Parameterized Algorithms for the Drone Delivery Problem
Abstract
Timely delivery and optimal routing remain fundamental challenges in the modern logistics industry. Building on prior work that considers single-package delivery across networks using multiple types of collaborative agents with restricted movement areas (e.g., drones or trucks), we examine the complexity of the problem under structural and operational constraints. Our focus is on minimizing total delivery time by coordinating agents that differ in speed and movement range across a graph. This problem formulation aligns with the recently proposed Drone Delivery Problem with respect to delivery time (DDT), introduced by Erlebach et al. [ISAAC 2022].
We first resolve an open question posed by Erlebach et al. [ISAAC 2022] by showing that even when the delivery network is a path graph, DDT admits no polynomial-time approximation within any polynomially encodable factor , unless P=NP. Additionally, we identify the intersection graph of the agents, where nodes represent agents and edges indicate an overlap of the movement areas of two agents, as an important structural concept. For path graphs, we show that DDT becomes tractable when parameterized by the treewidth of the intersection graph, and we present an exact FPT algorithm with running time , for some computable function . For general graphs, we give an FPT algorithm with running time , where is the maximum degree of the intersection graph. In the special case where the intersection graph is a tree, we provide a simple polynomial-time algorithm.
Keywords and phrases:
Complexity, Delivery, FPT algorithms, Graph TheoryCopyright and License:
2012 ACM Subject Classification:
Theory of computation Fixed parameter tractability ; Theory of computation Graph algorithms analysisEditors:
Ho-Lin Chen, Wing-Kai Hon, and Meng-Tsung TsaiSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Drone-based package delivery has the potential to transform the last-mile segment. Recent studies foretell that utilizing unmanned aerial vehicles (i.e., drones) can have a great sustainability impact while meeting increasing demands of customers [13, 17]. Additionally, it is observed that in the U.S. approximately 10–15% of package deliveries are delayed due to increasing loads [7]. According to ElSayed et al. [10], recent surveys indicate that a vast majority of people prefer a same-day delivery, which proves challenging for the logistics industry. Consequently, large companies focus more and more on developing suitable logistics models incorporating drones. Apart from monetary benefits, the utilization of drones can be very helpful in supplying medicine or food in areas struck by war or natural disasters [2].
In this work, we study a cooperative delivery setting recently introduced by Erlebach et al. [11] in which drones can hand over packages and work together to achieve the best possible delivery schedule. Each agent operates within a restricted movement area on the graph and is assumed to have unlimited battery capacity. In general, this model is inspired by real-world constraints such as restricted air spaces or environmental circumstances. Restricted movement areas also capture settings with different kinds of agents, not necessarily only drones – different types of agents might be eligible to traverse certain parts of a graph while others might not. Package handover between drones is already implemented in industry; companies such as IBM have developed and patented parcel transfer methods since 2017 [21].
Our focus is on minimizing total delivery time, a problem referred to as the Drone Delivery Problem with respect to time (DDT) [11, 3]. We study general graphs as well as the special case of path graphs. For path graphs, we first establish a hardness result, followed by the first fixed-parameter tractable algorithms for the path as well as the general settings. For some parameter , an algorithm is fixed-parameter tractable (FPT) if it runs in time , where is a computable function; such algorithms are efficient for small parameters and useful for fine-grained complexity analysis. We analyze the complexity of DDT using the intersection graph of the agents, where nodes represent agents and edges indicate overlapping movement areas. The treewidth and maximum degree of this graph serve as natural parameters for characterizing instance complexity – especially since DDT is already NP-hard on path graphs. These parameters reflect the extent of agent overlap and potential interference, and are likely to be small in practical settings.
Related Work.
For the most part, research regarding collaborative drone delivery focuses on two main objectives: minimizing fuel consumption and minimizing delivery time. In this work, we focus exclusively on the latter. Research on minimizing total consumption differs fundamentally from our analysis, since in our setting there are no battery constraints; therefore, the results do not translate. For work on minimizing fuel consumption, we refer to [5, 11]. Regarding delivery time, Bärtschi et al. [4] and Carvalho et al. [8] show that the problem of delivering a single package can be solved in polynomial time if the agents are free to move without restrictions – even with predetermined starting positions. However, Carvalho et al. [8] also prove that the problem becomes NP-hard if there are at least two packages involved. For the case of restricted movement areas, Erlebach et al. [11] prove that it is NP-hard to approximate DDT within a factor of , even if agents have equal speeds and fixed starting positions. Here, denotes the number of vertices in the graph and the number of agents. In the problem variant in which the starting positions are not given but can be chosen by the algorithm, they show that no polynomial-time approximation algorithm with any finite approximation ratio exists, unless P=NP. They also show that DDT with fixed starting positions remains NP-hard on path graphs if agents can have arbitrary speeds.
Bartlmae et al. [3] recently refined these results, showing that the problem on a path is still NP-hard if only two different speeds are allowed. This closes the gap regarding speeds as these instances can be solved trivially for only one speed. Additionally, they show that for the special case of unit grid graphs and only two different speeds, the problem remains NP-hard for fixed starting positions and is hard to approximate within a factor of for selectable starting positions, as well as agents constrained to movement areas forming rectangles. They also provide a simple -approximation algorithm for this setting. Complementing these hardness results, Luo et al. [16] demonstrated that on a path with fixed starting positions and exactly two speeds the problem can be solved in polynomial time; the complexity for three or more speeds, however, remains open.
Our Results.
In Section 3.1, we provide a hardness result for DDT on path graphs with selectable starting positions, closing open questions posed by Erlebach et al. [11], Bartlmae et al. [3] and Luo et al. [16].
Theorem 1.
DDT on a path with selectable starting positions is -APX-hard for any function that can be computed in polynomial time.
We then present the first FPT algorithm for this setting in Section 3.2, parameterized by the treewidth of the agents’ intersection graph.
Theorem 2.
DDT on a path with selectable starting positions can be solved in time , where w denotes the treewidth of the intersection graph.
In Section 4, we consider the more complex case of general graphs. We design an FPT algorithm whose running time depends on the treewidth and maximum degree of the intersection graph.
Theorem 3.
DDT with selectable starting positions can be solved in time on general graphs, where w denotes the treewidth and denotes the maximum degree of the intersection graph and is a function in w and .
For the special case where the intersection graph is a tree, we show in Section 4.3 that DDT can be solved in polynomial time. This result is not implied by the previous theorems; it allows for arbitrary maximum degree in the intersection graph.
Theorem 4.
DDT on a general graph with selectable starting positions can be solved in time if the underlying graph of the intersection graph is a tree.
2 Preliminaries
In this section, we formally define the Drone Delivery Problem with respect to time (DDT).
Setting.
We define an instance of DDT as a tuple , where with , is an undirected graph with edge lengths . The package starting position, as well as its destination, are given by , where and . The set represents all agents, with . There are two settings regarding agents which are typically considered for DDT:
-
1.
DDT with selectable positions (DDT-SP): Each agent is defined as a tuple , where is the agent’s speed and is a connected subgraph of representing the agent’s movement area. The initial starting position of can be chosen freely once before delivery is initiated.
-
2.
DDT with fixed positions (DDT-FP): Each agent is a tuple , with and defined as above, and the additional parameter specifies the fixed initial starting position of the agent.
An agent traverses an edge in time , regardless of whether it is carrying the package or not. Whenever two agents meet at the same vertex, they can hand over the package instantaneously. We define the travel time of agent between two vertices as the length of the shortest path in divided by and denote it by . If either or is not contained in , we define . For any pair of vertices and any possible agent the values can be precomputed in polynomial time.
We specify a feasible solution to be a schedule of consecutive trips by agents delivering the package from to . More precisely we want the schedule to consist of two components: A complete edge-by-edge trip of every agent and a complete edge-by-edge trip for the package specifying the current package carrier at any point in time. For the first part we want for every agent a set of sorted triples . Every triple indicates that agent moves over edge starting at time . It has to hold that and that for two consecutive triples and that and . Moreover, for DDT-SP we need to provide the starting position for every agent and for DDT-FP we need to have for the first triple that . The trip of the package is defined as a sorted set of tuples of the form , indicating that agent carries the package over edge starting at time . A schedule is feasible only if, for every tuple , it holds that . Again for two consecutive tuples and we also require and . Additionally, the first tuple must satisfy , and the last tuple must satisfy . The total delivery time is defined as , assuming is the final tuple in the schedule.
An instance of DDT-SP is illustrated in Figure 1(a). Throughout this paper we will focus exclusively on DDT-SP.
Useful Properties.
There are several useful properties regarding DDT. Erlebach et al. [11] demonstrated that there exists an optimal schedule in which every involved agent picks up and drops off the package exactly once. The key insight is that instead of using an agent multiple times we let that agent carry the package until its final drop-off without increasing the delivery time.
Another important observation relates to trips made by agents:
Observation 5.
In DDT-SP there exists an optimal schedule such that all involved agents move if and only if they carry the package.
Placing agents initially at the first vertex of their respective trip immediately leads to this observation. Unless stated otherwise, this implicit initial positioning is assumed.
Intersection Graph.
A useful structural concept is the intersection graph of the agents. We define the intersection (multi)graph of a DDT instance as follows:
-
The vertex set is the set of agents .
-
For any two agents with corresponding vertex sets and in , we add parallel edges between and in – one for each vertex they share in .
Formally, the edge set is defined as the multiset
Throughout this paper, we treat as a multiset and omit explicit edge indices where they are not relevant. Intuitively, a feasible schedule corresponds to a path in the intersection graph that starts with an agent intersecting and ends with an agent intersecting . If we assume each agent is used at most once, this path will be simple. Figure 1(b) illustrates the intersection graph for a given instance. We denote by the maximum degree of the intersection graph . When it is clear from the context, we will write instead of .
For any vertex , we define as the set of agents that cover , i.e., .
Tree Decomposition.
For computing the optimal traversal of the agents, we will use the concept of a tree decomposition. A tree decomposition is used as a measure of how similar a given graph is to a tree and was first introduced by Robertson and Seymour [18]. Computing the optimal treewidth is NP-hard [1], but finding the optimal tree decomposition is fixed-parameter tractable if parameterized by treewidth [6].
Definition 6 (Tree Decomposition).
A tree decomposition of a graph is a pair where is a tree with root and every node is associated with a set of the vertices , called bag. Additionally, the following three conditions must be fulfilled:
-
, i.e., every vertex appears in at least one bag,
-
for every edge there must exist a bag such that the vertices and are contained in this bag,
-
the set of nodes forms a connected subtree of for every choice .
The width of a tree decomposition is the size of its largest bag minus one. The treewidth of a graph is the minimum width over all possible tree decompositions of , denoted by w. To simplify the algorithm design, we assume the decomposition has a specific structure known as a nice tree decomposition: a binary tree with root and leaves such that and for all , containing only three types of nodes:
-
Introduce node: For two nodes where has exactly one child , is an introduce node iff for some .
-
Forget node: For two nodes where has exactly one child , is a forget node iff for some .
-
Join node: For three nodes where has exactly two children and , is a join node iff .
As in [9] we additionally assume that the edges are also introduced like the vertices in their respective type of node:
-
Introduce edge node: For every edge there is exactly one introduce edge node with for its only child bag and .
We assume that for every edge the corresponding introduce edge node appears directly before either or is forgotten in an ancestor node.
Using all node types, we define and as the set of vertices and edges that are either contained or introduced in bag or were introduced in some child of . Additionally, we define as the subgraph revealed up to node . As a consequence for the construction of the introduce edge nodes, for every join node there are no edges with both endpoints in , i.e. .
Based on a tree decomposition of width w for some graph , we can always compute a nice tree decomposition (with or without introduce edge nodes) of width w with nodes in polynomial time [9].
3 Drone Delivery on Path Graphs
We consider DDT-SP instances where the underlying graph is a path: a sequence of vertices connected in a line, with degree two at each internal vertex and degree one at the two endpoints. For an agent , we denote its movement area by , where and are the leftmost and rightmost vertices that can access. This setting can also be interpreted as agents moving along a one-dimensional line, with each movement area corresponding to an interval on that line, as illustrated in Figure 2. This allows us to interpret DDT-SP on a path as an instance of the subinterval covering problem introduced by Luo et al. [16], where the objective is to select, for each agent’s interval, a subinterval such that the union covers , while minimizing the total cost defined by the length of each selected subinterval divided by the agent’s speed.
For the setting with fixed initial positions, NP-hardness has been proven [3, 11], although strong NP-hardness remains unresolved. In contrast, for the setting with selectable positions – which is the primary focus of this paper – Luo et al. [16] presented a polynomial time algorithm for the case of exactly two speeds; for three or more speeds, however, no results were known prior to our work.
Before presenting parameterized algorithms for DDT on path graphs, we first establish hardness results for this setting, which motivates the relevance and necessity of parameterized approaches.
3.1 Inapproximability
Instead of merely proving NP-hardness, we establish a much stronger result: no polynomial-time algorithm with any polynomially encodable approximation ratio exists, unless P=NP. See 1 In the following we only present a high-level overview, the complete proof can be found in the full version of the paper. To prove the inapproximability, we reduce from the PartitionInto- problem.
Definition 7 (PartitionInto-).
Given a set of natural numbers and an integer , the task is to decide whether the index set can be partitioned into disjoint subsets such that .
Note that in this subsection refers to the number of subsets (and not the agent set). The NP-hardness of PartitionInto- follows immediately from the hardness of Partition with ; however for the proof of Theorem 1 we require the stronger result that PartitionInto- is also NP-hard in the strong sense, which is included in the full version.
Theorem 8.
PartitionInto- is NP-hard in the strong sense (even with distinct integers).
This is done by a straightforward reduction from 3-Partition, which was originally shown to be strongly NP-hard by Garey and Johnson [12] and for distinct integers by Hullet et al. [14]. It is particularly important that is part of the input; for a fixed , the problem admits an FPTAS, as shown by Sahni [20].
To show that no approximation algorithm with a polynomially encodable approximation ratio can exist (unless P=NP), we demonstrate that such an algorithm could be used to solve PartitionInto- in polynomial time. We do so by constructing a DDT instance from a given PartitionInto- instance such that:
is a “yes”-instance of PartitionInto- if and only if , where is the delivery time of the schedule produced by for the instance and the value is determined by the construction.
Let be an arbitrary PartitionInto- instance with distinct integers. We assume that the numbers are sorted in decreasing order, i.e., . We denote the total sum of all elements by .
For each object we create drones – one for each partition set. We refer to these drones as element agents and denote them by , where is associated with object and partition set . The speed of a drone is denoted by , meaning that all drones associated with the same partition set (i.e., with the same index ) share the same speed. We place several gadgets along the line and aim to ensure that each element agent can only be placed and transport the package at specific designated positions and not at arbitrary locations along the path. To achieve this, we employ two key mechanisms: first, we restrict the movement areas of the agents such that they are clearly unable to assist outside their interval. Second, we choose the ratios between the speeds to be sufficiently large, allowing us to define long intervals that certain agents cannot traverse in their entirety without exceeding the time bound .
For each of the partition sets, we create a partition gadget, that enforces that the sum of the weights associated with the element agents placed at that gadget is at least . Placing an element agent at a partition gadget can thus be interpreted as assigning to the corresponding partition set.
Additionally, for each object we construct a gadget – called an object gadget – that ensures each object is assigned to at most one partition set. This is done by requiring that exactly of the agents must be present at the object gadget, resulting in at most one of them being placed at a partition gadget. As a result, we can ensure that each partition gadget ends up with a total weight of exactly , if such a partition exists. If not, the construction forces a very large delivery time, causing the bound to be exceeded.
An example layout of the gadgets, ordered as , is shown in Figure 3. Consecutive gadgets are placed sufficiently far apart so that only specially designated fast transition agents can traverse the gaps, ensuring that each element agent can contribute to at most one gadget.
3.2 A Parameterized Algorithm
We now design an FPT algorithm for DDT-SP on path graphs. As a parameter for our approach, we use the maximum overlap – the thickness , i.e., the largest number of agents covering any single vertex.
Since each agent corresponds to an interval on the line, the intersection graph of agents is an interval graph. In such graphs, agents covering a common point form a clique, and each maximal clique corresponds to some point on the line [15]. As interval graphs are chordal, their treewidth equals the size of the largest clique minus one [19], which in our case implies . Thus, the treewidth of the intersection graph and the thickness parameter are equivalent. This structural property allows for a dynamic programming algorithm over a tree decomposition of the intersection graph. We define the event points as the start and end positions of all agent intervals, i.e., the multiset . We sort these events from left to right along the path (), resolving ties by placing start points before end points; the order among start points or among end points is chosen arbitrarily. In an optimal schedule, handovers occur only at these event points – specifically at or for a handover from to – since otherwise extending the faster agent’s segment would yield a strictly better or equally good schedule.
We interpret each event as a node in a tree decomposition that forms a path, see Fig. 2. We can consider the set of agents covering , as the bag at position . If is the start vertex of some agent , we say that is introduced to the bag, and if is the end point of some agent , it is forgotten. We define a dynamic program over the path decomposition induced by this event sequence. At each , we maintain:
-
the bag of agents covering ,
-
a subset of agents already used,
-
a current carrier responsible for transporting the package from to .
Since at most agents cover any point, we have , and the number of subsets (representing already-used agents) is bounded by . The dynamic programming table stores the minimum delivery time to reach under the assumption that agent will deliver it to and the current set of already used agents is , denoted by . We assume no agent starts at or ends at , as those movement intervals can be cut off without affecting the solution. Furthermore, at most one handover occurs per event point, and it happens only if or , as argued before. While we only store delivery times in the DP table, the full delivery sequence can be reconstructed via backtracking.
In the following we always assume for some DP entry that , otherwise the entry is defined as . Assume we have already computed all possible entries correctly, and now wish to compute .
The formal correctness of the following lemmas appears in the full version of the paper.
Introduce Event.
For an introduce event , it is the start point of an agent , so is now newly contained in . We differentiate between being included into , which corresponds to the package being handed over to and the case where is omitted (for now). Note that when enters it will also be the dedicated package carrier.
Lemma 9.
Let be an introduce event that introduces some agent . Assume that for all valid combinations the solutions have been computed correctly, then we correctly compute in time .
Forget Event.
For a forget event , an end point for some agent was reached, thus is removed from . We consider all possibilities for how could have been involved in an optimal delivery: Either delivered the package to and now hands it over to a different agent , or was involved in the optimal delivery but did not carry the package to , or never held the package at any point. Out of all of these options we again take the solution variant with the smallest cost.
Lemma 10.
Let be a forget event that forgets some agent . Assume that for all valid combinations the solutions have been computed correctly, then we correctly compute in time .
Theorem 2. [Restated, see original statement.]
DDT on a path with selectable starting positions can be solved in time , where w denotes the treewidth of the intersection graph.
Proof.
The correctness follows from the correctness of the different types of events and that the optimal solution must be stored in some entry for some final end point event . Since for every type of event we have runtime at most and the set of instances at an event point is upper bounded by and event points exist, we get a final runtime of .
4 Fixed-Parameter Tractability on General Graphs
Before designing an FPT algorithm on general graphs, we argue that, w.l.o.g., the intersection graph can be assumed to be simple – i.e., agents intersect at most once. Any instance can be transformed accordingly, increasing degree and treewidth by only a constant.
4.1 Unique Intersections between Agents
Given any DDT instance , we now create an instance that has equivalent schedules, but its intersection graph is simple and therefore any pair of agents overlap in at most one vertex. Each agent originally moves on a (possibly overlapping) subgraph of . To guarantee that no pair of agents share multiple vertices, we create a disjoint copy of every and relabel each vertex as . The original agents are then confined to their respective copies . Whenever two subgraphs and share a vertex in , the transformed graph now contains two distinct copies, i.e., and . We connect these copies of the same vertex by edges (of length 0) and introduce a dedicated auxiliary agent with speed and movement area restricted to the newly added edges of length 0 between the copies. Thus, the package can be transferred instantly between any two copies of the same original vertex, while original agents share no common vertex. The resulting instance preserves all feasible schedules with the same delivery time as the original one but it also satisfies the new constraint that any pair of agents shares at most one vertex, as any pair of original agents does not share a common vertex in , neither does any pair of helping agents , and agents and may only intersect in . In the full version of the paper, we formally define such a transformation and prove the following lemma.
Lemma 11.
For any DDT instance , there exists an equivalent instance , where , and is simple.
4.2 Tree Decomposition Algorithm for Unique Intersections
Let be a drone delivery instance in which each pair of agents intersects in at most one vertex. For an agent , we define . Let be a function that returns for two agents their unique intersection point if it exists and otherwise. Let be the intersection graph, and assume we have a nice tree decomposition of of width w and maximum degree .
We now design a dynamic program over that is parameterized by w and and computes the optimal agent tour. The algorithm is inspired by standard treewidth-based DP techniques for TSP111See e.g. http://www.cs.bme.hu/~dmarx/papers/marx-warsaw-fpt2, page 17.. For each node , we process the subgraph .
A delivery tour can be modeled as an ordered sequence of agents. Each contiguous subsequence induces a valid subpath in , if the corresponding edges for all , and . Intermediate agents with incur cost .
However, to determine the cost of agents we require knowledge about the corresponding unknown preceding and succeeding agents to determine entry and exit points. Thus, the DP state additionally stores for the boundary agents in their assumed predecessor and successor. This allows consistent cost computation when merging subpaths at join nodes.
We slightly modify the input instance to streamline boundary cases: we add two artificial agents and , each covering only vertex and respectively, and having zero speed. The unique intersection property extends naturally to these agents. We now additionally require any valid delivery tour to start with and end with . Both agents are required to be always contained in any bag, increasing the treewidth by exactly 2. Note that the actual delivery can still start at , since can immediately hand over the package at no cost.
To simplify boundary handling, we also introduce auxiliary agents and , each identical to and , but always assumed to lie outside the tree decomposition (i.e., they are never contained in any bag). A delivery tour will now implicitly require the tour to start with and end with . Together, this guarantees that for each boundary agent, which always includes and , its predecessor and successor are explicitly known, enabling us to compute exact cost for partial solutions.
Each DP state represents the optimal forest of paths in subgraph that connects agents according to the following:
-
for contains all agents with degree exactly
-
encodes directed pairwise path endpoints as a matching
-
and assign known predecessor/successor agents to agents in :
-
–
maps to a neighbor agent s.t. the corresponding edge is not contained in
-
–
maps to the neighbor s.t. the corresponding edge is contained in
-
–
Each path in a feasible forest must satisfy the following conditions:
-
The endpoints of lie in and every agent has degree in
-
For every pair , there must be a path in with both of these as endpoints
The cost of a forest is then evaluated using the previously mentioned reasoning of computing the cost of every individual agent measured by its two neighboring agents in the corresponding sequence. For convenience we will sometimes represent functions as set of tuples, i.e. .
For the root node the DP entry captures the optimal path from to , if correctly encodes the adjacent agents to and in an optimal sequence. By iterating over all valid candidates for the neighbors and we determine the optimal solution.
To compute the delivery cost of a sequence of agents, we use the predecessor/successor assignment . For an agent of degree 1 we write to denote the predecessor (if is the start of a path) or successor (if is the end), and its other adjacent agent by and the partner of in the matching by . We will refer to as the predecessor/successor partner (or psp for short) and to as the next/previous interior partner (or npip).
For a feasible forest , each component corresponds to a path of agents starting and ending at agents in . Using , we extend each such path to the sequence , where and . These agents define the handover points at the start and end of the path that involves agents and , which is necessary to compute the full cost contribution of each agent.
The cost of the extended sequence is given by Setting the predecessor of as and the successor of as ensures sequences starting at or ending at are correctly computed as well. In this case we will incur an additional cost of 0, since these agents must immediately handover the package at their respective vertex.
The total cost of the solution is the sum over all component sequences, i.e., . In the following we write for the extended sequence . Finally, for any solution and node we define and say that induces the instance if
-
each has degree in ,
-
each pair is connected by a path in with as their psp agents, and
-
for each npip agent on a path, the adjacent agent corresponds to .
For an example instance and corresponding agent degrees, see Figure 4. In the following arguments we will for simplicity assume that any DP entry contains the actual forest. If each DP entry only contains its cost one can, by simple recursive pointer-logic, compute the optimal solution in the end recursively. Therefore, we will argue correctness of each entry by considering the actual forest, but derive the computational runtime as if only the cost is saved in every DP entry.
The following lemma shows that indeed it is enough to prove correctness for every subinstance in the DP to derive the optimal solution. The proof is provided in the full version of the paper.
Lemma 12.
For every node and optimal tour that starts with agent and ends with , the partial solution is optimal for the induced instance.
We now describe how to handle the different node types in the dynamic program. We will assume that the instance to solve corresponds to a valid specification, otherwise we assign it cost . The proof of correctness for the different node types can be found in the full paper.
Leaf node: At a leaf node , only are present and no edges exist. The only valid forest is the empty one with cost 0, so we set .
Introduce node: Let be an introduce node with child and . Since has no incident edges at this point, it must have degree 0 in any valid solution, i.e., . Therefore does not influence any solution derived for and we set .
Lemma 13.
Let node introduce an agent , and let be its child. Assume that for all valid combinations the sets have been computed, then we correctly compute in time .
Forget node: Let be a forget node with child and . Since and , it must have degree either or in any feasible solution, depending on whether was used in the respective optimal solution. Therefore, we check both corresponding entries at the child node and choose the one with minimum cost.
Lemma 14.
Let node remove some vertex , and let be its child. Assume that for all valid combinations, the sets have been computed, then we correctly compute in time .
Introduce edge node: Let be an introduce-edge node with child and let be the newly introduced edge. If is not used in the optimal solution, we reuse the solution from . Otherwise, we consider the instance where the degrees of and are decreased by 1 and consider all valid choices for their next potential npip agent via . Additionally, we update accordingly to reflect all possible new pairings that are possible for solutions containing .
Lemma 15.
Let node introduce an edge , and let be its child. Assume that for all valid combinations, the sets have been computed, then we correctly compute in time .
Join node: Let be a join node with children and . To compute an optimal solution, we combine compatible solutions from both children while ensuring degrees, matching, psp agents and npip agents correctly align, and take the solution with minimal cost.
Lemma 16.
If node is a join node with two children and we correctly computed all solutions for all child instances for nodes and , then we correctly compute in time .
Using these lemmata, we establish the final theorem, with the complete proof included in the full version of this work. See 3
4.3 A Polynomial-Time Algorithm for Intersection Trees
We now briefly describe an exact algorithm for computing optimal schedules when the intersection graph of the underlying graph forms a tree. While this may seem similar to the setting previously considered, it does not follow directly, as the treewidth may be constant, but the vertex degrees can be unbounded.
We first show how to compute an optimal solution for any instance, given a fixed order of agents in the optimal schedule.
For this, we build a layered directed graph whose layers represent successive handovers:
-
Layer : single vertex representing the source .
-
Layer : one vertex for every intersection point of the movement areas of and (for the region of is the sink region containing ).
-
Layer : single vertex for the destination .
Edges connect every vertex in layer to every vertex in layer ; the weight equals the travel time of agent between these two points. Thus each – path in selects exactly one handover point per layer and has length equal to the total delivery time for that sequence of drones. Conversely, any schedule that uses these agents in this particular order defines such a path. Hence, the shortest path in yields the optimal schedule for the given order, which can easily be computed.
Lemma 17.
Given any ordered sequence of agents , we can compute the optimal route to deliver the package from to using the agents in this order in .
Proof.
We construct a directed weighted delivery graph , . The vertex set consists of layers. In layer we have a vertex , in layer we have a vertex and in layer we have all intersection points between agent and , i.e., . In the following, we refer to these vertices as . We connect with every vertex for and set its weight as . This connection represents the case that agent transports the package from to agent via some intersection point . Similarly, we connect a vertex , in layer with a vertex , , if there exists a path in that connects with . For each such edge we again set its weight to the time it takes to get from the first intersection point to the next using agent , i.e., we set the weight of the edge as . At last, we set the connections from the second last layer to in the same manner, i.e., we set its weight to , where .
We want to argue, that the shortest path in this graph has to correspond to an optimal delivery tour of the agents in the specified order. Let be the optimal tour and be the set of vertices at which an exchange of the package happens, including and . We can see that for each section , the delivery happens using agent to agent . Since the delivery points are specified by , we can upper bound the optimal travel time of for this section by . At last, for the final section , the delivery time of agent is upper bounded by .
We can see that the optimal path is always a feasible shortest path solution in graph , and since its cost is at most the cost of the optimal solution we know that the cost of the shortest path tour will be at most the shortest delivery time in the original instance when using the agents in the specified order. On the other hand, every feasible path in our graph corresponds to a unique tour using the same set of agents in the same order and exchanging the package at vertices . If one such tour would have delivery time strictly less than , this would contradict its optimality assumption, since the vertices on the shortest path also define a feasible drone delivery routing that delivers the package from to using the same set of agents in the given order. Therefore it follows, that the shortest path gives us the optimal delivery tour.
Our graph consists of at most vertices and at most edges. Using Dijkstra’s algorithm with lists, which has runtime , we get a final runtime of . One could use this property to calculate the optimal schedule for general graphs in time . It also allows us to solve DDT-SP efficiently, if the underlying simple graph of the intersection graph is a tree, in time . We conclude by proving Theorem 4.
Theorem 4. [Restated, see original statement.]
DDT on a general graph with selectable starting positions can be solved in time if the underlying graph of the intersection graph is a tree.
Proof.
Any delivery schedule corresponds to a path in the intersection graph. If this graph is a tree, there always exists a unique simple path between any two agents in . Given the first and last agents used in an optimal schedule, the order of all participating drones can be determined by this path, as each agent appears at most once. Using this order and Lemma 17, we can efficiently compute the delivery schedule. To identify the first and last agents, we consider all valid combinations of agents that can pick up the package at and drop it off at . Since each vertex in the graph belongs to at most two agents – otherwise, a clique of size at least three would be present in , contradicting the tree property – there are at most four such combinations. Simply enumerating all four candidate pairs and evaluating each leads to an overall runtime of .
5 Concluding Remarks and Future Work
We first proved that the Drone Delivery Problem with selectable starting positions (DDT-SP) is –APX-hard even on path graphs, thereby resolving an open question posed by Erlebach et al. and Bartlmae et al. [11, 3]. On the algorithmic side, we showed that DDT-SP on a path is fixed-parameter tractable when parameterized solely by the treewidth of the agents’ intersection graph. Employing more sophisticated techniques and parameterizing by both and the maximum degree of the intersection graph, we further obtained an FPT algorithm for general graphs. When the intersection graph is a tree, a layered-graph formulation yields a polynomial-time exact algorithm.
We believe that the introduction of the intersection graph and its properties is therefore of great value when analyzing the complexity of DDT.
The question of whether DDT on a path is strongly NP-hard remains open for both DDT-FP and DDT-SP. For DDT-SP on a path the complexity for any fixed number of speeds greater than two also remains unresolved. Future work could tighten our parameter dependencies, or establish stronger lower bounds such as -hardness. Another promising direction is to analyze DDT under smoothed and semi-random input models, where small random perturbations of worst-case instances provide a more realistic measure of expected computational complexity and can guide the development of practical algorithms.
References
- [1] Stefan Arnborg, Derek G Corneil, and Andrzej Proskurowski. Complexity of Finding Embeddings in a k-Tree. SIAM Journal on Algebraic Discrete Methods, 8(2):277–284, 1987. doi:10.1137/0608024.
- [2] Dane Bamburry. Drones: Designed for Product Delivery. Design Management Review, 26(1):40–48, 2015. doi:10.1111/drev.10313.
- [3] Simon Bartlmae, Andreas Hene, and Kelin Luo. On the Hardness of the Drone Delivery Problem. In Irene Finocchi and Loukas Georgiadis, editors, Algorithms and Complexity - 14th International Conference, CIAC 2025, Rome, Italy, June 10-12, 2025, Proceedings, Part II, volume 15680 of Lecture Notes in Computer Science, pages 200–215. Springer, 2025. doi:10.1007/978-3-031-92935-9_13.
- [4] Andreas Bärtschi, Daniel Graf, and Matús Mihalák. Collective Fast Delivery by Energy-Efficient Agents. In Igor Potapov, Paul G. Spirakis, and James Worrell, editors, 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018, volume 117 of LIPIcs, pages 56:1–56:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2018. doi:10.4230/LIPICS.MFCS.2018.56.
- [5] Lotte Blank, Kien C. Huynh, Kelin Luo, and Anurag Murty Naredla. Algorithms for the Collaborative Delivery Problem with Monitored Constraints. In Shin-ichi Nakano and Mingyu Xiao, editors, WALCOM: Algorithms and Computation - 19th International Conference and Workshops on Algorithms and Computation, WALCOM 2025, Chengdu, China, February 28 - March 2, 2025, Proceedings, volume 15411 of Lecture Notes in Computer Science, pages 62–78. Springer, 2025. doi:10.1007/978-981-96-2845-2_5.
- [6] Hans L. Bodlaender. A linear time algorithm for finding tree-decompositions of small treewidth. In S. Rao Kosaraju, David S. Johnson, and Alok Aggarwal, editors, Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, May 16-18, 1993, San Diego, CA, USA, pages 226–234. ACM, 1993. doi:10.1145/167088.167161.
- [7] Heleen Buldeo Rai, Sara Verlinde, and Cathy Macharis. Unlocking the failed delivery problem? Opportunities and challenges for smart locks from a consumer perspective. Research in Transportation Economics, 87:100753, 2021. E-groceries, digitalization and sustainability. doi:10.1016/j.retrec.2019.100753.
- [8] Iago A. Carvalho, Thomas Erlebach, and Kleitos Papadopoulos. On the fast delivery problem with one or two packages. Journal of Computer and System Sciences, 115:246–263, 2021. doi:10.1016/J.JCSS.2020.09.002.
- [9] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
- [10] Mo ElSayed, Ahmed Foda, and Moataz Mohamed. The impact of civil airspace policies on the viability of adopting autonomous unmanned aerial vehicles in last-mile applications. Transport Policy, 145:37–54, 2024. doi:10.1016/j.tranpol.2023.10.002.
- [11] Thomas Erlebach, Kelin Luo, and Frits C. R. Spieksma. Package Delivery Using Drones with Restricted Movement Areas. In Sang Won Bae and Heejin Park, editors, 33rd International Symposium on Algorithms and Computation, ISAAC 2022, December 19-21, 2022, Seoul, Korea, volume 248 of LIPIcs, pages 49:1–49:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ISAAC.2022.49.
- [12] M. R. Garey and David S. Johnson. Complexity Results for Multiprocessor Scheduling under Resource Constraints. SIAM J. Comput., 4(4):397–411, 1975. doi:10.1137/0204035.
- [13] Anne Goodchild and Jordan Toy. Delivery by drone: An evaluation of unmanned aerial vehicle technology in reducing CO2 emissions in the delivery service industry. Transportation Research Part D: Transport and Environment, 61:58–67, 2018. Innovative Approaches to Improve the Environmental Performance of Supply Chains and Freight Transportation Systems. doi:10.1016/j.trd.2017.02.017.
- [14] Heather Hulett, Todd G. Will, and Gerhard J. Woeginger. Multigraph realizations of degree sequences: Maximization is easy, minimization is hard. Oper. Res. Lett., 36(5):594–596, 2008. doi:10.1016/J.ORL.2008.05.004.
- [15] Cornelis Lekkeikerker and Johan Boland. Representation of a finite graph by a set of intervals on the real line. Fundamenta Mathematicae, 51(1):45–64, 1962.
- [16] Kelin Luo, Chenran Yang, Zonghan Yang, and Yuhao Zhang. The subinterval cover problem. In Vincent Chau, Christoph Dürr, Minming Li, and Pinyan Lu, editors, Frontiers of Algorithmics - 19th International Joint Conference, IJTCS-FAW 2025, Paris, France, June 30 - July 2, 2025, Proceedings, volume 15828 of Lecture Notes in Computer Science, pages 152–165. Springer, 2025. doi:10.1007/978-981-96-8312-3_12.
- [17] Almodather Mohamed and Moataz Mohamed. Unmanned Aerial Vehicles in Last-Mile Parcel Delivery: A State-of-the-Art Review. Drones, 9(6), 2025. doi:10.3390/drones9060413.
- [18] Neil Robertson and Paul D. Seymour. Graph Minors. II. Algorithmic Aspects of Tree-Width. J. Algorithms, 7(3):309–322, 1986. doi:10.1016/0196-6774(86)90023-4.
- [19] Donald J. Rose, Robert Endre Tarjan, and George S. Lueker. Algorithmic Aspects of Vertex Elimination on Graphs. SIAM J. Comput., 5(2):266–283, 1976. doi:10.1137/0205021.
- [20] Sartaj Sahni. Algorithms for Scheduling Independent Tasks. J. ACM, 23(1):116–127, 1976. doi:10.1145/321921.321934.
- [21] Frank Schroth. IBM granted patent for package transfer between drones. https://dronelife.com/2017/04/30/ibm-granted-patent-package-transfer-drones/, 2017. [Accessed 23-06-2025].
