Abstract 1 Introduction 2 Notations, Preliminaries, and Basic Observations 3 DWRP is FPT with Respect to the Feedback Edge Number 4 DWRP is FPT Parameterized by Vertex Integrity 5 W[1]-hardness with Respect to Distance to Constant Treedepth 6 Conclusions and Open Problems References

Parameterized Complexity of Directed Traveling Salesman Problem

Václav Blažej ORCID Institute of Informatics, University of Warsaw, Poland Andreas Emil Feldmann ORCID University of Sheffield, UK Foivos Fioravantes ORCID Faculty of Information Technology, Czech Technical University in Prague, Czech Republic Paweł Rzążewski ORCID Warsaw University of Technology, Poland
Institute of Informatics, University of Warsaw, Poland
Ondřej Suchý ORCID Faculty of Information Technology, Czech Technical University in Prague, Czech Republic
Abstract

The Directed Traveling Salesman Problem (DTSP) is a variant of the classical Traveling Salesman Problem in which the edges in the graph are directed and a vertex and edge can be visited multiple times. The goal is to find a directed closed walk of minimum length (or total weight) that visits every vertex of the given graph at least once. In a yet more general version, Directed Waypoint Routing Problem (DWRP), some vertices are marked as terminals and we are only required to visit all terminals. Furthermore, each edge has its capacity bounding the number of times this edge can be used by a solution.

While both problems (and many other variants of TSP) were extensively investigated, mostly from the approximation point of view, there are surprisingly few results concerning the parameterized complexity. Our starting point is the result of Marx et al. [APPROX/RANDOM 2016] who proved that DTSP is W[1]-hard parameterized by distance to pathwidth 3. In this paper we aim to initiate the systematic complexity study of variants of Directed Traveling Salesman Problem with respect to various, mostly structural, parameters.

We show that DWRP is FPT parameterized by the solution size, the feedback edge number and the vertex integrity of the underlying undirected graph. Furthermore, the problem is XP parameterized by treewidth.

On the complexity side, we show that the problem is W[1]-hard parameterized by the distance to constant treedepth.

Keywords and phrases:
Directed TSP, parameterized complexity, vertex integrity, treedepth
Funding:
Ondřej Suchý: Co-funded by the European Union under the project Robotics and advanced industrial production (reg. no. CZ.02.01.01/00/22_008/0004590).
Copyright and License:
[Uncaptioned image] © Václav Blažej, Andreas Emil Feldmann, Foivos Fioravantes, Paweł Rzążewski, and Ondřej Suchý; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithms
; Theory of computation Graph algorithms analysis
Related Version:
Full Version: https://arxiv.org/abs/2506.22127 [14]
Acknowledgements:
The project was initiated at the workshop Homonolo 2023. We are grateful to the organizers and other participants for a nice and productive atmosphere.
Funding:
Václav Blažej and Paweł Rzążewski: The work on this article is a part of project BOBR that has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 948057).
Editors:
Ho-Lin Chen, Wing-Kai Hon, and Meng-Tsung Tsai

1 Introduction

The Traveling Salesman Problem (TSP) is possibly the most famous combinatorial optimization problem. It is one of the few problems having entire monographs devoted solely to its aspects [5, 19, 35, 53]. In this paper we focus on the directed variant, which can be formulated as follows. The input instance is a directed graph G with edges assigned positive integers (weights) and an integer b, and we are to decide whether there is a closed walk in G visiting every vertex at least once and having total weight at most b. We refer to this problem as Directed Traveling Salesman Problem (DTSP). We also consider two natural generalizations of the problem. In the first of them, Directed Subset TSP (DsTSP), we are given alongside the graph also a subset of its vertices W called waypoints or terminals and the walk is only required to visit these vertices. Obviously, an instance of DTSP can be interpreted as the instance of DsTSP by letting W=V(G). In some applications it is also preferred not to traverse any (or some) of the edges of the graph too often. To this end, in Directed Waypoint Routing Problem (DWRP) (introduced in [2]), we augment the input with a positive integer for each edge specifying its capacity. The walk is then required to traverse each edge at most as many times as its capacity. A simple argument (provided later) shows that each edge is used at most n:=|V(G)| times in any solution. Hence, setting the capacities to n is equivalent to dropping the capacity constraints completely.

Our focus is on exact parameterized algorithms for the problem. Let us first summarize the known results for the undirected variant of the problem. Since Hamiltonian Cycle (HamC) is NP-hard even on planar graphs of maximum degree three [32], TSP is para-NP-hard with respect to (w.r.t.) the maximum degree of the input graph as well as w.r.t. the maximum number of visits to any vertex. As the solution size is equal to the number of vertices, the dynamic programming of Bellman [9] and Held and Karp [36] which runs in O(2nn2) time can be considered as an FPT algorithm w.r.t. solution size. It can be also used to solve Subset TSP in O(2|W||W|2) after an initial computation of distances between all pairs of waypoints. This can be improved to O(2|W|log|W|nO(1)) if the graph is planar and the weights are bounded by a polynomial [40].

On the one hand, a single-visit variant of TSP is known to be FPT w.r.t. treewidth (see also [23]) and this result also extends to our multi-visit variant and to Waypoint Routing (WPR) [51]. On the other hand, TSP is hard on cliques with edge weights 1 and 2, shown by a simple reduction from HamC. Therefore, it is para-NP-hard w.r.t. any parameter which is constant on cliques. Moreover, already HamC is W[1]-hard w.r.t. cliquewidth [30] (while FPT w.r.t. the neighborhood diversity [43]).

Recently, the (undirected) TSP was studied from the perspective of kernelization [12, 13]. It was shown to admit a polynomial kernel w.r.t. the feedback edge number and w.r.t. distance to constant size components. Here, for a graph class 𝒞, distance to 𝒞 refers to the minimum number of vertices that must be deleted from the input graph to obtain a graph that belongs to 𝒞. In the above case, the class contains all graphs with every connected component of size at most c, for any fixed c. TSP was shown not to admit polynomial kernel w.r.t. vertex integrity, unless NP coNP/poly, whereas Subset TSP does not admit polynomial kernel even w.r.t. distance to disjoint cycles, under the same assumption [13]. Here vertex integrity of a graph is the minimum k such that we can delete at most k vertices from the graph in such a way that each connected component of the resulting graph has at most k vertices.

Much less is known about the parameterized complexity of the directed case of the problem. The mentioned hardness results translate to the directed case by symmetrically orienting the input graph. While the algorithmic results do not transfer automatically to the directed setting, it is often possible to adapt them. For example, the dynamic programming w.r.t. number of vertices [9, 36] applies also to this case. This can be again improved to O(2|W|log|W|nO(1)) for DsTSP in planar graphs [47]; also lifting the weight-restriction from the undirected case. In contrast, DWRP is NP-hard already for two waypoints [2].

Similarly, the single visit variant is FPT w.r.t. the treewidth. However, Marx et al. [48] showed, that DTSP is W[1]-hard w.r.t. the pathwidth pw of the input graph and there is no algorithm for DTSP running in f(pw)no(pw) time for any computable function f, unless the Exponential Time Hypothesis (ETH) [37, 38] fails. More precisely, the proof shows that this is the case even w.r.t. distance to graphs of pathwidth 3. Furthermore, a more careful analysis of the proof (see the full version for details) shows that the W[1]-hardness holds true even w.r.t. distance to pathwidth 2. Thus, the fpt-algorithm for WRP w.r.t. treewidth cannot be transferred to the directed case.

Apparently, these are the only results concerning the parameterized complexity of DTSP, and, in particular, no fpt-algorithms w.r.t. structural parameters are known for the problem.

Figure 1: Complexity picture for the studied problems. Box fill shows tractability: green stands for FPT, orange for W[1]-hard and in XP, and yellow for in XP, but open whether FPT or W[1]-hard. The boxes either contain references to the corresponding theorem, or der if the result can be derived from the other results. All the hardness results apply even for unit weights, whereas the algorithms do not assume any restriction on the weights.

Our Contribution.

We initiate the systematic study of the parameterized complexity of DTSP and its generalizations focusing on structural parameters. In particular, we concentrate on parameters measuring the structure of the underlying undirected graph of the input. We aim to fill the apparent gap in knowledge and address the lack of fpt-algorithms.

First, we revisit the standard parameterization, i.e., the parameterization by the solution size. The budget bounds the number of edges in the solution, hence also the number of vertices visited, and in particular the size of W (for any yes-instance of DTSP and DsTSP) Thus for these problems, the known single exponential algorithms [9, 36] and subexponential algorithm for planar graphs [47] show that the problem is FPT w.r.t. the budget b. For DWRP the situation is not as straightforward. Nevertheless, we show the following result.111Proofs of statements marked with () can be found in the full version.

Theorem 1 ().

In ek4kkO(logk)mlogm time we can decide whether the given m-edge instance of DWRP has a solution consisting of at most k edge occurrences.

Next we turn to the structural parameters (see Figure 1 for an overview). The result of Marx et al. [48] shows that DTSP is already W[1]-hard w.r.t. distance to graphs of pathwidth 3, i.e., for graphs with rather restricted structure. In fact, as we show in the full version, this holds also for unweighted graphs. Therefore, in search for fpt-algorithms for the problems, the structure of the graph after removal of parameter many vertices or edges should be more restricted than having pathwidth 3. Our first positive result is w.r.t. the feedback edge number, i.e., the minimum number of edges that needs to be removed to obtain a forest.

Theorem 2.

DWRP can be solved in kO(k)+nO(1) time, where k is the feedback edge number of the input graph.

Then, we present our main algorithmic result, showing that DWRP is FPT w.r.t. vertex integrity. Recall that vertex integrity allows, roughly speaking, to delete parameter many vertices so as to obtain a graph with connected components of parameter size.

Theorem 3.

DWRP can be solved in kO(k6)nlog2n(logn+logU) time, where k is the vertex integrity of the input graph and U is the maximum weight of an edge in G.

The algorithm first guesses a part of the solution ensuring its connectivity and then employs a well structured ILP (N-fold IP [41]) to find the cheapest way to complete the initial guess into a solution.

We also show that, while the problems are probably not FPT w.r.t. treewidth alone, they are FPT w.r.t. treewidth combined with the bound on the number of visits to every city.

Theorem 4 ().

DWRP on n-vertex graphs of treewidth t can be solved in nO(t) time.

This means that all considered problems are in XP w.r.t. treewidth and, hence, w.r.t. all structural parameters considered in this paper.

We complement the positive results by showing that DWRP is W[1]-hard w.r.t. distance to constant treedepth, i.e., if the input graph becomes of constant treedepth after deleting parameter many vertices.

Theorem 5.

DWRP is W[1]-hard with respect to modulator to constant treedepth, even if all weights are 1.

Note that this result is incomparable to that of Marx et al. [48] in that it holds for a more restricted graph class, while it only applies to a more general problem.

Further Related Work.

Another popular formulation of (Directed) TSP is that the input graph is complete and, thus, we are given a matrix of weights for all ordered pairs of vertices. Since this matrix is asymmetric for the case of directed graphs, the directed variant of TSP is often called Asymmetric TSP (ATSP). It is easy to switch from graph G to a complete graph on the same set of vertices by performing the so called metric closure, i.e., assigning the edge (u,v) of the complete graph the weight given by distance from vertex u to vertex v in the graph G. The weights obtained this way satisfy triangle inequality. Whenever this is the case, there is no reason to revisit any vertex, as it cannot make the tour shorter. However, if the matrix is not required to satisfy the triangle inequality, it makes a difference whether visiting a vertex more than once is allowed or not (single visit version).

For the single visit version with general matrices a folklore result shows that it cannot be approximated within any polynomial factor, unless P=NP [20]. For undirected case with triangle inequality it was know that there is 32-approximation since 1976 [18], which was later improved [33, 49, 50] up to the currently best known factor 1.4 [52] for the graphic case, where the weights originate from the distances in an unweighted graph. However, for the directed case, it was long open, whether a constant factor approximation exists for matrices satisfying the triangle inequality [4, 6]. Constant-factor approximation algorithms appeared only recently, first for unweighted directed graphs [54], later for general distances [55], with the currently best approximation factor being 22+ε for any ε>0 [56]. The best known lower bound on the approximability is 7574 [39].

It is surprising, given the lack of parameterized analysis for the problem, that there are several studies concerning parameterized approximation algorithm for DTSP. First, Böckenhauer [15] considered (undirected) TSP with deadlines on the latest time to visit some of the vertices and showed a 2.5-approximation algorithm in k!nO(1) time, where k is the number of deadlines, and complemented that by several innaproximability results. The main result of the already mentioned paper of Marx et al. [48] is a polynomial-time constant-factor approximation for DTSP in nearly embeddable graphs, where both the factor and the time depend on the actual parameters of the class of graphs considered. Bonnet et al. [17] provided a (logr)-approximation for ATSP in 2O(nr) time for any r. Behrendt et al. [8] considered the case that there are few edges with (significantly) asymmetric costs and presented a 2.5-approximation parameterized by the vertex cover number of the graph formed by such edges and a 3-approximation parameterized by the minimum number of asymmetric edges in a minimum arborescence of the graph.

Further results are known for a variant of DWRP where the waypoints have a prescribed order [1] and for the undirected case [3].

Another studied variant of DTSP is the Many-visit TSP, where each vertex has a prescribed number of visits and the task is to find a closed walk which visits each vertex exactly the given number of times. After a significant effort, an algorithm was found for the problem that is exponential only in the number of vertices, i.e., independent of the demands which can be huge [11, 42]. The problem was recently studied from parameterized perspective [45] under the name Connected Flow. Here only a subset of vertices has a prescribed number of visits, the other vertices can be visited arbitrary number of times (or not visited at all) and edges have capacities (as in DWRP). They showed that the problem is para-NP-hard w.r.t. number of vertices with demand even in unweighted graph, while FPT w.r.t. this parameter, if there are no capacities. Further, they gave a polynomial kernel w.r.t. vertex cover number, an nO(tw)-time algorithm and a matching no(tw)-time ETH lower bound.

Several parameterized and fine-grained complexity studies considered the local search for the undirected single-visit TSP parameterized the size of the neighborhood to be searched [10, 16, 22, 34, 44, 46]. None of these studies seems to extend to directed graphs.

2 Notations, Preliminaries, and Basic Observations

We follow standard graph-theoretic notation [24]. Also, we refer the reader to [21] for a textbook on parameterized complexity.

(Generalized) 𝑵-fold integer programming (𝑵-fold IP).

is the problem of minimizing a separable convex objective (for us it suffices to minimize a linear objective) over a set of constraints of a specific form. Let r and si,ti for every i[N]. The IP has d=i[N]ti variables partitioned into N so-called bricks. The i-th brick is denoted x(i) and contains ti variables. The constraints have the following form:

D1x(1)+D2x(2)++DNx(N) =𝐛0 (linking (global) constraints)
Aix(i) =𝐛i i[N] (local constraints)
𝐥ix(i) 𝐮i i[N] (box constraints)

where we have Dir×ti, Aisi×ti, 𝐛0r, 𝐛isi and 𝐥i,𝐮iti for every i[N]. Let us denote s=maxi[N]si and recall that the dimension is d=i[N]ti. There are r global constraints and, apart from these, each variable is only involved in at most s local constraints and one box constraint. We call variables not appearing in linking constraints local.

The current best algorithm solving the N-fold IP in (rsΔ)O(r2s+rs2)dlogdlogDlogvalmax time is by Eisenbrand et al. [28, Cor. 97]; see also [27, 41], where D is the maximum range of a variable, Δ=maxi[N](max(Di,Ai)), and valmax is the maximum feasible value of the objective.

Variants of the Problem and Basic Observations.

Let us formally introduce the considered problems and establish notation used in the next sections.

To avoid degenerate cases, we assume that |W| is always at least 2 and that the input graph is strongly connected. We use undirected parameters, and, when speaking about a width of a directed graph, we mean the width of the underlying undirected graph.

Lemma 6 (Folklore, see, e.g., Bang-Jansen and Gutin [7, Exercise 1.12]).

Any closed directed walk (in particular a solution to the problem) can be decomposed into simple cycles, such that the number of times an edge is traversed by the walk equals the number of the cycles it appears in.

Observation 7 ().

In each optimal solution to DWRP, each vertex v is visited at most |W{v}| times.

Hence, an instance of DsTSP can be interpreted as an equivalent instance of DWRP, by letting κ(e)=|V| for every arc.

3 DWRP is FPT with Respect to the Feedback Edge Number

In this section we prove Theorem 2 that we restate here.

Theorem 2. [Restated, see original statement.]

DWRP can be solved in kO(k)+nO(1) time, where k is the feedback edge number of the input graph.

Proof.

Let (G=(V,E),W,ω,κ,b) be an instance of DWRP, where n=|V|. Let G be the underlying undirected graph of G. Let FE(G) be a feedback edge set of G of size at most k, i.e., GF is a forest. Note that it can be computed in polynomial time.

Our algorithm consists of three phases. First, we exhaustively apply some straightforward reduction rules in order to simplify (or already reject) the input. Then, we branch into 2O(k) of possibilities, guessing the structure of the solution. Finally, for each such guess, we create an equivalent instance of DWRP with O(k) vertices and edges. The original instance is a yes-instance if and only if at least one of the created instances is a yes-instance. Thus, our algorithm can be seen as a compression to OR of 2O(k) instances, each of size O(k). By Observation 7, each such instance can be solved in time kO(k) by brute force. Thus, the overall running time is kO(k)+nO(1).

Preprocessing.

The following reduction rule lets us deal with vertices of degree 1 in G.

Reduction Rule 1.

Suppose there is a vertex v in G which has only one neighbor u in G.

  • If vW, remove v from the graph.

  • If vW and both (u,v)E and (v,u)E, then remove the vertex v, include u into W, and decrease the budget by ω((u,v))+ω((v,u)).

  • If vW and one of the arcs (u,v),(v,u) is not present, then reject the instance.

The correctness of the rule is straightforward. Note that, as {u,v} is not part of any cycle in G, we may assume that {u,v}F, and thus F is still a feedback edge set of the graph resulting from the reduction rule.

We apply the reduction rule exhaustively, and, for simplicity, we keep denoting the resulting instance by (G,W,ω,κ,b) and the underlying undirected graph by G.

Let R be the set of all vertices that are incident to the edges in F. Note that since the reduction rule was exhaustively applied, each vertex has degree at least two in G. Therefore, each leaf of G′′=GF is in R and, thus, G′′ has at most 2k leaves. Let D be the set of vertices that have degree at least 3 in G′′. As G′′ is a forest with at most 2k leaves, the size of D is at most 2k1. We also define X=RD, and we have |X|4k1.

Let 𝒫 contain all paths in G′′ with both endpoints in X and all internal vertices outside X. In other words, the paths in 𝒫 correspond to the edges of the forest obtained from G′′ by contracting all vertices of degree 2. As there are at most 4k1 vertices in X and, as G′′ is a forest, the number of paths in 𝒫 is at most 4k2. Finally, we define 𝒫=𝒫F; we clearly have |𝒫|5k2.

Types of paths and their costs.

Consider an optimum solution C, i.e., a shortest (in terms of the sum of weights) closed walk that visits every vertex from W in G. Among all such solutions, pick one with the minimum number of edges.

Consider a path P𝒫 with endpoints u,vX. A visit is an inclusion-wise maximal set of orientations of edges from P that appear consecutively in C. A visit is a pass if it contains for every edge of P exactly one of its orientations and it contains it exactly once, i.e., it corresponds to traversing P once, either from u to v or from v to u.

Notice that a path P might be of one of the following types:

(uv)

there is at least one visit and every visit is a pass from u to v,

(uv)

there is at least one visit and every visit is a pass from v to u,

(uv)

every visit is a pass and there is at least one pass in each direction,

(uv)

none of the visits is a pass, there is a visit that starts in u and ends in u, but no visit that starts in v and ends in v,

(uv)

none of the visits is a pass, there is a visit that starts in v and ends in v, but no visit that starts in u and ends in u,

(uv)

none of the visits is a pass, there is a visit that starts in u and ends in u, and a visit that that starts in v and ends in v,

(uv)

the path P is not visited at all by C.

Claim 8 ().

The types listed above are mutually exclusive and cover all possibilities.

Let us make some further observations about possible visits in P by C.

If no internal vertex of P is in W, then P is of type uv, uv, uv, or uv. Indeed, any non-pass visit can be removed from C, contradicting the minimality.

Now consider a path P of type uv (the case uv is symmetric). We may safely assume that P is visited exactly once by C, as one of the visits (the one reaching furthest towards v) covers all vertices covered by all the visits altogether. Further, we may assume that this single visit starts in u, reaches the internal vertex of P that belongs to W and is closest to v, and then goes back to u. Thus, if P is of type uv or uv, then the visit in P contributes to the total cost of the solution by a fixed amount that can be computed in advance. We denote this cost by 𝖼𝗈𝗌𝗍(P,uv) or 𝖼𝗈𝗌𝗍(P,vu), respectively.

Now consider a path P of type uv. Similarly as before, we can assume that there are at least two vertices from W among internal vertices of P, as otherwise we can shorten C by removing one of the visits. Furthermore, we can assume that P is visited exactly twice: one visit starts at, u reaches some vertex xuW and goes back to u, and the other visit starts at v, reaches some vertex xvW, and goes back to v. In particular, no edge between xu and xv is traversed by C. As before, in polynomial time we can find an optimal pair of visits that cover all vertices from W that are on P, and compute its contribution to the cost of the solution (here note that we need to be careful as some edges might be only available in one direction). We denote this cost by 𝖼𝗈𝗌𝗍(P,uv).

Finally, each pass in a fixed direction has a fixed cost, equal to the sum of weights of edges in G corresponding to the edges of P, where we only choose edges in the correct direction. We denote it by 𝖼𝗈𝗌𝗍(P,uv) or 𝖼𝗈𝗌𝗍(P,vu), depending on the direction. We also define 𝖼𝖺𝗉𝖺𝖼𝗂𝗍𝗒(P,uv) (and, symmetrically, 𝖼𝖺𝗉𝖺𝖼𝗂𝗍𝗒(P,uv)) to the minimum capacity of an edge of G corresponding to an edge of P, in the direction from u to v (from v to u), resp.

Note that due to the directions and capacities of edges, some types might not be available for P. We will define the cost associated with such an unavailable type to be .

Building compressed instances.

Now we perform the branching. For each path P in 𝒫 with endvertices u,v, we guess its type uv, where {,,,,,,}. This results in 7|𝒫|=2O(k) branches.

Consider one such branch. Now we build an instance (G,W,ω,κ,b) of DWRP. Initialize b=b. We start with including all vertices from X to G, and all vertices from XW to W. Now let P be a path in 𝒫 with endvertices u,vX. We proceed, depending on . If the type of P is uv, we do nothing. If the type of P is uv (), we add u (v) to W, and decrease b by 𝖼𝗈𝗌𝗍(P,uv) (𝖼𝗈𝗌𝗍(P,vu)), respectively. If the type of P is uv, we add both u and v to W, and decrease b by 𝖼𝗈𝗌𝗍(P,uv).

Now consider the case that the type of P is uv (the case uv is symmetric). We add a new vertex xuvP and edges (u,xuvP) and (xuvP,v). Vertices u,v, and xuvP are all included into W. We define ω((u,xuvP))=𝖼𝗈𝗌𝗍(P,uv) and ω((xuvP,v))=0. Furthermore, we set κ((u,xuvP))=κ((xuvP,v))=𝖼𝖺𝗉𝖺𝖼𝗂𝗍𝗒(P,uv). If the type of P is u, we proceed as if was of both types uv and uv.

This concludes the construction of the instance. If b<0, we reject it immediately. Clearly, the number of vertices of G is at most |X|+2|𝒫|14k, and the number of edges is at most 4|𝒫|20k. The discussion about correctness is postponed to the full version.

4 DWRP is FPT Parameterized by Vertex Integrity

In this section we prove Theorem 3.

Theorem 3. [Restated, see original statement.]

DWRP can be solved in kO(k6)nlog2n(logn+logU) time, where k is the vertex integrity of the input graph and U is the maximum weight of an edge in G.

Proof.

An undirected graph G with vertex integrity k has a k-modulator MV(G) of size at most k such that each connected component of GM is of size at most k. We assume that G is given along with M as it can be found in kO(k)n time [26, 29]. Thus we assume that we are given an instance (G,W,ω,κ,b) of DWRP, with a set M of size at most k, such that each weakly connected component of GM has size at most k. For brevity, we will speak about “components” instead of “weakly connected components.”

In what follows, we start with introducing some notions and establishing some properties of an optimum solution. Then, after some branching, we build an instance of ILP that corresponds to a solution with the required properties.

Segments.

A segment is a walk in G with at least two vertices, that starts and ends in a vertex of M and all internal vertices are not in M. We remark that there might be no internal vertices – such a segment is just an arc contained in M. We call such a segment trivial. However, if a segment is non-trivial (i.e., not trivial), all its internal vertices are contained in a single component of GM; the segment is associated with the component.

Note that the endpoints of a non-trivial segment need not to be distinct. A segment s from u to v is minimal if there is no segment from u to v that uses only the arcs of s, contains all vertices of s that are in W, and is shorter than s.

Segments in an Optimum Solution.

Let C be an optimum solution, i.e., a shortest (w.r.t. the sum of weights of edges) closed directed walk in G that visits every vertex of W. We treat C as a sequence of vertices. Clearly C can be decomposed into segments (where two consecutive segments overlap on corresponding endpoints); let 𝒮 be the collection of these segments. We emphasize that 𝒮 is a multiset, as some segments might be used more than once. We observe that we can assume that each segment in 𝒮 is minimal, for otherwise we can replace it with a shorter one with the same endpoints, still covering all of W.

Some segments in 𝒮 might not be needed to cover W, but are required to keep the connectivity of the solution. We call them connectors. We can identify connectors with the following procedure. We initialize 𝒮= and proceed iteratively as follows. If there is a segment s in 𝒮𝒮 such that the segments 𝒮𝒮{s} cover all vertices of W, we include s into 𝒮. We emphasize that here we work with multisets, so the “” operation respects the multiplicity of elements. The set 𝒮 contains connectors. Note that 𝒮 is not defined uniquely and it might depend on the ordering in which segments were selected.

Consider a connector, i.e., a segment s from u to v that is in 𝒮. We observe that we can safely assume that it is a u-v-path, as otherwise we can replace it with such a path obtaining a solution of no larger length. We call such segments simple.

Traversals.

Now let us consider a component C of GM. A traversal of C is a collection 𝒮C of segments associated with C that:

  • together cover every vertex from WV(C),

  • for every s𝒮C there is a vertex in WV(C) not covered by segments in 𝒮C{s},

  • every segment in 𝒮C is minimal,

  • every edge e is used at most κ(e) times by 𝒮C.

Note that the segments from 𝒮𝒮 associated with C form a traversal. Indeed, the first condition follows since C covers all vertices from W and we moved segments to 𝒮 if they were not required to cover WV(C). The second condition again follows from the definition of 𝒮. Finally, recall that we already established the third condition without loss of generality.

Claim 9 ().

Every traversal has at most k(k+2) vertices. Moreover, for any component C of GM, there are at most kk(k+2) traversals of C. Furthermore, each traversal uses each edge at most k times.

Skeleton of the Solution.

Let us define two directed graphs H0 and H1 as follows. Both have the same vertex set, M.

For distinct u,vM, the arc uv exists in H0 if such an arc appears in C (i.e., C contains u immediately followed by v). On the other hand, the arc uv exists in H1 if there is a non-trivial segment in 𝒮 starting in u and ending in v. We emphasize that neither H0 nor H1 has parallel arcs nor loops.

Let H be the directed graph with vertex set M and the arc set being the union of arc sets of H0 and H1 (again, with no parallel arcs). Note that H has one strongly connected component H containing all vertices from WM, and vertices that are not in H are isolated in H. These vertices do not appear on C at all.

For u,vM, we say that a segment from u to v is bad (for a particular choice of H0,H1) if u or v are not in H, or the arc uv does not appear in H. A traversal is bad if it contains a bad segment.

We say that a collection 𝒮 of segments is compatible with H0 and H1 if, for every arc uv of H0, 𝒮 contains at least one copy of the trivial segment uv, and for every arc uv of H1, 𝒮 contains at least one non-trivial segment starting in u and ending in v.

The Algorithm.

We proceed to the description of the algorithm. We exhaustively guess the graphs H0 and H1 described above, considering all possible graphs on the vertex set M, so that the union of these two graphs has one strongly connected component and the remaining vertices isolated. This gives us 2O(k2) possible guesses. We are going to look for a set of segments that are compatible with H0 and H1, and the structure of H0,H1 will be used to ensure that the solution is connected.

Suppose we are in a branch corresponding to one guess. We will build an instance of generalized N-fold ILP [27, 41]. In our case, we have a brick corresponding to each component C of GM and some further bricks that do not have any local constraints.

For each traversal of C that is not bad, we introduce one binary variable; recall that there are at most kk(k+2) such variables. The value of this variable indicates whether the vertices from WV(C) are covered by a particular traversal. Furthermore, we introduce a local constraint to ensure that exactly one traversal is chosen.

For each simple segment associated with C which is a u-v-path for some u,vM, we introduce a variable with possible values from 0 to n. The intended meaning of this variable is the number of times this segment was used as a connector from u to v by the solution. There are at most kk+2 such variables.

For each edge e with at least one endpoint in C we introduce a (local) constraint ensuring that this edge is used by the solution at most as many times as the capacity permits. Namely, we sum over all simple segments and over all traversals that use edge e (multiplying by how many times they use e) and require that this sum is at most κ(e).

Now, let us move to variables not related to components. For each ordered pair u,v of distinct vertices, we introduce a variable with possible values from 0 to κ((u,v)). The intended meaning of this variable is the number of times the trivial segment is used as a connector from u to v by the solution. This gives us at most k2 variables. We can put each of this variable to a brick for itself. As the edges within M are not used by any traversals or non-trivial segments, the box constraints ensure that the capacities are adhered for these arcs, i.e., there will be no local constraints for these bricks.

Next, we add global constraints that ensure that the selected set of segments is compatible with H0 and H1. More precisely, for each arc uv of H0 (H1), we add a constraint that ensures that we choose the trivial segment uv (at least one non-trivial segment that starts in u and ends in v), respectively. We sum it over all selected traversals and connectors. These constraints are responsible for making the solution connected.

Finally, we need to make sure that for each vM, the number of segments that start in v is equal to the number of segments that end in v. Again, we can force it by summing the number of particular segments, including trivial, connectors, and ones belonging to traversals. These are also global constraints.

We minimize the total length (i.e., the sum of weights of edges) in all selected segments. Note that for some guesses we might get an infeasible instance of ILP – this means that, e.g., the segments that are required by H0 and H1 do not exist in G or all traversals of some component are bad. If all branches give infeasible instances, we return that there is no solution. However, every solution found (in any branch) is feasible and we can return the shortest one. From the description above it follows that if an optimum solution C exist, we will find it (or, more precisely, a solution of the same total length) in the branch corresponding to the actual H0 and H1.

Solving 𝑵-fold ILP.

Recall that generalized N-fold ILP can be solved (see [28, Cor. 97] and also [27, 41]) in (rsΔ)O(r2s+rs2)dlogdlogDlogvalmax time, where

  • r is the number of global constraints (at most k(k1)+k=k2 in our case),

  • s is the number of local constraints for each brick (O(k2) in our case),

  • Δ is the largest coefficient in the constraints (k in our case),

  • d is the total number of variables (at most k2+nkk(k+2)+nkk+2 in our case)

  • D is the maximum range of a variable (at most n in our case),

  • and valmax is the maximum value of the objective function (by Observation 7, in our case it is at most n2U, where U is the maximum weight of an arc in G).

Including the branching to guess H0 and H1, we obtain the final running time bound of kO(k6)nlog2n(logn+logU). This completes the proof.

5 W[1]-hardness with Respect to Distance to Constant Treedepth

In this section we prove Theorem 5.

Theorem 5. [Restated, see original statement.]

DWRP is W[1]-hard with respect to modulator to constant treedepth, even if all weights are 1.

We provide a reduction from Capacitated Dominating Set (CDS), which is defined as follows. We are given an undirected graph G and a capacity function c:V(G), where 1c(u)degG(u) for every uV(G). A set of vertices SV(G) is a capacitated dominating set if there exists a domination mapping f:(V(G)S)S such that for every v(V(G)S) we have {f(v),v}E(G) and each vertex sS dominates at most c(s) vertices, i.e., |f1(s)|c(s). Given a k, the problem is to find a capacitated dominating set of size k. CDS was shown to be W[1]-hard with respect to treewidth in [25]. In order to prove Theorem 5, we actually need to observe a slight improvement of the construction proposed in [25]: we require that CDS is W[1]-hard with respect to the distance to constant treedepth. This W[1]-hardness is obtained by carefully considering the structure of the graph used in the reduction in [25]. Formally:

Theorem 10 ().

CDS is W[1]-hard with respect to the distance to stars.

We are now ready to proceed with the sketch of the proof of Theorem 5. A more detailed version can be found in the full version.

Sketch of Proof of Theorem 5..

Let I=(G=(V,E),c,k) be an instance of CDS. We describe the construction of an instance I=(G,W,ω,κ,b) of DWRP that is equivalent to I such that G has a bounded modulator to constant treedepth.

The construction.

First, we describe the construction of the used gadgets. Each gadget has dedicated connecting vertices marked with “in” (e.g. uin), “out”, or “io”. Every gadget of the final G will be connected to other gadgets by edges incident only to its connecting vertices: “in” (“out” resp.) vertices can only be incident to arcs that are coming “into” (going “out” from resp.) the gadget, and “io” can be incident to both types of arcs. If this is true then we say that the graph contains the gadget. We use uX to denote the vertex u that belongs to a gadget X. All edges have weight 1. Unless stated otherwise, every edge has capacity n; this is always sufficient by Observation 7. Crucially, getting from one terminal to another requires the traversal of exactly two non-terminal vertices. As the final budget is set to exactly 3(number of terminals), it follows that every terminal is visited exactly once.

We begin with the force-p-traversals-gadget. It consists of three non-terminal vertices uin,uout,w and terminal vertices v1,,vp joined with edges (uin,vi),(vi,w) for every i[p] and (w,uout) of capacity p, see Figure 2.

Figure 2: Force-5-traversals-gadget. Black and white vertices represent terminals and non-terminals, respectively.
Claim 11.

Let G be a graph that contains a force-p-traversals-gadget X. Then every solution to DWRP in G traverses from uinX to uoutX exactly p times.

Next, we need the cover-z-gadget, which is illustrated in Figure 3. Let R1 be the directed path that starts at sin, goes to f, then to b, continues to xin, traverses all the ws’ until yout, goes to c and finishes in tout. Also, let R2 and P be the red and blue paths depicted in Figure 3. The idea here is that this gadget has two possible behaviors: either its terminals are covered by the combination of the R2 and P paths, or all of its terminals except from zio are covered by the R1 path, and z is covered by some external path that visits this gadget. Formally:

Figure 3: The cover-z-gadget. Black and white vertices represent terminals and non-terminals, respectively. The path R2 is colored red, while the path P is colored blue.
Claim 12.

Let G be a graph that contains the cover-z-gadget X. If S is a minimum solution to DWRP that traverses every terminal vertex of X exactly once, then S includes either the path R1, or the paths P and R2 as continuous subpaths.

We now present the construction of (G,W,ω,κ,b), see Figure 4. Let 𝒮 be a force-(k+1)-traversals-gadget that we call selection-gadget and let 𝒜 be a force-(2|E|+|V|+1)-traversals-gadget. We create an auxiliary non-terminal vertex x and add an arc (x,uin𝒜). Let x together with 𝒜 be called the auxiliary-gadget. We connect the selection- and auxiliary-gadgets by creating terminal vertices x1,x2, non-terminal vertex x3, and arcs (uout𝒜,x2), (x2,x3), (x3,uin𝒮), (uout𝒮,x1), (x1,x). These two gadgets compose the upper part of G.

Finally, we encode the vertices and edges of G into G=(V,E). For every vertex uV we add vertices zu, cu, and du to V, then we create a cover-zu-gadget denoted u. We add arcs (uout𝒮,xinu), (youtu,cu), (cu,du), (cu,uin𝒮), (uout𝒜,sinu), (toutu,x) to E, and we set the capacity of (cu,du) to c(u). For every arc (u,v) such that {u,v}E, we create a cover-zv-gadget denoted u,v. Then we add arcs (du,xinu,v), (youtu,v,cu), (uout𝒜,sinu,v), (toutu,v,x). Note that in the above we created two gadgets, u,v and v,u, for each {u,v}E. Finally, we set the budget b=132|E|+69|V|+3k+12. This concludes construction of the DWRP instance.

Figure 4: An example of a completely constructed DWRP instance for graph G=({u,v,w},{{u,v}}) and k=2 (capacities omitted). The top half contains the upper part of G. The bottom half corresponds to the vertices and edges of G. Gray boxes hide the inner parts of the corresponding cover-gadgets, see Figure 3. Dotted arrows signify arcs that belong to the auxiliary-gadget or connect cover-gadgets to the auxiliary-gadget. Black and white vertices represent terminals and non-terminals, respectively.

The instances are equivalent.

On a high level, we show that any solution C of the instance (G,W,ω,κ,b) obeying the above budget has a specific behavior. First, the budget is set so that each terminal can be visited at most once. Let SV be a solution of I. The walk C is separated into two stages. In the first stage, for each uS the walk C starts from uin𝒮, goes through 𝒮 to uout𝒮, from there to xinu, using the P path (visiting zu) of the gadget u to youtu and to cu. Then for each vertex v that is dominated by u, it goes from cu to du, uses the P path of gadget u,v to visit zv and return to cu. Crucially, this can be done at most c(u) times. Finally it returns to uin𝒮.

Once all the vertices of S are dealt with in this way the first stage is done, and C proceeds to 𝒜. For each cover-gadget (which are equal in number to the terminals of 𝒜 minus one), the walk C goes from x through 𝒜 to uout𝒜 and then through to cover the “remaining” vertices of (i.e., the vertices that were not visited during the first stage); this is done by employing either the R1 or the R2 path, according to whether was traversed during the first step. We then show that C exists and is of the correct budget if and only if I is a yes-instance of CDS.

The rest of the proof focuses on proving that G has a modulator of size 7|M|+7 to treedepth 86, using that GM has treedepth 2 (it is a disjoint union of stars).

6 Conclusions and Open Problems

We have shown that DWRP is FPT w.r.t. vertex integrity as well as w.r.t. feedback edge set number, while it is W[1]-hard w.r.t. distance to constant treedepth even in unweighted graphs. DTSP is W[1]-hard w.r.t. distance to pathwidth 3, also even in unweighted graphs and we conjecture that the above hardness w.r.t. distance to constant treedepth holds also for this problem. An immediate open problem stemming from our research is to close the gap by considering distances to even smaller constant values of the parameters. Namely, we would like to know whether the problems are FPT w.r.t. feedback vertex set (distance to treewidth 1), distance to disjoint paths (pathwidth 1), or distance to stars (treedepth 2).

We have also shown, that the problems are FPT parameterized by treewidth combined with the number of visits. Given that all the hardness reductions leverage vertices of high degrees, we are wondering whether a combination of treewidth with the maximum degree of the input graph might lead to an fpt-algorithm.

In this paper, we focused on structural parameters of the underlying undirected graph. Nevertheless, there are many width measure actually designated for directed graphs [31] and the tractability w.r.t. them is open. In fact, currently we do not even know whether DTSP is polynomial time solvable or NP-hard on directed graphs that become acyclic (DAGs) after deleting a single vertex or even a single edge.

References

  • [1] Saeed Akhoondian Amiri, Klaus-Tycho Foerster, Riko Jacob, Mahmoud Parham, and Stefan Schmid. Waypoint routing in special networks. In Claudio Casetti, Fernando A. Kuipers, James P. G. Sterbenz, and Burkhard Stiller, editors, 2018 IFIP Networking Conference and Workshops, Networking 2018, pages 496–504. IFIP, 2018. doi:10.23919/IFIPNetworking.2018.8696560.
  • [2] Saeed Akhoondian Amiri, Klaus-Tycho Foerster, Riko Jacob, and Stefan Schmid. Charting the algorithmic complexity of waypoint routing. Comput. Commun. Rev., 48(1):42–48, 2018. doi:10.1145/3211852.3211859.
  • [3] Saeed Akhoondian Amiri, Klaus-Tycho Foerster, and Stefan Schmid. Walking through waypoints. Algorithmica, 82(7):1784–1812, 2020. doi:10.1007/s00453-020-00672-z.
  • [4] Nima Anari and Shayan Oveis Gharan. Effective-resistance-reducing flows, spectrally thin trees, and asymmetric TSP. In Venkatesan Guruswami, editor, IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, pages 20–39. IEEE Computer Society, 2015. doi:10.1109/FOCS.2015.11.
  • [5] David L. Applegate, Robert E. Bixby, Vašek Chvátal, and William J. Cook. The Traveling Salesman Problem: A Computational Study, volume 17 of Princeton Series in Applied Mathematics. Princeton University Press, Princeton, 2011. doi:10.1515/9781400841103.
  • [6] Arash Asadpour, Michel X. Goemans, Aleksander Madry, Shayan Oveis Gharan, and Amin Saberi. An O(log n/log log n)-approximation algorithm for the asymmetric traveling salesman problem. Oper. Res., 65(4):1043–1061, 2017. doi:10.1287/OPRE.2017.1603.
  • [7] Jørgen Bang-Jensen and Gregory Z. Gutin. Digraphs – Theory, Algorithms and Applications, Second Edition. Springer Monographs in Mathematics. Springer, 2009.
  • [8] Lukas Behrendt, Katrin Casel, Tobias Friedrich, J. A. Gregor Lagodzinski, Alexander Löser, and Marcus Wilhelm. From symmetry to asymmetry: Generalizing TSP approximations by parametrization. J. Comput. Syst. Sci., 136:157–170, 2023. doi:10.1016/J.JCSS.2023.03.007.
  • [9] Richard Bellman. Dynamic programming treatment of the travelling salesman problem. Journal of the ACM, 9(1):61–63, 1962. doi:10.1145/321105.321111.
  • [10] Mark de Berg, Kevin Buchin, Bart M. P. Jansen, and Gerhard Woeginger. Fine-grained complexity analysis of two classic TSP variants. ACM Transactions on Algorithms, 17(1):5:1–5:29, 2021. doi:10.1145/3414845.
  • [11] André Berger, László Kozma, Matthias Mnich, and Roland Vincze. Time- and space-optimal algorithm for the many-visits TSP. ACM Trans. Algorithms, 16(3):35:1–35:22, 2020. doi:10.1145/3382038.
  • [12] René van Bevern and Daniel A. Skachkov. A quadratic-order problem kernel for the traveling salesman problem parameterized by the vertex cover number. Operations Research Letters, 52:107065, 2024. doi:10.1016/j.orl.2024.107065.
  • [13] Václav Blažej, Pratibha Choudhary, Dušan Knop, Šimon Schierreich, Ondřej Suchý, and Tomáš Valla. On polynomial kernels for traveling salesperson problem and its generalizations. In Shiri Chechik, Gonzalo Navarro, Eva Rotenberg, and Grzegorz Herman, editors, 30th Annual European Symposium on Algorithms, ESA 2022, volume 244 of LIPIcs, pages 22:1–22:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ESA.2022.22.
  • [14] Václav Blažej, Andreas Emil Feldmann, Foivos Fioravantes, Pawel Rzazewski, and Ondřej Suchý. Parameterized complexity of directed traveling salesman problem. CoRR, abs/2506.22127, 2025. doi:10.48550/arXiv.2506.22127.
  • [15] Hans-Joachim Böckenhauer, Juraj Hromkovic, Joachim Kneis, and Joachim Kupke. The parameterized approximability of TSP with deadlines. Theory Comput. Syst., 41(3):431–444, 2007. doi:10.1007/S00224-007-1347-X.
  • [16] Édouard Bonnet, Yoichi Iwata, Bart M. P. Jansen, and Łukasz Kowalik. Fine-grained complexity of k-OPT in bounded-degree graphs for solving TSP. In Michael A. Bender, Ola Svensson, and Grzegorz Herman, editors, Proceedings of the 27th Annual European Symposium on Algorithms, ESA ’19, volume 144 of Leibniz International Proceedings in Informatics, pages 23:1–23:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2019. doi:10.4230/LIPIcs.ESA.2019.23.
  • [17] Édouard Bonnet, Michael Lampis, and Vangelis Th. Paschos. Time-approximation trade-offs for inapproximable problems. J. Comput. Syst. Sci., 92:171–180, 2018. doi:10.1016/J.JCSS.2017.09.009.
  • [18] Nicos Christofides. Worst-case analysis of a new heuristic for the travelling salesman problem. Operations Research Forum, 3:20, 2022. doi:10.1007/s43069-021-00101-z.
  • [19] W. Cook. In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation. Princeton University Press, 2011. doi:10.1515/9781400839599.
  • [20] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms, 3rd Edition. MIT Press, 2009. URL: http://mitpress.mit.edu/books/introduction-algorithms.
  • [21] Marek Cygan, Fedor V. Fomin, Łukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer International Publishing, Cham, 2015. doi:10.1007/978-3-319-21275-3.
  • [22] Marek Cygan, Łukasz Kowalik, and Arkadiusz Socała. Improving TSP tours using dynamic programming over tree decompositions. ACM Transactions on Algorithms, 15(4):54:1–54:19, 2019. doi:10.1145/3341730.
  • [23] Marek Cygan, Stefan Kratsch, and Jesper Nederlof. Fast hamiltonicity checking via bases of perfect matchings. J. ACM, 65(3):12:1–12:46, 2018. doi:10.1145/3148227.
  • [24] Reinhard Diestel. Graph Theory, 6th Edition, volume 173 of Graduate texts in mathematics. Springer, 2025.
  • [25] Michael Dom, Daniel Lokshtanov, Saket Saurabh, and Yngve Villanger. Capacitated domination and covering: A parameterized perspective. In Martin Grohe and Rolf Niedermeier, editors, Parameterized and Exact Computation, Third International Workshop, IWPEC 2008, volume 5018 of Lecture Notes in Computer Science, pages 78–90. Springer, 2008. doi:10.1007/978-3-540-79723-4_9.
  • [26] Pål Grønås Drange, Markus S. Dregi, and Pim van ’t Hof. On the computational complexity of vertex integrity and component order connectivity. Algorithmica, 76(4):1181–1202, 2016. doi:10.1007/S00453-016-0127-X.
  • [27] Friedrich Eisenbrand, Christoph Hunkenschröder, and Kim-Manuel Klein. Faster algorithms for integer programs with block structure. In Ioannis Chatzigiannakis, Christos Kaklamanis, Dániel Marx, and Donald Sannella, editors, 45th International Colloquium on Automata, Languages, and Programming, ICALP ’18, volume 107 of Leibniz International Proceedings in Informatics, pages 49:1–49:13. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2018. doi:10.4230/LIPIcs.ICALP.2018.49.
  • [28] Friedrich Eisenbrand, Christoph Hunkenschröder, Kim-Manuel Klein, Martin Koutecký, Asaf Levin, and Shmuel Onn. An algorithmic theory of integer programming. CoRR, abs/1904.01361, 2019. arXiv:1904.01361.
  • [29] Michael R Fellows and Sam Stueckle. The immersion order, forbidden subgraphs and the complexity of network integrity. J. Combin. Math. Combin. Comput, 6(1):23–32, 1989.
  • [30] Fedor V. Fomin, Petr A. Golovach, Daniel Lokshtanov, Saket Saurabh, and Meirav Zehavi. Clique-width III: Hamiltonian cycle and the odd case of graph coloring. ACM Trans. Algorithms, 15(1), 2018. doi:10.1145/3280824.
  • [31] Robert Ganian, Petr Hlinený, Joachim Kneis, Daniel Meister, Jan Obdrzálek, Peter Rossmanith, and Somnath Sikdar. Are there any good digraph width measures? J. Comb. Theory B, 116:250–286, 2016. doi:10.1016/J.JCTB.2015.09.001.
  • [32] M. R. Garey, David S. Johnson, and Robert Endre Tarjan. The planar hamiltonian circuit problem is NP-complete. SIAM J. Comput., 5(4):704–714, 1976. doi:10.1137/0205049.
  • [33] Shayan Oveis Gharan, Amin Saberi, and Mohit Singh. A randomized rounding approach to the traveling salesman problem. In Rafail Ostrovsky, editor, Proceedings of the 52nd IEEE Annual Symposium on Foundations of Computer Science, FOCS ’11, pages 550–559. IEEE Computer Society, 2011. doi:10.1109/FOCS.2011.80.
  • [34] Jiong Guo, Sepp Hartung, Rolf Niedermeier, and Ondřej Suchý. The parameterized complexity of local search for TSP, more refined. Algorithmica, 67(1):89–110, 2013. doi:10.1007/s00453-012-9685-8.
  • [35] Gregory Gutin and Abraham P. Punnen, editors. The Traveling Salesman Problem and Its Variations. Springer, 2007. doi:10.1007/b101971.
  • [36] Michael Held and Richard M. Karp. A dynamic programming approach to sequencing problems. Journal of the Society for Industrial and Applied Mathematics, 10(1):196–210, 1962. doi:10.1137/0110015.
  • [37] Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-SAT. Journal of Computer and System Sciences, 62(2):367–375, 2001. doi:10.1006/jcss.2000.1727.
  • [38] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4):512–530, 2001. doi:10.1006/JCSS.2001.1774.
  • [39] Marek Karpinski, Michael Lampis, and Richard Schmied. New inapproximability bounds for TSP. J. Comput. Syst. Sci., 81(8):1665–1677, 2015. doi:10.1016/J.JCSS.2015.06.003.
  • [40] Philip N. Klein and Dániel Marx. A subexponential parameterized algorithm for subset TSP on planar graphs. In Chandra Chekuri, editor, Proceedings of the 2014 Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’14, pages 1812–1830. SIAM, 2014. doi:10.1137/1.9781611973402.131.
  • [41] Martin Koutecký, Asaf Levin, and Shmuel Onn. A parameterized strongly polynomial algorithm for block structured integer programs. In Ioannis Chatzigiannakis, Christos Kaklamanis, Dániel Marx, and Donald Sannella, editors, 45th International Colloquium on Automata, Languages, and Programming, ICALP ’18, volume 107 of Leibniz International Proceedings in Informatics, pages 85:1–85:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2018. doi:10.4230/LIPIcs.ICALP.2018.85.
  • [42] Lukasz Kowalik, Shaohua Li, Wojciech Nadara, Marcin Smulewicz, and Magnus Wahlström. Many-visits TSP revisited. J. Comput. Syst. Sci., 124:112–128, 2022. doi:10.1016/J.JCSS.2021.09.007.
  • [43] Michael Lampis. Algorithmic meta-theorems for restrictions of treewidth. Algorithmica, 64(1):19–37, 2012. doi:10.1007/S00453-011-9554-X.
  • [44] Giuseppe Lancia and Marcello Dalpasso. Algorithmic strategies for a fast exploration of the TSP 4-opt neighborhood. J. Heuristics, 30(3-4):109–144, 2024. doi:10.1007/S10732-023-09523-W.
  • [45] Isja Mannens, Jesper Nederlof, Céline M. F. Swennenhuis, and Krisztina Szilágyi. On the parameterized complexity of the connected flow and many visits TSP problem. In Lukasz Kowalik, Michal Pilipczuk, and Pawel Rzazewski, editors, Graph-Theoretic Concepts in Computer Science - 47th International Workshop, WG 2021, volume 12911 of Lecture Notes in Computer Science, pages 52–79. Springer, 2021. doi:10.1007/978-3-030-86838-3_5.
  • [46] Dániel Marx. Searching the k-change neighborhood for TSP is W[1]-hard. Operations Research Letters, 36(1):31–36, 2008. doi:10.1016/j.orl.2007.02.008.
  • [47] Dániel Marx, Marcin Pilipczuk, and Michal Pilipczuk. A subexponential parameterized algorithm for directed subset traveling salesman problem on planar graphs. SIAM J. Comput., 51(2):254–289, 2022. doi:10.1137/19M1304088.
  • [48] Dániel Marx, Ario Salmasi, and Anastasios Sidiropoulos. Constant-factor approximations for asymmetric TSP on nearly-embeddable graphs. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2016, volume 60 of LIPIcs, pages 16:1–16:54. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016. doi:10.4230/LIPICS.APPROX-RANDOM.2016.16.
  • [49] Tobias Mömke and Ola Svensson. Removing and adding edges for the traveling salesman problem. Journal of the ACM, 63(1):2:1–2:28, 2016. doi:10.1145/2739008.
  • [50] Marcin Mucha. 13/9-approximation for graphic TSP. Theory of Computing Systems, 55:640–657, 2014. doi:10.1007/s00224-012-9439-7.
  • [51] Šimon Schierreich and Ondřej Suchý. Waypoint routing on bounded treewidth graphs. Information Processing Letters, 173:106165, 2022. doi:10.1016/j.ipl.2021.106165.
  • [52] András Sebö and Jens Vygen. Shorter tours by nicer ears: 7/5-approximation for the graph-TSP, 3/2 for the path version, and 4/3 for two-edge-connected subgraphs. Combinatorica, 34(5):597–629, 2014. doi:10.1007/s00493-014-2960-3.
  • [53] D.B. Shmoys, J.K. Lenstra, A.H.G. Rinnooy Kan, and E.L. Lawler. The Traveling Salesman Problem, volume 12 of Wiley Series in Discrete Mathematics & Optimization. John Wiley & Sons, Incorporated, 1985. URL: https://www.wiley.com/en-ie/The+Traveling+Salesman+Problem%3A+A+Guided+Tour+of+Combinatorial+Optimization-p-9780471904137.
  • [54] Ola Svensson. Approximating ATSP by relaxing connectivity. In Venkatesan Guruswami, editor, IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, pages 1–19. IEEE Computer Society, 2015. doi:10.1109/FOCS.2015.10.
  • [55] Ola Svensson, Jakub Tarnawski, and László A. Végh. A constant-factor approximation algorithm for the asymmetric traveling salesman problem. J. ACM, 67(6):37:1–37:53, 2020. doi:10.1145/3424306.
  • [56] Vera Traub and Jens Vygen. An improved approximation algorithm for the asymmetric traveling salesman problem. SIAM J. Comput., 51(1):139–173, 2022. doi:10.1137/20M1339313.