb(G,s)n1, and due to the previous examples there exist graphs for which those bounds are tight.

In this paper we study several structural parameterizations111Throughout the paper we assume that the reader is familiar with the basics of parameterized complexity, as given in standard textbooks [8]. of the Telephone Broadcast problem which asks, given a graph G, a source vertex sV(G), and an integer t, whether b(G,s)t. In 1981, Slater, Cockayne, and Hedetniemi [33] introduced Telephone Broadcast and showed that it is NP-complete in general but polynomial-time solvable on trees. Among several results obtained in the intensive study of the problem, the most relevant to us are the very recent ones due to Fomin et al. [16], Tale [34], and Aminian et al. [2], described below.

Fomin, Fraigniaud, and Golovach [16] initiated the study of the parameterized complexity of Telephone Broadcast. They developed a 3nn𝒪(1)-time algorithm, where n is the number of vertices, as well as showed that the problem is fixed-parameter tractable parameterized by feedback edge set number, by vertex cover number, and by the number of vertices minus the number of rounds; notice that their first result, along with the fact that n2t, further implies that the problem is FPT by the number of rounds and leads to an algorithm of double-exponential parametric dependence. Among other open questions they posed, they asked the complexity of Telephone Broadcast parameterized by other structural parameters and explicitly mentioned treewidth and feedback vertex set number.

Answering the previous question, Tale [34] showed that Telephone Broadcast is NP-complete on graphs of feedback vertex set number 1 (and thus treewidth 2). As a matter of fact, the proof shows NP-completeness on graphs of vertex deletion distance 2 to path forest (and thus pathwidth 3). Regarding the double-exponential dependence parameterized by the number of rounds t, as discussed in [34], a result of Papadimitriou and Yannakakis [30] implies that Telephone Broadcast parameterized by t does not admit an algorithm with parameter dependence better than double-exponential (under the ETH). Therefore, the bound obtained by the observation n2t applied to the 3nn𝒪(1)-time algorithm of [16] is essentially optimal.

In a very recent work, Aminian, Kamali, Seyed-Javadi, and Sumedha [2] studied Telephone Broadcast on cactus graphs and on graphs of bounded pathwidth. They showed that the problem is NP-complete on cactus graphs of pathwidth 2, while they presented a factor-2 approximation algorithm for cactus graphs. Furthermore, they established a connection between the pathwidth pw of the input graph G and b(G,s), by proving that for all sV(G) it holds that b(G,s)=Ω(n4(pw+1)). A consequence of this result is that the polynomial-time approximation algorithm of Elkin and Kortsarz [14] achieves an approximation ratio of 𝒪(4pw) for graphs of pathwidth pw, improving over the factor 𝒪(lognloglogn) achieved in general graphs.

Figure 1: Parameterized complexity of Telephone Broadcast with respect to structural graph parameters. The connection between two parameters represents that the upper parameter p is bounded by some computable function f() of the lower parameter q, i.e., pf(q). The parameters marked with are studied in this paper. The double, rounded, and dotted rectangles indicate paraNP-complete, fixed-parameter tractable, and parameterized approximable cases, respectively. The exact parameterized complexity of the parameterizations in the last case remains unsettled.
Our contribution.

Our aim in this paper is to thoroughly study Telephone Broadcast under the perspective of parameterized complexity; for an overview of our results and the relationship between the mentioned parameters we refer to Figure 1. First we show in Section 3 that the problem remains NP-complete even for very restricted families of graphs, namely (i) cactus graphs of vertex deletion distance 1 to path forest (Theorem 1), and (ii) graphs of constant tree-depth (Theorem 5). The reduction employed in Theorem 1 follows along the lines of the one presented by Tale [34], starting from a variation of 3-Partition. However, by selecting a more appropriate variant of 3-Partition we are able to significantly simplify both the reduction itself and the constructed graph, thus improving over the initial result by Tale [34] and the subsequent one by Aminian et al. [2] (in the sense that graphs with vertex deletion distance 1 from a path forest, as given in our reduction, are a strict subclass of the snowflake graphs given in [2]). More importantly, by modifying said reduction, we further prove that the problem remains NP-hard for graphs of constant tree-depth. Note that tree-depth is a parameter not covered by the previous reductions, which heavily relied on constructions of long paths (which inherently have large tree-depth).

Our negative results extend the intractability of the problem from bounded pathwidth to bounded tree-depth instances. It is therefore natural to ask which (more restrictive) parameterizations do render the problem tractable. We present several positive results in this direction in Section 4. In particular, in Theorem 6 we show that the problem is FPT parameterized by vertex integrity, which nicely complements the paraNP-hardness in case of parameterization by tree-depth. To obtain this result, we generalize some of the ideas employed by Fomin et al. [16] to show fixed-parameter tractability by vertex cover number. Next, in Theorem 9 we consider graphs which are k vertex deletions away from being a clique and we develop a 2𝒪(k2)n𝒪(1)-time algorithm. Moving on, we consider the parameterization by both t and the treewidth tw of the input graph, and in Theorem 12 we develop a single-exponential 2𝒪(ttw)n𝒪(1)-time algorithm based on dynamic programming (contrast this with the fact that the problem is intractable when parameterized solely by treewidth and requires a double-exponential dependence when parameterized solely by t). As our last algorithmic results, in Section 5 we develop FPT approximation algorithms when parameterized by clique cover number and by cluster vertex deletion number. With these results we clearly trace the limits of tractability for sparse parameters (tree-depth, vertex integrity) but also improve our understanding of some dense graph parameters.

The 2𝒪(ttw)n𝒪(1) algorithm is of particular note because it identifies a small island of tractability for Telephone Broadcast, namely, it implies that Telephone Broadcast is polynomial-time solvable for graphs of bounded treewidth (XP) whenever we are interested in a fast broadcast schedule (t=𝒪(logn)). This is interesting, because in general the problem seems quite intractable for most parameters and because all hardness reductions we mentioned construct instances which require a large (polynomial in n) number of rounds. This further motivates the question of which graph families may admit a schedule with few rounds, which, as we mention below, has been extensively studied and also has algorithmic implications in terms of approximation. Closing the paper, we improve our understanding of this (structural) question by more carefully studying the relationship between the minimum number of necessary rounds and the pathwidth and tree-depth of a graph. In particular, in Section 6 we show as a main result (Corollary 21) that b(G,s)=Ω(n(2pw+2)1). This bound exponentially improves over the corresponding bound of Aminian et al. [2] (who showed that b(G,s)=Ω(n4(pw+1))). As an immediate application (Corollary 22), by applying an algorithm of Elkin and Kortsarz [14], we obtain a polynomial-time algorithm with approximation ratio 𝒪(pw) (compared to the ratio of 𝒪(4pw) given in [2]).

Related work.

There has been an extensive line of research with regards to broadcasting under the telephone model in graphs. The computational complexity of Telephone Broadcast has been studied for multiple classes of graphs, with the problem being polynomial-time solvable for trees [33], a subclass of cactus graphs [6], fully connected trees [19], generalized windmill graphs (which is equivalent to graphs of twin-cover number 1[1, 9], and unicyclic graphs [23], with the latter result having been generalized to the previously mentioned FPT algorithm parameterized by feedback edge set number by Fomin et al. [16]. On the other hand, Jansen and Müller [28] showed that Telephone Broadcast remains NP-complete on several restricted graph classes such as chordal and grid graphs. We also refer to some relevant surveys in [17, 26]. In another line of research, Grigni and Peleg [20] have provided bounds on the minimum number of edges and the minimum maxdegree for graphs G with the property that b(G,s)=logn for all sV(G).

The problem is also well-studied in terms of its polynomial-time approximability. Ravi [31] presented a 𝒪(log2nloglogn)-factor approximation algorithm, while Kortsarz and Peleg [29] presented (among other results) an algorithm that computes a broadcast protocol with at most 2b(G,s)+𝒪(n) rounds. Subsequently, Bar-Noy, Guha, Naor, and Schieber [3] improved the approximation ratio to 𝒪(logn), while Elkin and Kortsarz [12] provided a combinatorial approximation algorithm of the same approximation ratio, as opposed to the algorithms of [3, 31] that involve solving LPs, that additionally generalizes to directed graphs. The current best approximation ratio of 𝒪(lognloglogn) is due to Elkin and Kortsarz [14]; as a matter of fact, the ratio of their algorithm is 𝒪(lognlogb(G,s)), thus whenever b(G,s)=Ω(nδ) for some constant δ>0, they obtain a constant approximation ratio 𝒪(1/δ). Better approximation ratios are known for specific graph classes [4, 5, 22, 29], while there are also some inapproximability results [12, 32].

There are several related problems in the literature (see e.g. [35] or the survey [25]), and other models of communication have been considered, such as the open-line and open-path model [15, 29]. An important generalization of Telephone Broadcast that has been studied is the Telephone Multicast problem, where the objective is to minimize the number of rounds needed to inform a specific subset of vertices of the input graph. Most of the previously mentioned approximation algorithms ([3, 12, 14, 31]) generalize to this problem resulting in improved approximation ratios, while directed versions (and variations) of it have also been studied [13, 24].

2 Preliminaries

Throughout the paper we use standard graph notations [10], and we assume familiarity with the basic notions of parameterized complexity [8]. For x,y, let [x,y]={z:xzy}, while [x]=[1,x].

All graphs considered are undirected without loops. Given a graph G=(V,E) and a subset of its vertices SV, G[S] denotes the subgraph induced by S while GS denotes G[VS]. We denote the set of connected components of G by cc(G). For two vertices u,vV, the distance between u and v in G, denoted by d(u,v), is the length of a u-v shortest path. For Ccc(G), dC(u,v) denotes the distance between u and v in the connected component C. The diameter of a connected graph G, denoted by diam(G), is the maximum among the lengths of its shortest paths, i.e., maxu,vVd(u,v).

For a connected graph G=(V,E) and a source sV(G), b(G,s) denotes the minimum number of rounds for broadcasting a message from s to all the other vertices.

A broadcast protocol, which represents how a message is broadcast from the originator s, is a spanning tree T rooted at s together with a time-stamp function τ:E(T)[t], informally indicating when an edge is used to transmit a message. More formally, we require that τ must be a proper coloring of the edges of T with the additional property that for each vV{s} the edge connecting v to its parent must have minimum value assigned by τ over all edges incident on v. We say that u forwards the message to v at time tuv if u is the parent of v in the tree and τ(uv)=tuv.

Finally, we give a formal definition of Telephone Broadcast as follows.

3 NP-hardness Results

In this section we prove that Telephone Broadcast remains NP-complete even on very restricted families of graphs, namely on (i) cactus graphs that are distance-1 to path forest (Theorem 1) and (ii) graphs of constant tree-depth (Theorem 5). Our work builds upon previous work by Tale [34], who showed that the problem is NP-complete on graphs of distance-2 to path forest. We note that Theorem 1 improves and significantly simplifies both the initial result by Tale [34] as well as a recent result by Aminian et al. [2] who, via a long series of reductions, proved that Telephone Broadcast remains NP-complete on a special type of cactus graphs coined snowflake graphs.222Roughly speaking, snowflake graphs are those that are distance-1 to caterpillar forest, so they are a strict superclass of graphs which are distance-1 from path forests.

Since Telephone Broadcast clearly belongs to NP, it suffices to show the NP-hardness for each case. The starting point of both of our reductions is a restricted version of Numerical Matching with Target Sums. Given three multisets A,B,C each containing n positive integers such that aAa+bBb=cCc, Numerical Matching with Target Sums asks to determine whether it is possible to partition the 3n given numbers into n triples S1,,Sn such that each triple contains one ciC, one ajA, and one bkB, with ci=aj+bk. Numerical Matching with Target Sums is known to be strongly NP-complete [18, SP17], even when all input numbers are distinct [27, Appendix], that is, when ABC is a set of cardinality 3n. Starting from such an instance, by first doubling all elements of ABC and then adding 1 to those of BC, one can show that the following restricted version of the problem is NP-complete as well.

The ideas behind both reductions of Theorems 1 and 5 are quite similar. We start by introducing the source vertex s, and setting t to be the maximum target sum. Then, for every target sum, we introduce a gadget on roughly that many vertices and connect both of its endpoints to s. On a high level, if the target sum ci is due to aj+bk, at rounds taj and tbk the source s is supposed to broadcast towards the said gadget; notice that it is therefore crucial that AB=. To restrict the broadcasting of s during the rest of the rounds, namely on round h[t]{tx:xAB}, we attach either a long path or a large star to s that essentially forces it to broadcast towards it at round h. Implementing the previous with the gadgets being long paths is sufficient for Theorem 1 to go through. For Theorem 5 however, we need to proceed in two steps and first reduce to the natural generalization of Telephone Broadcast where there are multiple source vertices before eventually reducing to Telephone Broadcast.

3.1 Cactus Graphs

We start with the hardness result for cactus graphs that are distance-1 to path forest.

Theorem 1.

Telephone Broadcast is NP-complete for cactus graphs that are distance-1 to path forest.

Proof.

Let =(A,B,C) be an instance of Restricted Numerical Matching with Target Sums, where A={ai:i[n]}, B={bi:i[n]}, and C={ci:i[n]}. We will construct an equivalent instance 𝒥=(G,s,t) of Telephone Broadcast, where t=maxcCc. Note that t>maxxABx.

We construct the graph G as follows:

  • Introduce a vertex s;

  • For every i[n], introduce a path 𝒫i on ci+2 vertices with endpoints ui and vi, and add edges {s,ui} and {s,vi};

  • For every h[t]{tx:xAB}, introduce a path 𝒬h on th+1 vertices, and add an edge from one of its endpoints to s. Name the other endpoint qh (for h=t, we name the single vertex of 𝒬t as qt instead).

This concludes the construction of G. Notice that G is a cactus graph, while Gs is a collection of paths. Before proving the equivalence of the two instances, we first compute the size of graph G.

Claim 2.

It holds that |V(G)|=1+t(t+1)2.

Proof.

Notice that G is comprised of vertex s, as well as the vertices present in 𝒫i and 𝒬h, for i[n] and h[t]{tx:xAB}. Consequently,

|V(G)| =1+i=1n(ci+2)+h[t]{tx:xAB}(th+1)
=1+2n+i=1nci+(t2n)+h[t]{tx:xAB}(th)
=1+t+i=1nci+h[t](th)h{tx:xAB}(th)
=1+i=1nci+h[t]hxABx
=1+t(t+1)2,

and the statement follows.

Claim 3.

If is a yes-instance of Restricted Numerical Matching with Target Sums, then 𝒥 is a yes-instance of Telephone Broadcast.

Proof.

Let (S1,,Sn) be a partition of ABC that certifies that is a yes-instance. Rename appropriately the elements of ABC so that Si={ai,bi,ci} for all i[n]. Let h[t] denote the current round, and consider the following broadcast protocol.

  • If h[t]{tx:xAB}, then set s to forward the message along the path 𝒬h. In the subsequent rounds, the path from s to qh keeps propelling the message towards qh.

  • Otherwise, it holds that h=tx for some xAB. If x=ai, then set s to forward the message to ui, else if x=bi, then towards vi instead. In the subsequent rounds, the message keeps getting propelled along the path 𝒫i towards its other endpoint.

This completes the description of the protocol.

We now prove that every vertex of G gets the message by the end of round t. Regarding the vertices belonging to 𝒬h, notice that since s forwards the message at round h, and 𝒬h contains th+1 vertices, all vertices of 𝒬h receive the message by the end of round t; as a matter of fact, qh receives the message exactly on the last round t.

It remains to argue for the vertices of 𝒫i. By the protocol, if Si={ai,bi,ci}, one endpoint of 𝒫i gets the message at round tai, while the other at round tbi. These two vertices forward the message towards each other to convey it to all the vertices in the path connecting them. In that case, the number of vertices of 𝒫i that receive the message by round t is at least t(tai)+1+t(tbi)+1=ai+bi+2=ci+2, thus all of its vertices receive the message by the end of round t.

Claim 4.

If 𝒥 is a yes-instance of Telephone Broadcast, then is a yes-instance of Restricted Numerical Matching with Target Sums.

Proof.

Assume there exists a broadcast protocol such that every vertex of G receives the message by the end of round t. We claim that the maximum number of vertices that have received the message after h[t] rounds of transmission is 1+i=1hi=1+h(h+1)2. To see this, notice that every vertex apart from s has degree at most 2, thus it can broadcast the message at most once.333We assume that no vertex broadcasts the message towards its already informed neighbors. In that case, the number of vertices receiving the message at round h is at most those that received the message at round h1 plus 1 due to s.

Since |V(G)|=1+t(t+1)2 due to Claim 2, it follows that this is indeed the case, thus every vertex apart from s and those that are informed in the last round broadcasts the message exactly once. Consequently, every vertex of degree 1 receives the message at the last round, thus s broadcasts the message towards the path 𝒬h at round h, for all h[t]{tx:xAB}.

At round h{tx:xAB}, s broadcasts the message towards some path 𝒫i, and this broadcast results in a total of x+1 vertices of path 𝒫i having received the message by round t. Consequently, it follows that for every path 𝒫i, s broadcasts towards ui and vi at rounds txi1 and txi2, where t(txi1)+1+t(txi2)+1=xi1+xi2+2=ci+2. Since ci is odd, that is also the case for exactly one among xi1 and xi2, thus {xi1,xi2} contains an element from both A and B. In that case, (S1,,Sn) certifies that is a yes-instance, since it is a partition of ABC where Si={ci,xi1,xi2}, each Si contains a single element out of A, B, and C, while ci=xi1+xi2. This completes the proof. By Claims 3 and 4, Theorem 1 follows.

3.2 Bounded Tree-depth

Now we show the hardness for graphs of tree-depth at most 6. To this end, we introduce a generalization of Telephone Broadcast as an intermediate problem, where instead of a unique vertex as the initial source, we have a set of vertices. We call the variant Telephone Broadcast with Multiple Sources and formalize it as follows, where b(G,S) is defined analogously to b(G,s).

Our proof thus consists of the following two steps. First, we reduce Restricted Numerical Matching with Target Sums to Telephone Broadcast with Multiple Sources. On a high level, the reduction is similar to the one of Theorem 1, albeit with a few supplementary steps to bound the tree-depth. The main difference is that we use star-like structures equipped with multiple sources instead of paths. Next, we present a reduction from Telephone Broadcast with Multiple Sources to Telephone Broadcast that does not increase tree-depth too much; as a matter of fact, if this reduction is applied to a graph output by the first step, then the tree-depth does not increase at all. We again use star-like structures here.

We highlight that instead of independently presenting the two reductions in distinct theorems, we choose to present them in one, as doing so allows us to present a tighter bound on the tree-depth of the final graph.

Theorem 5.

() Telephone Broadcast is NP-complete for graphs of tree-depth at most 6.

4 Fixed-parameter Algorithms

4.1 FPT Algorithm Parameterized by Vertex Integrity

Let G=(V,E) be a graph. The vertex integrity of G, denoted vi(G), is the minimum integer k such that there is a vertex set SV with |S|+maxCcc(GS)|V(C)|k. It is known that such a set can be computed by a fixed-parameter tractable algorithm parameterized by k [11].

In this section, we present a fixed-parameter tractable algorithm for Telephone Broadcast parameterized by vertex integrity.

Theorem 6.

Telephone Broadcast is fixed-parameter tractable parameterized by vertex integrity.

Overview.

Our algorithm can be seen as a generalization of the fixed-parameter tractable algorithm parameterized by vertex cover number due to Fomin et al. [16]. Since the ideas are similar, let us present a brief overview of their algorithm. Let G=(V,E) be a graph with a vertex cover S of size k. They first show that there is an optimal broadcast protocol such that all vertices in the vertex cover S receive the message in the first 2k1 rounds. Since a broadcast protocol with 2k1 rounds involves at most 22k1 vertices and the vertices in VS can be partitioned into 2k classes of twins, one can guess which vertices are involved in the first 2k1 rounds. After testing the feasibility of the guessed vertices, it only remains to check whether the completely informed vertex cover S can send the message to the independent set VS within a given number of rounds. This problem can be solved in polynomial time by a reduction to the Bipartite Matching problem.

Our algorithm follows the same general strategy, however there are two obstacles one needs to overcome in order to generalize from vertex cover number to vertex integrity. Let SV be a set satisfying |S|+maxCcc(GS)|V(C)|k. The first and main obstacle is showing the existence of an optimal broadcast protocol in which the vertices in S receive the message in the first few rounds. Unfortunately, there are instances that do not admit such optimal broadcast protocols (see Figure 2); what we show instead is that there is an optimal broadcast protocol in which the vertices in S receive the message in the first and last few rounds. The second obstacle is that after the removal of S, we have a set of small connected components instead of an independent set. To deal with this, we show that most of the components of GS receive the message from S only once and do not send the message back to S. This property allows us to handle these components of GS as single vertices forming an independent set in some sense.

Figure 2: The set S={s,v} is the unique set satisfying that |S|+maxCcc(GS)|V(C)|7 (=vi(G)). In all optimal broadcast protocols, v is the last vertex that receives the message from s as v needs only three rounds after it receives the message, while other neighbors needs four rounds.
Some definitions.

In the following, we fix a graph G=(V,E) and a source vertex sV. We also fix a vertex set SV that minimizes the sum |S|+maxCcc(GS)|V(C)| under the condition that sS. Such S can be found by first finding a set S minimizing |S|+maxCcc((Gs)S)|V(C)|, and then setting S=S{s}. Let k=|S|+maxCcc(GS)|V(C)|. Note that kvi(G)+1.

We say that C and C in cc(GS) have the same type if G admits an automorphism η such that η(V(C))=V(C), η(V(C))=V(C), and η(v)=v for each vV(V(C)V(C)). By the equivalence relation of having the same type, we partition cc(GS) into the equivalence classes 𝒞1,,𝒞p. We can upper-bound p, the number of types, by a function of k; e.g., p<2k2, which is an upper bound of the number of labeled graphs formed by at most k vertices, i.e., by the vertices in S and a component Ccc(GS). Observe that, in a broadcast protocol, two components of GS with the same type can be used interchangeably.

Let P be a broadcast protocol for (G,s). We denote by r(P) the number of rounds in P. For Ccc(GS), let aP(C) denote the arrival time at C in P; that is, aP(C) is the first round when some vertex in S forwards the message to some vertex in C. We call Ccc(GS) a leaf component of P if no vertex of C forwards the message to vertices of S. We call the vertices in the leaf components unimportant and the rest of the vertices important. That is, the important vertices are those belonging to S as well as in the non-leaf components of GS.

4.1.1 Optimal Broadcast Protocols with Nice Properties

We say that an optimal broadcast protocol P for (G,s) is S-lazy if, among all optimal broadcast protocols, P minimizes the total number of message-forwardings from S.

Lemma 7.

() If P is an S-lazy optimal broadcast protocol for (G,s), then every leaf component C with aP(C)r(P)k+1 receives the message from S exactly once.

Lemma 8.

() There is an S-lazy optimal broadcast protocol P such that all important vertices receive the message only in the first (2k3)k rounds and the last 2k rounds.

4.1.2 The Algorithm Parameterized by Vertex Integrity

Now we present a fixed-parameter tractable algorithm parameterized by vertex integrity for finding an optimal broadcast protocol for (G,s). We first guess the number of rounds t in an optimal broadcast protocol. This is possible as t<|V|. If t<2k2, then we apply the fixed-parameter algorithm parameterized by t [16]. In the following, we assume that t2k2.

We find an optimal broadcast protocol P for (G,s) with t rounds such that

  • every leaf component receives the message from S exactly once, and

  • the important vertices receive the message only in the first (2k3)k rounds and the last 2k rounds.

Such a protocol exists by Lemmas 7 and 8. As in the proof of Lemma 8, we also assume that no vertex takes a break in P.

To describe the algorithm, we partition the set of rounds [t] in P into three subsets of consecutive rounds R1=[1,(2k3)k], R2=[(2k3)k+1,t2k], and R3=[t2k+1,t]. Note that |R2|=(t2k)((2k3)k+1)+1=t2k2+kk as t2k2.

The algorithm works as follows.

  1. 0.

    Guess S1S and 𝒞1,𝒞3cc(GS) as follows:

    • sS1 and S1{s} is the set of vertices in S that receive the message in R1;

    • 𝒞1={Ccc(GS):aP(C)R1} with |𝒞1|(2k3)k2;

    • 𝒞3={Ccc(GS):aP(C)R3} with |𝒞3|2k2.

  2. 1.

    Check if the combination of S1 and 𝒞1 is feasible: that is, the algorithm checks whether there is a partial broadcast protocol P1 for G[S1C𝒞1V(C)] with (2k3)k rounds that starts at s and informs all vertices in S1 and at least one vertex of each C𝒞1.

  3. 2.

    Let 𝒞2=cc(GS)(𝒞1𝒞3). Check if S1 can forward the message to each of 𝒞2 in R2: that is, the algorithm checks whether there is a multi-source partial broadcast protocol P2 for G[S1C𝒞2V(C)] with t(2k1)k rounds that starts at S1 and informs exactly one vertex (equivalently, at least one vertex) of each C𝒞2.

  4. 3.

    Check if the combination of S1 and 𝒞3 is feasible: that is, the algorithm checks whether there is a multi-source broadcast protocol P3 for G[SC𝒞3V(C)] with 2k rounds that starts at S1.

Correctness.

We first show that an optimal broadcast protocol for (G,s) with t rounds exists if and only if correctly guessed S1, 𝒞1, 𝒞3 pass all three tests by the algorithm.

If an optimal broadcast protocol for (G,s) with t rounds exists, then there is one with the properties that we assumed in the algorithm. Let P be such a protocol. We construct S1, 𝒞1, 𝒞3 from P as defined in the algorithm. Observe that at each round, at most |S|k components in cc(GS) may receive the message from S, and thus |{Ccc(GS):aP(C)R1}|(2k3)k2 holds. By the same reasoning, we have |{Ccc(GS):aP(C)R3}|2k2. Clearly, S1, 𝒞1, 𝒞3 pass all three tests.

Conversely, assume that some S1, 𝒞1, 𝒞3 pass all three tests by the algorithm. Let P1, P2, P3 be the protocols found by the algorithm. Let P be the protocol obtained by concatenating P1, P2, P3 in this ordering. In P, some vertices of the components in 𝒞1 and 𝒞2 may remain uninformed, while all other vertices receive the message. We modify P to obtain a desired protocol. We first consider a component C1𝒞1 that has uninformed vertices in P. In P, at least one vertex in C1 receives the message in P1 and no vertex in C1 sends or receives the message in P2. Thus, we can modify P in such a way that the vertices in C1 send and receive the message locally in C1 and inform all vertices of C1 using at most k1 rounds in P2. Next we consider a component C2𝒞2 that has uninformed vertices in P. Similarly to the previous case, we can modify P locally in C2 to inform all vertices of C2 using at most k1 round in P3. Now the obtained protocol is a broadcast protocol for (G,s) with t rounds.

Running time.

Now we show that the algorithm can be implemented as a fixed-parameter tractable algorithm parameterized by k.

We first estimate the number of possible candidates for guessing S1, 𝒞1, and 𝒞3. For S1, we simply try all 2|S|1=2k1 subsets of S that contain s. For 𝒞i (i{1,3}), it suffices to try all possibilities of how many components of each type are included in 𝒞i. Since the number of types is less than 2k2, the number of candidates for 𝒞i can be bounded from above by a function in k; i.e., 2k2(2k3)k2 for 𝒞1 and 2k22k2 for 𝒞3. In total, we test at most 22k5 candidates for the combination of S1, 𝒞1, 𝒞3. Thus, it suffices to show that, for a fixed combination of S1, 𝒞1, 𝒞3, each of the three tests can be done with a fixed-parameter tractable algorithm parameterized by k.

The first test can be done in time depending only on k because the question is decidable and the target graph G[S1C𝒞1V(C)] has at most k+|𝒞1|k<2k4 vertices. In the same way, we can see that the third test can be done in time depending only on k.

For the second test, we can use the polynomial-time subroutine that Fomin et al. [16] used for their algorithm parameterized by vertex cover number. The subroutine checks in polynomial time whether there is a multi-source broadcast protocol with a given number of rounds starting at a vertex cover. To use this subroutine, we construct a graph G2 from G[S1C𝒞2V(C)] by replacing each component C2 in 𝒞2 with a single vertex that is adjacent to the vertices in S1N(V(C2)). Observe that the desired multi-source partial broadcast protocol P2 for G[S1C𝒞2V(C)] exists if and only if there is a multi-source broadcast protocol for G2 with t(2k1)k rounds starting at S1. Since S1 is a vertex cover of G2, we can use the subroutine of Fomin et al. [16].

4.2 FPT Algorithm Parameterized by Distance to Clique

In this section we consider Telephone Broadcast parameterized by distance to clique k, in which the input graph contains a subset XV of size k such that GX is a clique. We call X a modulator of G and let n=|V|k. Computing a (smallest) modulator is equivalent to computing a (minimum) vertex cover and thus can be done in time 2kn𝒪(1) [7, 21].

We show that, in these instances, the amount of information necessary to encode a solution is bounded, in that we can recreate a solution knowing the following about the vertices of the modulator: on which round each is informed, how many vertices each informs, as well as some details about the vertices that inform them (see Lemma 11 and the description below for details). We solve the problem by enumerating all possibilities for this information, and then recreating a matching solution in polynomial time.

Our approach is based on the following two facts: (i) b(G,s)k+log2n, and (ii) to encode a solution we only need to know the information described above.

The rest of this section is dedicated to proving the following theorem.

Theorem 9.

Telephone Broadcast is fixed-parameter tractable parameterized by distance to clique k, and can be solved in time 2𝒪(k2)n𝒪(1).

We start by formalizing and proving the two facts mentioned above:

Lemma 10.

() Let G=(V,E) be a connected graph and XV with |X|=k such that GX is a clique of size n. Then b(G,s)k+log2n for all sV.

The lemma below formalizes the process of recreating a solution, that is, given restricted information about a broadcast protocol, computing a protocol that matches that information. For simplicity of presentation, the lemma lists in compact form the information that is needed about the broadcast protocol, and we provide additional explanation below the lemma.

Lemma 11.

() Let (G,s) be an instance of Telephone Broadcast, X be a modulator of G of size k, and P be a broadcast protocol. We can construct in polynomial time a broadcast protocol P with the same number of rounds as P, given the following information about P:

  1. 1.

    t, the number of rounds of P;

  2. 2.

    for each vX, the round τv in which v is informed;

  3. 3.

    for each vX, the vertex av that informs it (its informer), where a vertex in V(X{s}) is identified by its neighborhood in X as well as the set of vertices in X it informs;

  4. 4.

    for each informer av, vX, its informer bv if it is in X, or bv=ϕ otherwise (representing either an informer in VX or that av=s);

  5. 5.

    for each vX, the number cv of vertices that it informs, that is, how many times it transmits the message to an uninformed vertex.

For Point 3, we do not need to know the exact vertex of the clique that informs a vertex vX, as there can be many clique vertices that are functionally equivalent. Instead, we identify vertices in V(X{s}) by their neighborhood in X; if multiple vertices in X share an informer, the first (in an arbitrary order) encodes it by its neighborhood, while the following simply indicate that they have the same informer as a previous vertex. We can thus encode the informer of uX using a number iu from 0 to 2k+2k as follows. Take an arbitrary ordering of X={v0,,vk1}. If iu<2k, au is a (yet unused) vertex with neighborhood in X given by the binary representation of iu; if 2kiu<2k+k, au is the vertex of X with index iu2k (i.e. viu2k); if 2k+kiu<2k+2k, au is the informer of the vertex of X with index iu2kk, that is, au=aw with w=viu2kk; and if iu=2k+2k, then au=s. For Point 4, we need to know the informer bv of each av; however, if bv is in VX, the actual vertex is irrelevant, and thus we simply notate this case as bv=ϕ; we notate it similarly if au=s, in which case it has no informer.

Let us see how this lemma can be applied to solve the problem.

The algorithm starts by computing a modulator X of size at most k. We remark that a modulator of G is a vertex cover in G¯, and thus the minimum modulator can be computed by employing any FPT algorithm for Vertex Cover (see e.g. [7, 21]) on G¯.

Then, it simply enumerates the information required by Lemma 11; for each possibility it uses the procedure in the lemma to obtain a protocol. If there is a feasible solution to the problem, Lemma 11 guarantees that the algorithm obtains a valid protocol when it uses the correct information, and thus the algorithm is correct.

As to the running time, it is dominated by the enumeration of all the options for Lemma 11: there are log2n+k possibilities for t by Lemma 10, and the same number of possibilities for each τv, and each cv; for each av, there are 2k+2k options, corresponding to the vertices in X, their informers (if vertices share an informer), or a new vertex from one of each 2k neighborhood classes; for each bv, there are k+1 choices. Thus, the total number of possibilities is

(log2n+k)2k+1(2k+2k)k(k+1)k=(log2n)k+1k𝒪(k)2k2.

As the procedure in Lemma 11 runs in polynomial time, the running time of the algorithm is FPT and bounded by (2klogn)𝒪(k)n𝒪(1). We can achieve the running time bound of 2𝒪(k2) by case distinction: if logn2k, then the bound follows by substitution; otherwise, we substitute k<loglogn and get a running time of 2𝒪((loglogn)2)=2𝒪(logn)=n𝒪(1).

4.3 Algorithm for Parameter Treewidth plus Time

In this section we show, via a dynamic programming algorithm, that Telephone Broadcast admits a single-exponential FPT algorithm if we parameterize by both treewidth and the target number of rounds t. Let us first give an informal high-level overview of the main ideas.

The strategy of our algorithm will be to compute the proper edge-coloring which assigns a time-stamp to each edge used by an optimal protocol. Intuitively, it is natural that this leads to a complexity of the form 2ttw, because for each vertex v of a bag we need to keep track of the set of colors which have already been used on an edge incident on v. We therefore store a subset of [t] for each vertex of a bag. To facilitate the algorithm we will also keep track of some further information, notably including the time at which a vertex is informed by the protocol (but this only adds a further ttw factor to the complexity). This extra information will allow us to infer the direction in which each edge is supposed to be used (that is, which endpoint transmits the message and which receives it) and verify that the protocol is consistent (that is, each vertex starts transmitting the message after receiving it).

Theorem 12.

() There is an algorithm which takes as input an n-vertex graph G=(V,E), a vertex sV, an integer t, and a nice tree decomposition of G of width tw and determines whether b(G,s)t in time 2𝒪(ttw)n𝒪(1).

5 Parameterized Approximation Results

In this section, we present FPT approximation algorithms parameterized by clique cover number and cluster vertex deletion number. Both parameters are more general than distance to clique. The precise parameterized complexity for the two parameters remains unsettled.

5.1 Clique Cover Number

For a graph G, a partition of its vertex set V(G) into cliques is a clique cover. The minimum integer p such that G admits a clique cover with p cliques is the clique cover number. The clique cover number of a graph is equal to the chromatic number of its complement. In this subsection, we show that the optimization version of Telephone Broadcast admits an FPT-AS (i.e., an f(p,ε)n𝒪(1)-time (1+ε)-approximation algorithm for ε>0) when parameterized by clique cover number p.

Theorem 13.

() Given a connected n-vertex graph G, sV(G), and a clique cover Q1,,Qp of G, one can find a broadcast protocol with at most (1+ε)b(G,s) rounds in time 322p/εpn𝒪(1).

5.2 Cluster Vertex Deletion Number

For a graph G, a set SV(G) is a cluster vertex deletion if each connected component of GS is a complete graph. The cluster vertex deletion number of G is the size of a minimum cluster vertex deletion set of G.

Theorem 14.

() Given a connected graph G with cluster vertex deletion number cvd and sV(G), one can find a broadcast protocol with at most (2+ε)b(G,s) rounds in time f(cvd,ε)n𝒪(1).

6 Lower Bounds with Respect to Structural Parameters

Here we present several results showcasing the relationship between the structure of the input graph and the minimum number of rounds required by any broadcast protocol to complete. On an intuitive level, graphs close to being stars or paths require a large (that is, polynomial in the size of the graph) number of rounds to broadcast the message, and the aim of this section is to quantify this intuition and provide corresponding lower bounds with respect to the tree-depth and the pathwidth of the input graph. We start with Lemmas 15, 16, and 17, which are essential building blocks in proving the main results of this section in Theorems 18 and 20. We note that Theorem 20 improves over an analogous lower bound recently obtained by Aminian et al. [2] and leads to Corollaries 21 and 22.

Lemma 15.

Given a connected graph G and a non-empty set SV(G), for all sV(G) it holds that b(G,s)|cc(GS)|/|S|.

Proof.

Let a component of GS be active when there exists a vertex belonging to it that has received the message. It holds that on every round the number of additional components of GS that become active is at most |S|. In that case, if sS, then at least |cc(GS)|/|S| rounds are required in order to make all of the components of GS active. Notice that the lower bound holds in the case sS as well, since then, although there exists a component which is already active at the start, after the first round of the protocol no additional component of GS has become active.

Lemma 16.

Given a connected graph G, for all sV(G) it holds that b(G,s)diam(G)/2.

Proof.

Consider a protocol of minimum broadcasting time b(G,s) as well as a shortest path P in G such that diam(G)=|V(P)|1 with u1 and u2 denoting its endpoints. For every vV(G) it holds that d(v,s)b(G,s), that is, every vertex of G is at distance at most b(G,s) from s; if that were not the case v cannot receive the message in time. Finally, since P is a shortest path it holds that diam(G)=d(u1,u2)d(u1,s)+d(s,u2)2b(G,s) and the statement follows.

Lemma 17.

() Given a connected graph G and a non-empty set SV(G), for all sV(G) it holds that

b(G,s)Ccc(GS)diam(C)2|S|.

We are now ready to proceed with the main result of this section concerning tree-depth.

Theorem 18.

Let G be a connected graph with n>1 vertices of tree-depth td. Then, for all sV(G) it holds that b(G,s)n1/td/td.

Proof.

Since G is of tree-depth td, there exists an elimination tree T of G of height at most td. This is a rooted tree on the same vertex set, with r denoting the root vertex, where every pair of vertices adjacent in G adheres to the ancestor/descendant relation.

Notice that if n1/td2, then the statement holds, unless G is an isolated vertex. In the following, assume that n1/td>2. We will prove that there exists a vertex with at least n1/td children in T. Assume that this is not the case. Then, it holds that

n=|V(T)|i=0td1n(1/td)i=n1n1/td1<n1,

which is a contradiction. Consequently, there exists a vertex u with at least n1/td children in T.

Let SV(G) contain the vertices present in the u-r path of T, where 1|S|td. Then, GS has at least n1/td connected components, 1 per child of u in T, and the statement follows due to Lemma 15.

Prior to presenting Theorem 20 we need the following definition.

Definition 19 ([2, Proof overview of Theorem 5.2]).

A standard path decomposition is a path decomposition in which the vertices in each bag are not a subset of the vertices in the preceding or succeeding bag along the path.

Observe that in a standard path decomposition there are no two distinct bags with the vertices of the first one being a subset of the vertices of the second. We define the length of a path decomposition to be the number of its bags.

Theorem 20.

() Let G be a connected graph with more than one vertex that admits a standard path decomposition of width pw and length . Then, for all sV(G) it holds that b(G,s)1/(pw+1)/2pw.

Observe that one can easily transform a path decomposition into a standard path decomposition of the same width; it suffices to discard any bag whose vertices are a subset of another bag’s vertices. Furthermore, notice that in any path decomposition every vertex appears at least once. This, along with Theorem 20, leads to Corollary 21, which in turn, along with the approximation algorithm of Elkin and Kortsarz [14], leads to Corollary 22.

Corollary 21.

Let G be a connected graph with n>1 vertices of pathwidth pw. Then, for all sV(G) it holds that

b(G,s)(n/(pw+1))1/(pw+1)2pw.
Corollary 22.

There is a polynomial-time algorithm for Telephone Broadcast achieving an approximation ratio of 𝒪(pw), where pw denotes the pathwidth of the input graph.

7 Conclusion

In this paper we have given an extensive investigation of the complexity of the Telephone Broadcast problem with respect to many of the most prominent structural graph parameters. Let us also mention a few concrete open questions. First, with regards to dense graph parameters, we have presented an exact FPT algorithm parameterized by the vertex deletion distance to clique, but only approximation algorithms for the more general parameters cluster vertex deletion number and clique-cover number. Can these be improved to exact FPT algorithms?

Second, with respect to treewidth, even though the problem is NP-hard for graphs of treewidth 2, we showed that an XP algorithm is possible if we seek a fast broadcast schedule, that is, t=𝒪(logn), because the problem admits an algorithm with parameter dependence 2𝒪(ttw) (Theorem 12). Can this be improved to an FPT algorithm parameterized by treewidth, under this restriction on t? Note that treewidth is the only parameter for which this question is interesting, as for graphs of small pathwidth we have established that the broadcast time must be significantly higher than 𝒪(logn) (Corollary 21).

Finally, the computational complexity of Telephone Broadcast on graph classes would be another interesting research direction. In particular, the complexity on split graphs remains open [28].

References

  • [1] Akash Ambashankar and Hovhannes A. Harutyunyan. Broadcasting in stars of cliques and path-connected cliques. Algorithms, 18(2), 2025. doi:10.3390/a18020076.
  • [2] Aida Aminian, Shahin Kamali, Seyed-Mohammad Seyed-Javadi, and Sumedha. On the complexity of telephone broadcasting: From cacti to bounded pathwidth graphs. In 52nd International Colloquium on Automata, Languages, and Programming, ICALP 2025, July 8-11, 2025, Aarhus, Denmark, LIPIcs. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2025.
  • [3] Amotz Bar-Noy, Sudipto Guha, Joseph Naor, and Baruch Schieber. Message multicasting in heterogeneous networks. SIAM J. Comput., 30(2):347–358, 2000. doi:10.1137/S0097539798347906.
  • [4] Puspal Bhabak and Hovhannes A. Harutyunyan. Constant approximation for broadcasting in k-cycle graph. In Algorithms and Discrete Applied Mathematics - First International Conference, CALDAM 2015. Proceedings, volume 8959 of Lecture Notes in Computer Science, pages 21–32. Springer, 2015. doi:10.1007/978-3-319-14974-5_3.
  • [5] Puspal Bhabak and Hovhannes A. Harutyunyan. Approximation algorithm for the broadcast time in k-path graph. J. Interconnect. Networks, 19(4):1950006:1–1950006:22, 2019. doi:10.1142/S0219265919500063.
  • [6] Maja Cevnik and Janez Zerovnik. Broadcasting on cactus graphs. J. Comb. Optim., 33(1):292–316, 2017. doi:10.1007/S10878-015-9957-8.
  • [7] Jianer Chen, Iyad A. Kanj, and Ge Xia. Improved upper bounds for vertex cover. Theor. Comput. Sci., 411(40-42):3736–3756, 2010. doi:10.1016/J.TCS.2010.06.026.
  • [8] Marek Cygan, Fedor V. Fomin, Łukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
  • [9] Peter Damaschke. A linear-time optimal broadcasting algorithm in stars of cliques. J. Graph Algorithms Appl., 28(1):385–388, 2024. doi:10.7155/JGAA.V28I1.2981.
  • [10] Reinhard Diestel. Graph Theory, volume 173 of Graduate texts in mathematics. Springer, 2017. doi:10.1007/978-3-662-53622-3.
  • [11] Pål Grønås Drange, Markus S. Dregi, and Pim van ’t Hof. On the computational complexity of vertex integrity and component order connectivity. Algorithmica, 76(4):1181–1202, 2016. doi:10.1007/S00453-016-0127-X.
  • [12] Michael Elkin and Guy Kortsarz. A combinatorial logarithmic approximation algorithm for the directed telephone broadcast problem. SIAM J. Comput., 35(3):672–689, 2005. doi:10.1137/S0097539704440740.
  • [13] Michael Elkin and Guy Kortsarz. An approximation algorithm for the directed telephone multicast problem. Algorithmica, 45(4):569–583, 2006. doi:10.1007/S00453-005-1196-4.
  • [14] Michael Elkin and Guy Kortsarz. Sublogarithmic approximation for telephone multicast. J. Comput. Syst. Sci., 72(4):648–659, 2006. doi:10.1016/J.JCSS.2005.12.002.
  • [15] Arthur M. Farley. Minimum-time line broadcast networks. Networks, 10(1):59–70, 1980. doi:10.1002/NET.3230100106.
  • [16] Fedor V. Fomin, Pierre Fraigniaud, and Petr A. Golovach. Parameterized complexity of broadcasting in graphs. Theor. Comput. Sci., 997:114508, 2024. doi:10.1016/J.TCS.2024.114508.
  • [17] Pierre Fraigniaud and Emmanuel Lazard. Methods and problems of communication in usual networks. Discret. Appl. Math., 53(1-3):79–133, 1994. doi:10.1016/0166-218X(94)90180-5.
  • [18] M. R. Garey and David S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979.
  • [19] Mohammad Saber Gholami, Hovhannes A. Harutyunyan, and Edward Maraachlian. Optimal broadcasting in fully connected trees. J. Interconnect. Networks, 23(1):2150037:1–2150037:20, 2023. doi:10.1142/S0219265921500377.
  • [20] Michelangelo Grigni and David Peleg. Tight bounds on minimum broadcast networks. SIAM J. Discret. Math., 4(2):207–222, 1991. doi:10.1137/0404021.
  • [21] David G. Harris and N. S. Narayanaswamy. A faster algorithm for vertex cover parameterized by solution size. In 41st International Symposium on Theoretical Aspects of Computer Science, STACS 2024, volume 289 of LIPIcs, pages 40:1–40:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.STACS.2024.40.
  • [22] Hovhannes A. Harutyunyan and Narek A. Hovhannisyan. Broadcasting in split graphs. In Algorithms and Complexity - 13th International Conference, CIAC 2023, Proceedings, volume 13898 of Lecture Notes in Computer Science, pages 278–292. Springer, 2023. doi:10.1007/978-3-031-30448-4_20.
  • [23] Hovhannes A. Harutyunyan and Edward Maraachlian. On broadcasting in unicyclic graphs. J. Comb. Optim., 16(3):307–322, 2008. doi:10.1007/S10878-008-9160-2.
  • [24] Daniel Hathcock, Guy Kortsarz, and R. Ravi. The telephone k-multicast problem. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2024, volume 317 of LIPIcs, pages 21:1–21:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.APPROX/RANDOM.2024.21.
  • [25] Sandra Mitchell Hedetniemi, Stephen T. Hedetniemi, and Arthur L. Liestman. A survey of gossiping and broadcasting in communication networks. Networks, 18(4):319–349, 1988. doi:10.1002/NET.3230180406.
  • [26] Juraj Hromkovic, Ralf Klasing, Andrzej Pelc, Peter Ruzicka, and Walter Unger. Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2005. doi:10.1007/B137871.
  • [27] Heather Hulett, Todd G. Will, and Gerhard J. Woeginger. Multigraph realizations of degree sequences: Maximization is easy, minimization is hard. Oper. Res. Lett., 36(5):594–596, 2008. doi:10.1016/J.ORL.2008.05.004.
  • [28] Klaus Jansen and Haiko Müller. The minimum broadcast time problem for several processor networks. Theor. Comput. Sci., 147(1&2):69–85, 1995. doi:10.1016/0304-3975(94)00230-G.
  • [29] Guy Kortsarz and David Peleg. Approximation algorithms for minimum-time broadcast. SIAM J. Discret. Math., 8(3):401–427, 1995. doi:10.1137/S0895480193245923.
  • [30] Christos H. Papadimitriou and Mihalis Yannakakis. The complexity of restricted spanning tree problems. J. ACM, 29(2):285–309, 1982. doi:10.1145/322307.322309.
  • [31] R. Ravi. Rapid rumor ramification: Approximating the minimum broadcast time (extended abstract). In 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, pages 202–213. IEEE Computer Society, 1994. doi:10.1109/SFCS.1994.365693.
  • [32] Christian Schindelhauer. On the inapproximability of broadcasting time. In Approximation Algorithms for Combinatorial Optimization, Third International Workshop, APPROX 2000, Proceedings, volume 1913 of Lecture Notes in Computer Science, pages 226–237. Springer, 2000. doi:10.1007/3-540-44436-X_23.
  • [33] Peter J. Slater, Ernest J. Cockayne, and Stephen T. Hedetniemi. Information dissemination in trees. SIAM J. Comput., 10(4):692–701, 1981. doi:10.1137/0210052.
  • [34] Prafullkumar Tale. Telephone broadcast on graphs of treewidth two. Theor. Comput. Sci., 1045:115282, 2025. doi:10.1016/J.TCS.2025.115282.
  • [35] Jinghan Xu and Zhiyuan Li. Broadcast graph is NP-complete. In Algorithms and Discrete Applied Mathematics - 11th International Conference, CALDAM 2025, Proceedings, volume 15536 of Lecture Notes in Computer Science, pages 343–357. Springer, 2025. doi:10.1007/978-3-031-83438-7_29.