Till Fluschnik’s research while affiliated with Technische Universität Berlin and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (80)


Polynomial-time preprocessing for weighted problems beyond additive goal functions
  • Presentation

December 2019

·

21 Reads

·

5 Citations

René van Bevern

·

Matthias Bentert

·

Till Fluschnik

·

[...]

·

Rolf Niedermeier

Diminishable parameterized problems and strict polynomial kernelization

November 2019

·

27 Reads

·

2 Citations

Computability

Kernelization – a mathematical key concept for provably effective polynomial-time preprocessing of NP-hard problems – plays a central role in parameterized complexity and has triggered an extensive line of research. This is in part due to a lower bounds framework that allows to exclude polynomial-size kernels under the assumption of [Formula: see text]. In this paper we consider a restricted yet natural variant of kernelization, namely strict kernelization, where one is not allowed to increase the parameter of the reduced instance (the kernel) by more than an additive constant. Building on earlier work of Chen, Flum, and Müller [CiE 2009, Theory Comput. Syst. 2011], we underline the applicability of their framework by showing that a variety of fixed-parameter tractable problems, including graph problems and Turing machine computation problems, does not admit strict polynomial kernels under the assumption of [Formula: see text], an assumption being weaker than the assumption of [Formula: see text]. Finally, we study an adaption of the framework to a relaxation of the notion of strict kernels, where in the latter one is not allowed to increase the parameter of the reduced instance by more than a constant times the input parameter.


Parameterized algorithms and data reduction for the short secluded s‐t‐path problem

August 2019

·

40 Reads

·

12 Citations

Networks

Given a graph G = (V, E), two vertices s, t ∈ V, and two integers k, ℓ, the Short Secluded Path problem is to find a simple s‐t‐path with at most k vertices and ℓ neighbors. We study the parameterized complexity of the problem with respect to four structural graph parameters: the vertex cover number, treewidth, feedback vertex number, and feedback edge number. In particular, we completely settle the question of the existence of problem kernels with size polynomial in these parameters and their combinations with k and ℓ. We also obtain a 2O(tw) · ℓ2 · n‐time algorithm for n‐vertex graphs of treewidth tw, which yields subexponential‐time algorithms in several graph classes.


The complexity of finding small separators in temporal graphs

August 2019

·

14 Reads

·

96 Citations

Journal of Computer and System Sciences

Temporal graphs have time-stamped edges. Building on previous work, we study the problem of finding a small vertex set (the separator) whose removal destroys all temporal paths between two designated terminal vertices. Herein, we consider two models of temporal paths: those that pass through arbitrarily many edges per time step (non-strict) and those that pass through at most one edge per time step (strict). Regarding the number of time steps of a temporal graph, we show a complexity dichotomy (NP-completeness versus polynomial-time solvability) for both problem variants. Moreover, we prove both problem variants to be NP-complete even on temporal graphs whose underlying graph is planar. Finally, we introduce the notion of a temporal core (vertices whose incident edges change over time) and prove that the non-strict variant is fixed-parameter tractable when parameterized by the temporal core size, while the strict variant remains NP-complete, even for constant-size temporal cores.



On (1+ε)-approximate Data Reduction for the Rural Postman Problem

June 2019

·

63 Reads

·

9 Citations

Lecture Notes in Computer Science

Given a graph G=(V,E) with edge weights and a subset RER\subseteq E of required edges, the NP-hard Rural Postman Problem (RPP) is to find a closed walk of minimum total weight containing all edges of R. The number b of vertices incident to an odd number of edges of R and the number c of connected components formed by the edges in R are both bounded from above by the number of edges that has to be traversed additionally to the required ones. We show how to reduce any RPP instance I to an RPP instance II' with 2b+O(c/ε)2b+O(c/\varepsilon ) vertices in O(n3)O(n^3) time so that any α\alpha -approximate solution for II' gives an α(1+ε)\alpha (1+\varepsilon )-approximate solution for I, for any α1\alpha \ge 1 and ε>0\varepsilon >0. That is, we provide a polynomial-size approximate kernelization scheme (PSAKS). We make first steps towards a PSAKS with respect to the parameter c.


Figure 4.1: Illustration of a partial solution: the thick edges are an overall solution, where the darker edges are the part of the solution in G x . The dashed edges are forbidden to exist.
Parameterized algorithms and data reduction for the short secluded s-t-path problem
  • Preprint
  • File available

June 2019

·

117 Reads

Given a graph G=(V,E), two vertices s,t∈V, and two integers k,ℓ, the Short Secluded Path problem is to find a simple s-t-path with at most k vertices and ℓ neighbors. We study the parameterized complexity of the problem with respect to four structural graph parameters: the vertex cover number, treewidth, feedback vertex number, and feedback edge number. In particular, we completely settle the question of the existence of problem kernels with size polynomial in these parameters and their combinations with k and ℓ. We also obtain a 2^{O(w)} ℓ^2 n-time algorithm for graphs of treewidth w, which yields subexponential-time algorithms in several graph classes.

Download

Multistage Vertex Cover

June 2019

·

28 Reads

Covering all edges of a graph by a minimum number of vertices, this is the NP-hard Vertex Cover problem, is among the most fundamental algorithmic tasks. Following a recent trend in studying dynamic and temporal graphs, we initiate the study of Multistage Vertex Cover. Herein, having a series of graphs with same vertex set but over time changing edge sets (known as temporal graph consisting of various layers), the goal is to find for each layer of the temporal graph a small vertex cover and to guarantee that the two vertex cover sets between two subsequent layers differ not too much (specified by a given parameter). We show that, different from classic Vertex Cover and some other dynamic or temporal variants of it, Multistage Vertex Cover is computationally hard even in fairly restricted settings. On the positive side, however, we also spot several fixed-parameter tractability results based on some of the most natural parameterizations.


The Complexity of Routing with Collision Avoidance

June 2019

·

32 Reads

·

5 Citations

Journal of Computer and System Sciences

We study the computational complexity of routing multiple objects through a network while avoiding collision: Given a graph G with two distinct terminals and two positive integers p,k, the question is whether one can connect the terminals by at least p routes (walks, trails, paths; the latter two without repeated edges or vertices, respectively) such that in at most k edges it happens that we traverse them in more than one route at the same time. We prove that for paths and trails the problem is NP-hard on undirected and directed planar graphs even if the maximum vertex degree or k≥0 is constant. For walks we prove polynomial-time solvability on undirected graphs for unbounded k and on directed graphs if k≥0 is constant. We additionally study variants where the maximum length of a route is restricted. For walks this variant becomes NP-hard on undirected graphs.


Fig. 3 Sketch of the construction described in the proof of Theorem 5. Ellipses indicate cliques, rectangles indicate independent sets. Multiple edges to an object indicate that the corresponding vertex is incident to each vertex enclosed within that object.
Two illustrative examples for the four-point condition. Left: A path P16\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{16}$$\end{document} with 16 vertices; Right: A cycle C16\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$C_{16}$$\end{document} with 16 vertices. Indeed, δ(P16)=0\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\delta (P_{16})=0$$\end{document}, here indicated by the equally largest two distance sums D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_2$$\end{document} (solid) and D3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_3$$\end{document} (dashed). The situation changes in the case of a C16\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$C_{16}$$\end{document} (that is, the P16\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_{16}$$\end{document} with one additional edge connecting the endpoints). We have δ(C16)=8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\delta (C_{16})=8$$\end{document}, here indicated by the largest distance sum D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_2$$\end{document} (solid) and the two equally smallest distance sums D1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_1$$\end{document} (dotted) and D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_2$$\end{document} (dashed)
Illustrations to the cases I–III and the subcases therein in the proof of Lemma 7
An illustrative sketch of the graph constructed in the proof of Theorem 8. Encircled vertices correspond to cliques. A thick edge represents a matching between copy-vertices. An edge labeled “∈E\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\in E$$\end{document}” (“∉E\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\not \in E$$\end{document}”) represent incidences corresponding to present (not present) edges in the original graph. The vertex w is incident with all vertices except vertices contained in Xi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X_i$$\end{document} for all 1≤i≤4\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1\le i\le 4$$\end{document}
When Can Graph Hyperbolicity be Computed in Linear Time?

May 2019

·

51 Reads

·

3 Citations

Algorithmica

Hyperbolicity is a distance-based measure of how close a given graph is to being a tree. Due to its relevance in modeling real-world networks, hyperbolicity has seen intensive research over the last years. Unfortunately, the best known algorithms used in practice for computing the hyperbolicity number of an n-vertex graph have running time O(n4)O(n^4). Exploiting the framework of parameterized complexity analysis, we explore possibilities for “linear-time FPT” algorithms to compute hyperbolicity. For example, we show that hyperbolicity can be computed in 2O(k)+O(n+m)2^{O(k)} + O(n +m) time (where m and k denote the number of edges and the size of a vertex cover in the input graph, respectively) while at the same time, unless the Strong Exponential Time Hypothesis (SETH) fails, there is no 2o(k)n2ε2^{o(k)}\cdot n^{2-\varepsilon }-time algorithm for every ε>0\varepsilon >0.


Citations (45)


... They consider constraints on the extent to which a committee can change, while ensuring a certain level of support remains for the committee. Deltl et al. [15] looked into a similar model, but with the restriction that agents can only approve at most one project per timestep. ...

Reference:

Temporal Elections: Welfare, Strategyproofness, and Proportionality
Algorithmics of Egalitarian versus Equitable Sequences of Committees
  • Citing Conference Paper
  • August 2023

... We will use the following lemma to shrink edge weights so that their encoding length will be polynomial in the number of vertices and edges of the graph. It is a generalization of an idea implicitly used for weight reduction in a proof of Lokshtanov et al. [47,Theorem 4.2] and shrinks weights faster and more significantly than a theorem of Frank and Tardos [31] that is frequently used in the exact kernelization of weighted problems [3,6,25,48]. We first state the lemma, and thereafter intuitively describe its application to RPP. ...

Polynomial-Time Data Reduction for Weighted Problems Beyond Additive Goal Functions
  • Citing Article
  • March 2023

Discrete Applied Mathematics

... This introduces non-trivial dependencies between the time warping and the vertex mapping which render the problem computationally hard. Indeed, this is not a singular case for temporal graph problems where for many cases the temporal counterparts of problems solvable in polynomial time turn NP-hard; examples include the computation of matchings in graphs (Heeger et al. 2019;Baste et al. 2020;Mertzios et al. 2020), short path computations (Casteigts et al. 2019;Fluschnik et al. 2020), or the computation of separators . ...

Multistage s–t Path: Confronting Similarity with Dissimilarity

Algorithmica

... An adjacent line of work by Bredereck et al. [7,8] and Zech et al. [36] look into sequential committee elections where an entire committee is elected at each timestep. They consider constraints on the extent to which a committee can change, while ensuring a certain level of support remains for the committee. ...

When Votes Change and Committees Should (Not)

... Such data can be modeled by a temporal graph, that is, a multi-layer graph in which the layers are ordered linearly [16,17,[30][31][32][33]. The goal in clustering a temporal graph is to find a clustering that slowly evolves over time consistently with the graph [16][17][18][34][35][36]. ...

Multistage Vertex Cover

Theory of Computing Systems

... Related Work. In our previous work [4], we proved that Feedback Vertex Set remains NP-complete on 4-and 5-regular planar Hamiltonian graphs, p-regular Hamiltonian graphs for every p ∈ N ≥6 , and p-Hamiltonian-ordered graphs for every p ∈ N ≥3 . Several classic graph problems are studied on planar regular graphs. ...

Feedback Vertex Set on Hamiltonian Graphs
  • Citing Chapter
  • September 2021

Lecture Notes in Computer Science

... We follow a model recently introduced by Fluschnik and Kellerhals [6]. Herein, the modeled graph can be understood as path-based graph [22,8]: a vertex corresponds to a part fragmented by human-made infrastructures subsuming habitat patches of diverse animal habitats, and any two vertices are connected by an edge if the corresponding patches can be connected by a green bridge. ...

Placing Green Bridges Optimally, with a Multivariate Analysis
  • Citing Chapter
  • July 2021

Lecture Notes in Computer Science

... Typically, the solutions are sets of vertices or edges, and the amount of change is measured with the symmetric difference of the sets. Many combinatorial problems have been studied in the multistage setting including matching problems [35,60,61], vertex cover [62], finding paths [63], 2-coloring [64], and others [65][66][67][68][69]. ...

A Multistage View on 2-Satisfiability
  • Citing Chapter
  • May 2021

Lecture Notes in Computer Science

... More generally, to encompass the computation of approximate solutions with a loss of factor α ≥ 1, given a β-approximate solution to the instance of Q, for any β ≥ 1, lift must output an α · β-approximate solution to the instance of P . Since its introduction, this notion of compression/kernelization (termed lossy compression/kernelization) has already found a wide range of applications; see, e.g., [40,28,21,36,35,1,47,20] for just a few illustrative examples. ...

On approximate data reduction for the Rural Postman Problem: Theory and experiments
  • Citing Article
  • October 2020

Networks