graph minor theory and its algorithmic …paboulker/content/graph_minors...1 - characterization of...

135
Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms Pierre Aboulker - [email protected] Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 1 / 135

Upload: others

Post on 05-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Graph Minor Theory and its algorithmic consequencesMPRI Graph Algorithms

Pierre Aboulker - [email protected]

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 1 / 135

Page 2: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

1 - Characterization of graph classes by forbiddenconfigurations

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 2 / 135

Page 3: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Graph theory

Graphs: a mathematical object and an efficient modeling tool.

Important questions:

What classes of graphs have good algorithmic properties? (colouring, cliquemax...)

What classes of graphs have good structural properties? (decompositiontheorem, elimination ordering...)

Forbidding a substructure:

Minors: Robertson and Seymour, 1983-2012

Topological minors

Induced subgraphs

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 3 / 135

Page 4: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Basic Definitions and Terminology

In this course, all graphs are simple (no parallel edges) and without loop.

If G is a graph, we denote V (G ) its set of vertices and E (G ) its set of edges.

A vertex v is a neighbour of a vertex u if uv ∈ E (G ). The neighbourhood of u,denoted N(u) is the set of neighbours of u.Its degree, denoted d(u) is the cardinality of its neighbourhood. The maximumdegree of a graph is denoted ∆(G ).

A graph with no edge is stable set, or independent set, and a graph with allpossible edges (

(n2

)) is a clique, or complete graph. The complete graph on n

vertices is denoted Kn. The complete bipartite graph with parts of size a and b isdenoted Ka,b.

The path Pk is a graph with V (Pk) = x1, x2, . . . , xk, with edgesE (Pk) = xixi+1, 1 ≤ i ≤ k − 1. The vertices x1 and xk are called theendpoints of the path. If we add the edge xkx1 to Pk then the resulting graph isthe cycle on k vertices, denoted Ck .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 4 / 135

Page 5: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Chromatic number

χ(G )= minimum number of colors needed to color the vertices in such a way thatadjacent vertices receive distinct colors. In other words its a partitioning of thevertex sets into stable sets, minimizing the number of stable sets.

Exercice 1What is the chromatic of Ka,b? Kn? Cn?

Let k an integer. A class of graphs C is k-degenerate if for all G ∈ C, G has avertex of degree at most k.

Exercice 2Let C be a k-degenerate class of graphs closed under taking induced subgraph.Prove that all graphs in G has chromatic number at most k + 1.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 5 / 135

Page 6: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Containment relationsWe define four operations on a graph G :

1 Remove a vertex v (and all its incident edges) , denoted G \ v .

2 Remove an edge e (but not its end vertices) , denoted G \ e.

3 Contract an edge e = xy , denoted G/e :(i.e. remove x and y , add a new vertex z with neighbourhoodN(z) = (N(x) ∪ N(u)) \ z (no loops))

4 Topological contraction is a contraction of edge e that has an endvertex ofdegree 2. Its inverse is the subdivision operation which consists in removingan edge xy , adding a new vertex z , and adding the edges xz and zy .

DefinitionLet G and H be two graphs.

H induced subgraph of G if H obtained from G by the repeated use of 1.

H subgraph of G if H obtained from G by the repeated use of 1 and 2.

H topological minor of G if H is a minor of G and every contraction usedwas topological.

H minor of G if H obtained from G by the repeated use of rule 1,2 and 3.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 6 / 135

Page 7: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Partial orders

Each of these containment relation defines a partial order on graphs:

H induced subgraph of G : H ⊆i G

H subgraph of G : H ⊆ G

H topological minor of G : H t G

H minor of G : H m G

Let be any of these orders. We say that a class of graphs C is -closed(subgraph-closed, minor-closed...) if for all G ∈ C: H G ⇒ H ∈ C. .

The class of planar graphs if minor closed (and thus topological-minor-closed,subgraph-closed and induced-subgraph-closed).

The class of bipartite graphs is subgraph-closed, but nottopological-minor-closed.

The class of all graphs whose connected components are cliques isinduced-subgraph-closed, but not subgraph-closed.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 7 / 135

Page 8: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Minors

Here is an equivalent definition for minors that is often useful:

Lemma

Let G and H be two graphs, and denote V (H) = v1, . . . , vp. Then H is a minorof G if and only if there exists p connected and disjoint subgraphs G1, . . . ,Gp ofG such that for every edge vivj of H, there exists an edge between Gi and Gj .The graphs induced by G1, . . . ,Gp is called a H-model of G .

Exercice 3

Show that the (3× 3)-grid has a K4-minor

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 8 / 135

Page 9: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Topological Minors

A topological minor is also called subdivision.Here is an equivalent definition of topological minor.

DefinitionA graph H is topological minor of a graph G if there exists a injective mapping ffrom V (H) to V (G ) such that for each edge uv of H, there exists in G a pathPuv connecting f (u) and f (v) in G with the property that all these path areinternally disjoint.

Exercice 4Describe the graphs that do not contain the following graphs as topologicalminors : K3, K1,3, K1,4.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 9 / 135

Page 10: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Classes of graph defined by forbidden configurations

For a set F of graphs, let Forb4(F) = G : ∀F ∈ F ,F G i.e. the class ofgraphs not containing any graphs of F under 4-relation. We say such graph areF-4-free.

Forb4t (K5,K3,3) = planar graphs = (K5,K3,3-topological minor free graphs.

Forb⊆(C3,C5,C7, ...) = ?? bipartite graphs.

Forb⊆i (K1,2) = ?? graphs whose connected components are cliques.

A graph F is a 4-obstruction for a class G if F /∈ G but for every H 4 G , H ∈ C.Let Obst4(C) be the set of all 4-obstruction of G.

K5 is a topological-minor-obstruction for planar graphs since K5 is not planar,but every proper topological-minor of K5 is.

K6 is not a topological-minor-obstruction for planar graphs since K5 4t K6

and K5 is not planar.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 10 / 135

Page 11: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Exercises

Exercice 5 (*)

Let C be a class of graphs and 4 a containment relation on graphs. Prove that Cis 4-closed if and only if there exists a (possibly infinite) set of graphs F suchthat C = Forb4(F).

Exercice 6Prove that a graph G is a forest if and only if it does not contain C3 as a minor.

Exercice 71 Prove that every graph with average degree at least 2r−2 contains Kr as a

minor.

2 For r fixed, does there exist Kr minor-free graphs with arbitrarily largechromatic number?

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 11 / 135

Page 12: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

2 - Three Algorithmic Problems

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 12 / 135

Page 13: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

A Classical Connectivity Problem

Consider the following problem of connectivity.

Problem ( k disjoint paths problem)

Input : A graph G , an integer k and two subsets of vertices A and B of size kOutput : TRUE if there exists k vertex disjoint paths from A to B

CLASSIC : Can be solved in time O((k |E (G )|) using Ford-Fulkerson Algorithm.

From a structural point view, the maximum number of paths linking A and Bcorrecponds to a minimum vertex cut separating A and B and is a classical resultof Menger.

Theorem (Menger,1927)

Let x and y be distinct vertices of a graph G . Then the minimum number ofvertices whose deletion separates x from y is equal to the maximum number ofinternally disjoint paths linking x and y .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 13 / 135

Page 14: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Exercise on connectivity

Let G be a graph, x ∈ V (G ) and Y ⊆ V (G ) \ x. A family of k internallydisjoint (x ,Y )-paths whose terminal vertices are distinct is referred to as a k-fanfrom x to Y .

Exercice 8Let G be a k-connected graph.

1 Let x be a vertex of G, and let Y ⊆ V \ x be a set of at least k vertices ofG . Then there exists a k-fan in G from x to Y . (This property is known asthe Fan Lemma).

2 Let S be a set of k vertices in a k-connected graph G , where k ≥ 2. Thenthere is a cycle in G which includes all the vertices of S .

For a very good presentation of Menger Theorem and its consequences, see thebook Graph Theory of J. A. Bondy and U. S. R. Murty, chapters 9.1 and 9.2.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 14 / 135

Page 15: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

A similar problem.

Problem (k-disjoint rooted paths problem)

Input : A graph G , an integer k , and two subsets of vertices S = s1, s2, . . . , skand T = t1, t2, . . . , tkOutput : TRUE iff there exists disjoint paths P1,P2, . . . ,Pk , such that Pi is apath from si to ti .

Crucial role in VLSI design, related to commodity flow problem, manyapplications.

With k ≥ 2 part of the input, this problem is NP-complete, even restricted tothe class of planar graphs.

Nevertheless, in the Graph Minor series of papers, Robertson and Seymourproved a polynomial algorithm for fixed k .

Theorem (Robertson-Seymour, 1995 (XIII))

The k-disjoint rooted path problem can be solved in time O((f (k).n3

)(improved to quadratic time by Kawarabayashi, Kobashi and Reed, 2012)

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 15 / 135

Page 16: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Topological Minor Detection I

Problem (Topological H-minor detection)

Input : A graph G and a graph H.Output : TRUE if H is a topological minor of G , FALSE otherwise.

With H part of the input : NP-complete

With H fixed, polynomial thanks to the k-disjoint path problem algorithm:

I Complexity : O(f (k)nk

), where k = |V (H)|, and n = |V (G)|. Therefore

polynomial for every fixed k. Such an algorithm is called (XP), see later inthe course.

I In 2010, Grohe, Kawabarayashi, Marx, and Wollan proved much better:O(f (k)n3

). Such an algorithm is called Fixed Parameter Tractable (FPT)

algorithm (see later in the course)

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 16 / 135

Page 17: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Topological Minor Detection II

TheoremLet H be a fixed graph with k edges. One can decide whether H is a topologicalminor of a given graph G in time O

(f (k)nk

).

Sketch proof:Let f : V (H)→ V (G ) be an injection.Observe that there is

(n

|V (H)|)

such objects

We want to decide if there exists disjoint paths in G between the f (v)corresponding to edges of H.To do that, we replace each vertex f (v) by dH(v) copies of f (v) (having the sameneighbours).Now, for k = |E (H)|, solving the k-Rooted Disjoint Path Problem for thesesources clearly solves the desired question.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 17 / 135

Page 18: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Consequences

In particular, the previous theorem implies that any family of graphs that isdefined with forbidding a FINITE family of graphs as topological minors ispolynomially testable.

In other words if C = Forb4t (F) where F is a finite set of graphs, then we candecide in polynomial time if a graph G belongs to C.

Example of such class?

Theorem (Kuratowski, 1930)

A graph G is planar if and only if it does not contain K5 nor K3,3 as a topologicalminor.

Note that one does not need to solve k rooted paths problem to get polytimealgorithms for recognizing planar graphs (there exist even linear algorithms to dothat).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 18 / 135

Page 19: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

3 - Wagner Conjecture and minor closed classes

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 19 / 135

Page 20: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Wagner Conjecture (now Graph Minor Theorem)

Reinhart Diestel

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 20 / 135

Page 21: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Minors Vs Topological Minors

By definition: H topological minor of G ⇒ H minor of G

Exercise: converse not true: find a pair of graphs G and H such that H is aminor of G but H is not a topological minor of G .

When H is subcubic (maximum degree at most 3), this is nevertheless true.

TheoremLet H be a graph with maximum degree at most 3. Then a graph G has anH-minor if and only if it contains an H-subdivision.

Sketch proof:

Assume H is a minor of G

Let G ′ be a minimal topological minor of G such that H is a minor of G (i.e.(i.e. [V (G )|+ |E (G )| is minimized).

Look at an H-model (G1, . . . ,Gp) (where p = |V (H)|) of G .

By minimality of G , each Gi is a tree with at most 3 leaves and no vertex ofdegree 2

Each such tree must be a star, so we get the topological minor

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 21 / 135

Page 22: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Minors Vs Topological Minors

A similar argument proves this more general result.

TheoremFor every graph F , there exists a finite family of graphs F such that:G contains F as a minor if and only if it contains some graph in F as atopological minor.In other words: Forb4t (F ) = Forb4m(F).

This result combined with the theorem on topological minor detection now clearlyimplies the following theorem.

Theorem (Robertson and Seymour, 1995)

Let H be a fixed graph. There exists a polynomial time algorithm to decidewhether H is a minor of a given graph G .

Corollary

If C is a class of graphs defined by forbidding finitely many minors, then thereexists a polynomial algorithm to decide wether an input graph belongs to C

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 22 / 135

Page 23: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Wagner Conjecture

QuestionWhat are the families defined by finitely many forbidden minors?

Examples :

Graph Class Minor minimal graphsForests triangle

Union of Paths triangle, clawPlanar K5 , K3,3

Toric ≥ 16629 (but finite)

Exercice 9For each of the following classes, decide if it is minor closed or not. If not, try todescribe the smallest minor closed class containing it : cliques, paths, cycles,graphs of max degree k?

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 23 / 135

Page 24: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Minor Closed Classes

QuestionWhat are the families defined by finitely many forbidden minors?

A trivial fact is that such families are closed under minors (every minor of agraph in the family is in the family).

In a monumental work (>700 pages of proof, Graph Minors I-II-III-...-XXV),Robertson and Seymour solved a conjecture of Wagner from 1937 saying thatthis is sufficient.

Theorem (Graph Minor Theorem, Robertson and Seymour, XX)

Any minor closed class of graphs is defined by a finite list of forbidden minors

With an important consequence (among many others):

Corollary

If C is a minor closed class, then there exists a polynomial time algorithm todecide if an input graph belongs to C.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 24 / 135

Page 25: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Exercises

Exercice 10

Prove that the following problems are solvable in time O(f (k)n3

).

k-Feedback vertex setInput : A graph G .Output : TRUE if there exists k vertices in G that intersect every cycle of G .

k-Vertex CoverInput : A graph G .Output : TRUE if there exists a set S of at most k vertices in G such thatevery edge of G is incident to at least one vertex of S .

k-leaf Spanning TreeInput : A graph G .Output : TRUE if there exists in G a spanning tree T with at least k leaves.

HINT: Observe that for each of these problems, the set of TRUE instances isclosed under taking minor.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 25 / 135

Page 26: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

4 - Well Quasi Orders and Wagner Conjecture

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 26 / 135

Page 27: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Introduction

In this section we will try to understand some of the ideas behind the proof ofWagner’s conjecture by proving similar but (much) easier results.

We first introduce the notion of well quasi order that gives an equivalent way tostate Wagner Conjecture.

Then we will prove a theorem due to Kruskal saying that trees are well quasiordered for the minor relation.

In the next section, we will explain through the notion of treewidth why KruskalTheorem and its proof is central in Robertson and Seymour’s proof.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 27 / 135

Page 28: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Wagner’s Conjecture

Definition (Bounds)

For a given minor closed class C, a graph H is said to be a bound of C if H is notin C but every strict minor of H is.

Proposition

Let C be a minor closed class, and B be its (possibly infinite) set of bounds. ThenG ∈ C if and only if G does not contain any graph of B as a minorIn particular C = Forb4m(B). Moreover, B is the smallest set of graphs with thisproperty.

So Wagner’s conjecture is to prove that a set of bounds is always finite.

Observe that by definition the set of bounds forms an antichain of the minorpartial order: no bound is a minor of another bound.

Is it true that every antichain is finite?

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 28 / 135

Page 29: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Wagner’s Conjecture - continued

Proposition

The following are equivalent :

Every minor closed class has a finite set of bounds

There is no infinite antichain for the minor relation

Definition

A partial order 4 defined on a set X is a well quasi order (WQO) if there is noinfinite decreasing sequence and no infinite antichain.

Wagner’s conjecture is equivalent to say that the class of all graphs with theminor relation is a wqo.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 29 / 135

Page 30: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Exercises on well quasi ordering

Exercice 11For each of these, say if it is a wqo.

(N,6).

(R,6).

(N2,4) where (x , y) 4 (x ′y ′) iff (x 4 x ′ and y 4 y ′),

(G,⊆i ) where G is the class of all graphs (recall that H ⊆i G means H is aninduce subgraph of G ).

Finite trees ordered by subgraph relation.

(G,4) where G 4 H if G topological minor of H

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 30 / 135

Page 31: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Dealing with wqo: a first tool

Proposition

Let (X ,4) be a partially ordered set and (xi )i∈N be any sequence. Then thissequence has an infinite subsequence that is either increasing, or decreasing or anantichain.

Corollary

Let (X ,4) be a partially ordered set. The three assertions are equivalent

1 (X ,4) is a wqo.

2 from every sequence (xi )i∈N one can extract an infinite increasingsubsequence.

3 from every sequence (xi )i∈N one can extract i < j such that xi 4 xj .

This will be useful: in order to prove that a given partial order is a wqo, we willonly prove the third statement, but when we use the fact that an order is a wqo(for example in a proof by induction), we can use the second statement which is(in appearance) much stronger.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 31 / 135

Page 32: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Second tool: extending a partial order

Let (X ,≤) be a partial order. For finite subsets A,B ⊂ X , write A 4 B if there isan injective mapping f : A→ B such that a ≤ f (a) for all a ∈ A.

This naturally extends ≤ to a partial order on [X ]ω, the set of all finite subsets ofX .

Lemma

If X is a WQO, then so is [X ]ω.

Proof [see Diestel, Lemma 12.1.3]: Main idea: start with a “minimum”infinite antichain.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 32 / 135

Page 33: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Proof sketch

Assume for contradiction that [X ]w has an infinite antichain.

We start by constructing a bad sequence (An)n∈N as follows:

Assume inductively that Ai has been defined for every i < n, and that thereexists a bad sequence in [X ]w starting with A0, . . . ,An−1.

Choose An such that some bad sequence starts with (A0, . . . ,An−1,An) and|An| is minimum with this property.

For each n, pick en element an ∈ An, and set Bn = An \ an.

Since X is wqo, (an)n∈N has an infinite increasing subsequence (ani )i∈N

Now look at sequence (A0, . . . ,An0−1,Bn0 ,Bn1 , . . . ).

By the the minimal choice of An, it is not a bad sequence.

Conclude.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 33 / 135

Page 34: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

The graph minor theorem for trees

Theorem (Kruskal 1960)

The finite trees are WQO by the topological minor relation, i.e. for every infinitesequence of trees T0,T1, . . . , there exists i < j such that Ti 4t Tj .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 34 / 135

Page 35: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Proof

Let T1 and T2 be two rooted trees. We say that T1 ≤ T2 if there is a subdivisionof T1 that can be embedded into T2 so that the root of T1 is mapped onto theroot of T2.

We are going to prove (on board) that the set of tree is wqo by ≤ (which isslightly stronger than the announced result).

Reinhart Diestel

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 35 / 135

Page 36: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

5 - TreeWidth

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 36 / 135

Page 37: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Treewidth

We proved (Kruskal Theorem) that Wagner conjecture holds for trees. Somaybe we can use the same ideas to prove Wagner conjecture for graphs thatlook like trees. So we would like a notion that measure how much a graphlooks like a tree.

Moreover, since it is easy to compute on trees, it should be easy to computeon graphs that “looks like” trees.

This is achieved by the notion of Treewidth which is a notion of“treelikeness”. In other words it measures how much a graph look like a tree.

You can understand it like this: if a graph has treewidth 5, then it is atdistance 5 from being a tree. Or it is a tree of width 5.

The goal of this section is to introduce treewidth, tree decomposition, and toextend Kruskal Theorem to graphs with bounded treewidth (no proof), lookat graphs of treewidth at most 3.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 37 / 135

Page 38: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

How much a graph look like a tree

How can we measure how much a graph look like a tree?

1 Number of cycles is bounded

2 The number of vertices we need to remove to get a tree is bounded.

3 Bounded-size parts connected in a treelike way.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 38 / 135

Page 39: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Definition of a tree decomposition and of treewidth

Let G be a graph. A tree decomposition of G is a pair (T ,W ), where T is atree and W = (Wt)t∈V (T ) a collection of subsets of V (G ) indexed on V (T )satisfying :

(T1) For every v ∈ V (G ), there exists t ∈ V (T ) such that v ∈Wt

- every vertex is in some bag -

(T2) For every edge uv ∈ E (G ), there exists t ∈ V (T ) such that u, v ∈Wt

- every edge is in a bag -

(T3) For every u ∈ V (G ), Tu = t ∈ V (T ) , u ∈Wt induces a connectedsubgraph of T .

The width of a tree decomposition is maxt∈V (T )(|Wt | − 1)

The tree width of a graph G , denoted tw(G), is the minimum width of a treedecomposition of G .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 39 / 135

Page 40: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Equivalent definitions of tree decomposition

Definition 2: a tree decomposition of G is a tree T along with a collection ofsubtrees Tv , one for each vertex of G , with the condition that Tu and Tv intersectif uv is an edge of G .

Definition 3: replace property (T3) by the following:

(T3) Vt1 ∩ Vt3 ⊆ Vt2 whenever t1, t2, t3 ∈ V (T ) satisfy t2 ∈ t1Tt3 (where t1Tt3

denote the unique path linking t1 and t3 in T ).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 40 / 135

Page 41: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Example of a tree decomposition

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 41 / 135

Page 42: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Example of a tree decomposition

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 42 / 135

Page 43: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Helly Property

Here is a key lemma regarding subtrees intersection; by analogy with Helly’sTheorem on convex subsets of Rd , this property is often called Helly property forsubtrees of a tree.

LemmaLet T be a collection of pairwise intersecting subtrees of a given tree T . Then∩T∈FT 6= ∅.

Corollary

Let G be a graph and K be a complete subgraph of G . In any tree decomposition(T ,W ) of G , there exists a vertex t of T such that K ⊆Wt .in particular, tw(G ) ≥ ω(G )− 1

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 43 / 135

Page 44: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

A first lower bound on tree-width

Proposition

For every graph G , there exists a tree decomposition of width tw(G ) such that forevery edge st ∈ E (T ), Ws 6⊂Wt and Wt 6⊂Ws . In particular, for every leaff ∈ V (T ), there exists a vertex u ∈ V (G ) such that Tu = f .Such a tree decomposition is called irreducible.

Theorem

In every graph G , there exists a vertex of degree at most tw(G ), i.e.δ(G ) ≤ tw(G ).

Corollary

The class of graph with treewidth at most k is k-degenerated.Hence, for all graphs G , χ(G ) ≤ tw(G ) + 1.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 44 / 135

Page 45: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Separation property of tree decompositions

The following is an easy but fundamental result. It says that a tree decompositiontransfers the separation properties of the tree to the decomposed graph.

Proposition

Let (T ,W ) be a tree decomposition of G and t1t2 be an edge of T and letS = Wt1 ∩Wt2 . For i = 1, 2, denote by Ti the connected component of T \ t1t2

containing ti , and Gi the subgraph of G induced by ∪t∈Ti (Wt \ S). Then S is acutset of G separating G1 from G2.

Or equivalently

Theorem

If H is a connected subgraph of G , then for any tree decomposition (T ,W ) of G ,∪v∈V (H)Tv induces a subtree of T .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 45 / 135

Page 46: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Closure property

Proposition

Let G be a graph, v a vertex of G and e an edge of G .

tw(G \ e) ≤ tw(G )

tw(G \ v) ≤ tw(G )

tw(G/e) ≤ tw(G )

Proof:

for G \ e, do nothing

for G \ v , just remove v from every bag containing it.

for G/e, where e = uv : let w be the new vertex. Add w in every bagcontaining u or v , and delete every occurrence of u and v .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 46 / 135

Page 47: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Treewidth and Minors

Proposition

If H is a minor of G , then tw(H) ≤ tw(G )

Corollary

The class of graphs of treewidth at most k is closed under taking minors.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 47 / 135

Page 48: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Wagner’s conjecture for graphs with bounded tree-width

Graphs with bounded treewidth are sufficiently similar to trees that it becomespossible to adapt the proof of Kruskal Theorem to them.

Very roughly, one has to iterate the “minimal bad sequence” used in Kruskal prooftw(G ) times.

This takes us a step further towards a proof of the Graph Minor Theorem:

Theorem (Robertson and Seymour, IV)

For every integer k, the class of graphs with treewidth at most k is well quasiordered by the minor relation.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 48 / 135

Page 49: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Bounds for graphs with treewidth at most 2

So, for every fixed k , the class G : tw(G ) 4 k has a finite number of bounds.

Let us try to describe the bounds for small values of k .

Theorem

tw(G ) ≤ 1⇔ G is a forest ⇔ G does not contain K3 as a minor⇔ G ∈ Forb4m(K4)

tw(G ) ≤ 2⇔ G does not contain K4 as a minor ⇔ G ∈ Forb4m(K4)

The first item is easy, let us prove the second.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 49 / 135

Page 50: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Proof sketch:

If G contains K4 as a minor, then tw(G ) ≥ tw(K4) = 3. Sotw(G ) ≤ 2⇒ G ∈ Forb4m(K4).

Let G ∈ Forb4m(K4) and let us prove that tw(G ) ≤ 2. We proceed byinduction on V (G ).

So every proper induced subgraph of G has treewidth at most 2.

Prove first that every 3-connected graph contains K4 as a minor (Use MengerTheorem).

So we may assume that G has a cutset of size S at most 2.

If S is of size 1, conclude.

Assume S = a, b.If ab /∈ E (G ), then add ab to G and prove that this does not create aK4-minor.

So now S is a clique (we call that a clique cutset).

Let C1 be a connected component of G \ S and C2 = G \ (S ∪ C1).

For i = 1, 2, set Gi = G [Ci ∪ S ] (The Gi are often called blockdecomposition). By minimality of G , tw(Gi ) 4 2.

Take a tree decomposition of G1 and G2 of width at most 2 and link a bag ofG1 containing ab to a bag of G2 containing ab.

Prove that this is a tree decomposition of G of width 2.Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 50 / 135

Page 51: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Bounds for graphs with treewidth at most 2

Theorem

tw(G ) ≤ 1⇔ G ∈ Forb4m(K3)

tw(G ) ≤ 2⇔ G ∈ Forb4m(K4)

The proof for tw(G ) = 2 shows the role of separators with treewidth.

One could hope for a general result of the type:

tw(G ) ≤ k iff G ∈ Forb4m(Kk+2) FALSE

There exists graph with no K5 minor with arbitrarily large treewidth.(As we will soon see, even planar graphs can have arbitrarily large treewidth).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 51 / 135

Page 52: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Bounds for graphs with treewidth at most 3

Theorem

tw(G ) ≤ 3⇔ G does not contain one of the four following graphs as as a minor :K5,W8, O and C5 × K2.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 52 / 135

Page 53: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Digression : Hadwiger Conjecture

We know that for every graph G :

ω(G ) ≤ χ(G ) ≤ tw(G ) + 1

ω(G ) ≤ ωm(G ) ≤ tw(G ) + 1

where ωm(G ) denotes the largest integer k such that G has a Kk minor.

Conjecture (Hadwiger)

For every graph G , χ(G ) ≤ ωm(G ).

For k = 2: ωm(G ) ≤ 2⇔ G is a forest ⇒ χ(G ) ≤ 2.

For k = 3: ωm(G ) ≤ 3⇔ tw(G ) ≤ 2⇒ χ(G ) ≤ 3 by the above inequalities.

For k = 4: ωm(G ) ≤ 4⇒ χ(G ) ≤ 4 contains the Four Colour Theorem sinceplanar graphs are K5-minor free. In fact it is equivalent (and hence true),thanks to a structural characterisation of graphs with no K5 minor due toWagner.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 53 / 135

Page 54: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Theorem (Wagner, 1956)

G is K5-minor free if and only G is a subgraph of some graph built recursively byclique sums operation, starting from planar graphs and W8.

We will see later in the course that this theorem together with the 4-color theoremimplies Hadwiger conjecture for k = 5, that is

ωm(G ) ≤ 4⇒ χ(G ) ≤ 4

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 54 / 135

Page 55: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Exercises on treewidth

Exercice 12

Prove that if H is a subdivision of G , then tw(H) = tw(G )

The following exercise says that classes of graphs with bounded treewidth aresparse.

Exercice 13Show that graphs G of treewidth at most k with k ≥ 1 have strictly less thank |V (G )| edges.

Next exercise is very important to design algorithm based on the treedecomposition.

Exercice 14

Show that every graph G admits a tree decomposition of width tw(G ) with atmost |V (G )| bags.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 55 / 135

Page 56: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Exercises on treewidth

Exercice 15Determine the treewidth of a path, a tree, a complete graph, a complete bipartitegraph, the cube.

Exercice 16

Prove that if G contains (as a subgraph) a complete bipartite graph with parts Aand B, then in every tree decomposition there exists a bag that contains A or abag that contains B.

Exercice 17Prove that if x and y are two vertices that are joined by k + 1 internally vertexdisjoints paths, then in every tree decomposition of G of width at most k, thereexists a bag containing both x and y .

Exercice 18

Prove that if G is K2,3-minor-free then tw(G ) ≤ 3.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 56 / 135

Page 57: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Treewidth also plays a crucial role in algorithmic, we’llcome back to it.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 57 / 135

Page 58: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

6 - Brambles - Duality - Cops and Robbers

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 58 / 135

Page 59: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

In the previous section, we have seen that Wagner Conjecture holds for class ofgraphs with bounded treewidth.

To make a proof of the general case, we should be able to say stuff about thegraphs it does not cover, i.e. to deduce informations about a graph from theassumption it has large treewidth.

The main theorem of this section achieves that: it identifies a canonicalobstruction to small treewidth, a structural phenomenon that occurs in a graph ifand only if it has large treewidth.

This phenomenon is called Bramble.(In reality, it is mainly used to get certificate on the value of the treewidth of agraph, the notion of tangle is used as an obstruction for large treewidth, but wewon’t see it during this class).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 59 / 135

Page 60: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Bramble

DefinitionWe say that two connected subgraphs of G touch if they have non emptyintersection or if they are joined by an edge.

A bramble of G is a collection B of connected subgraphs that are pairwisetouching.

A transversal of a bramble B is a set of vertices of G that has non emptyintersection with each element of B.

The order of a bramble B is the minimum size of a transversal of B.

The bramble number of G , denoted bn(G ), is the maximum order of abramble of G .

Note that if G contains Kp as a minor, then the connected subgraphs of aKp-model of G form a bramble (no intersection, just touching) of order p.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 60 / 135

Page 61: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

A Bramble

A bramble of order 4 of G3,3:

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 61 / 135

Page 62: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Duality Theorem I

Proposition

If (T ,W ) is a tree decomposition of G and B is a bramble in G , then there existst ∈ T such that Wt is a transversal of B

Proof sketch: (main idea: usual ”orientation of edges of the treedecomposition”.)

For each edge t1t2, if S = Wt1 ∩Wt2 intersects all sets of the bramble, we aredone.

Otherwise, for i = 1, 2, denote by Ti the connected component of T \ t1t2

containing ti , and Gi the subgraph of G induced by ∪t∈Ti (Wt \ S).

We know that S is a cutset of G separating G1 from G2.

If B ∈ B does not intersect S , then there is i ∈ 1, 2 such that B ⊆ Gi .

Moreover, since S is a cutset separating G1 from G2, all such B are containdin the same Gi .

Orient the edge t1t2 toward ti . Hence, we may assume that all edges of thetree deomposition has an orientation.

The last vertex t of a maximal directed is a sink (no arc is oriented towardit), Wt is a transversal of B.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 62 / 135

Page 63: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Duality Theorem II

Proposition

If (T ,W ) is a tree decomposition of G and B is a bramble in G , then there existst ∈ T such that Wt is a transversal of B

Therefore bn(G ) ≤ tw(G ) + 1.I other words, if B is a bramble of G , then tw(G ) + 1 is at least the order of B

The converse inequality is true but harder to prove.It gives the following sort of minmax theorem (in fact maxmin=minmax).

Theorem (Seymour and Thomas, 1993)

For every graph G , bn(G ) = tw(G ) + 1

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 63 / 135

Page 64: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

What is the treewidth of the grid?

Proposition

Prove that the treewidth of the grid Gn,n is equal to n.

To prove that tw(Gn,n) ≤ n, find a tree decomposition (actually you can finda path decomposition) of width n.

To prove that tw(Gn,n) ≥ n, it is enough to find a bramble of order n + 1.

It is easy to check that the following is a bramble of order n + 1:I A = xi,1, 1 ≤ i ≤ n, the last row,I B = x1,j , 1 ≤ j < n the last column minus its last element,I Cij = xkj , 1 ≤ k < n ∪ xik , 1 ≤ k < n, (crosses minus the last element

of row and column).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 64 / 135

Page 65: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

A Game of Cops and Robber

2 player game on a graph: one controls the Robber, the other control Cops

Goal of the cops is to capture the robber

Many variants exist

In our variant :

cops and robbers are standing on vertices of the graph

at each turn a fraction of the cops can move by helicopter and land on anyvertex of the graph.

The robber sees an helicopter approaching and can instantly move at infinitespeed to any other vertex along a path of a graph. The only constraint isthat he is not permitted to run through a vertex occupied by some cop.

The cops win if at some point they occupy all vertices adjacent to the position ofthe robber, and an extra cop lands by helicopter on the robber.

Definition

The cop number of a graph G , denoted cn(G ), is the smallest number of copsneeded to ensure the capture of the robber.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 65 / 135

Page 66: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

TreeDec = strategy for the cops

Proposition

cn(G ) ≤ tw(G ) + 1

Put every cop one the vertices of some bag Wt .

The robber, if it escapes has to be in some vertex appearing only in the bagsof some component of T \ t.

Let t ′ the neighbour of t in T in the direction of this component.

Wt ∩Wt′ separates the component containing he robber form the rest of thegraph.

At the next move, cops in Wt \Wt′ move to occupy all of Wt′ .

Cops apply this strategy until it reaches some leaf of the tree and the robbercannot escape.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 66 / 135

Page 67: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Brambles = Strategy for the Robber

Proposition

bn(G ) ≤ cn(G )

Let B be a bramble of order bn(G ) and assume only bn(G )− 1 cops.

Let C be the set of initial positions of the cops.

By definition there exists a set X ∈ B such that X ∩ C = ∅.The robber moves to some vertex x ∈ X .

After that, the game really begins, cops move so that the new set occupiedby the cops is C ′.

Again there exists X ′ ∈ B such that X ′ ∩ C ′ = ∅.During their flight the only occupied vertices are C ∩ C ′ so X ∪ X ′ is entirelyfree of cops,

The robber can freely move from X to Y and this strategy can be applied forever.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 67 / 135

Page 68: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

7 - The Decomposition Paradigm

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 68 / 135

Page 69: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Introduction

The decomposition Paradigm have lead to many difficult and important results.

It is used to describe a fixed class of graphs, say C.

The key is to describe how every graph of C can be constructed by gluing togethercertain basic graphs by a well defined composition rules.

The main result of the graph minor project is a (approximate) decompositiontheorem for Forb4m(Kk); observe that for every fixed graph H,

Forb4m(H) ⊆ Forb4m(K|V (H)|)

This section can be seen as an introduction to decomposition theorem, we willshow, among other things, a decomposition theorem for chordal graphs as well asfor graphs of bounded treewidth.

The next section will be dedicated to perfect graphs, an illustration of what isperhaps the most dramatic success of the decomposition method.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 69 / 135

Page 70: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Clique cutsets and treewidth

Let G be a graph and S a set of vertices of G . G [S ] denotes the inducedsubgraphs of G induced by S .S is a cutset or separator of G if G \ S has at least two connected components.It is a clique cutset if S induces a clique (i.e. G [S ] is a clique).

The following say that we should be happy when a graph has a clique cutset.

Proposition

Let G be a graph with a clique cutset S and let (Xi )i∈I be the connectedcomponents of G \ S . Let Gi = G [Ci ∪ S ]. Then tw(G ) = maxi∈I (tw(Gi )).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 70 / 135

Page 71: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Exercises on clique cutsets

Exercice 19

Let G be a graph with a clique cutset S and let (Xi )i∈I be the connectedcomponents of G \ S . Let Gi = G [Ci ∪ S ]. Prove that:

1 χ(G ) = maxi∈I (χ(Gi )).

2 ωm(G ) = maxi∈I (ωm(Gi ))

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 71 / 135

Page 72: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Decomposition theorem for chordal graph I

A graph G is chordal if it has no induced subgraph isomorphic to a cycle oflength at least 4.Chordal graphs is one of the oldest studied class of graphs. They have a verystrong structure that permits to design efficient algorithms to compute on them.

Theorem (Dirac, 1961)

If G is a chordal graph then either it is a clique or it admits a clique cutset.

Proof.Suppose that G is not a clique. Let S be a minimal vertex-cutset of G , and let C1

and C2 be two connected components of G \ S . Suppose for contradiction thatG [S ] is not a clique. So S contains two non-adjacent vertices u and v . Since S isminimal, both u and v have a neighbor in both C1 and C2. Hence, for i = 1, 2,there exists a chordless uv -path Pi whose interior vertices are in Ci . Then P1 ∪ P2

induces a hole, a contradiction. So S is a clique-cutset of G .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 72 / 135

Page 73: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Decomposition theorem for chordal graph II

It is now easy to deduce the following decomposition theorem for chordal graphs.

TheoremA graph is chordal if and only if it can be constructed recursively by pasting alongcomplete subgraphs, starting from complete graphs.

Exercice 201 Let G be a chordal graph. Prove that χ(G ) = ω(G ).

2 Find a graph H such that χ(H) 6= ω(H).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 73 / 135

Page 74: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Treewidth and Chordal graphs

Th following give you 4 characterization of chordal graphs.

Exercice 21Show that the following statement are equivalent:

1 G is chordal

2 G admits a tree decomposition such that every bag is a clique.

3 Every induced subgraph of G contains a simplicial vertex, i.e. a vertexwhose neighborhood is a clique.

4 G admits a tree decomposition with the property that uv ∈ E (G ) if andonly if Tu and Tv have non empty intersection (recall that Tu is the set ofbag containing u).

5 G is the intersection graph of a family of subtrees of a tree.

Using one of the above characterization of chordal graphs, prove that for everygraph G :

tw(G ) = minω(G ′)− 1, G subgraph of G ′ and G ′ is chordal

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 74 / 135

Page 75: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Clique Sums

DefinitionLet G1 and G2 be two graphs and K1 a clique of G1, K2 a clique of G2 with|K1| = |K2|. If G is a graph obtained by identifying vertices of K1 and K2, andthen removing some edges of this clique, then G is a clique sum of G1 and G2.

Similarly as for clique cutset, we have the following:

Proposition

If G is a clique sum of G1 and G2, then tw(G ) ≤ max(tw(G1), tw(G2)).

And another characterization of treewidth, that is also a decomposition theoremfor classes of graphs with bounded treewidth.

Proposition

G has treewidth at most k if and only if it can be constructed recursively by cliquesum operations starting from graphs on at most k + 1 vertices.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 75 / 135

Page 76: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

8 - Treewidth, Forbidden Minor and planar graphs

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 76 / 135

Page 77: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Treewidth of minor closed class

Recall that, if H is a graph,

Forb4m(H) = G : H is not a minor of G

We have already seen that:

Graphs in Forb4m(K3) have treewidth at most 2.

Graphs in Forb4m(K4) have treewidth at most 3.

Graphs in Forb4m(K5) have unbounded treewidth.

A natural question to ask is then: for which H, graphs in Forb4m(H) havebounded treewidth?

One of the most important result of graph minor theory is a complete andbeautiful characterization of such H.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 77 / 135

Page 78: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

For which H, graphs in Forb4m(H) have bounded treewidth?

First H must be planar.If H is non-planar, then Forb4m(H) contains all grids (indeed, all grids and theirminors are planar (why?)) and grids have arbitrarily large treewidth .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 78 / 135

Page 79: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Grid Minor Theorem

Theorem (Grid Minor Theorem, Robertson and Seymour, V)

Given a graph H, graphs in Forb4m(H) have bounded treewidth if and only if H isplanar.

We need to prove the if part, that is, for H a planar graph, graphs in Forb4m(H)have bounded treewidth.

In fact, we only need to show this for the special case where H is a grid, becauseevery planar graph is a minor of some grid. (To see this, draw a planar graphand superimpose a sufficiently fine grid, then fatten vertices and edges of theplanar graph).

Theorem (Grid Minor Theorem)

Let k be an integer.There exists f (k) such that if G ∈ Forb4m(Gk,k), then tw(G ) ≤ f (k)

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 79 / 135

Page 80: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Very (very) rough idea of the proof:Let G be a graph with very large treewidth. We want to show that G contains alarge grid.

Show that G contains a large family A1, . . . ,Am of pairwise disjointconnected subgraphs such that:

each pair Ai ,Aj can be linked in G by a family Pi,j of many disjoint Ai − Aj

paths avoiding the other sets.

We then consider all the pairs Pi,j ,Pi,′j′

If we can find such a pair such that many of the paths in Pi,j meets many ofthe path in Pi ′,j′ , then we can find a large grid (this is the most difficult partof the proof because the intersections might be very messy).

Otherwise, for every pair Pi,j ,Pi,′j′ , many of the paths in Pi,j avoid many ofthe path in Pi ′,j′ .

We can then select one path Pi,j ∈ Pi,j from each family such that theseselected path are pairwise disjoint.

Contracting each of the connected subgraph will then give us a Km-minor,which contains a large grid.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 80 / 135

Page 81: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Theorem (Grid Minor Theorem)

There exists f (k) such that if G is Gk,k -minor free then tw(G ) < f (k)

Establishing tight bounds on f (k) is an important graph-theoretical questionwith many applications on structural and algorithmic graph theory.

Robertson and Seymour showed that f (k) = Ω(k2 log k) must hold.

For a long time, the best known upper bounds on f (k) weresuper-exponential in k .

The first polynomial upperbound of f (k) = O(k98poly log k) was proved byChekuri and Chuzhoy in 2013.

Since then, many ameliorations have been proved, the best one is:

Theorem (Chekuri and Chuzhoy, 2019)

If G is Gk,k -minor free then tw(G ) < O(k9 poly log k).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 81 / 135

Page 82: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Planar Graphs are WQO

Tentative proof of Wagner’s Conjecture : Let (Gn)n∈N be a sequence of graphsWe want to prove that there exists Gi and Gj with i < j and Gi is a minor of Gj .

If there exists i ≥ 1 such that G0 4m Gi , WIN

If not, then the Gi for ≥ 1 are G0-minor free.

If G0 is planar, then G0-minor free graphs have bounded treewidth.

In this case (G1,G2,G3, . . . ) is WQO, WIN.

Corollary

The class of planar graphs is wqo for the minor relation.

Would be nice to be able to say truff on H-minor free graphs even when H isnon-planar.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 82 / 135

Page 83: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

9 - Graphs are WQO (Warning : contains majorhandwaving)

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 83 / 135

Page 84: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Wagner’s Conjecture : Sketch

Starts as before : Assume (Gn)n∈N is a counterexample.

We can assume that no graph Gi with i ≥ 1 has G0 as a minor.

Hence Gi ∈ Forb4m(G0) for i ≥ 1

Can we describe the structure of these graphs??

It is sufficient to get a structure theorem for Forb4m(Kk).

For k ≤ 4 we have seen characterizations (small treewidth).

For k = 5 there is one due to Wagner:

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 84 / 135

Page 85: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Wagner decomposition Theorem

Theorem (Wagner - 1937)

K5-minor free graphs are constructed by a sequence of 3-clique sums operationsstarting from W8 and planar graphs.

Assume (Gi )i∈N is an infinite antichain.

Assume there exists n ∈ N such that such that |V (Gn)| ≤ 5.

Then (Gi )i∈N are K5-minor-free.

Then we can use Wagner Theorem: the graphs Gi , i > n have some kind of a2-layer structure:

I Outside we have a tree-like structure, which can be handled with similarmethods used to handles trees (and graphs with bounded treewidth).

I Inside (that is in the ”bag” of the tree decomposition given by WagnerTheorem), graphs are planar or W8, and we already now they are WQO.

Hence, all we need is a generalisation of Wagner decomposition Theorem for allcomplete graphs.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 85 / 135

Page 86: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Vortices and Fringes

Let us start with a technical definition. If C is a cycle, a vortex on C is definedthe following way :

Select a collection of arcs A1,A2, . . . ,Al on C so that each vertex is in atmost k arcs.

For each arc we add a vertex vi that is linked to some vertices of Ai .

We can also add edges vivj if Ai ∩ Aj 6= ∅.We call this adding a fringe of width k to C .

Laszlo Lovasz

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 86 / 135

Page 87: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Almost k-embeddable

Now let us define a class Gk of almost k-embeddable graphs

i Start with a surface of genus at most k with a graph G embedded in it sothat each face is homeomorphic to a disc.

ii Add at most k vortices (local perturbation of a face of the embedding)

iii Add at most k apexes (vertices linked arbitrarily to the rest of the graph)

Daniel Marx

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 87 / 135

Page 88: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Structure Theorem

Theorem (Robertson and Seymour Theorem, XX)

For every graph H, there exists an integer k such that all H-minor free graphs canbe obtained by a sequence of k-clique sum operations starting from almostk-embeddable graphs.

Felix Reidl

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 88 / 135

Page 89: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

”Proof” of Wagner Conjecture

Very (very) roughly, the proof that graphs are WQO for minor ordering is

Show that graphs of bounded genus are WQO by induction on the genus(very hard).

Almost k-embedable graphs are taken care to the cost of more very hardwork.

Kruskal’s Theorem’s proof is adapted to deal with the tree structure given bythe clique sums operations.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 89 / 135

Page 90: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Algorithmic implications

General message:

if something works for planar graphs,

then we might generalize it to bounded genus graphs,

then we might generalize it to H-minor-free graphs.

What next?

What about Forb4t (H)?

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 90 / 135

Page 91: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

H-topological minor free graphsH-topological minor free graphs look like that (Grohe and Marx, 2012)

Felix ReidlPierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 91 / 135

Page 92: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Decomposition theorem for H-topological minor freegraphs

Theorem (Grohe and Marx, 2012)

For every H, there is an integer k such that every H-subdivision-free graph has atree decomposition where the torso of every bag is either:

k-almost embeddable in a surface of genus at most k or

has degree at most k with the exception of at most k vertices (“almostbounded degree”).

General message:If a problem can be solved both

on (almost-)embeddable graphs and

on (almost-)bounded degree graphs,

then these results can be raised to H-subdivision-free graphs without toomuch extra effort.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 92 / 135

Page 93: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

10 - Algorithms for bounded-treewidth graphs

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 93 / 135

Page 94: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

FPT Algorithms

A parametrized algorithmic problem is a problem where a certainparameter k is given in addition to the input (of size n).

The complexity is studied as a function of n and k .

k can be the size of the solution, or an implicit parameter of the input graph(diameter, maximum degree, treewidth...).

There are roughly three possibilities for a parametrized algorithmic problem.

Either the problem is already hard for fixed k .Example: decide if χ(G ) ≤ k is NP hard for k = 3.

Or the problem is NP hard for k in the input but polynomial of k fixed.Example: Decide if α(G ) ≤ k with parameter k by exhaustive search needs :O(nk

)(we say it is XP).

Or it is Fixed Parameter Tractable FPT for k : Algorithm in timeO(f (k)nO(1)

)We will now show that many NP hard problems are FPT whenparametrized by treewidth.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 94 / 135

Page 95: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Max Weighted Independent Set

Problem (Maximum Weighted Independent Set - MWIS)

Input : A graph G with weight function ω : V (G )→ ROutput : an Independent set of maximum weight.

NP-complete for general graphs.

Polynomial for trees by Dynamical programming

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 95 / 135

Page 96: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

MWIS for Trees

Fix a root r arbitrarily.

Denote by ch(v) the set of children of v , by T (v) the subtree rooted at v (henceT (r) = T ) and:

f (v) denotes the maximum weight of an independent set of T (v),

f +(v) denotes the maximum weight of an independent set of T (v)containing v

f −(v) denotes the maximum weight of an independent set of T (v) notcontaining v

The value of a maximum weight independent set of T is precisely f (r) .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 96 / 135

Page 97: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

MWIS for Trees

Let v be a vertex of T , and let ch(v) be the set of children of v . We have:

f +(v) = Σx∈ch(v)f−(x) + ω(v)

f −(v) = Σx∈ch(v)f (x)

f (v) = max(f +(v), f −(v))

It only remains to compute these three functions in a bottom-up fashion (that isstarting from the leaves and computing layer after layer until we rich the root),which take O(|V (T )|) time.

Many NP-hard problems are solvable in polytime on trees, using dynamicprogramming.We are going to see that the same strategy stands when applied on treedecomposition.That is we are going to find algorithms whose complexity is a function f (k, n), kbeing the treewidth and n the number of vertices, and this function will be apolynomial in n.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 97 / 135

Page 98: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

MWIS parametrized by treewidth

TheoremGiven a tree decomposition of width k , Maximum Weighted Independant Set canbe computed in time O(2k · kO(1) · n).

Wt ⊆ V (G ): vertices appearing in node tVt ⊆ V (G ): vertices appearing in the subtree rooted at t.

Generalizing the strategy used for tree:instead of computing two values f +(t) and f −(t), we compute 2|Wt | ≤ 2k valuesfor each bag Wt .

For each node t and each subset S of Wt :M[t,S ] = max weighted independant I such that I ⊆ Vt and I ∩Wt = S .

It is easy to compute M[t,S ] if the values are known for the children of t. But weare going to define a tree decomposition with a particular structure to ease it evenmore.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 98 / 135

Page 99: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Nice Tree Decompositions

To design algorithms parametrized by treewidth, it is convenient to use thefollowing particular tree decompositions.

DefinitionA nice tree decomposition of G is a tree decomposition where T is a rootedbinary tree with bags (Wt)t∈V (T ) and each inner node t is of three possible kind :

Leaf: t has no child and |Wt | = 1.

Join: t has two children t1 and t2 and Wt = Wt1 = Wt2 .

Introduce: t has one child t ′ and Wt = Wt′ \ x where x 6∈Wt′

Forget: t has one child t ′ and Wt = Wt ∪ x where x 6∈Wt

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 99 / 135

Page 100: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

From tree decomposition to nice tree decomposition

TheoremA tree decomposition of width k and n nodes can be turned into a nice treedecomposition of width k and O(w · n) nodes in time O(w2 · n).

Proof Sketch:Root the decomposition arbitrarily.For each internal node with p children, it is possible to add 2p new join nodes tomake it binary.For each edge t1t2 replace t1t2 by a path with at most k forget nodes and at mostk introduce nodes.

Using nice decomposition, it becomes super easy to compute M[t,S ] in abottom-up fashion as we are going to see now.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 100 / 135

Page 101: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

For each node t and each subset S of Wt :M[t,S ] = max weighted independant I such that I ⊆ Vt and I ∩Wt = S .

Leaf: |Wt | = 1, trivialIntroduce: one child t ′ with Wt = Wt′ ∪ v :

M[t,S ] = M[t ′,S ] if v /∈ S

= M[t ′,S \ s] + ω(v) if v ∈ S

= −∞ if S contains v and a neighbor of v

Forget: one child t ′ with Wt = Wt′ \ v :

M[t,S ] = max(M[t ′,S ],M[t ′,S ∪ v])

Join: t has two children t1 and t2 such that Wt = Wt1 = Wt2 :

M[t,S ] = M[t1,S ] + M[t2,S ]− ω(S)

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 101 / 135

Page 102: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Other Problems

Here is a list of results one can prove similarly using a tree decomposition oftreewidth k.

TheoremLet G be given with a tree decomposition of width at most k.

1 Computing χ(G ) can be done in time O(f (k).n)

2 Computing ω(G ) can be done in time O(2k .kk .n

)3 Computing γ(G ) := min|X |, X dominating set , can be done in time

O(f (k).n).

4 Deciding if G has a hamiltonian cycle can be done in time O(f (k).n)

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 102 / 135

Page 103: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

11 - Courcelle’s Theorem

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 103 / 135

Page 104: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Monadic Second Order Logic

A celebrated algorithmic meta-theorem of Courcelle generalises all the previousresults to monadic second order formulas.

Logical formulas on graphs are constructed inductively using

atomic formulas : x = y , v ∈ X , e ∈ F for subsets of vertices or edges.

the binary relation Inc(x , e) which is satisfied if x ∈ V and x is incident withe ∈ E .

logical operators ∨ and ∧ and ¬quantifiers ∀ and ∃

First order formulas : quantifiers over vertices and edges (∀v ∈ V (G );∃e ∈ E (G ))

MSO1 = FO + quantify over sets of vertices,

MSO2 = MSO1 + quantify over sets of edges.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 104 / 135

Page 105: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Formula for 3-colorability

This is a second order formula for 3 colourability :

∃X1 ⊂ V ∃X2 ⊂ V ∃X3 ⊂ V

(∀x ∈ V (x ∈ X1 ∨ x ∈ X2 ∨ x ∈ X3)

∧¬(x ∈ X1 ∧ x ∈ X2) ∧ ¬(x ∈ X1 ∧ x ∈ X3) ∧ ¬(x ∈ X2 ∧ x ∈ X3))

∧ (∀xy ∈ E ¬(x ∈ X1 ∧ y ∈ X1) ∧ ¬(x ∈ X2 ∧ y ∈ X2) ∧ ¬(x ∈ X3 ∧ y ∈ X3))

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 105 / 135

Page 106: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Courcelle Theorem

The theorem of Courcelle asserts that every such property is easy to decide forbounded treewidth graphs.

TheoremIf a graph property can be expressed in MSO2, then for every fixed k ≥ 1, there isa linear-time algorithm for testing this property on graphs having treewidth atmost k.

Note: The constant depending on k can be very large (double, triple exponentialetc.), therefore a direct dynamic programming algorithm can be more efficient.

If we can express a property in MSO2, then we immediately get that testing thisproperty is FPT parameterized by the treewidth k of the input graph.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 106 / 135

Page 107: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Vertex CoverA set of vertices S is a vertex cover if every edge is incident to a vertex in S (orequivalently if V \ S is an independent set).We have seen an algorithm for this problem (since we have seen one for maxindependent set), here we are giving another one using these simpledecompositions.If G is given with a tree decomposition of width t, one can find the minimum sizeof a vertex cover in time 2t .O(n).

Proof:Let (T ,W ) be a nice tree decomposition of G . For every node t of T , denote byGt the subgraph of G induced by the vertices that belong to a bag that is adescendent of t. Now for every C that is a subset of Wt , let φ(t,X ) be equal tothe minimum size of a vertex cover X ′ of Gt such that C ′ ∩Wt = X if such a X ′

exists, and ∞ otherwise.Now we will show how to compute φ(t,X ) for all t and X using a bottom upapproach. We have to deal with the leaves of the tree and then with the threepossible cases for internal nodes (Forget, Introduce, Join).

if t is a Leaf node of T , with Wt = x. Then φ(t, x) = 1 and φ(t, ∅) = 0if t is a Forget node with child t ′ and Wt = Wt′ \ x, then for all X ⊂Wt ,

φ(t, x) = minφ(t ′,X ), φ(t ′,X ∪ x)if t is an Introduce Node with child t ′ and Wt′ = Wt \ x, then for allX ⊂Wt :

1 If X is not a vertex cover of the graph induced by Wt′ , then φ(t,X ) =∞.2 If X is a vertex cover of the graph induced by Wt′ , et x ∈ X , thenφ(t,X ) = φ(t′,X \ x) + 1.

3 If X is a vertex cover of the graph induced by Wt′ , et x 6∈ X , thenφ(t,X ) = φ(t′,X ).

if t is an Join Node with child t ′ and t ′′, then for all X ⊂Wt ,φ(t,X ) = φ(r ,X ) + φt′′(X )− |X |.

These results are not difficult to prove, and therefore all values of φ(t,C ) can becomputed in time proportional to |V (T )|21+tw(G). It is clear that the min Vertexcover is given by the minimum ever C of all φ(r ,C ), where r is the root of T ,which gives the algorithm.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 107 / 135

Page 108: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

12 - Computing Tree Decomposition

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 108 / 135

Page 109: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Computing tree width

ProblemInput : A graph G and an integer kOutput : TRUE if and only if tw(G ) ≤ k

NP-Hard: Arnborg, Corneil, Proskurowski ’87 (note that polytime open forplanar)

Anyway, we want to use tree decomposition to design FPT algorithm withparameter tw(G ), so we would be happy to compute tw(G ) in timeO(f (tw(G )) · P(n)).

FPT : O(tw(G )tw(G)3

n)

algorithm (Bodlaender, 96)

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 109 / 135

Page 110: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Approximate the treewidth

We don’t really need to compute an optimal tree decomposition, the following isenough.

TheoremThere exists an algorithm with input a graph G and an integer k and that outputsin time O

(f (k).n2

):

either a small certificate that tw(G ) ≥ k

or a tree decomposition of width at most 4k − 1.

This is enough for our FPT algorithms seen before : simply run this for k = 1,k = 2, k = 3,... one is guaranteed to find a tree decomposition of G of width atmost 4tw(G ) in time O

(f (tw(G )).n2

)).

The rest of this section is dedicated to design this algorithm.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 110 / 135

Page 111: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Computing the treewidth: state of the art

Complexity of computing the treewidth parametrized by the size of the solutionk = tw(G ).

picture from wikipedia

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 111 / 135

Page 112: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Approximate the treewidth

TheoremThere exists an algorithm with input a graph G and an integer k and that outputsin time O

(f (k).n2

):

either a small certificate that tw(G ) ≥ k

or a tree decomposition of width at most 4k − 1.

The rest of this section is dedicated to design this algorithm.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 112 / 135

Page 113: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Good separator

Let G be a graph. A set of vertices S is a separator (or vertex cutset) if Sdisconnects G , that is G \ S has at least two connected components.

Let S ,X be two set of vertices, S is a good separator with respect to X if:

S disconnects G into two parts V1 and V2 both intersecting X .

For i = 1, 2, Vi contains at most 2|X |/3 vertices of X .

(Such a separator is sometime called a 2/3-separator w.r.t. X ).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 113 / 135

Page 114: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Certificate that tw(G ) ≥ k

Proposition

If tw(G ) < k , then every X ⊆ V (G ) of size at least 2k + 1 admits a goodseparator of size at most k

Proof Ideas:

Take a tree decomposition (T ,W ) where T is a binary tree.

For each interior node t ∈ T , the bag Bt separates G into 2 or 3 connectedcomponents (is no interior node possible?).

If one contains more than half of the vertices of X , then orient thecorresponding edge out from t.

Prove that there exists an internal node t with no outgoing edge.

Show that Bt is a good separator with respect to X .

Certificate that tw(G ) ≥ k:If G contains a set X of at least 2k + 1 vertices that do not admit a goodseparator of size a most k , then tw(G ) ≥ k .

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 114 / 135

Page 115: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Proof of the previous theorems

We prove by induction on the number of vertices of G the following algorithm(apply it with W = ∅ to get the desired algorithm).

Problem

Input : A graph G , an integer k and a set X ⊆ V (G ) such that |X | ≤ 3kOutput : A certificate that tw(G ) ≥ k or a rooted tree decomposition T of G ofwidth at most 4k − 1 where X ⊆ root(G )

If G has at most 4k vertices then put all vertices in a single bag.

If X has less than 2k + 1 vertices, then augment X arbitrarily by addingvertices until its size is at least 2k + 1.

Assume for the moment that we know how to compute a good separator ofsize at most k wrt X .

If X admits no good separator of size at most k , then by what precedes it isa certificate that tw(G ) ≥ k .

So we may assume that X has a good separator S of size at most k.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 115 / 135

Page 116: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

S is a good separator for X

G \ S disconnects G into two non-empty parts V1 and V2 such thatX ∩ Vi ≤ 2|X |/3 for i = 1, 2

Define Xi = S ∪ (X ∩ Vi ). Then |Xi | ≤ k + 23 3k = 3k

Set Gi = G [Vi ∪ S ], and apply induction on (Gi ,Xi ) for i = 1, 2

Observe that |V (Gi )| < |V (G )|.

Either certificate that tw(Gi ) ≥ k for some i and therefore tw(G ) ≥ k

Or get two rooted decompositions T1,T2 of G1 and G2 with Xi ⊆ root(Ti )

Add a root bag containing all vertices in X ∪ S (note that |X ∪ S | ≤ 4k)attached to the roots of T1 and T2.

Check that it is indeed a tree decomposition of the desired width.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 116 / 135

Page 117: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Computing the good separator

Here is how to compute a good separator S of size at most k wrt X :

S exists if and only if one can partition X into three subsets X1, X2, X0 suchthat

I X1 and X2 have size at most 2|X |/3,I X0 is a subset of a separator of size at most k separating V1 and V2 where

Xi ⊆ Vi

Equivalently if and only if in G \ X0, there are at most k − |X0| disjoint pathsfrom X1 to X2.

Ford Fulkerson : O(k2n

)1

33k ways of defining the partition X0,X1,X2 so O(27k .k2n

)for this step

So the total complexity for the algorithm is O(27k .k2n2

)since the tree

decomposition has at most n nodes.

1FF runs a number of iterations; each iteration takes O(n + m) time and either concludesthat the currently found flow is maximum, or augments it by 1. Since we are interested only insituations when the maximum flow is of size at most k + 1, we may terminate the computationafter k + 2 iterations. Moreover m ≤ kn, otherwise tw(G) > kPierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 117 / 135

Page 118: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

13 - FPT parametrized by size of the solution

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 118 / 135

Page 119: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

FPT algorithms

We want here FPT algorithms parametrized by size of solution.

We will work with the following problem all along this section:

Problem (Vertex Cover)

Input : G , kOutput : Does there exist a set X of size at most k such that every edge isincident to at least one vertex of S?

NP-Hard since Vertex Cover = Complement of Independent Set.

We are going to prove several algorithms to solve k-VC in timeO(f (k) · nO(1)

)Observe that an FPT parametrized by size of solution for k-VC does notimply the same for the k-Independant Set (No no(k) algorithm is known todecide if max independent set ≥ k).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 119 / 135

Page 120: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Existence of FPT via Robertson and Seymour Theorems

Let C be a class of graphs.

Problem ((C, k)-deletion)

Input : G , kOutput : Does there exist a set X of size at most k such that G \ X ∈ C?

It generalizes several well known problems

C = stable sets ⇒ k-Vertex Cover

C = forests ⇒ k-Feedback Vertex Set Problem

We can answer this problem if C is minor closed:

if so, the set of YES instances is also minor closed (why?)

⇒ f (k)O(n3) algo by Robertson and Seymour theorems.

Problems : this is just existential proof since we do not know how to get thebounds (Robertson and Seymour theorems are not constructive). Moreovernot uniform : not the same algorithm for different values of k (forbiddenminors depend on k).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 120 / 135

Page 121: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

FPT algorithms through Tree Width

Example : k-Vertex Cover.

Decide whether tw(G ) ≤ k and find a tree decomposition of width k in thatcase

if tw > k answer NO (why?)If G has a k-VC X , it has pathwidth at most k : take a path on n − k nodes,each containing X plus a vertex.

if tw ≤ k decide if G has a k-VC with Dynamic Programming to find aminimum vertex cover

Both algoritmic steps have FPT algos.

Works as long as the problem we are solving has some property that implies thatthere is a bound t such that if tw(G ) > t then either the answer is always YES oralways NO.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 121 / 135

Page 122: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Branching method

We prove an easy 2k .O(n) algorithm for k-VC by a technique called branching.

Let xy be an edge, the main idea is:

G has a k-VC⇔

G \ x has a (k − 1)-VC or G \ y has a (k − 1)-VC

Hence, to solve an instance (G , n, k) it suffices to solve two instances(G , n − 1, k − 1).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 122 / 135

Page 123: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Kernelization

The idea of kernelization is to do the a preprocessing which transforms aninstance (G , k) in an instance (G ′, k ′), called a kernel, such that

(G , k) is a YES-instance if and only if (G ′, k ′) is a YES-instance

k ′ ≤ k

the size G ′ is bounded by a function of k .

It is then sufficient to apply a brute force algorithm on (G ′, k ′), to get an FPTalgorithm.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 123 / 135

Page 124: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Kernelization for k-VC

We are goint to construct a polynomial kernel for k-VC problem.

Set G = G ′ and k = k ′ and repeat these two steps as much as you can:

If v is an isolated vertex, it is not in the solution, set G ′ := G ′ \ vIf d(v) ≥ k + 1, it must be in any solution (if one exist) set G ′ := G ′ \ v andk ′ := k ′ − 1

What can you say about the obtained G ′?

If |E (G ′)| > k2 answer NO

Otherwise (G ′, k ′) is a kernel of size at most 2k2, we brute force on it

Complexity: O(k2k + n + m

)By using more elaborated techniques, one can find better kernels and thus betteralgorithms (2k − clog(k) is the best known kernelization).

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 124 / 135

Page 125: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Vertex Cover parametrized by treewidth

A set of vertices S is a vertex cover if every edge is incident to a vertex in S (orequivalently if V \ S is an independent set).We have seen an algorithm for this problem (since we have seen one for maxindependent set), here we are giving another one using these simpledecompositions.If G is given with a tree decomposition of width t, one can find the minimum sizeof a vertex cover in time 2t .O(n).

Proof:Let (T ,W ) be a nice tree decomposition of G . For every node t of T , denote byGt the subgraph of G induced by the vertices that belong to a bag that is adescendent of t. Now for every C that is a subset of Wt , let φ(t,X ) be equal tothe minimum size of a vertex cover C ′ of Gt such that C ′ ∩Wt = X if such a X ′

exists, and ∞ otherwise.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 125 / 135

Page 126: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Now we will show how to compute φ(t,X ) for all t and X using a bottom upapproach. We have to deal with the leaves of the tree and then with the threepossible cases for internal nodes (Forget, Introduce, Join).

if t is a Leaf node of T , with Wt = x. Then φ(t, x) = 1 and φ(t, ∅) = 0

if t is a Forget node with child t ′ and Wt = Wt′ \ x, then for all X ⊂Wt ,

φ(t, x) = minφ(t ′,X ), φ(t ′,X ∪ x)

if t is an Introduce Node with child t ′ and Wt′ = Wt \ x, then for allX ⊂Wt :

1 If X is not a vertex cover of the graph induced by Wt′ , then φ(t,X ) =∞.2 If X is a vertex cover of the graph induced by Wt′ , et x ∈ X , thenφ(t,X ) = φ(t′,X \ x) + 1.

3 If X is a vertex cover of the graph induced by Wt′ , et x 6∈ X , thenφ(t,X ) = φ(t′,X ).

if t is an Join Node with child t ′ and t ′′, then for all X ⊂Wt ,φ(t,X ) = φ(r ,X ) + φt′′(X )− |X |.

These results are not difficult to prove, and therefore all values of φ(t,C ) can becomputed in time proportional to |V (T )|21+tw(G). It is clear that the min Vertexcover is given by the minimum ever C of all φ(r ,C ), where r is the root of T ,which gives the algorithm.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 126 / 135

Page 127: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

14 - Disgression: Perfect Graphs

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 127 / 135

Page 128: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Perfect graphs

It is clear that for all graphs G , ω(G ) ≤ χ(G ).A natural question is to ask for which graphs the equality holds.Give some examples of graphs G such that χ(G ) 6= ω(G ).

DefinitionA graph G is perfect if and only if for every induced subgraph H of G ,χ(H) = ω(H)

Exercice 221 Prove that bipartite graphs are perfects.

2 Prove that chordal graphs are perfects.

3 Prove that C2k+1 and C 2k+1 are not perfect

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 128 / 135

Page 129: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Berge graphs and the Strong Perfect Graphs Conjecture

A hole is an induce cycle of length at least 4.It is odd if it is of odd length.

Claude Berge proposed the following conjecture, known as the Strong PerfectGraph Conjecture:

Conjecture (Berge, 60’s)

A graph is perfect if and only if it doesn’t contain an odd hole nor thecomplement of an odd hole as an induce subgraph.

Graphs with no odd hole nor anti odd hole are called Berge Graphs. So theconjecture said that Berge graphs and perfect graphs are the same.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 129 / 135

Page 130: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Weak Perfect Graph Conjecture

Let G be a graph. The complement of G , denoted by G is the graph on V (G )where uv ∈ E (G ) if and only if uv /∈ E (G ).

It is clear that if a graph G is Berge, then G is also Berge. This lead Berge topropose the following conjecture, known as the Weak Perfect graphConjecture, and proved by Laszlo Lovasz.

Theorem (Lovasz, 1972)

If a graph is perfect, then its complement is also perfect.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 130 / 135

Page 131: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

The Strong Perfect Graph TheoremThe Strong Perfect Graph Conjecture has been opened for more than 50 years andlead to the development of many new techniques in graph theory, algorithmicgraph theory and combinatorial optimization.It has finaly been proved using the decomposition paradigm. The proof is 150pages long and is extremely technical.

Theorem (Chudnovsky, Robertson, Seymour, Thomas, 2002)

A graph is perfect if and only if one of the following holds:either it is basic, that is:

it is bipartite or it is the complement of a bipartite graph, or

it is a line graph or the complement of a line graph

or it has one of the following decomposition:

it has a 2-join or a complement of a 2-join,

it has an homogeneous pair,

it has a balanced skew partition.

A very nice survey on perfect graphs has been written by Nicolas Trotignon, apresentation on perfect graphs based on this survey can be done.Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 131 / 135

Page 132: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Beyond perfection

A class of graphs C is said to be hereditary, if it is closed under taking inducesubgraphs.

A class of graphs C is hereditary⇔

∃ a family (possibly infinite) of graphs F such that C = Forb⊆i (F)

In a seminal paper from 1981 called Around the world of Perfect Graphs, Gyarfasproposed the following definition.

DefinitionLet C be a hereditary class of graphs. C is χ-bounded, if there exists a function fsuch that for every G ∈ C,

χ(G ) ≤ f (ω(G ))

Hence, perfect graphs is exactly the class of graphs χ-bounded by the functionf (x) = 1.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 132 / 135

Page 133: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Erdos Theorem

TheoremThere exists triangle-free graphs with arbitrarily large chromatic number.

Corollary

The class of all graphs is not χ-bounded.

The girth of a graph is the length of its shortest cycle.

Theorem (Erdos, 1959)

There exists graphs with arbitrarily large girth and chromatic number.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 133 / 135

Page 134: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

Gyarfas-Sumner Conjecture

Conjecture (Gyarfas, Sumner, 1981)

Let G be a graph. Forb⊆i (H) is χ-bounded if and only if H is a forest.

Exercice 231 Prove the only if part of the conjecture (hint: use Erdos Theorem).

2 Prove that it is enough to prove the conjecture for trees.

Theorem (Gyarfas, 1981)

For every integer k, Forb⊆i (Pk) is χ-bounded.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 134 / 135

Page 135: Graph Minor Theory and its algorithmic …paboulker/content/graph_minors...1 - Characterization of graph classes by forbidden con gurations Pierre Aboulker - pierreaboulker@gmail.com

What about non-induce subgraphs

The following proves that a graph with chromatic number at least k containsevery tree with at most k vertices as a subgraph.

Exercice 24

Let H be a fixed graph. Prove that there exists an integer k = k(H) such that forall G ∈ Forb⊆(H), χ(G ) ≤ k if and only if H is a forest.Prove moreover that for every tree T , we can take k = |V (T )|.

Pierre Aboulker - [email protected] Graph Minor Theory and its algorithmic consequences MPRI Graph Algorithms 135 / 135