Abstract 1 Introduction 2 Preliminaries 3 Edge Burning Number 4 Graph burning with all the activators on a path 5 Graph burning with known activators 6 Conclusions References

On Graph Burning and Edge Burning

Giuseppe F. Italiano LUISS University, Rome, Italy Athanasios L. Konstantinidis ORCID University of Ioannina, Greece Manas Jyoti Kashyop ORCID Indian Institute of Technology Bhubaneswar, India
Abstract

Graph burning is a deterministic, discrete-time process that models how influence or contagion spreads in a graph. Initially, all vertices are unburned. At each round, one new vertex is chosen to burn. Once a vertex is burned, in the next round each of its unburned neighbors become burned. The process ends when all vertices are burned. The burning number of a graph is the minimum number of rounds needed for the process to end. Very recently, a variant called edge burning was introduced, where instead of vertices we burn edges: at each round one new edge is burned. Once an edge is burned, in the next round all its unburned incident edges become burned. The edge burning number is the minimum number of rounds that are needed to burn all the edges. In this paper, we present a systematic study of edge burning and provide some new results for graph burning. First, we show a tight relationship between the edge burning number and the burning number of a given graph: specifically, their absolute difference is at most 1. Moreover, we show that the edge burning number of a graph is equal to the graph burning number of its line graph. On the computation complexity side, we show that the edge burning problem is NP-complete, but can be solved in linear time on paths, split graphs, and cographs. Furthermore, we give an XP algorithm when the edge burning problem is parameterized by the diameter of the input graph and a linear kernel when parameterized by the neighborhood diversity. For the graph burning problem, we provide 2-approximation algorithms when either the solution is part of the input or forced to form a path.

Keywords and phrases:
Burning Number, Graph Burning, Edge Burning, Approximation
Category:
Research
Funding:
Giuseppe F. Italiano: Giuseppe F. Italiano was partially supported by MUR, the Italian Ministry for University and Research, under PRIN Project AHeAD (Efficient Algorithms for HArnessing Networked Data).
Copyright and License:
[Uncaptioned image] © Giuseppe F. Italiano, Athanasios L. Konstantinidis, and Manas Jyoti Kashyop; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Algorithm design techniques
Acknowledgements:
The work was done when the second and the third authors were postdocs at LUISS University Rome, Italy.
Editors:
Alessio Conte, Andrea Marino, Giovanna Rosone, and Jeffrey Scott Vitter

1 Introduction

Graph burning was introduced as a model to study spread of an influence or a contagion in a social network in [4]. Graph burning is a deterministic process and it advances in discrete time steps called rounds. Input to the graph burning process is a simple, undirected, and unweighted graph. Initially, all the vertices in the graph are marked as unburned. In the first round a vertex is selected, it is marked as burned, and denoted as the first activator. In round i, where i2, an unburned vertex (if such a vertex is available) is selected and marked as burned (called the i-th activator). Further, in round i, where i2, all the unburned neighbors of the vertices which are marked as burned till round i1 are marked as burned. The goal in the graph burning process is to mark all the vertices in the graph as burned using the minimum number of rounds. Bonato et al. [4] called the minimum number of rounds required to mark all the vertices as burned in the input graph as burning number b(G) of graph G. The set of activators selected in every round forms a sequence, which is called the burning sequence of the graph.

Graph burning marks vertices from unburned to burned and selects a sequence of vertices as a sequence of activators. Mondal et al. [16] proposed the process of marking edges instead of vertices and selecting a sequence of edges as a sequence of activators. They referred to this process as edge burning. In other words, edge burning is a discrete deterministic process where, instead marking all the vertices of the input graph from unburned to burned, the goal is to mark all the edges of the graph from unburned to burned. Initially, all the edges in the graph are marked as unburned. In the first round an edge is selected and it is marked as burned: this edge is referred to as the first source. In round i, i2, an unburned edge (if such an edge is available) is selected and marked as burned, and it is referred to as the i-th source. Further, in round i, i2, all the unburned neighbors of the edges which are marked as burned till round (i1) are marked as burned. The goal in the edge burning process is to mark all the edges in the graph as burned using the minimum number of rounds. The edge burning number of a graph, denoted by Eb(G), is the minimum number of rounds required to mark all the edges in the graph as burned. The set of sources selected in every round forms a sequence called the edge burning sequence of the graph. Throughout the paper, we will use the notation burn a vertex instead of marking a vertex as burned, burn an edge instead of marking an edge as burned. Similarly, we will refer to burned (unburned) vertex/vertices and to burned (unburned) edge/edges.

Previous work.

The graph burning problem has received significant attention in recent years. Bessy et al. [2] showed that computing the burning number is NP-complete even for trees with maximum degree 3 but optimally solvable in linear time for paths. In addition, this problem remains NP-hard even on caterpillar graphs [10], interval graphs [9] and spider graphs [2], but it is polynomial time solvable on split graphs and cographs [11]. In [5], Bonato et al. presented a very elegant 3-approximation algorithm for graph burning on general graphs and a 2-approximation algorithm for trees. Moreover, Mondal et al. [16] proved that graph burning is APX-hard and provided a 3-approximation algorithm with a different approach from [5]. From the parameterized complexity viewpoint, graph burning is W[2]-hard when parameterized by the burning number, and thus unlikely to admit an FPT algorithm [12]. Furthermore, the problem has been studied under several structural parameters [11, 12].

As for the edge burning problem, Mondal et al. [16] observed that the burning number can be smaller than the edge burning number by giving the wheel graph as an example, as shown in Figure 1 (left): W5, the wheel graph of 6 vertices, has burning number equal to 2, and edge burning number equal to 3. It is easy to see that the edge burning number can be smaller than the burning number, as shown in Figure 1 (right): the graph G has burning number equal to 3, and edge burning number equal to 2. As pointed out by Mondal et al. [16], an interesting question is to determine the relationship between the burning number and the edge burning number of a given graph.

Figure 1: We denote activators for graph burning by the blue vertices and sources for edge burning by the red edges. The numbers over the vertices or edges show the number of rounds of an optimal solution. The graph W5 is an example from [16] in which the graph burning number is less than the edge burning (b(W5)=2<Eb(W5)=3). On the other hand, we give the graph G as an example that shows the opposite, the edge burning number of G is less than the burning number of G (Eb(G)=2<b(G)=3).

Our results.

In this paper, we present a systematic study of edge burning and provide some new results for graph burning. First, we address the question posed by Mondal et al. [16] and show that there is indeed a tight relationship between the edge burning number and the burning number of a given graph: specifically, we prove that their absolute difference can be at most 1. In addition, we show that the edge burning number of a graph is equal to the graph burning number of its line graph. The latter result appears to be of broad interest. On the one hand, we use it to establish new upper bounds for the edge burning number using known results for the burning number. On the other hand, it allows us to prove also new results for the burning number, such as the NP-completeness of the graph burning problem on the restricted class of connected claw-free graphs.

On the computation complexity side, we show that the edge burning problem is NP-complete on general graphs. This is not surprising, given the tight relationship that we have proved between the edge burning number and the burning number of a graph. On the positive side, we show that edge burning can be solved in linear time on paths, split graphs, and cographs. We next consider the parameterized complexity of the edge burning problem; first we show a trivial XP algorithm for the edge burning problem when parameterized by the diameter of the graph, followed by a linear kernel when parameterized by the neighborhood diversity.

Next, we focus our attention to two variants of the graph burning problem. The first variant is defined as follows. Consider a network in which one wishes to spread influence in the minimum number of rounds by selecting some nodes as activators. The nodes selected as activators must be operational until the influence reaches every node in the network. Suppose this requirement forces the nodes selected as activator to be connected to an emergency service line. Therefore, all the activator nodes in the network must lie in a path which models the emergency service line. With this motivation, we define a variant of the graph burning problem in which all the activators must be on a path. We call the problem as Graph burning with Activators on a Path (GbAP) problem. Our motivation for the GbAP problem resembles the motivation for studying well-known clustering problems like the k-center problem with all the centers on a line [6]. Potential applications include setting up kiosks for medical emergencies, where these kiosks must be connected to an uninterrupted power supply line, in an event that attracts large gatherings and many stalls. Note that the GbAP problem reduces to the graph burning problem when we restrict the graph class to paths, which can be solved optimally in linear time. We show that GbAP problem is NP-complete even for trees with maximum degree 3; on the positive side, we present a 2-approximation algorithm for the GbAP problem on trees.

The second variant was defined by Mondal et al. [16], who considered graph burning with additional advice: more specifically, together with the graph, an (unordered) set of activators used by an optimal solution is provided as input. In [16] it is shown that finding an optimal burning sequence is NP-hard even in this special case. We refer to this variant as the Graph burning with Activators as Input (GbAI) problem. For the GbAI problem, we present a deterministic algorithm that guarantees a 2-approximation and a randomized algorithm that guarantees better than 2-approximation. We also show that the GbAI problem is fixed parameter tractable when parameterized by the solution size (the burning number). To put our results in perspective, we recall that for the graph burning problem no better than 3-approximation is known for general graphs [5, 16] and the problem is W[2]-hard when parameterized by the burning number [12].

Related work.

Independently from our work, Antony et al. [1] very recently studied the relationship between the burning number and the edge burning number and the computational complexity of the edge burning by showing NP-hardness for it. Also, there are some results on edge burning number in very restrictive graphs [13, 14].

Organization of the paper.

The remainder of the paper is organized as follows. We start by introducing some preliminary terminology and definitions in Section 2, while in Section 3 we present our new results on the edge burning problem. Next, we consider our two variants of the graph burning problem: Section 4 deals with graph burning with all activators on a path (GbAP problem), where all activators must be on a path of the input graph, while Section 5 deals with graph burning with known activators (GbAI problem), where a set of activators used by an optimal solution is given as input. Finally, Section 6 lists some concluding remarks and directions for further research.

2 Preliminaries

All graphs considered throughout the paper are simple, undirected and connected, unless explicitly stated otherwise. Given an input graph G=(V,E), we denote by n=|V| the number of vertices, and by m=|E| the number of edges. The neighborhood of a vertex v of G is N(v)={xvxE} and the closed neighborhood of v is N[v]=N(v){v}. For SV, N(S)=vSN(v)S and N[S]=N(S)S. For XV, the subgraph of G induced by X, G[X], has vertex set X, and for each vertex pair u,v from X, uv is an edge of G[X] if and only if uv and uv is an edge of G. We denote the edge burning number of G by Eb(G) and the burning number of G by b(G). We use Kn to denote a complete graph with n vertices and Pn to denote a path with n vertices. The complete bipartite graph K1,3 is also called as claw and a claw-free graph is a graph in which no induced subgraph is a claw. A clique of a graph is a set of pairwise adjacent vertices of the graph and an independent set of a graph is a set of pairwise non-adjacent vertices of the graph. We use the notion of line graph of a graph.

Definition 1.

The line graph of a graph G is a graph L(G) with the following properties:

  1. 1.

    For every edge in G, there is a corresponding vertex in L(G).

  2. 2.

    Two vertices in L(G) are adjacent if and only if the corresponding edges in G are adjacent.

We define the distance between two edges 𝖾𝟣 and 𝖾𝟤 as the minimum number of edges between the two edges plus 1. The distance between two vertices 𝗏𝟣 and 𝗏𝟤, denoted as 𝖽𝗂𝗌𝗍(𝗏𝟣,𝗏𝟤), is the length of the shortest path between 𝗏𝟣 and 𝗏𝟤 (the minimum number of edges). The eccentricity of a vertex 𝗎, denoted as 𝖾𝖼𝖼(𝗎), is 𝖾𝖼𝖼(𝗎)=max𝗏𝖵{𝖽𝗂𝗌𝗍(𝗎,𝗏)}. The diameter 𝖽 of G is the maximum length of a shortest path in G, that is 𝖽=max𝗎,𝗏𝖵{𝖽𝗂𝗌𝗍(𝗎,𝗏)} = max𝗏𝖵{𝖾𝖼𝖼(𝗏)}. The radius 𝗋𝖺𝖽 of G is min𝗏𝖵{𝖾𝖼𝖼(𝗏)}. For a vertex 𝗏, the set 𝖭𝗄[𝗏] denotes the set of vertices at a distance at most 𝗄, that is 𝖭𝗄[𝗏]={𝗎|𝖽𝗂𝗌𝗍(𝗎,𝗏)𝗄}.

Problem statements.

Next, we formalize the decision version of the graph burning problem. We recall here that the set of activators selected in every round forms a sequence, which is called the burning sequence of the graph, and the set of sources selected in every round forms a sequence called the edge burning sequence of the graph.

Graph Burning Input: An undirected graph G and an integer k1. Question: Does G have a burning sequence that burns all the vertices         of G in at most k rounds?

Similarly, we formalize the decision version of the edge burning problem.

Edge Burning Input: An undirected graph G and an integer k1. Question: Does G have an edge burning sequence that burns all the edges         of G in at most k rounds?

Finally, we present some concepts from parameterized complexity which are essential for our results.

Parameterized complexity.

A problem with input size n and parameter k is fixed parameter tractable (FPT), if it can be solved in time f(k)nO(1) for some computable function f. A kernelization for a parameterized problem is a polynomial time algorithm that maps each instance (I,k) of a parameterized problem to an instance (I,k) of the same problem such that (I,k) is a 𝗒𝖾𝗌-instance if and only if (I,k) is a 𝗒𝖾𝗌-instance, and |I|+k is bounded by f(k) for some computable function f. The output (I,k) is called a kernel. The function f is said to be the size of the kernel. It is well-known that every decidable parameterized problem is FPT if and only if it admits a kernel. The class XP contains all problems that can be solved in O(|I|f(k)) time for some computable function f. It is common to build an FPT algorithm or a kernel for a parameterized problem by constructing a series of reduction rules, that is, polynomial algorithms that either solve the problem or produce instances of the problem that, typically, have lesser sizes or lesser values of the parameter. Respectively, it is said that a rule is safe or sound if it either correctly solves the problem or constructs an equivalent instance.

3 Edge Burning Number

In this section we study the edge burning problem. Since in the edge burning problem edges are selected as sources in place of vertices with the objective to burn all the edge instead of the vertices, the immediate question, as posed in [16], that arises is the relationship between the edge burning number and the burning number for a given graph. The examples in Figure 1 show that there are graphs in which the difference between the edge burning number and the burning number is one. In the following theorem we show that the difference between these two numbers is at most 1 for any graph.

Theorem 2.

For any graph G without isolated vertices |b(G)Eb(G)|1.

Proof.

First, we show that Eb(G)b(G)+1. Given a graph G we assume a solution for the graph burning problem of size k. This means that there is a burning sequence A of k activators that burns all the vertices of G. Based on A we give an edge burning sequence S of k sources that burns all the edges of G in k+1 rounds. For the activator vi of A we choose an incident edge to vi as a source, let ei be this source. Thus, S contains k edges of G and every one of them is incident to an activator. Observe that the activator vi burns all the vertices at distance at most ki, denote W all these vertices. Thus, there is a path from vi to every vertex uW that contains at most ki edges. By considering an incident edge to vi as source for the edge burning problem and by the definition of the distance between two edges, we get that all the edges of the paths between vi and every vertex uW will be burned by the source ei in next ki rounds. Since this holds for every activator vi and source ei, in k rounds we have that every vertex of G has at least one burned incident edge. Hence, in the next round, k+1, all the unburned edges will be burned.

Next, we show that b(G)Eb(G)+1. Assume a solution for the edge burning problem of size k of a given graph G. This means that there is an edge burning sequence S of k sources that burns all the edges of G. Based on S we give a burning sequence A of k activators that burns all the vertices of G in k+1 rounds. For the source ei of S we choose one of the two endpoints as an activator, let vi be this activator. Thus, A contains k vertices of G, each of them is endpoint of some source of S. Let F be the set of the edges that are burned by the source ei. This means that the edges of F are at distance at most ki from ei. Consider now the corresponding activator vi. By the definition of the distance between two edges, we get that vi is at distance at most ki+1 from every endpoint of the edges in F. Thus, we may need one more round to burn the vertices of F by using vi as activator. Notice that this holds for every source ei and activator vi. Since the sources in S burn all the edges of G in k rounds, we have that all the vertices of G can be burned by A in at most k+1 rounds. Our next theorem provides another relationship between the edge burning number and the burning number through the notion of line graph.

Theorem 3.

For any graph G, Eb(G) = b(L(G)) where L(G) is the line graph of G.

Proof.

Assume that (G,k) is a 𝗒𝖾𝗌-instance for Edge Burning and let (e1,e2,,ek) be the edge burning sequence for G, i.e. Eb(G)=k. Let also 𝒜=(A1,A2,,Ak) be the set of edges that can be burned by the edges (e1,e2,,ek) respectively. This means that the edges that belong to the sets of 𝒜 are exactly all the edges of the graph if we ignore the edges (e1,e2,,ek). Without loss of generality, let f be an edge that belongs to A1. By the definition of edge burning, the distance between the edges e1 and f is at most k1. Now consider the line graph L(G). Then the edges of the edge burning sequence correspond to some vertices U={v1,v2,,vk} of L(G). We show that the vertices of U form a burning sequence with the same order for the graph burning problem, this means b(L(G))=k. Let vf be the corresponding vertex in L(G) of the edge fG. Since there is a path with (at most) k2 edges between the edges e1 and f, there is a path with (at most) k2 vertices between the vertices v1 and vf. Thus, we get that vf will be burned in at most k1 steps. Notice that this holds for every edge source ei and edge fAi. Hence, the burning number of L(G) is at most the edge burning number of G, i.e., b(L(G))Eb(G).

Assume now that (L(G),k) is a 𝗒𝖾𝗌-instance for graph burning and let U={v1,v2,,vk} be the burning sequence for L(G). With the same argumentation, for every vertex vf there is some source vi that burns it in at most ki1 steps. In other words, there is a path with at most ki2 intermediate vertices in the path from vi to vf. This means, there is a path that contains ki2 edges between the corresponding edges, ei and f in G. Therefore, the edge burning number of G is at most the burning number of L(G), i.e., Eb(G)b(L(G)). By combining the above inequalities, we get that Eb(G)=b(L(G)). The burning number of a path or a cycle with n vertices is known to be n by [4]. Thus, using Theorem 3, we get the following bounds.

Corollary 4.

If G is a path with m edges and n vertices then Eb(G)=m = n1.

Corollary 5.

If G is a cycle with m edges and n vertices then Eb(G)=m = n.

For a complete graph Kn, n2, we have the following cases for the edge burning number:

Eb(Kn)={1if n=22if n=3or43if n5

Observe that K2 is just an edge and so Eb(Kn)=1. For n=3or4, by choosing any edge as the first source, all other edges will be burned in the second round for n=3. For n=4, only one edge is not incident to the first source, so we choose this edge as the second source. Thus, Eb(Kn)=2. For n5, observe that there are at least 2 non-incident edges to the first source. Thus, with the same procedure as previously, we need three rounds to burn all the edges. On the other hand, the burning number of Kn, n2, is always 2. Note that a simple algorithm for computing the edge burning number on a path can be obtained by adapting the corresponding algorithm to find the burning sequence on paths [3]:

Finding an edge burning sequence on paths.

Let Pn = {𝖾𝟣,𝖾𝟤,,𝖾𝗆} denote a path with 𝗆 edges and Eb(Pn)=k. Let {𝗑𝟣,𝗑𝟤,,𝗑𝗄} denote an edge burning sequence. We compute the sources as follows.

  • for 𝟢𝗂𝗄𝟤,𝗑𝗄𝗂=𝖾𝗆𝗂𝟤𝗂.

  • if 𝗆(𝗄𝟣)𝟤+𝗄, we get 𝗑𝟣=𝖾𝗆(𝗄𝟣)𝟤(𝗄𝟣), otherwise 𝗑𝟣=𝖾𝟣.

3.1 NP-Hardness of Edge Burning

In this section, we study the computational complexity of the edge burning problem (Edge Burning). First, observe that given a graph and a sequence of edges as sources we can check in polynomial time if the sequence is a solution for the edge burning. Thus, Edge Burning is in NP. Next, we show that Edge Burning is NP-hard. We obtain our result by using a reduction from the Vertex Cover problem, a well-known NP-complete problem. Vertex Cover: Given graph G and an integer k. Is there a subset S of vertices in G of size k or less such that every edge of G has at least one of its endpoints in S? Our constructions for the NP-hardness are based on [16].

Theorem 6.

Edge Burning is NP-complete.

Proof.

Given an instance (G=(V,E),k) of Vertex Cover we construct a graph G as follows:

  • for every vertex v of V, we add two adjacent vertices v1 and v2 in G,

  • for every edge {u,v}E,

    • we add two vertices uv and vu in G, additionally, we add the edges {u1,uv}, {v1,vu} and {uv,vu} in G. We then replace the edge {uv,vu} by a path with 2n+3 vertices, where uv and vu are the endpoints of the path. Let w be the middle vertex of the path.

    • we add a path Tuv with n+1 vertices and make one of its endpoints adjacent to w.

  • we add 2n+5 pairs of adjacent vertices. Every pair is isolated with respect to the rest of the graph.

Notice that G can be constructed in polynomial time.

We claim that (G,k) is a 𝗒𝖾𝗌-instance for Vertex Cover if and only if G has a burning sequence of length at most k+2n+5.

Assume that G has a vertex cover C of size at most k. We find an edge burning sequence F for G. First, we add to F the edges {vi1,vi2} of G that correspond to the vertices of C in arbitrary order. We denote this set of edges as C. This means in the first k rounds all the edges of C are burned. After that we choose the 2n+5 isolated edges of G as burning sources for F. Hence, we need k+2n+5 rounds in order to burn these edges. Now we show that the rest edges can be burned within k+2n+5 rounds. As we said in the first k rounds all the edges of C are burned. Moreover, for every edge {u1,u2} that does not belong to C there is an edge of C that is in distance 2n+5 since C is vertex cover of G. This means all the edges {u1,u2} can be burned in the next (2n+5) rounds. Observe also that all the edges between an edge of C and an edge {u1,u2}C are in distance at most 2n+4 from some edge of C. Furthermore, the edges of a path Tuv are in distance at most 2n+4 from some edge {v1,v2}C. Thus, all the edges of G can be burned in k+2n+5 rounds.

For the opposite direction, assume that G has a burning sequence F of length at most k+2n+5. We show how to build a vertex cover C for G of size at most k. For every edge {u,v}E, we define Huv to be a subgraph of G that contains the edges {u1,u2} and {v1,v2}, all the edges in distance at most n+2 either from {u1,u2} or {v1,v2}, all the edges in the path of u1 to v1 and the edges of the path Tuv. For every Huv and for each burning source e in it, we check whether the distance between e and {u1,u2} is smaller than the distance between e and {v1,v2}. If the former holds then we put u in C otherwise we put v in C. We break ties arbitrarily. Next we prove that C is a vertex cover of G. Assume that there is an edge {u,v}E, where neither u nor v belongs to C. This means that every burning source eG is closer to some {x,y}G other than {u1,u2} and {v1,v2}. Thus, Huv does not contain any edge burning source. Observe that the distance between an edge e outside of Huv and the last edge of Tuv is at least n+2n+5. Hence, we need at least n+2n+6 rounds in order to burn the edges of Huv which is strictly larger than k+2n+5. This leads to a contradiction, and so C is a vertex cover since for every edge {u,v}E at least one of the endpoints belong to C. Finally, since we need 2n+5 rounds to burn the isolated edges, we get that the vertex cover is at most k.

By construction, the graph G in the proof of Theorem 6 is disconnected. Next, we can adjust the proof of Theorem 6 and show that the Edge Burning problem is also NP-hard on connected graphs. More precisely, let G be a graph and let v be a vertex of G. We extend this graph by adding a pair of adjacent vertices {x,y} and make the vertex x adjacent to v of G. Observe that the minimum vertex cover of the new graph, H, is one more than in G, since we have added the edge {x,y} and so one of the endpoints has to belong to the vertex cover. Let the minimum vertex cover of H. Next, we follow the construction of Theorem 6 but instead of using the isolated pair of adjacent vertices, we add a path P=(x2,Q,Q,e1,Q,e2,Q,,Q,e2n+5), where Q is a sequence of (+2n+4) vertices, Q is a sequence of (2n+4) vertices, and e1,e2,,e2n+5 are pairs of adjacent vertices that correspond to the isolated pairs of adjacent vertices of Theorem 6. Notice that the number of the edges of P{x2,Q} is (2n+4)(2n+5)+(2n+5)=(2n+5)2. By Corollary 4 we get that any edge burning sequence for P{x2,Q} contains 2n+5 edges.

Again, we wish to show that the extended graph has a vertex cover of size at most if and only if there is an edge burning sequence with at most +2n+5 sources. Observe that any vertex cover in the extended graph contains either x or y. Without loss of generality assume that x belong to vertex cover, otherwise we can swap y and x. For one direction, we can burn all the edges by burning first the edge {x1,x2}, next the remaining edges that correspond to the vertices of the vertex cover and finally the edges of the path P{x2,Q} by using the algorithm for finding an edge burning sequence on a path previously described. For the other direction, assume that there is an edge burning sequence of size +2n+5. Then, since the number of the edges of the path P{x2,Q} is (2n+5)2 we need 2n+5 sources to burn it. Moreover, the distance between these sources and {x1,x2} is +2n+5. Thus, the remaining sources need to be in H, and so, the corresponding vertices will be the vertex cover of size .

Hence, combining Theorems 3 and 6 and since the line graph of a connected graph is a connected claw-free graph, we get the following result.

Theorem 7.

Graph Burning is NP-hard on connected claw-free graphs.

3.2 Algorithms for edge burning on special graphs

The NP-hardness result for the edge burning problem makes it interesting to look for graph classes for which the edge burning problem admits a polynomial-time algorithm. In this section, we provide linear-time algorithms to compute the edge burning number on two graph classes: split graphs and cographs. We start with the class of split graphs. A graph is a split graph if its vertices can be partitioned into an independent set I and a clique C, where (C,I) is called a split partition of the graph. It is known that split graphs are self-complementary, that is, the complement of a split graph remains a split graph. First, we present the following observation about the edge burning number on a graph.

Observation 8.

A graph G with at least two edges has Eb(G)2. Moreover, G has Eb(G)=2 if and only if there is an edge e such that all the remaining edges are incident to e except for at most one of them.

Proof.

The first claim is straightforward since in the first round we can burn only one edge. Assume now that Eb(G)=2, this means that there are two sources, (e1,e2). If G has only the edges e1 and e2 then we have the claim. Assume that there are more than two edges in the graph. Since Eb(G)=2 and e1 is the first source, the edges of E(G){e1,e2} are incident to e1 in order to be burned in the second round. Hence, there is at most one edge non incident to e1 and that can be the edge e2. In the other direction, we assume first there is an edge e such that every other edge of the graph is incident to e. Then if we burn e in the first round then all the other edges will be burned in the second round. Observe that if there is exactly one edge non-incident to e we can also burn this edge at the end of the second round. Thus, in both cases the Eb(G)=2. Using Observation 8, we present an algorithm to compute the edge burning number for split graphs in the following theorem.

Figure 2: A complete split graph. By choosing the vertex as the first activator for the graph burning problem in two rounds all the vertices will be burned. On the other hand, by choosing the edge as the first source for the edge burning problem all the edges will be burned in three rounds.
Theorem 9.

The edge burning number of a split graph is at most 3 and it can be computed in linear time.

Proof.

Let G=(V,E) be a split graph with clique partition (C,I). Based on Observation 8, we can check in linear time whether Eb(G)=2; otherwise, we show that it must be Eb(G)=3. In the first round we arbitrarily burn an edge from the clique C. In the second round all the incident edges will be burned and we burn again one of the remaining unburned edges. At this point every vertex of the clique has at least one burned incident edge. Thus, in the third round all the edges of the clique will be burned as well as all the edges between the vertices of the clique and the vertices of the independent set. Since there is no edge between the vertices of I, all the edges of the graph have been burned. Hence, Eb(G)=3. Clearly, the above procedure can be implemented in linear time.

Even in the case where the graph is a complete split graph, i.e., every vertex of the independent set is adjacent to every vertex of the clique, the edge burning number is at most 3, while the burning number of a complete split graph is 2. For example, see Figure 2.

Next, we consider the class of cographs. Let G=(V,E) and H=(U,F) be two undirected graphs with VU=. The disjoint union of G and H is the graph obtained from the union of G and H, denoted by GH=(VU,EF). The complete join of G and H is the graph obtained from the union of G and H and adding edges between every pair of vertices that belong to different graphs, denoted by GH=(VU,EF{vuvV,uU}). A graph is a cograph if it can be generated from single-vertex graphs and recursively applying the disjoint union and complete join operations. By definition, the complement of a cograph is also a cograph. Cographs are exactly the graphs that do not contain chordless paths on 4 vertices, P4, as induced subgraphs [7], and they can be recognized in linear time [8]. In the following theorem, we present an algorithm to compute the edge burning number for a cograph.

Figure 3: A cograph with its cotree. Observe that by burning the edge {x,u}, all the edges of the cograph will be burned in three rounds.
Theorem 10.

The edge burning number of a cograph is at most 3 and it can be computed in linear time.

Proof.

Let G=(V,E) be a connected cograph, then the last operation need to be complete join. Let G=H1H2. Using Observation 8 in linear time we can determine if Eb(G)=2; otherwise we show that the Eb(G)=3. We consider as a first source an edge vu such that vH1 and uH2. By definition, v is adjacent to every vertex H2 and u is adjacent to every vertex H1, and so, at the end of the second round all the vertices of G have at least one burned incident edge. Thus, in the third round all the edges will be burned. The above steps can be implemented in linear time by using a suitable data structure, called cotree [8], (see for e.g., Figure 3). The construction of the cotree of G takes time O(n+m) [8].

3.3 Parameterized complexity for edge burning

One way to cope with the NP-hardness of the edge burning problem is to study the problem in the context of parameterized complexity. We start with the following observation.

Observation 11.

For a graph G with radius 𝗋𝖺𝖽 and diameter 𝖽 we have that: 𝖽+11Eb(G)𝗋𝖺𝖽+𝟤.

Proof.

For any graph G it is known that 𝖽+1b(G)𝗋𝖺𝖽+𝟣 [4]. Moreover, by Theorem 2 we have b(G)1Eb(G)b(G)+1. The observation yields from combining these two results. Based on the observation above, we can obtain a trivial XP algorithm for the edge burning problem parameterized by the diameter 𝖽 of the graph. We compute all the subsets of edges of size at most 𝖽 and for each such subset we check all the permutations. Every permutation can be considered as a sequence for the edge burning problem. Observe that this can be done in O(𝖽!𝗇𝟤(𝖽+𝟣)) time. An XP algorithm has also been given in [12] for the graph burning problem parameterized by the diameter. An interesting direction to explore next is to find a parameter with respect to which the edge burning problem admits an FPT algorithm. We consider graphs with bounded neighborhood diversity and show that the edge burning problem is FPT and admits a linear kernel when parameterized by neighborhood diversity.

The neighborhood diversity has been defined by Lampis [15]. For a graph G(V,E), two vertices x and y in V have the same type if N(x){y}=N(y){x}.

Definition 12.

A graph G=(V,E) has neighborhood diversity at most 𝗇𝖽, if there exists a partition of V(G) into at most 𝗇𝖽 sets, such that all vertices in each set have the same type.

Observe that the vertices of a given type not only have the same (closed) neighborhood in G, but also form either a clique or an independent set in G. Further, there exists a polynomial time algorithm that finds a minimum partition of V into neighborhood types [15]. In the following theorem, we present a linear kernel for the edge burning problem parameterized by the neighborhood diversity of the input graph, similar to [11] for the graph burning problem.

Theorem 13.

Edge burning admits a 5𝗇𝖽-kernel, where 𝗇𝖽 is the neighborhood diversity of the input graph.

Proof.

Let G=(V,E) be a graph with neighbohood diversity, 𝗇𝖽, and let C1,C2,,C𝗇𝖽 be the type classes of G. We show that edge burning admits a 5𝗇𝖽-kernel. To do that, we apply one of the following reduction rules for every type class in G:

Rule 13.1.

If a class Ci forms a clique in G and |Ci|>5 then we remove all the vertices apart from 5 vertices.

To show that the rule is sound, observe that if Ci forms a clique and contains at least 5 vertices then in at most 3 rounds all the incident edges to the vertices of Ci can be burned. More precisely, if an edge incident to a vertex of Ci is burned, then in the next round all edges of G[Ci] that are incident to that vertex will be burned. Thus, in the following round all the edges of G[Ci] will be burned as well as all the incident edges from others classes to the vertices of Ci. On the other hand, if we set fire on an edge of G[Ci] then in two rounds we have that every vertex of G[Ci] have at least one burned incident edge, and so, in the next round all the rest incident edges to Ci will be burned. Hence, it is enough to keep 5 vertices for such a class Ci since a clique with 5 vertices needs 3 rounds in order to be burned.

Rule 13.2.

If a class Ci forms an independent set in G and |Ci|>2 then we remove all the vertices apart from 3 vertices.

To show that the rule is sound, observe that if we pick an edge incident to a vertex of Ci as a source, then in the next round all the vertices of Ci will have at least one burned incident edge. This is because the endpoint of the source edge that is not in Ci is adjacent to every vertex of Ci. Thus, in the following round all incident edges to the vertices of Ci will be burned. Now, observe that the same holds even if an edge incident to a neighbor of Ci burned, since the vertices of Ci have the same neighborhood. Therefore, it is enough to keep 3 vertices. Finally, Rules 13.1 and 13.2 can be applied in polynomial time and the resulting graph has 𝗇𝖽 classes with at most 5 vertices in each class. In the following sections, we present our results on graph burning.

4 Graph burning with all the activators on a path

In this section, we consider our first variant of the graph burning problem in which all activators are on a path in the input graph. We remind the reader that our motivation for considering this variant comes from the scenario in social networks where a set of high performing nodes, termed as activators, must be connected to an emergency service line which enforces all the activators to be on path. Formally, we define the problem as follows.

Definition 14 (Graph burning with Activators on a Path (GbAP)).

The input is a graph G. The goal is to design an optimal burning sequence such that all the activators are on a path in G.

Note that if we restrict the graph class to paths, then the GbAP problem reduces to the graph burning problem and it is solvable optimally in polynomial time. We first prove that GbAP problem is NP-complete even for trees with degree at most 3.

4.1 NP-completeness for GbAP

Given a sequence {x1,x2,,xg} of sources for the GbAP problem for trees, in time O(n) we can compute 𝖭𝗀𝗂[𝗑𝗂] for 1ig and verify if 𝗂=𝟣𝗀𝖭𝗀𝗂[𝗑𝗂]=𝖵. Therefore, GbAP problem for trees is in NP. To show that GbAP problem is NP-hard, we show that there is a polynomial time reduction from the Distinct 3-Partition problem to the GbAP problem on trees with maximum degree 3. In fact, the reduction presented by Bessy et al. [2] to prove that graph burning is NP-hard for trees with maximum degree 3 also proves that GbAP problem is NP-hard for trees with maximum degree 3. To prove the NP-hardness result, Bessy et al. [2] presented a polynomial time reduction from the Distinct 3-Partition problem. An instance of the Distinct 3-Partition problem consists of the following: a finite set X={a1,a2,,a3n} of positive distinct integers and a positive integer B where i=13nai=nB, and B/4<ai<B/2, for 1i3n. The goal is to decide if there is a partition of X into n triples such that the elements in each triple add up to B. Let m=max{a|aX}. For an instance for the Distinct 3-Partition problem as mentioned above, Bessy et al. [2] constructed a tree T consisting of (2m+1)2+3(m2+m)2 vertices with maximum degree 3 and proved that the given instance of the Distinct 3-Partition problem is an 𝗒𝖾𝗌-instance if and only if burning number of T is 2m+1. Further, they proved that because of the construction of T, any optimal solution for the graph burning problem must place all the activators on a path in T. Therefore, the implication of the reduction in [2] is stronger. It proves that graph burning is NP-hard for trees with maximum degree 3 even in the restricted case when all the activators must be placed on a path. We get the following theorem.

Theorem 15.

GbAP problem is NP-complete for trees with maximum degree three.

4.2 A 2-approximation algorithm for GbAP on trees

We present a 2-approximation algorithm for the GbAP problem on trees. To design our algorithm, we crucially use the properties of a diametral path and center of a graph. Let 𝖽 be the diameter of a graph G. Any path P in G is called a diametral path if the length of P is equal to 𝖽. A vertex with minimum eccentricity is called center of G. When the graph G is a tree, the following theorem is well known.

Theorem 16 (Jordan theorem [17]).

A tree has at most 2 centers. If a tree has 2 centers, they must be adjacent.

We first prove the following lemma about diametral paths and centers of a tree.

Lemma 17.

Every diametral path in a tree must contain every center.

Proof.

Let P be any diametral path in the tree, 𝖽 be the diameter of the tree, and c be a center of the tree. Assume by contradiction that c is not contained in P. Let x1 and x2 be the two endpoints of the path P. Let 𝗏𝗆𝗂𝖽 be a vertex contained in P and is at a distance at least 𝖽/2 from x1 and x2. Therefore, 𝖾𝖼𝖼(𝗏𝗆𝗂𝖽)𝖽/𝟤. Otherwise, it will contradict that the length of the diameter of the tree is 𝖽. Further, it also implies that the eccentricity of any center for the tree is 𝖽/2. Next, we consider the unique path between 𝗏𝗆𝗂𝖽 and c in the tree.

  1. 1.

    𝖽𝗂𝗌𝗍(𝖼,𝗏𝗆𝗂𝖽)>𝟣: Consider the following paths: from c to x1 and from c to x2. At least one of the two paths must contain 𝗏𝗆𝗂𝖽. Without loss of generality, suppose the path from c to x1 contains 𝗏𝗆𝗂𝖽. This implies that 𝖽𝗂𝗌𝗍(𝖼,𝗑𝟣)=𝖽𝗂𝗌𝗍(𝖼,𝗏𝗆𝗂𝖽)+𝖽𝗂𝗌𝗍(𝗏𝗆𝗂𝖽,𝗑𝟣)>𝟣+𝖽/𝟤𝖽/𝟤. Therefore, 𝖾𝖼𝖼(c)>𝖽/2. But this contradicts that c is a center of the tree because there exists a vertex 𝗏𝗆𝗂𝖽 with 𝖾𝖼𝖼(𝗏𝗆𝗂𝖽)𝖽/𝟤.

  2. 2.

    𝖽𝗂𝗌𝗍(𝖼,𝗏𝗆𝗂𝖽)=𝟣: In this case both the paths, from c to x1 and from c to x2, must contain 𝗏𝗆𝗂𝖽. We consider the following two scenarios.

    1. (a)

      Diameter 𝖽 is even: For xi,i{1,2}, we have 𝖽𝗂𝗌𝗍(𝖼,𝗑𝗂)=𝟣+𝖽𝗂𝗌𝗍(𝗏𝗆𝗂𝖽,𝗑𝗂)=𝟣+𝖽/𝟤>𝖽/𝟤. Therefore, 𝖾𝖼𝖼(c)>𝖽/2 and it contradicts that c is a center.

    2. (b)

      Diameter 𝖽 is odd: For xi,i{1,2}, consider the xi for which 𝖽𝗂𝗌𝗍(𝗑𝗂,𝗏𝗆𝗂𝖽)=(𝟣+𝖽)/𝟤. Then, 𝖽𝗂𝗌𝗍(𝖼,𝗑𝗂)=𝟣+𝖽𝗂𝗌𝗍(𝗏𝗆𝗂𝖽,𝗑𝗂)=𝟣+𝖽+𝟣𝟤>𝖽/𝟤. Therefore, 𝖾𝖼𝖼(c)>𝖽/2 and it contradicts that c is a center.

Therefore, if c is a center of the tree and P is any diametral path of the tree, then P must contain c. Hence the lemma. Next we make the following observation about two paths on a tree.

Observation 18.

Let P1 and P2 be two paths in a tree and P1 and P2 are not vertex disjoint. Then all the common vertices between P1 and P2 induce a path P^ and P^ is a subpath of P1 and P2. Note that P^ may contain only one vertex.

Proof.

The proof follow immediately from the fact that a tree is an acyclic graph. Otherwise, if the common vertices do not form an induced path, then a subset of vertices belonging to only P1, a subset of vertices belonging to only P2, and a subset of vertices common to P1 and P2 form a cycle. Furthermore, since the common vertices induce a path, it must be a subpath of the two overlapping paths. Before presenting the algorithm, we prove some useful properties.

Lemma 19.

For the GbAP problem on trees, if the tree has at least two diametral paths with only the centers as common vertices, then any optimum solution must place the first activator on one of the centers.

Proof.

Suppose not, and there exists an optimum solution that places the first activator on a vertex other than the centers. Since we are constrained to place all the activators on a path, a center can be burned only in the second or higher rounds. Since we assumed that the diametral paths have only centers as the common vertices and at least two diametral paths are there, the solution would require 𝟤+𝖽/𝟤 rounds to burn the tree completely. However, from Lemma 17, every diametral path in a tree must contain every center. Therefore, any solution that places the first activator in a center would require 𝟣+𝖽/𝟤 rounds to completely burn the tree, contradicting that the solution we started with is an optimum solution. Hence the Lemma.

Lemma 20.

For trees containing at least two diametral paths with only the centers as common vertices, an optimum solution for the GbAP problem needs 𝟣+𝖽/𝟤 rounds.

Proof.

From Lemma 19, the first activator must be on a center. After that the optimum may place the remaining activators on one of the diametral paths. But it will take 𝖽/𝟤 rounds to burn the other diametral paths. Therefore, any optimum solution takes 𝟣+𝖽/𝟤 rounds.

Lemma 21.

For trees there exists an optimum solution for the GbAP problem that places all the activators on a diametral path.

Proof.

Let P be a non diametral path and assume that all the activators in an optimum solution are on the path P. Let P be a diametral path and 𝖽 be the length of the diameter. Note that any optimum solution takes at most 1+𝖽/2 rounds. We have the following two cases.

  1. 1.

    P and P are edge disjoint: In this case, P must contain one of the centers, say c, and the first activator must be on that center. Otherwise, the solution will take >1+𝖽/2 rounds contradicting that it is optimal. Placing all the activators on P starting with the first activator on the center c takes 1+𝖽/2 rounds. Let 𝗑𝟣 and 𝗑𝟤 be the endpoints of path P. Clearly, 𝖽𝗂𝗌𝗍(𝖼,𝗑𝟣)𝖽/𝟤 and 𝖽𝗂𝗌𝗍(𝖼,𝗑𝟤)𝖽/𝟤. Therefore, placing all the activators on P starting with the first activator on the center c yields another optimal solution.

  2. 2.

    P and P are not edge disjoint: From Observation 18, the common vertices between P and P induce a subpath. Let P^ be that subpath. Let 𝗑𝟣^ and 𝗑𝟤^ be the endpoints of P^. Let 𝗑𝟣 be the endpoint of P nearest to 𝗑𝟣^ and 𝗑𝟤 be the endpoint of P nearest to 𝗑𝟤^. Similarity, let 𝗑𝟣 be the endpoint of P nearest to 𝗑𝟣^ and 𝗑𝟤 be the endpoint of P nearest to 𝗑𝟤^. Clearly, 𝖽𝗂𝗌𝗍(𝗑𝟣^,𝗑𝟣)𝖽𝗂𝗌𝗍(𝗑𝟣^,𝗑𝟣) and 𝖽𝗂𝗌𝗍(𝗑𝟤^,𝗑𝟤)𝖽𝗂𝗌𝗍(𝗑𝟤^,𝗑𝟤). Therefore, placing all the activators on P will contribute max{𝖽𝗂𝗌𝗍(𝗑𝟣^,𝗑𝟣),𝖽𝗂𝗌𝗍(𝗑𝟣^,𝗑𝟤)} many rounds in addition to burning the subpath P^ and the rest of the tree. Instead, placing all the activators on P will contribute max{𝖽𝗂𝗌𝗍(𝗑𝟣^,𝗑𝟣),𝖽𝗂𝗌𝗍(𝗑𝟤^,𝗑𝟤)} many rounds in addition to burning the subpath P^ and rest of the tree. Thus, placing all the activators on P is another optimal solution.

Based on the above lemmas, we present a simple algorithm (Algorithm 1) for the GbAP problem on trees. In the following lemma we prove the approximation guarantee of Algorithm 1.

Algorithm 1 GbAP for input tree T.
Lemma 22.

Algorithm 1 finds a 2-approximation for the GbAP problem on trees.

Proof.

From Lemma 19 in the case when the tree has two diametral paths with only the centers as common vertices, the first activator must be on a center. Furthermore, by Lemma 20 any optimum solution takes 𝟣+𝖽/𝟤 rounds in this case. Therefore, c followed by any arbitrary sequence of 𝖽/𝟤 vertices on the diametral path P as activators is an optimal solution. In the other case, the tree has either a unique diametral path or overlapping diametral paths with length of the common subpath strictly greater than 2. In that case, Lemma 21 states that there exists an optimum solution that places all the activators on a diametral path. In this case, Algorithm 1 finds a sequence to optimally burn the diametral path P and outputs the same sequence as the burning sequence for the GbAP problem on T. Let ALG be the number rounds required by Algorithm 1 and let OPT be the number of rounds required by an optimum solution. It is straight forward to argue that after burning the path P in 𝖽+𝟣 rounds, Algorithm 1 will take at most 𝖮𝖯𝖳 many additional rounds. Therefore, 𝖠𝖫𝖦𝖽+𝟣+𝖮𝖯𝖳. But number of rounds required by any optimal solution is at least the number of rounds required to burn the diametral path. Therefore, 𝖮𝖯𝖳𝖽+𝟣 and 𝖠𝖫𝖦𝖮𝖯𝖳𝟤. Hence, the lemma follows. Finally, in Lemma 23 we prove the running time of Algorithm 1.

Lemma 23.

The running time of Algorithm 1 is O(n)

Proof.

In a tree, a diametral path P, the length of P, and the centers of P can be found using two invocations of a breadth first search algorithm. Any diametral path P other than P must contain at least all the centers. Therefore, the existence of such a path can be checked using another breadth first search from one of the (at most two) centers. Finally, finding an optimal burning sequence on a path takes O(n) time. Therefore, the running time of Algorithm 1 is O(n). Combining Lemma 22 and Lemma 23 yields the following theorem.

Theorem 24.

There exists a deterministic 2-approximation algorithm for the GbAP problem on trees with running time O(n).

5 Graph burning with known activators

In this section, we consider our second variant of the graph burning problem where a set of activators used by an optimal solution is given as input. We remind the reader that a motivation to consider this variant is to develop better approximation algorithms or efficient heuristic based algorithms. We call the set of activators used by an optimal algorithm as the optimal activator set. Formally, we define the following variant of the graph burning problem.

Definition 25 (Graph burning with Activators as Input (GbAI)).

The input is a graph G and an optimal activator set. The goal is to design an optimal burning sequence.

The GbAI problem is known to be NP-hard [16]. In this section, we present a deterministic 2-approximation and a randomized better than 2-approximation algorithm for the GbAI problem. We also show that the GbAI problem is fixed parameter tractable parameterized by the size of the optimal activator set.

5.1 A deterministic 2-approximation algorithm

Let 𝒮 be the optimal activator set given as input. Our approach is to burn the activators in the set 𝒮 in any arbitrary order. A simple argument shows that the above straightforward deterministic approach results in a 2-approximation for the GbAI problem.

Theorem 26.

GbAI admits a deterministic 2-approximation algorithm.

Proof.

Let k=|𝒮|. Let 𝖠𝖫𝖦 be the number of rounds required by our approach and let 𝖮𝖯𝖳 be the number of rounds required by an optimum solution. Clearly, 𝖮𝖯𝖳k. It is easy to observe that after burning the activators in the set 𝒮, our approach will require at most 𝖮𝖯𝖳 many additional rounds. Therefore, 𝖠𝖫𝖦𝗄+𝖮𝖯𝖳 and 𝖠𝖫𝖦𝖮𝖯𝖳𝟤. Hence the theorem.

5.2 A randomized better than 2-approximation algorithm

Let 𝒮 be the optimal activator set given as input. Our approach is to select the activators one by one uniformly at random from the set 𝒮 without replacement and burn them. Again, a simple argument shows that the above randomized approach yields a better than 2-approximation for the GbAI problem.

Theorem 27.

GbAI admits a randomized better than 2-approximation algorithm.

Proof.

Let k=|𝒮|. Among the k! different sequences of the activators in 𝒮, at least one results in the optimal burning sequence. Therefore, probability that we obtain an optimal burning sequence by sampling uniformly at random without replacements is at least 1k!. Let 𝖠𝖫𝖦 be the number of rounds required by our approach and let 𝖮𝖯𝖳 be the number of rounds required by an optimum solution. Clearly, 𝖮𝖯𝖳k. In the case our sampling does not obtain an optimal burning sequence, it is easy to observe that after burning the activators, our approach will require at most 𝖮𝖯𝖳 many additional rounds. Therefore, In the case our sampling does not obtain an optimal burning sequence, total rounds required is 𝟤𝖮𝖯𝖳. Hence, 𝖠𝖫𝖦𝟣𝗄!𝖮𝖯𝖳+(𝟣𝟣𝗄!)(𝟤𝖮𝖯𝖳) and 𝖠𝖫𝖦𝖮𝖯𝖳𝟤𝟣𝗄!. Hence the theorem.

5.3 GbAI is fixed parameter tractable

Let 𝒮 be the optimal activator set given as input and k=|𝒮|. Also, let 𝗉𝖾𝗋𝗆(𝒮) denote the set of all permutations of the elements in 𝒮. We present Algorithm 2.

Algorithm 2 GbAI for input graph G(V,E) and optimal activator set 𝒮.
Lemma 28.

Algorithm 2 outputs an optimal burning sequence.

Proof.

Let {o1,o2,,ok}𝗉𝖾𝗋𝗆(𝒮) be an optimal burning sequence. Therefore, such a sequence satisfies the condition 𝖭𝗄𝟣[𝗈𝟣]𝖭𝗄𝟤[𝗈𝟤]𝖭𝗄𝟥[𝗈𝟥]𝖭𝟢[𝗈𝗄]= V. Since Algorithm 2 uses an exhaustive search on the set 𝗉𝖾𝗋𝗆(𝒮), it must provide an optimal burning sequence.

Lemma 29.

For an input graph G with n vertices and an optimal activator set of size k, Algorithm 2 takes O(2klogkn2) time.

Proof.

Let m be the number of edges and n be the number of vertices in graph G. Computing the 𝖭𝗋[𝗏] data structure requires a single breadth first search for vertex 𝗏. Therefore, the first for loop (Line 1 to 5) takes O((m+n)k) times. Each set 𝖭𝗋[𝗏] is of size at most n. The second for loop (Line 6 to 10 in Algorithm 2) takes O(n) time for every sequence in the set 𝗉𝖾𝗋𝗆(𝒮). Therefore, total time required by the second for loop is O(nkk). Thus, total running time of Algorithm 2 is O((m+n)k+nkk). For m=O(n2), running time is O(kkn2) = O(2klogkn2). Hence, the lemma follows. Combining Lemma 28 and Lemma 29 yields the following theorem.

Theorem 30.

The GbAI problem is FPT when parameterized by the size of the optimal activator set.

6 Conclusions

In this paper we have studied the edge burning problem, and provided a collection of interesting results. After showing that it is NP-complete, we have provided linear-time algorithms for split graphs and cographs and we have shown that the problem admits a linear kernel when parameterized by neighborhood diversity. Furthermore, we have shown that the absolute difference between the edge burning number and the burning number for a graph is at most 1. We believe that this relationship between the edge burning number and the burning number for a graph can be of independent interest. We have also proved another relationship between the edge burning number and the burning number through the line graph and used this relationship to prove several properties of edge burning and graph burning on special graph classes. Our work raises some interesting and perhaps intriguing questions. One interesting direction is to find graph classes for which edge burning and graph burning have different computational complexities, say one problem is NP-hard and the other is polynomially solvable. Are there any such problems? Another interesting direction is to find graph classes for which the edge burning number is exactly the same as the burning number.

References

  • [1] Dhanyamol Antony, Anita Das, Shirish Gosavi, Dalu Jacob, and Shashanka Kulamarva. Graph burning: Bounds and hardness, 2025. doi:10.48550/arXiv.2402.18984.
  • [2] Stéphane Bessy, Anthony Bonato, Jeannette C. M. Janssen, Dieter Rautenbach, and Elham Roshanbin. Burning a graph is hard. Discret. Appl. Math., 232:73–87, 2017. doi:10.1016/j.dam.2017.07.016.
  • [3] Anthony Bonato, Jeannette Janssen, and Elham Roshanbin. How to burn a graph. Internet Mathematics, 12(1-2):85–100, 2016. doi:10.1080/15427951.2015.1103339.
  • [4] Anthony Bonato, Jeannette C. M. Janssen, and Elham Roshanbin. Burning a graph as a model of social contagion. In Anthony Bonato, Fan Chung Graham, and Pawel Pralat, editors, Algorithms and Models for the Web Graph - 11th International Workshop, WAW 2014, Beijing, China, December 17-18, 2014, Proceedings, volume 8882 of Lecture Notes in Computer Science, pages 13–22. Springer, 2014. doi:10.1007/978-3-319-13123-8_2.
  • [5] Anthony Bonato and Shahin Kamali. Approximation algorithms for graph burning. In T. V. Gopal and Junzo Watada, editors, Theory and Applications of Models of Computation - 15th Annual Conference, TAMC 2019, Kitakyushu, Japan, April 13-16, 2019, Proceedings, volume 11436 of Lecture Notes in Computer Science, pages 74–92. Springer, 2019. doi:10.1007/978-3-030-14812-6_6.
  • [6] Peter Brass, Christian Knauer, Hyeon-Suk Na, Chan-Su Shin, and Antoine Vigneron. The aligned k-center problem. Int. J. Comput. Geom. Appl., 21(2):157–178, 2011. doi:10.1142/S0218195911003597.
  • [7] D.G. Corneil, H. Lerchs, and L.K. Stewart. Complement reducible graphs. Discrete Applied Mathematics, 3:163–174, 1981. doi:10.1016/0166-218X(81)90013-5.
  • [8] D.G. Corneil, Y. Perl, and L.K. Stewart. A linear recognition algorithm for cographs. SIAM Journal on Computing, 14:926–934, 1985. doi:10.1137/0214065.
  • [9] Arya Tanmay Gupta, Swapnil A Lokhande, and Kaushik Mondal. Burning grids and intervals. In Algorithms and Discrete Applied Mathematics: 7th International Conference, CALDAM 2021, Rupnagar, India, February 11–13, 2021, Proceedings 7, pages 66–79. Springer, 2021. doi:10.1007/978-3-030-67899-9_6.
  • [10] Michaela Hiller, Arie MCA Koster, and Eberhard Triesch. On the burning number of p-caterpillars. In Graphs and Combinatorial Optimization: from Theory to Applications: CTW2020 Proceedings, pages 145–156. Springer, 2020.
  • [11] Anjeneya Swami Kare and I Vinod Reddy. Parameterized algorithms for graph burning problem. In Combinatorial Algorithms: 30th International Workshop, IWOCA 2019, Pisa, Italy, July 23–25, 2019, Proceedings, pages 304–314. Springer, 2019. doi:10.1007/978-3-030-25005-8_25.
  • [12] Yasuaki Kobayashi and Yota Otachi. Parameterized complexity of graph burning. Algorithmica, 84(8):2379–2393, 2022. doi:10.1007/S00453-022-00962-8.
  • [13] S. Komala and U. Mary. Burning, edge burning & chromatic burning classification of some graph family. Journal of Discrete Mathematical Sciences and Cryptography, 27(2-B):665–674, 2024.
  • [14] S. Komala and U. Mary. Edge burning: Relationship between edge and vertex burning of grid graph. Journal of Dynamics and Control, 8:1–12, 2024.
  • [15] Michael Lampis. Algorithmic meta-theorems for restrictions of treewidth. Algorithmica, 64(1):19–37, 2012. doi:10.1007/S00453-011-9554-X.
  • [16] Debajyoti Mondal, Angelin Jemima Rajasingh, N. Parthiban, and Indra Rajasingh. Apx-hardness and approximation for the k-burning number problem. Theor. Comput. Sci., 932:21–30, 2022. doi:10.1016/j.tcs.2022.08.001.
  • [17] Douglas B. West. Introduction to Graph Theory, page 72. Prentice Hall, Upper Saddle River, N.J., second edition, 2001.