scispace - formally typeset
Search or ask a question
Author

Daniel Binkele-Raible

Bio: Daniel Binkele-Raible is an academic researcher from University of Trier. The author has contributed to research in topics: Parameterized complexity & Kernelization. The author has an hindex of 7, co-authored 10 publications receiving 189 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: For the k-Leaf-Out-Branching problem, it was shown in this paper that no polynomial-sized kernel is possible unless coNP is in NP/poly.
Abstract: The k-Leaf Out-Branching problem is to find an out-branching, that is a rooted oriented spanning tree, with at least k leaves in a given digraph. The problem has recently received much attention from the viewpoint of parameterized algorithms. Here, we take a kernelization based approach to the k-Leaf-Out-Branching problem. We give the first polynomial kernel for Rooted k-Leaf-Out-Branching, a variant of k-Leaf-Out-Branching where the root of the tree searched for is also a part of the input. Our kernel with O(k3) vertices is obtained using extremal combinatorics.For the k-Leaf-Out-Branching problem, we show that no polynomial-sized kernel is possible unless coNP is in NP/poly. However, our positive results for Rooted k-Leaf-Out-Branching immediately imply that the seemingly intractable k-Leaf-Out-Branching problem admits a data reduction to n independent polynomial-sized kernels. These two results, tractability and intractability side by side, are the first ones separating Karp kernelization from Turing kernelization. This answers affirmatively an open problem regarding “cheat kernelization” raised by Mike Fellows and Jiong Guo independently.

48 citations

Journal ArticleDOI
TL;DR: It is shown that some of the problems of lobbying can be solved in polynomial time, some are NP-complete but fixed-parameter tractable, and some are W[2]-complete.

38 citations

Posted Content
TL;DR: It is shown that some of the problems of lobbying in a stochastic environment can be solved in polynomial time, some are NP-complete but fixed-parameter tractable, and some are W[2]-complete.
Abstract: We propose models for lobbying in a probabilistic environment, in which an actor (called "The Lobby") seeks to influence voters' preferences of voting for or against multiple issues when the voters' preferences are represented in terms of probabilities. In particular, we provide two evaluation criteria and two bribery methods to formally describe these models, and we consider the resulting forms of lobbying with and without issue weighting. We provide a formal analysis for these problems of lobbying in a stochastic environment, and determine their classical and parameterized complexity depending on the given bribery/evaluation criteria and on various natural parameterizations. Specifically, we show that some of these problems can be solved in polynomial time, some are NP-complete but fixed-parameter tractable, and some are W[2]-complete. Finally, we provide approximability and inapproximability results for these problems and several variants.

32 citations

Journal ArticleDOI
TL;DR: In this paper, exact exponential-time algorithms for computing the lower and upper irredundance numbers of a graph G on n vertices with running time O(1.99914^n) and O( 1.9369^n, respectively, were presented.

28 citations

Journal ArticleDOI
TL;DR: A polynomial-space O(1.6914^n)-time algorithm based on an algorithm for bipartite graphs that runs in time O( 1.30052^n) is designed, and it is shown that the constraint bipartites vertices cover problem can be solved inTime O (1.300 52^n), as a byproduct of this algorithm.

18 citations


Cited by
More filters
BookDOI
TL;DR: This handbook, written by thirty-six prominent members of the computational social choice community, covers the field comprehensively and offers detailed introductions to each of the field's major themes.
Abstract: The rapidly growing field of computational social choice, at the intersection of computer science and economics, deals with the computational aspects of collective decision making. This handbook, written by thirty-six prominent members of the computational social choice community, covers the field comprehensively. Chapters devoted to each of the field's major themes offer detailed introductions. Topics include voting theory (such as the computational complexity of winner determination and manipulation in elections), fair allocation (such as algorithms for dividing divisible and indivisible goods), coalition formation (such as matching and hedonic games), and many more. Graduate students, researchers, and professionals in computer science, economics, mathematics, political science, and philosophy will benefit from this accessible and self-contained book.

396 citations

Posted Content
22 Nov 2006
TL;DR: Koivisto et al. as discussed by the authors presented an O(2k n2 + n m) algorithm for the Steiner tree problem in graphs with n vertices, k terminals, and m edges with bounded integer weights.
Abstract: We present a fast algorithm for the subset convolution problem:given functions f and g defined on the lattice of subsets of ann-element set n, compute their subset convolution f*g, defined for S⊆ N by [ (f * g)(S) = [T ⊆ S] f(T) g(S/T),,]where addition and multiplication is carried out in an arbitrary ring. Via Mobius transform and inversion, our algorithm evaluates the subset convolution in O(n2 2n) additions and multiplications, substanti y improving upon the straightforward O(3n) algorithm. Specifically, if the input functions have aninteger range [-M,-M+1,...,M], their subset convolution over the ordinary sum--product ring can be computed in O(2n log M) time; the notation O suppresses polylogarithmic factors.Furthermore, using a standard embedding technique we can compute the subset convolution over the max--sum or min--sum semiring in O(2n M) time.To demonstrate the applicability of fast subset convolution, wepresent the first O(2k n2 + n m) algorithm for the Steiner tree problem in graphs with n vertices, k terminals, and m edges with bounded integer weights, improving upon the O(3kn + 2k n2 + n m) time bound of the classical Dreyfus-Wagner algorithm. We also discuss extensions to recent O(2n)-time algorithms for covering and partitioning problems (Bjorklund and Husfeldt, FOCS 2006; Koivisto, FOCS 2006).

280 citations

Journal ArticleDOI
TL;DR: The complexity of possible/necessary winner problems for the following common voting rules are completely characterized: a class of positional scoring rules (including Borda), Copeland, maximin, Bucklin, ranked pairs, voting trees, and plurality with runoff.
Abstract: Usually a voting rule requires agents to give their preferences as linear orders. However, in some cases it is impractical for an agent to give a linear order over all the alternatives. It has been suggested to let agents submit partial orders instead. Then, given a voting rule, a profile of partial orders, and an alternative (candidate) c, two important questions arise: first, is it still possible for c to win, and second, is c guaranteed to win? These are the possible winner and necessary winner problems, respectively. Each of these two problems is further divided into two sub-problems: determining whether c is a unique winner (that is, c is the only winner), or determining whether c is a co-winner (that is, c is in the set of winners). We consider the setting where the number of alternatives is unbounded and the votes are unweighted. We completely characterize the complexity of possible/necessary winner problems for the following common voting rules: a class of positional scoring rules (including Borda), Copeland, maximin, Bucklin, ranked pairs, voting trees, and plurality with runoff.

200 citations

Book
28 Feb 2019
TL;DR: Kernelization: Theory of Parameterized Preprocessing, by Fomin et al., is unique in that it is a text focusing solely on the titular topic of kernelization, and is able to more effectively showcase and teach the tools used in the field than a more traditional text on fixed parameter complexity.
Abstract: Preprocessing, or data reduction, is a standard technique for simplifying and speeding up computation. Written by a team of experts in the field, this book introduces a rapidly developing area of preprocessing analysis known as kernelization. The authors provide an overview of basic methods and important results, with accessible explanations of the most recent advances in the area, such as meta-kernelization, representative sets, polynomial lower bounds, and lossy kernelization. The text is divided into four parts, which cover the different theoretical aspects of the area: upper bounds, meta-theorems, lower bounds, and beyond kernelization. The methods are demonstrated through extensive examples using a single data set. Written to be self-contained, the book only requires a basic background in algorithmics and will be of use to professionals, researchers and graduate students in theoretical computer science, optimization, combinatorics, and related fields.

181 citations

Dissertation
03 Sep 2012
TL;DR: The notion of branch decompositions of a set function introduced by Robert-son and Seymour is used to introduce three new graph parameters, boolean-width, max-imum matching-width (MM-width) and maximum induced matching- width (MIM-width), which are compared to existing graph parameters by comparing partial orders of width parameters.
Abstract: The main focus of this thesis is on using the divide and conquer technique toeciently solve graph problems that are in general intractable. We work inthe eld of parameterized algorithms, using width parameters of graphs thatindicate the complexity inherent in the structure of the input graph. We usethe notion of branch decompositions of a set function introduced by Robert-son and Seymour to de ne three new graph parameters, boolean-width, max-imum matching-width (MM-width) and maximum induced matching-width(MIM-width). We compare these new graph width parameters to existinggraph parameters by de ning partial orders of width parameters. We focuson tree-width, branch-width, clique-width, module-width and rank-width,and include a Hasse diagram of these orders containing 32 graph parameters.We use the size of a maximum matching in a bipartite graph as a setfunction to de ne MM-width and show that MM-width never di ers by morethan a multiplicative factor 3 from tree-width. The main reason for introduc-ing MM-width is that it simpli es the comparison between tree-width andparameters de ned via branch decomposition of a set function.We use the logarithm of the number of maximal independent sets in a bi-partite graph as set function to de ne boolean-width. We show that boolean-width of a graph class is bounded if and only if rank-width is bounded, andshow that the boolean-width of a graph can be as low as the logarithm of therank-width of the graph. Given a decomposition of boolean-width k, we de-sign FPT algorithms parameterized by k, for a large class of graph problems,whose runtime has a single exponential dependency in the boolean-width,i.e. O

144 citations