×

Target set selection parameterized by vertex cover and more. (English) Zbl 1524.90325

Summary: Diffusion is a natural phenomenon in many real-world networks. Spreading of ideas, rumors in an online social network; propagation of virus, malware in a computer network; spreading of diseases in a human contact network, etc. are some real-world examples of this. Diffusion often starts from a set of initial nodes known as seed nodes. A node can be in any one of the following two states: influenced (active) or not influenced (inactive). We assume that a node can change its state from inactive to active, however, not vice versa. Only the seed nodes are active initially and the information is dissipated from these seed nodes in discrete time steps. Each node \(v\) is associated with a threshold value \(\tau (v)\) which is a positive integer. A node \(v\) will be influenced at time step \(t^{\prime } \), if there are at least \(\tau (v)\) number of nodes in its neighborhood which have been activated on or before time step \(t^{\prime }-1\). The diffusion stops when no more node-activation is possible. Given a simple, undirected graph \(G\) with a threshold function \(\tau :V(G) \rightarrow \mathbb{N} \), the Target Set Selection (TSS) problem is about choosing a minimum cardinality set, say \(S \subseteq V(G)\), such that starting a diffusion process with \(S\) as its seed set will eventually result in activating all the nodes in \(G\). For any non-negative integer \(i\), we say a set \(T\subseteq V(G)\) is a degree-\(i\) modulator of \(G\) if the degree of any vertex in the graph \(G - T\) is at most \(i\). Degree-0 modulators of a graph are precisely its vertex covers. Consider a graph \(G\) on \(n\) vertices and \(m\) edges. We have the following results on the TSS problem:
\(\bullet\)
It was shown by A. Nichterlein et al. [“On tractable cases of target set selection”, Soc. Netw. Anal. Min. 3, No. 2, 233–256 (2013; doi:10.1007/s13278-012-0067-7), see also [Zbl 1310.68115]] that it is possible to compute an optimal-sized target set in \(\boldsymbol{O}(\boldsymbol{2}^{(\boldsymbol{2}^t+\boldsymbol{1})\boldsymbol{t}}\boldsymbol{\cdot m})\) time, where \(t\) denotes the cardinality of a minimum degree-0 modulator of \(\boldsymbol{G}\). We improve this result by designing an algorithm running in time \(\boldsymbol{2}^{\boldsymbol{O}(\boldsymbol{t}\log \boldsymbol{t})}\boldsymbol{n} \).
\(\bullet\)
We design a \(\boldsymbol{2}^{\boldsymbol{2}^{\boldsymbol{O}(\boldsymbol{t})}}\boldsymbol{n}^{\boldsymbol{O}(\boldsymbol{1})}\) time algorithm to compute an optimal target set for \(\boldsymbol{G}\), where \(t\) is the size of a minimum degree-\(\boldsymbol{1}\) modulator of \(\boldsymbol{G}\).
\(\bullet\)
We show that for a graph on \(n\) vertices of treewidth \(s\), the TSS problem cannot be solved in \(\boldsymbol{f}(\boldsymbol{s})\boldsymbol{n}^{\boldsymbol{o}(\boldsymbol{\frac{s}{\log s}})}\) time unless the Exponential Time Hypothesis fails. This is an improvement over the previously known lower bound of \(\boldsymbol{f}(\boldsymbol{s})\boldsymbol{n}^{\boldsymbol{o}(\sqrt{\boldsymbol{s}})}\) due to O. Ben-Zwi et al. [Discrete Optim. 8, No. 1, 87–96 (2011; Zbl 1248.90068)]. In fact, we prove that same lower bound holds when parameterized by tree-depth or star-deletion number.

MSC:

90C35 Programming involving graphs or networks
90C10 Integer programming
91D30 Social networks; opinion dynamics
76R50 Diffusion
05C82 Small world graphs, complex networks (graph-theoretic aspects)

References:

[1] Bakshy, E., Rosenn, I., Marlow, C., Adamic, L.: The role of social networks in information diffusion. In: Proceedings of the 21st International Conference on World Wide Web, pp 519-528. ACM (2012)
[2] Hu, Y-C; Perrig, A.; Johnson, DB, Wormhole attacks in wireless networks, IEEE J. Selected Areas Commun., 24, 2, 370-380 (2006) · doi:10.1109/JSAC.2005.861394
[3] Salathé, M., Kazandjieva, M., Lee, J.W., Levis, P., Feldman, M.W., Jones, J.H.: A high-resolution human contact network for infectious disease transmission. Proceedings of the National Academy of Sciences, 201009094 (2010)
[4] Chen, N., On the approximability of influence in social networks, SIAM J. Discret. Math., 23, 3, 1400-1415 (2009) · Zbl 1203.68314 · doi:10.1137/08073617X
[5] Chiang, C-Y; Huang, L-H; Li, B-J; Wu, J.; Yeh, H-G, Some results on the target set selection problem, J. Comb. Optim., 25, 4, 702-715 (2013) · Zbl 1273.90224 · doi:10.1007/s10878-012-9518-3
[6] Cicalese, F.; Cordasco, G.; Gargano, L.; Milanič, M.; Vaccaro, U., Latency-bounded target set selection in social networks, Theor. Comput. Sci., 535, 1-15 (2014) · Zbl 1358.05272 · doi:10.1016/j.tcs.2014.02.027
[7] Chopin, M.; Nichterlein, A.; Niedermeier, R.; Weller, M., Constant thresholds can make target set selection tractable, Theory Comput. Syst., 55, 1, 61-83 (2014) · Zbl 1319.68109 · doi:10.1007/s00224-013-9499-3
[8] Dvoraḱ, P., Knop, D., Toufar, T.: Target set selection in dense graph classes. In: Hsu, W., Lee, D., Liao, C. (eds.) 29th International Symposium on Algorithms and Computation, ISAAC 2018, December 16-19, 2018, Jiaoxi, Yilan, Taiwan. LIPIcs, vol. 123, pp. 18-11813. Schloss Dagstuhl - Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ISAAC.2018.18 (2018) · Zbl 1533.68234
[9] Bazgan, C.; Chopin, M.; Nichterlein, A.; Sikora, F., Parameterized inapproximability of target set selection and generalizations, Computability, 3, 2, 135-145 (2014) · Zbl 1320.68088 · doi:10.3233/COM-140030
[10] Nichterlein, A.; Niedermeier, R.; Uhlmann, J.; Weller, M., On tractable cases of target set selection, Soc. Netw. Anal. Min., 3, 2, 233-256 (2013) · doi:10.1007/s13278-012-0067-7
[11] Hartmann, T.A.: Target set selection parameterized by clique-width and maximum threshold. In: International Conference on Current Trends in Theory and Practice of Informatics, pp 137-149. Springer (2018) · Zbl 1444.68144
[12] Bliznets, I., Sagunov, D.: Solving target set selection with bounded thresholds faster than 2^n. In: Paul, C., Pilipczuk, M. (eds.) 13th International Symposium on Parameterized and Exact Computation (IPEC 2018). Leibniz International Proceedings in Informatics (LIPIcs), vol. 115, pp. 22-12214. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. doi:10.4230/LIPIcs.IPEC.2018.22 (2019) · Zbl 1520.68110
[13] Keiler, L., Lima, C.V.G., Maia, A.K., Sampaio, R., Sau, I.: Target set selection with maximum activation time. arXiv:2007.05246 (2020)
[14] Knop, D., Schierreich, S., Suchý, O.: Balancing the spread of two opinions in sparse social networks. arXiv:2105.10184 (2021)
[15] Banerjee, S., Mathew, R., Panolan, F.: Target set selection parameterized by vertex cover and more. arXiv:1812.01482 (2021)
[16] Ben-Zwi, O.; Hermelin, D.; Lokshtanov, D.; Newman, I., Treewidth governs the complexity of target set selection, Discret. Optim., 8, 1, 87-96 (2011) · Zbl 1248.90068 · doi:10.1016/j.disopt.2010.09.007
[17] Cygan, M., Fomin, F.V., Kowalik, Ł, Lokshtanov, D, Marx, D., Pilipczuk, M., Pilipczuk, M., Saurabh, S.: Parameterized Algorithms, vol. 4 Springer (2015) · Zbl 1334.90001
[18] Marx, D.: Can you beat treewidth? In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07), pp. 169-179. IEEE (2007) · Zbl 1213.68316
[19] Lenstra Jr., H., Integer programming with a fixed number of variables, Math. Oper. Res., 8, 4, 538-548 (1983) · Zbl 0524.90067 · doi:10.1287/moor.8.4.538
[20] Kannan, R.: Improved algorithms for integer programming and related lattice problems. In: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing. STOC ’83, pp. 193-206. Association for Computing Machinery. doi:10.1145/800061.808749 (1983)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.