A Quasi-Hole Detection Algorithm for Recognizing k-Distance-Hereditary Graphs, with k < 2
Abstract
:1. Introduction
- coincides with the class of distance-hereditary graphs;
- , for each .
- the stretch number of any pair of distinct vertices is defined as , where is the length of any longest induced path between u and v, and is the distance between the same pair of vertices;
- .
- (adapted from [2]) if and only if the following graphs are not induced subgraphs of G:
- -
- holes , for each ;
- -
- cycles with ;
- -
- cycles with .
- (this paper) if and only if the following graphs are not induced subgraphs of G:
- -
- holes , for each ;
- -
- cycles with ;
- -
- cycles with ;
- -
- cycles with .
- (from [12]) if and only if for each cycle , , of G;
- (this paper) if and only if for each cycle , , of G.
2. Notation and Basic Concepts
- for each pair such that ,
- there exists a cycle-pair that induces the stretch number of G, that is .
3. A Characterization Based on Forbidden Subgraphs
- G is a distance-hereditary graph if and only if the following graphs are not induced subgraphs of G:
- (i)
- , for each ;
- (ii)
- cycles with ;
- (iii)
- cycles with .
- (i)
- , for each ;
- (ii)
- cycles with ;
- (iii)
- cycles with ;
- (iv)
- cycles with .
- (⇐)
- We prove that if , then G contains one of the subgraphs in items , , , or , or G contains a proper induced subgraph such that . In the latter case, we can recursively apply to the following proof.
- :
- In this case, if is chordless, then it corresponds to a hole as described in Item . If the chord distance of is equal to 1, all chords are incident to . According to p, we have:
- :
- corresponds to the cycle in Item ;
- :
- corresponds to the cycle in Item ;
- :
- corresponds to the cycle in Item ;
- :
- Let be the leftmost chord of . If the cycle corresponds to the cycle in Item . When , consider the subgraph induced by the vertices in the cycle . The induced paths and provide the following lower bound for :
- :
- In this case, according to Lemma 2, must be incident to chords. We now analyze two cases with respect to the value of , being the rightmost chord of :
- :
- Consider the subgraph induced by the vertices in the cycle . In this case, the induced paths and provide the following lower bound for : . Hence, is a proper subgraph of G with . The statement follows by recursively applying to this proof.
- :
- in this case the induced paths and provide the following lower bound for :
4. A Characterization Based on Cycle-Chord Conditions
- Assume . In this case, the induced paths and provide a stretch number , a contradiction.
- Assume . In this case, the induced paths and provide the following lower bound on :This contradicts .
- (⇒)
- If , then it is sufficient to use Lemma 3. Now, let us assume that such that p and q are coprime. By Lemma 1, if is an inducing-stretch cycle of G, according to the hypotheses, we may assume that is formed by the vertices of the induced paths and , with .
5. Recognition Algorithm
5.1. An Existing Hole Detection Algorithm
5.2. Quasi-Hole Detection Algorithm
- (⇐)
- Suppose that G admits cycles as described in the statement, and let be the shortest among such cycles. We now show that C has at least 5 vertices and :
- Since C fulfills the conditions of the statement, then C contains at least 5 vertices;
- Suppose by contradiction that . Then, there must exist chords with both and different from . To each chord not incident on , we associate a “length” defined as . Now, let , with , be a chord with minimum length. By definition, holds. Since is a , then , and hence results to be a cycle with at least 5 vertices. Moreover, between and , for each , , cannot exist an edge, otherwise it would be a chord with length smaller than .
Algorithm 1: A quasi-hole detection algorithm. |
- is ain the graph is the vertex set of ;
- is ain the graph is the edge set of .
Algorithm 2: A recursive procedure used by to perform an adapted DFS. |
- the initial vertex (called in the algorithm) is added again to the active-path (cf. Line 4). If the length of the active-path is 5 or more (cf. Line 5), then the graph contains a cycle fulfilling the conditions of Lemma 5 and hence a quasi-hole is found;
- at the end of the active-path there is a vertex different from but already inserted in the active-path (cf. Lines 12–13). In this case, again the conditions of Lemma 5 apply, but now we are sure that a hole is found.
5.3. Detecting Quasi-Hole on at Least k Vertices
- is an induced path in is the vertex set of ,
- is an induced path in is the edge set of .
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Howorka, E. Distance-hereditary graphs. Q. J. Math. 1977, 28, 417–420. [Google Scholar] [CrossRef]
- Bandelt, H.J.; Mulder, H.M. Distance-hereditary graphs. J. Comb. Theory Ser. B 1986, 41, 182–208. [Google Scholar] [CrossRef] [Green Version]
- Brandstädt, A.; Le, V.B.; Spinrad, J.P. Graph Classes: A Survey; Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 1999. [Google Scholar]
- Brandstädt, A.; Dragan, F.F. A linear-time algorithm for connected r-domination and Steiner tree on distance-hereditary graphs. Networks 1998, 31, 177–182. [Google Scholar] [CrossRef]
- Chang, M.S.; Hsieh, S.Y.; Chen, G.H. Dynamic Programming on Distance-Hereditary Graphs. In International Symposium on Algorithms and Computation; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1997; Volume 1350, pp. 344–353. [Google Scholar]
- Gioan, E.; Paul, C. Dynamic distance hereditary graphs using split decomposition. In International Symposium on Algorithms and Computation; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4835, pp. 41–51. [Google Scholar]
- Lin, C.; Ku, K.; Hsu, C. Paired-Domination Problem on Distance-Hereditary Graphs. Algorithmica 2020, 82, 2809–2840. [Google Scholar] [CrossRef]
- Nicolai, F.; Szymczak, T. Homogeneous sets and domination: A linear time algorithm for distance-hereditary graphs. Networks 2001, 37, 117–128. [Google Scholar] [CrossRef]
- Rao, M. Clique-width of graphs defined by one-vertex extensions. Discret. Math. 2008, 308, 6157–6165. [Google Scholar] [CrossRef]
- Cicerone, S.; Di Stefano, G.; Flammini, M. Compact-Port Routing Models and Applications to Distance-Hereditary Graphs. J. Parallel Distrib. Comput. 2001, 61, 1472–1488. [Google Scholar] [CrossRef] [Green Version]
- Esfahanian, A.H.; Oellermann, O.R. Distance-hereditary graphs and multidestination message-routing in multicomputers. J. Comb. Math. Comb. Comput. 1993, 13, 213–222. [Google Scholar]
- Cicerone, S.; Di Stefano, G. Graphs with bounded induced distance. Discret. Appl. Math. 2001, 108, 3–21. [Google Scholar] [CrossRef] [Green Version]
- Cicerone, S. Characterizations of Graphs with Stretch Number less than 2. Electron. Notes Discret. Math. 2011, 37, 375–380. [Google Scholar] [CrossRef]
- Cicerone, S.; Di Stefano, G. Networks with small stretch number. J. Discret. Algorithms 2004, 2, 383–405. [Google Scholar] [CrossRef]
- Nikolopoulos, S.D.; Palios, L. Detecting Holes and Antiholes in Graphs. Algorithmica 2007, 47, 119–138. [Google Scholar] [CrossRef] [Green Version]
- Hammer, P.L.; Maffray, F. Completely separable graphs. Discret. Appl. Math. 1990, 27, 85–99. [Google Scholar] [CrossRef] [Green Version]
- Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 2nd ed.; The MIT Press and McGraw-Hill Book Company: New York, NY, USA, 2001. [Google Scholar]
- Cicerone, S. Using Split Composition to Extend Distance-Hereditary Graphs in a Generative Way—(Extended Abstract). In International Conference on Theory and Applications of Models of Computation; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6648, pp. 286–297. [Google Scholar] [CrossRef]
- Cicerone, S. On Building Networks with Limited Stretch Factor. In Web, Artificial Intelligence and Network Applications, Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications, AINA, Caserta, Italy, 15–17 Aprli 2020; Advances in Intelligent Systems and Computing; Springer: Berlin/Heidelberg, Germany, 2020; Volume 1150, pp. 926–936. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cicerone, S. A Quasi-Hole Detection Algorithm for Recognizing k-Distance-Hereditary Graphs, with k < 2. Algorithms 2021, 14, 105. https://doi.org/10.3390/a14040105
Cicerone S. A Quasi-Hole Detection Algorithm for Recognizing k-Distance-Hereditary Graphs, with k < 2. Algorithms. 2021; 14(4):105. https://doi.org/10.3390/a14040105
Chicago/Turabian StyleCicerone, Serafino. 2021. "A Quasi-Hole Detection Algorithm for Recognizing k-Distance-Hereditary Graphs, with k < 2" Algorithms 14, no. 4: 105. https://doi.org/10.3390/a14040105
APA StyleCicerone, S. (2021). A Quasi-Hole Detection Algorithm for Recognizing k-Distance-Hereditary Graphs, with k < 2. Algorithms, 14(4), 105. https://doi.org/10.3390/a14040105