Abstract 1 Introduction 2 Preliminaries 3 FPT Algorithms and Approximation Schemes 4 Inapproximability 5 XNLP-completeness 6 Refining Hardness for Bounded Tree-depth Graphs 7 Conclusion References

Parameterized Maximum Node-Disjoint Paths

Michael Lampis ORCID Université Paris-Dauphine, PSL University, CNRS UMR7243, LAMSADE, Paris, France Manolis Vasilakis ORCID Université Paris-Dauphine, PSL University, CNRS UMR7243, LAMSADE, Paris, France
Abstract

We revisit the Maximum Node-Disjoint Paths problem, the natural optimization version of the famous Node-Disjoint Paths problem, where we are given an undirected graph G, k (demand) pairs of vertices (si,ti), and an integer , and are asked whether there exist at least vertex-disjoint paths in G whose endpoints are given pairs. This problem has been intensely studied from both the approximation and parameterized complexity point of view and is notably known to be intractable by standard structural parameters, such as tree-depth, as well as the combined parameter plus pathwidth. We present several results improving and clarifying this state of the art, with an emphasis towards FPT approximation.

Our main positive contribution is to show that the problem’s intractability can be overcome using approximation: We show that for several of the structural parameters for which the problem is hard, most notably tree-depth, the problem admits an efficient FPT approximation scheme, returning a (1ε)-approximate solution in time f(td,ε)n𝒪(1). We manage to obtain these results by comprehensively mapping out the structural parameters for which the problem is FPT if is also a parameter, hence showing that understanding as a parameter is key to the problem’s approximability. This, in turn, is a problem we are able to solve via a surprisingly simple color-coding algorithm, which relies on identifying an insightful problem-specific variant of the natural parameter, namely the number of vertices used in the solution.

The results above are quite encouraging, as they indicate that in some situations where the problem does not admit an FPT algorithm, it is still solvable almost to optimality in FPT time. A natural question is whether the FPT approximation algorithm we devised for tree-depth can be extended to pathwidth. We resolve this negatively, showing that under the Parameterized Inapproximability Hypothesis no FPT approximation scheme for this parameter is possible, even in time f(pw,ε)ng(ε). We thus precisely determine the parameter border where the problem transitions from “hard but approximable” to “inapproximable”.

Lastly, we strengthen existing lower bounds by replacing W[1]-hardness by XNLP-completeness for parameter pathwidth, and improving the no(td) ETH-based lower bound for tree-depth to (the optimal) no(td).

Keywords and phrases:
ETH, Maximum Node-Disjoint Paths, Parameterized Complexity, PIH
Copyright and License:
[Uncaptioned image] © Michael Lampis and Manolis Vasilakis; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms
Related Version:
Full Version: https://arxiv.org/abs/2404.14849
Funding:
This work is partially supported by ANR project ANR-21-CE48-0022 (S-EX-AP-PE-AL).
Editors:
Akanksha Agrawal and Erik Jan van Leeuwen

1 Introduction

One of the most important problems of structural graph theory has arguably been Node-Disjoint Paths, where given a graph G and k pairs of its vertices (si,ti) for i=1,,k, called demands, the goal is to determine whether there exist k vertex-disjoint paths connecting si and ti. This extensively studied problem [1, 4, 5, 20, 22, 24, 25, 32, 34] is one of the very first to be proven NP-complete (for k being part of the input) [19], and it has a central role in the field of structural graph theory as well as in parameterized complexity [27], as the breakthrough result by Robertson and Seymour [31] that it is fixed-parameter tractable (FPT) parameterized by k (i.e., admits an f(k)n𝒪(1) algorithm for some function f, where n=|V(G)|) is the culmination of their long and influential series of works on Graph Minors.

In this work we concern ourselves with Maximum Node-Disjoint Paths (MaxNDP), the natural generalization of Node-Disjoint Paths where one asks whether at least k demands can be routed by vertex-disjoint paths (we say that a demand is routed when there exists a path connecting its endpoints in the set of vertex-disjoint paths of the solution). Notice that one could alternatively phrase this as an optimization problem and ask for the maximum number of demands that can be routed. Even though MaxNDP has been intensely studied with respect to its approximability [7, 8, 9, 10, 21], our understanding regarding its tractability under the perspective of parameterized complexity is rather limited. Given the rich literature regarding Node-Disjoint Paths and the importance of its structural parameterizations (indeed, Scheffler’s tw𝒪(tw)n𝒪(1) algorithm [32] is a key ingredient of the proof of [31]), the quest to study MaxNDP under the same point of view is strongly motivated, with the hope of extending some of these results to it. Alas, prior work by Ene, Mnich, Pilipczuk, and Risteski [14] shows that MaxNDP is already W[1]-hard when parameterized by the tree-depth of the input graph (in fact their proof implies hardness for the combined parameter vertex integrity111A graph has vertex integrity at most k if there exists a set of at most p vertices such that their deletion results in a graph with connected components of size at most kp. plus feedback vertex number). On the other hand, notice that MaxNDP is trivially FPT by k; one can simply reduce it to 2k instances of Node-Disjoint Paths. A natural question arising from this observation is whether a parameterization by renders the problem tractable. In this spirit, Marx and Wollan [28] studied this setting and proved that the problem is W[1]-hard even when parameterized by the combined parameter plus the treewidth of the input graph; a closer look into their proof reveals that their result extends to graphs of bounded pathwidth plus feedback vertex number. This plethora of negative results fails to answer which parameterizations render the problem tractable, and whether a parameterization by plus some structural parameter (larger than or incomparable to treewidth) may lift it to FPT.

Figure 1: Our results and hierarchy of the related graph parameters, where vc, vi, td, pw, fvs, cvd, and fes stand for vertex cover, vertex integrity, tree-depth, pathwidth, feedback vertex number, cluster vertex deletion number, and feedback edge number respectively. For any graph, if the parameter at the tail of an arrow is a constant, that is also the case for the one at its head. Green and gray indicate that the problem is FPT (Theorems 2 and 3) and that it admits an FPT approximation scheme (Theorems 4 and 5) respectively. Yellow indicates W[1]-hardness, orange that there is no FPT approximation scheme (Theorem 6), and red XNLP-completeness (Theorem 8). Prior to this work, it was only known that the problem is W[1]-hard parameterized by vi+fvs [14] and by +pw+fvs [28].

Our Contribution.

In the present paper we thoroughly investigate the complexity of MaxNDP under different parameterizations, and determine exactly when it is rendered tractable, by additionally employing the use of approximation in the process (see Figure 1 for a synopsis of our results). We start by showing that the problem is FPT parameterized by the number of vertices of an optimal solution by developing a simple algorithm that makes use of the color-coding technique introduced by Alon, Yuster, and Zwick [2]. We then prove that, albeit simple, this algorithm is in fact sufficient to pinpoint exactly when the problem is fixed-parameter tractable: utilizing a variety of structural observations, we develop FPT algorithms for various parameterizations (most involving as a parameter) at the core of all of which lies the previously mentioned algorithm. Along the way we also develop an FPT algorithm for the parameterization by the feedback edge number. These positive results, in conjunction with the hardness results of [14, 28], clearly showcase the transition of the problem from FPT to W[1]-hard for its various parameterizations (with the exception of cluster vertex deletion number, where it is unknown whether the problem is W[1]-hard).

Given the apparent hardness of the problem, we move on to consider it under the perspective of parameterized approximation (see [15] for a survey of the area). Here, we observe that utilizing the previously developed FPT algorithms when is also a parameter, can in fact lead to efficient FPT approximation schemes (FPT-ASes) in case of solely structural parameterizations of the problem, when parameterized by the cluster vertex deletion number, the vertex integrity, or the tree-depth of the input graph; in the latter two cases the problem is known to be W[1]-hard [14].

The FPT approximation schemes developed indicate that the W[1]-hardness can, in some cases, be overcome via the use of approximation. Given the relationship of our studied parameters as well as the FPT-AS for tree-depth, a natural question is whether an analogous approximation scheme exists for the parameterization by pathwidth as well. Notice that the W[1]-hardness by plus the pathwidth pw and the feedback vertex number fvs of the input graph already excludes the existence of an approximation scheme of running time f(pw,fvs,ε)n𝒪(1), yet one of time f(pw,fvs,ε)ng(ε) remains possible. Our next result is to exclude the existence of such a scheme under the Parameterized Inapproximability Hypothesis [26], which was recently proved to hold under the ETH [17], and thus precisely determine the parameter border where the problem transitions from “hard but approximable” to “inapproximable”. By slightly modifying our reduction, we subsequently show that the problem is XNLP-complete when parameterized solely by the pathwidth of the input graph, where XNLP is a complexity class that has been recently brought forth by Bodlaender, Groenland, Nederlof, and Swennenhuis [3], and such a result implies W[t]-hardness for all integers t1.

Lastly, we proceed to a more fine-grained examination of the hardness of MaxNDP when parameterized by the tree-depth of the input graph. Standard dynamic programming techniques can be used to obtain an n𝒪(tw) algorithm, while previous work by Ene, Mnich, Pilipczuk, and Risteski [14] implies that the problem cannot be solved in time no(td) under the ETH for graphs of tree-depth td, thereby leaving hope for an no(td) algorithm. We revisit said proof, and by employing a recursive structure introduced by Lampis and Vasilakis [23] we bridge this gap and prove that MaxNDP cannot be solved in time no(td) under the ETH, rendering the n𝒪(tw) algorithm optimal even for this much smaller class of graphs.

Related Work.

Even though MaxNDP has been well-studied under the scope of approximation algorithms, the 20 years old algorithm of ratio 𝒪(n) due to Kolliopoulos and Stein [21] remains the state of the art in general graphs. This has been improved in the case of grid [6] and planar graphs [7], resulting in approximation ratios 𝒪~(n1/4) and 𝒪~(n9/19) respectively, where standard 𝒪~ notation is used to hide polylogarithmic terms. For graphs of pathwidth pw, Ene, Mnich, Pilipczuk, and Risteski [14] have presented an algorithm of approximation ratio 𝒪(pw3). Regarding inapproximalibity results, after a series of works, Chuzhoy, Kim, and Nimavat [9, 10] have shown that the problem cannot be approximated in polynomial time (i) within a factor of 2𝒪(log1εn) for any constant ε, assuming NPDTIME(npolylogn), and (ii) within a factor of n𝒪(1/(loglogn)2), assuming that there exists some constant δ>0 such that NPDTIME(2nδ).

The problem has been also studied under a parameterized complexity perspective. As already noted, it is trivially FPT by k by a simple reduction to 2k instances of Node-Disjoint Paths, which is well-known to be FPT by the number of demands. On the other hand, Marx and Wollan [28] have shown that it becomes W[1]-hard when parameterized by +tw, with a closer look into their proof revealing that their result extends to the parameterization by +pw+fvs. Regarding structural parameterizations, Ene, Mnich, Pilipczuk, and Risteski [14] have proved that the problem is W[1]-hard when parameterized by the tree-depth of the input graph; in fact, their proof extends to graphs of bounded vertex integrity plus feedback vertex number. Fleszar, Mnich, and Spoerhase [16] have proposed an algorithm of running time (k+fvs)𝒪(fvs)n𝒪(1) as an alternative to the 2kfvs𝒪(fvs)n𝒪(1) algorithm obtained by reducing the instance to Node-Disjoint Paths and then using Scheffler’s algorithm [32].

Organization.

In Section 2 we discuss the general preliminaries. Subsequently, in Section 3 we present various tractability results, followed by the inapproximability result for pathwidth in Section 4. Moving on, in Sections 5 and 6 we present the XNLP-completeness and the refined W[1]-hardness of the problem, when parameterized by the pathwidth and the tree-depth of the input graph respectively. Lastly, in Section 7 we present the conclusion as well as some directions for future research. Proofs of statements marked with () are omitted and can be found in the full version.

2 Preliminaries

For x,y, let [x,y]={z:xzy}, while [x]=[1,x]. For a set S, let (Sc) denote the set of subsets of S of size c for some c, that is (Sc)={SS:|S|=c}. Throughout the paper we use standard graph notations [12] and assume familiarity with the basic notions of parameterized complexity [11]. All graphs considered are undirected without loops unless explicitly mentioned otherwise. Let G=(V,E) be a graph. The cluster vertex deletion number of G, denoted cvd(G), is the size of the smallest vertex set whose removal results in a cluster graph, i.e., a union of cliques. The vertex integrity of G, denoted vi(G), is the minimum integer k such that there is a vertex set SV such that |S|+maxC𝚌𝚌(GS)|V(C)|k, where 𝚌𝚌(GS) denotes the set of connected components in GS.

Given a graph G=(V,E) and a partition of V into k independent sets V1,,Vk, each of size n, k-Multicolored Clique asks whether G contains a k-clique, and is well-known to be W[1]-hard and not to admit any f(k)no(k) algorithm, where f is any computable function, unless the ETH is false [11]. Multicolored Densest k-Subgraph asks for the maximum number of edges that are induced by a subgraph of G that contains exactly one vertex per independent set (color). Let Ei,jE denote the set of edges e={u,v} where uVi and vVj. In that case, let si=|{j[k]:Ei,j}| and σ=i[k]si/2. Assuming that OPT denotes said maximum value, the Parameterized Inapproximability Hypothesis (PIH) [26] states that there exists a constant 0<c<1 such that no f(k)n𝒪(1) algorithm can distinguish between OPT=σ and OPT<cσ. In fact, one can assume without loss of generality that 1si3 for all i=1,,k [26, Lemma 4.4]. This hypothesis was very recently proved to hold under the ETH [17] (see also [18]), and is the analogue of the PCP theorem in the setting of parameterized complexity.

Lastly, we give a formal definition of the problem this work is concerned with.

Maximum Node-Disjoint Paths  Instance: Graph G=(V,E), set of k demand pairs (V2), and integer k. Goal: Determine whether at least demand pairs can be routed, where to route a pair we need to select a path connecting it, so that all selected paths are vertex-disjoint.

Notice that in the above definition, even though demand pairs may indeed share a terminal, the paths comprising a feasible solution must be vertex-disjoint, and this constraint also applies to their endpoints. Given an instance =(G,(,)) of the optimization (or decision) version of MaxNDP and G a subgraph of G, OPT([G]) denotes the maximum number of demands of that can be routed in G. We write OPT() as a shorthand for OPT([G]).

3 FPT Algorithms and Approximation Schemes

Here we present various tractability results for MaxNDP. We start by proving in Section 3.1 that the problem is FPT when parameterized by the number of vertices involved in an optimal solution; using this as well as some structural observations, we obtain FPT algorithms when parameterized by vc, +cvd, +vi, and +td. We additionally develop an FPT algorithm for the parameterization by fes. Moving on, in Section 3.2 we obtain FPT approximation schemes for various structural parameterizations of the problem by making use of the previous FPT algorithms; for most of said parameterizations the problem is known to be W[1]-hard.

3.1 Exact Algorithms

We start with the following theorem.

Theorem 1.

Let =(G,,) be an instance of MaxNDP. Additionally, let τ be such that there exists a family 𝒫 of vertex-disjoint paths each routing a demand of , where |𝒫|=min{,OPT()} and P𝒫|V(P)|τ, with |V(P)| denoting the number of vertices in path P. There is an algorithm that, given and τ, decides in time 2𝒪(τ)n𝒪(1).

Proof.

Let C=[τ] be a set of τ colors. Randomly color the vertices of G with colors from C, and let A be the event where every one of the at most τ vertices of 𝒫 receives a distinct color. Then, it follows that

Pr[A]τ!ττ>(τe)τττ=eτ,

therefore event A holds with probability at least eτ.

Now, let T[S] be equal to the maximum number of demands that can be routed by paths using only vertices of colors belonging to SC, where each color is used in at most one path. Moreover, let f(S)=1 if there exists at least one demand that can be routed using only vertices of colors belonging to S and 0 otherwise. Notice that f can be computed in polynomial time. Then, it holds that

T[S]=maxSS{f(S)+T[SS]},

thus one can compute T[C] in time 2𝒪(τ)n𝒪(1) for a given coloring of the vertices of G.

By repeating this procedure 2𝒪(τ) times, with high probability there exists some iteration where event A holds, and the total running time is 2𝒪(τ)n𝒪(1). By using standard techniques [11, Section 5.6], one can derandomize the described algorithm and obtain a deterministic one of the same running time.

Using Theorem 1 we can obtain various parameterized algorithms, by bounding the number of vertices of an optimal solution using some simple observations.

Theorem 2 ().

Given an instance =(G,,) of MaxNDP, there exist algorithms that decide in time

  • 2𝒪(vc)n𝒪(1),

  • 2𝒪(cvd+)n𝒪(1),

  • 2𝒪(vi2+vi)n𝒪(1),

  • 2𝒪(2td)n𝒪(1),

where vc, cvd, vi, and td denote the vertex cover, cluster vertex deletion number, vertex integrity, and tree-depth of G respectively.

Given the W[1]-hardness of MaxNDP when parameterized by the feedback vertex number implied by previous works [14, 28], we move on to consider the parameterization by the feedback edge number, and show that it renders the problem tractable.

Theorem 3 ().

Given an instance =(G,) of MaxNDP, there exists an algorithm that computes OPT() in time 3fesn𝒪(1), where fes denotes the feedback edge number of G.

3.2 Approximation Schemes

Using the FPT algorithms of Theorem 2, we develop FPT approximation schemes for MaxNDP when parameterized solely by structural parameters.

Theorem 4.

Given an instance =(G,) of MaxNDP, one can (1ε)-approximate OPT() in time 2𝒪(cvd/ε)n𝒪(1) and 2𝒪(vi2/ε)n𝒪(1), where cvd and vi denote the cluster vertex deletion number and vertex integrity of G respectively.

Proof.

Let SV(G) denote the deletion set, which can be computed in time 2𝒪(cvd)n𝒪(1) for cvd [33] and 2𝒪(vilogvi)n𝒪(1) for vi [13]. Notice that OPT([GS])OPT()|S|, since every vertex of S can be used to route at most one demand. Consider the case where OPT()|S|(1ε)OPT()OPT()|S|/ε. Then, OPT([GS])(1ε)OPT(). Alternatively, it holds that OPT()<|S|/ε and the algorithm of Theorem 2 can be used, with =𝒪(|S|/ε).

It remains to compute OPT([GS]). In the case of the cluster vertex deletion set, GS is a collection of cliques. In that case, one can compute OPT([GS]) in polynomial time by reducing to an instance of Maximum Matching, on the same vertex set and on edge set equal to the pairs of where both endpoints belong to the same clique. In the case of vertex integrity, it holds that OPT([GS]) can be computed in FPT time, since it is comprised of 𝒪(n) instances of size at most vi, each of which is solvable in time 2𝒪(vi)n𝒪(1) due to Theorem 1.

Theorem 5.

Given an instance =(G,) of MaxNDP, one can (1ε)-approximate OPT() in time 2𝒪(2td/ε)n𝒪(1), where td denotes the tree-depth of G.

Proof.

Since G has tree-depth td, one can compute an elimination forest of G in time 2𝒪(td2)n𝒪(1) due to [29, 30]. This is a rooted forest on the same vertex set where every pair of vertices adjacent in G adheres to the ancestor/descendant relation. Assume that G is connected, otherwise solve for each connected component. Let r denote the root of the elimination tree, in which case it follows that every connected component of Gr has tree-depth at most td1. Notice that it holds that OPT([Gr])OPT()1, since r can be used to route at most one demand. Let ε<ε and consider the case where

OPT()11ε1εOPT()OPT()1εεε,

thus setting ε=ε/2 implies that OPT()2εε. In this case, it holds that an (1ε)-approximation of OPT([Gr]) is an (1ε)-approximation of OPT(). On the other hand, if OPT()<2εε=𝒪(1/ε), we can use the algorithm of Theorem 2, running in time 2𝒪(2td/ε)n𝒪(1).

Consequently, one can recursively argue about the existence of an approximation scheme, since in the case where a graph has tree-depth equal to 1, the instance is polynomial-time solvable. We proceed with bounding the scheme’s running time. Let T(td,ε) denote the running time for graph G with tree-depth td and error ε, while n denotes the number of connected components of Gr. Notice that it holds that

T(td,ε)max{2𝒪(2td/ε)n𝒪(1),nT(td1,ε/2)}2𝒪(2td/ε)n𝒪(1)+nT(td1,ε/2),

while the number of the nodes of the same height in the recursion tree is at most n, since each node corresponds to a connected component. Consequently, it holds that

T(td,ε)2𝒪(2td/ε)n𝒪(1)+ni=1td2𝒪(2tdi1ε/2i)n𝒪(1)=2𝒪(2td/ε)n𝒪(1).

4 Inapproximability

Given the FPT approximation scheme of Theorem 5, a natural question arising is whether such an approximation scheme exists for the parameterization by pathwidth as well. Due to the W[1]-hardness of MaxNDP parameterized by +pw+fvs [28], there can be no (1ε)-approximation scheme running in time f(pw,fvs,ε)n𝒪(1), yet one of running time f(pw,fvs,ε)ng(ε) might be possible.222Assuming there existed such an algorithm of running time f(pw,fvs,ε)n𝒪(1), setting ε<1/OPT() results in obtaining a solution of value at least (1ε)OPT()>OPT()1, i.e., optimal, in time f(pw,fvs,OPT())n𝒪(1). In this section we answer this question in the negative and prove that there exists some constant 0<c<1 such that MaxNDP cannot be approximated within a factor of c in time f(pw,fvs)n𝒪(1), for any function f, unless the Parameterized Inapproximability Hypothesis [26] fails.

Theorem 6.

Assuming the PIH, there exists a constant c>0 such that MaxNDP does not admit a c-approximation algorithm of running time f(pw,fvs)n𝒪(1).

Proof.

Let =(G,k) be an instance of Multicolored Densest k-Subgraph, and recall that we assume that G is given to us partitioned into k independent sets V1,,Vk, where Vi={v1i,,vni}. Moreover, let Ei1,i2E(G) denote the edges of G with one endpoint in Vi1 and the other in Vi2. For every color class i[k], let si=|{j[k]:Ei,j}|, and assume without loss of generality that 1si3. Set σ=i[k]si/2, and notice that k2σ3k2. Let OPT()σ denote the optimal value of instance , i.e., the maximum number of edges among the induced subgraphs of G that contain one vertex per color class Vi.

We will construct in polynomial time an instance 𝒥=(H,) of MaxNDP, where pw(H)=𝒪(k), fvs(H)=𝒪(k), and |V(H)|=n𝒪(1), while (V(H)2) is a set of demands. Moreover, it will hold that OPT(𝒥), where OPT(𝒥) denotes the optimal value of instance 𝒥, and =2k+σ. We will present a reduction such that (i) if OPT()=σ, then OPT(𝒥)=, and (ii) if OPT()<cσ, then OPT(𝒥)<c, for constants c and c where 0<c<1 and c=9+c10.

Choice Gadget.

For an independent set Vi, we construct the choice gadget C^i in the following way. First, for p[n], we construct paths on vertex sets P^pi={wqi,p:q[3]}, as well as paths R^pi on 3 unnamed vertices each. Then, we introduce vertices vpi and upi, for p[n+1]. Next, we add edges {un+1i,v1i} and {vn+1i,u1i}. Lastly, for p[n], we add edges {vpi,w1i,p} and {w3i,p,vp+1i}, as well as an edge from upi to one endpoint of R^pi, and an edge from up+1i to the other endpoint of R^pi. See Figure 2 for an illustration. Subsequently, add to all pairs (vpi,up+1i) and (vpi,up1i) for p[2,n], as well as the pairs (v1i,u2i) and (vn+1i,uni). Let c denote all such pairs added to in this step of the construction. Intuitively, we will consider a one-to-one mapping between the vertex vpi of Vi being chosen and the vertices of P^pi not being used to route any of the demands in c.

Figure 2: Choice gadget C^i.

Adjacency vertices.

Let Ei,j. Introduce an adjacency vertex ei,j, and add edges {ei,j,wxi,p} and {ei,j,wyj,p} where p[n], and x,y[3] such that no other adjacency vertex is adjacent to them (since si3 for all i[k], there always exist such x and y). If e={vpi,vqj}Ei,j, then add the pair (wxi,p,wyj,q) in . Notice that all adjacency vertices have disjoint neighborhoods, and let FV(H) be the set of all adjacency vertices, where |F|=σ.

This concludes the construction of the instance 𝒥. Notice that HF is a collection of k choice gadgets, each of which is a cycle. Consequently, the graph obtained from HF by deleting a vertex per choice gadget is a collection of paths, thus both pw(H) and fvs(H) are at most 𝒪(k).

We first prove that if OPT()=σ, then OPT(𝒥)=. Consider a function h:[k][n] such that G[𝒱] has σ edges, where 𝒱={vh(i)iVi:i[k]}V(G). We construct a family of vertex-disjoint paths as follows. First, for every i[k], we route two demands in C^i. In particular, we route the demands (vh(i)i,uh(i)+1i) as well as (vh(i)+1i,uh(i)i), using the vertices of the shortest path of C^i in each case. Note that in this step we have created 2k vertex-disjoint paths connecting terminal pairs belonging to c, and in every gadget C^i the only unused vertices are those of P^h(i)i and R^h(i)i. Then, consider the adjacency vertex ei,j, where i,j[k]. Route the demand (wxi,h(i),wyj,h(j)) via ei,j, since both endpoints of the demand are its neighbors and have not been used in any path so far, for some x,y[3]. Such a demand indeed exists in , since {vh(i)i,vh(j)j}Ei,j; if that were not the case then G[𝒱] has less than σ edges. This procedure results in σ additional demands being routed. Notice that since the neighborhoods of all adjacency vertices are disjoint, the resulting paths are indeed vertex-disjoint.

It remains to prove that if OPT()<cσ, then OPT(𝒥)<c (or its contrapositive, as we will do in actuality). We start with Claim 7.

Claim 7.

At most 2 demands can be routed in a choice gadget C^i in HF, in which case the only unused vertices are those of P^pi and R^pi, for some p[n]. Additionally, it holds that OPT(𝒥).

Proof.

Let N=3n+(n+1) and notice that C^i is a C2N, thus there are exactly 2 simple paths connecting any pair of its vertices. Moreover, the number of vertices in any simple path between vpi and upi, including said endpoints, is N+1. Consequently, to route any demand with both endpoints in C^i, either N+14 or N+1+4 vertices are used. In case more than 2 demands are routed, at least 3(N+14)=3N9 vertices are used, which is a contradiction since C^i consists of 2N vertices.

Assume that exactly 2 demands are routed. Moreover, assume that a demand is routed using N+1+4 vertices. Then, both routed demands use at least (N+1+4)+(N+14)>2N vertices, which is a contradiction. Therefore, both demands that are routed in C^i use the shortest path connecting their endpoints.

Let (vpi,uqi) and (vpi,uqi) denote the demands routed, where p<p and p[n]. It holds that q=p+1, since otherwise q=p1, and vpi belongs to the shortest path connecting (vpi,uqi), a contradiction. Symmetrically, it follows that q=p1. Lastly, it holds that q>q, since otherwise uqi belongs to the shortest path connecting (vpi,uqi). Consequently, it follows that q>qp+2>p, which implies that p<p<p+2, i.e., p=p+1. In that case, the only unused vertices are those of P^pi and R^pi.

Notice that HF is a collection of k choice gadgets. Since in each such gadget at most 2 demands can be routed, it follows that OPT(𝒥)2k+|F|=2k+σ=.

We now move on to prove that if OPT(𝒥)c, then OPT()cσ. Let 𝒫 denote a collection of OPT(𝒥) vertex-disjoint paths of H routing demands of , where OPT(𝒥)c. Additionally, let 𝒞j𝒫 contain the choice gadgets C^i such that there exist exactly j paths in 𝒫 that route demands in the graph induced by C^i, for j[0,2]. Notice that (𝒞0𝒫,𝒞1𝒫,𝒞2𝒫) defines a partition of the choice gadgets due to Claim 7. Moreover, let 𝒫F𝒫 be comprised of the paths of 𝒫 that contain vertices of F. We will say that a path P𝒫F intersects C^i if P contains a vertex of C^i. We define the loss of a solution 𝒫 to be L𝒫=|𝒫|. Notice that due to Claim 7 it holds that L𝒫=2|𝒞0𝒫|+|𝒞1𝒫|+(|F||𝒫F|).

It holds that OPT(𝒥)=|𝒫|=L𝒫c=(1c), thus it follows that L𝒫(1c). Construct a new solution 𝒫 in the following way: for every C^i𝒞0𝒫𝒞1𝒫, route two demands of c such that there exist two vertex-disjoint paths using only vertices of C^i. Afterwards, remove any paths of 𝒫F that are not vertex-disjoint with those. There are at most 3 vertices of F adjacent to vertices of C^i, and by choosing the routed demands of C^i in such a way that at least one of those vertices of C^i remains unused, it follows that at most 2 paths of 𝒫F intersect C^i. Thus it follows that L𝒫(|F||𝒫F|)+2(|𝒞0𝒫|+|𝒞1𝒫|)2L𝒫, therefore |𝒫|=L𝒫2L𝒫. Furthermore, notice that since for all i[k] it holds that C^i𝒞2𝒫, due to Claim 7 it follows that only the vertices of P^h(i)i and R^h(i)i remain unused by the paths of 𝒫 that route demands in c, for some function h:[k][n]. Consequently, for any routed demand (wxi,p,wyj,q)c, it holds that p=h(i) and q=h(j).

Let 𝒱={vh(i)i:i[k]}, and notice that |𝒱Vi|=1 for all i[k]. Let A=|E(G[𝒱])| denote the number of edges present in the subgraph induced by 𝒱. We will prove that Acσ, in which case it follows that OPT()cσ. Notice that A2L𝒫2k=σ2L𝒫, since this is the number of routed demands in c by 𝒫, while (wxi,h(i),wyj,h(j)) implies that {vh(i)i,vh(j)j}Ei,j.

It suffices to prove that σ2L𝒫cσ. Since σ2L𝒫σ2(1c), we will prove σ2(1c)cσ instead, which is equivalent to c1+σ2(c1). Since c1<0 and σ2=12σ2k+σ12k/22k+k/2=110, the statement holds for c=1+110(c1)=9+c10.

5 XNLP-completeness

The W[1]-hardness results of [14, 28] already imply that MaxNDP is W[1]-hard parameterized by the pathwidth of the input graph. Here we examine in more detail the parameterization solely by pathwidth, and prove that in this case the problem is in fact XNLP-complete. This complexity class was recently brought forth by Bodlaender, Groenland, Nederlof, and Swennenhuis [3] and consists of the parameterized problems such that an instance (x,k), where x can be encoded with n bits and k denotes the parameter, can be solved non-deterministically in time f(k)n𝒪(1) and space f(k)logn, for some computable function f.

Such a completeness result in fact implies that MaxNDP parameterized by pathwidth is W[t]-hard for all t. To prove said result, we reduce from the XNLP-complete Chained Multicolored Clique, and use a construction quite similar to the one of Theorem 6.

Theorem 8 ().

MaxNDP parameterized by the pathwidth of the input graph is XNLP-complete.

6 Refining Hardness for Bounded Tree-depth Graphs

In this section, we refine the hardness result of Ene, Mnich, Pilipczuk, and Risteski [14] for bounded tree-depth graphs, by employing a recursive structure introduced in [23]. The reduction of [14] starts from an instance (G,k) of k-Multicolored Clique, and produces an equivalent instance of MaxNDP on a graph of tree-depth, vertex integrity, and feedback vertex number 𝒪(k2), implying a no(td) lower bound under the ETH. We refine their approach, resulting in a reduction that keeps tree-depth linear in k, thereby improving the lower bound to no(td) under the ETH. As a consequence of our result, it follows that the standard n𝒪(tw) algorithm for the problem is optimal, even if one considers the class of graphs of bounded tree-depth.

In order to achieve this result, we combine ideas from both [14] and [23]. On a high level, the reduction of [14] consists of k choice gadgets, each of which is used to encode the vertex which is chosen to take part in a supposed clique per color class. Afterwards, it suffices to add (k2) vertices in order to verify the existence of edges among all the chosen vertices of the color classes. The deletion of those (k2) vertices then gives the bounds for the tree-depth of the graph. In order to avoid this quadratic dependence, we make use of a recursive structure introduced in [23] meant to verify the existence of edges between the chosen vertices, while keeping the tree-depth of the resulting graph linear in k.

Theorem 9.

For any computable function f, if there exists an algorithm that solves MaxNDP in time f(td)no(td), where td denotes the tree-depth of the input graph, then the ETH is false.

Proof.

Let (G,k) be an instance of k-Multicolored Clique, such that every vertex of G has a self loop, i.e., {v,v}E(G), for all vV(G). Recall that we assume that G is given to us partitioned into k independent sets V1,,Vk, where Vi={v1i,,vni}. Assume without loss of generality that k=2z, for some z (one can do so by adding dummy independent sets connected to all the other vertices of the graph). Moreover, let Ei1,i2E(G) denote the edges of G with one endpoint in Vi1 and the other in Vi2. We will construct in polynomial time an equivalent instance (H,,) of MaxNDP, where H is a graph of tree-depth td(H)=𝒪(k), feedback vertex number fvs(H)=𝒪(k2), and size |V(H)|=n𝒪(1), (V(H)2) is a set of demands, and is an integer, such that G has a k-clique if and only if at least demands of can be routed in H.

Choice Gadget.

For an independent set Vi, we construct the choice gadget C^i as depicted in Figure 3(a). We first construct paths on vertex sets P^ji={v1i,j,v2i,j,v3i,j}, where j[n]. Afterwards, for every j[2,n], we introduce vertices αji and βji, connecting them with v1i,1,v1i,j and v3i,1,v3i,j respectively. Moreover, we add the pair (αji,βji) to . Intuitively, we will consider a one-to-one mapping between the vertex vji of Vi belonging to a supposed k-clique of G and the vertices of P^ji not being used to route any of the demands added in this step.

Copy Gadget.

Given two instances 1, 2 of a choice gadget C^i, when we say that we add a copy gadget (1,2,t), where t{1,2}, we introduce a copy vertex g, connect it with all vertices vt+1i,j of 1 and all vertices v1i,j of 2 for j[n] and add all the pairs (vt+1i,j,v1i,j) to .

(a) Choice gadget C^i.
(b) Addition of a copy gadget (1,2,1).
Figure 3: Choice gadgets and how to copy them.

Adjacency Gadget.

Let i1,i2,i1,i2[k]. For i1i2 and i1i2, we define the adjacency gadget333For some high-level intuition regarding the adjacency gadgets, we refer the reader to [23, Section 4]. A^(i1,i2,i1,i2) as follows:

  • Consider first the case when i1=i2=i and i1=i2=i. Let the adjacency gadget contain instances of the choice gadgets C^i and C^i, as well as a validation vertex mi,i. Add edges between mi,i and all vertices v2i,j and v2i,j for j[n]. If e={vji,vji}Ei,i, then add the pair (v2i,j,v2i,j) to .

  • Now consider the case when i1<i2 and i1<i2. Then, let A^(i1,i2,i1,i2) contain instances of choice gadgets C^i and C^i, where i[i1,i2] and i[i1,i2], which we will refer to as the original choice gadgets of A^(i1,i2,i1,i2), as well as the adjacency gadgets

    • A^(i1,i1+i22,i1,i1+i22),

    • A^(i1,i1+i22,i1+i22,i2),

    • A^(i1+i22,i2,i1,i1+i22),

    • A^(i1+i22,i2,i1+i22,i2).

    Lastly, let denote the original choice gadget C^p, where p[i1,i2][i1,i2]. Notice that there are exactly two instances of choice gadget C^p appearing as original choice gadgets in the adjacency gadgets just introduced, say instances 1 and 2. Add copy gadgets (,1,1) and (,2,2).

Figure 4: Adjacency gadget A^(i,i,i,i).

Let graph H be the adjacency gadget A^(1,k,1,k) and set =γ(n1)+δ, where γ=2k(2k1) and δ=5k24k. Notice that it holds that |V(H)|=(nk)𝒪(1) as well as that all copy and validation vertices have disjoint neighborhoods. Additionally, let αβ denote the set of pairs of of the form (αji,βji). This concludes the construction of the instance (H,,).

Lemma 10 ().

H has the following properties:

  • γ is equal to the number of instances of choice gadgets present in H,

  • δ is equal to the number of copy and validation vertices present in H.

Lemma 11 ().

It holds that td(H)=𝒪(k) and fvs(H)=𝒪(k2).

Lemma 12 ().

If G contains a k-clique, then (H,,) is a Yes instance of MaxNDP.

Lemma 13 ().

If (H,,) is a Yes instance of MaxNDP, then G contains a k-clique.

Therefore, in polynomial time, we can construct a graph H, of tree-depth td=𝒪(k) and fvs=𝒪(k2) due to Lemma 11, as well as a set of pairs , such that, due to Lemmas 12 and 13, deciding whether at least pairs of can be routed is equivalent to deciding whether G has a k-clique.

7 Conclusion

In this work we examine in depth Maximum Node-Disjoint Paths under the perspective of parameterized complexity, painting a complete picture regarding its tractability under most standard parameterizations. We additionally employ the use of approximation and present various (in)approximability results, further enhancing our understanding of the problem in the setting of parameterized approximation.

As a direction for future work, we remark that although Theorem 6 excludes the existence of an approximation scheme, a constant-factor approximation algorithm running in time f(tw)n𝒪(1) remains possible. Regarding the FPT algorithms of Section 3, all but the one of Theorem 3 rely on providing an upper bound on the number of vertices involved in an optimal solution, leading in some cases to even double-exponential running times. The optimality of those running times is thus a natural open question. Lastly, it is unknown whether the problem is FPT parameterized by the cutwidth or the cluster vertex deletion number of the input graph.

References

  • [1] Isolde Adler, Stavros G. Kolliopoulos, Philipp Klaus Krause, Daniel Lokshtanov, Saket Saurabh, and Dimitrios M. Thilikos. Irrelevant vertices for the planar disjoint paths problem. J. Comb. Theory, Ser. B, 122:815–843, 2017. doi:10.1016/J.JCTB.2016.10.001.
  • [2] Noga Alon, Raphael Yuster, and Uri Zwick. Color-coding. J. ACM, 42(4):844–856, 1995. doi:10.1145/210332.210337.
  • [3] Hans L. Bodlaender, Carla Groenland, Jesper Nederlof, and Céline M. F. Swennenhuis. Parameterized problems complete for nondeterministic FPT time and logarithmic space. Inf. Comput., 300:105195, 2024. doi:10.1016/J.IC.2024.105195.
  • [4] Juhi Chaudhary, Harmender Gahlawat, Michal Wlodarczyk, and Meirav Zehavi. Kernels for the disjoint paths problem on subclasses of chordal graphs. In 18th International Symposium on Parameterized and Exact Computation, IPEC 2023, volume 285 of LIPIcs, pages 10:1–10:22. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.IPEC.2023.10.
  • [5] Kyungjin Cho, Eunjin Oh, and Seunghyeok Oh. Parameterized algorithm for the disjoint path problem on planar graphs: Exponential in k2 and linear in n. In Proceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, SODA 2023, pages 3734–3758. SIAM, 2023. doi:10.1137/1.9781611977554.ch144.
  • [6] Julia Chuzhoy and David H. K. Kim. On approximating node-disjoint paths in grids. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2015, volume 40 of LIPIcs, pages 187–211. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2015. doi:10.4230/LIPIcs.APPROX-RANDOM.2015.187.
  • [7] Julia Chuzhoy, David H. K. Kim, and Shi Li. Improved approximation for node-disjoint paths in planar graphs. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, pages 556–569. ACM, 2016. doi:10.1145/2897518.2897538.
  • [8] Julia Chuzhoy, David H. K. Kim, and Rachit Nimavat. Improved approximation for node-disjoint paths in grids with sources on the boundary. In 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018, volume 107 of LIPIcs, pages 38:1–38:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2018. doi:10.4230/LIPICS.ICALP.2018.38.
  • [9] Julia Chuzhoy, David H. K. Kim, and Rachit Nimavat. Almost polynomial hardness of node-disjoint paths in grids. Theory Comput., 17:1–57, 2021. doi:10.4086/toc.2021.v017a006.
  • [10] Julia Chuzhoy, David H. K. Kim, and Rachit Nimavat. New hardness results for routing on disjoint paths. SIAM J. Comput., 51(2):17–189, 2022. doi:10.1137/17m1146580.
  • [11] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
  • [12] Reinhard Diestel. Graph Theory, volume 173 of Graduate texts in mathematics. Springer, 2017. doi:10.1007/978-3-662-53622-3.
  • [13] Pål Grønås Drange, Markus S. Dregi, and Pim van ’t Hof. On the computational complexity of vertex integrity and component order connectivity. Algorithmica, 76(4):1181–1202, 2016. doi:10.1007/S00453-016-0127-X.
  • [14] Alina Ene, Matthias Mnich, Marcin Pilipczuk, and Andrej Risteski. On routing disjoint paths in bounded treewidth graphs. In 15th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2016, volume 53 of LIPIcs, pages 15:1–15:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016. doi:10.4230/LIPIcs.SWAT.2016.15.
  • [15] Andreas Emil Feldmann, Karthik C. S., Euiwoong Lee, and Pasin Manurangsi. A survey on approximation in parameterized complexity: Hardness and algorithms. Algorithms, 13(6):146, 2020. doi:10.3390/A13060146.
  • [16] Krzysztof Fleszar, Matthias Mnich, and Joachim Spoerhase. New algorithms for maximum disjoint paths based on tree-likeness. Math. Program., 171(1-2):433–461, 2018. doi:10.1007/s10107-017-1199-3.
  • [17] Venkatesan Guruswami, Bingkai Lin, Xuandi Ren, Yican Sun, and Kewen Wu. Parameterized inapproximability hypothesis under exponential time hypothesis. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, pages 24–35. ACM, 2024. doi:10.1145/3618260.3649771.
  • [18] Venkatesan Guruswami, Bingkai Lin, Xuandi Ren, Yican Sun, and Kewen Wu. Almost optimal time lower bound for approximating parameterized clique, csp, and more, under ETH. In Proceedings of the 57th Annual ACM Symposium on Theory of Computing, STOC 2025, pages 2136–2144. ACM, 2025. doi:10.1145/3717823.3718130.
  • [19] Richard M. Karp. On the computational complexity of combinatorial problems. Networks, 5(4):45–68, 1975. doi:10.1002/NET.1975.5.1.45.
  • [20] Ken-ichi Kawarabayashi, Yusuke Kobayashi, and Bruce A. Reed. The disjoint paths problem in quadratic time. J. Comb. Theory, Ser. B, 102(2):424–435, 2012. doi:10.1016/j.jctb.2011.07.004.
  • [21] Stavros G. Kolliopoulos and Clifford Stein. Approximating disjoint-path problems using packing integer programs. Math. Program., 99(1):63–87, 2004. doi:10.1007/s10107-002-0370-6.
  • [22] Tuukka Korhonen, Michal Pilipczuk, and Giannos Stamoulis. Minor containment and disjoint paths in almost-linear time. In 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, pages 53–61. IEEE, 2024. doi:10.1109/FOCS61266.2024.00014.
  • [23] Michael Lampis and Manolis Vasilakis. Structural parameterizations for two bounded degree problems revisited. ACM Trans. Comput. Theory, 16(3):17:1–17:51, 2024. doi:10.1145/3665156.
  • [24] Daniel Lokshtanov, Dániel Marx, and Saket Saurabh. Slightly superexponential parameterized problems. SIAM J. Comput., 47(3):675–702, 2018. doi:10.1137/16M1104834.
  • [25] Daniel Lokshtanov, Pranabendu Misra, Michal Pilipczuk, Saket Saurabh, and Meirav Zehavi. An exponential time parameterized algorithm for planar disjoint paths. SIAM J. Comput., 54(2):321–418, 2025. doi:10.1137/20M1355902.
  • [26] Daniel Lokshtanov, M. S. Ramanujan, Saket Saurabh, and Meirav Zehavi. Parameterized complexity and approximability of directed odd cycle transversal. In Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, SODA 2020, pages 2181–2200. SIAM, 2020. doi:10.1137/1.9781611975994.134.
  • [27] Daniel Lokshtanov, Saket Saurabh, and Meirav Zehavi. Efficient graph minors theory and parameterized algorithms for (planar) disjoint paths. In Treewidth, Kernels, and Algorithms - Essays Dedicated to Hans L. Bodlaender on the Occasion of His 60th Birthday, volume 12160 of Lecture Notes in Computer Science, pages 112–128. Springer, 2020. doi:10.1007/978-3-030-42071-0_9.
  • [28] Dániel Marx and Paul Wollan. An exact characterization of tractable demand patterns for maximum disjoint path problems. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, pages 642–661. SIAM, 2015. doi:10.1137/1.9781611973730.44.
  • [29] Wojciech Nadara, Michal Pilipczuk, and Marcin Smulewicz. Computing treedepth in polynomial space and linear FPT time. In 30th Annual European Symposium on Algorithms, ESA 2022, volume 244 of LIPIcs, pages 79:1–79:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ESA.2022.79.
  • [30] Felix Reidl, Peter Rossmanith, Fernando Sánchez Villaamil, and Somnath Sikdar. A faster parameterized algorithm for treedepth. In Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, volume 8572 of Lecture Notes in Computer Science, pages 931–942. Springer, 2014. doi:10.1007/978-3-662-43948-7_77.
  • [31] Neil Robertson and Paul D. Seymour. Graph minors .XIII. The disjoint paths problem. J. Comb. Theory, Ser. B, 63(1):65–110, 1995. doi:10.1006/jctb.1995.1006.
  • [32] Petra Scheffler. A practical linear time algorithm for disjoint paths in graphs with bounded tree-width. TU, Fachbereich 3, 1994.
  • [33] Dekel Tsur. Faster parameterized algorithm for cluster vertex deletion. Theory Comput. Syst., 65(2):323–343, 2021. doi:10.1007/S00224-020-10005-W.
  • [34] Michal Wlodarczyk and Meirav Zehavi. Planar disjoint paths, treewidth, and kernels. In 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023, pages 649–662. IEEE, 2023. doi:10.1109/FOCS57990.2023.00044.