FINE-GRAINED META-THEOREMS FOR VERTEX INTEGRITY

被引:0
|
作者
Lampis, Michael [1 ]
Mitsou, Valia [2 ]
机构
[1] PSL Univ, Univ Paris Dauphine, CNRS, LAMSADE, F-75016 Paris, France
[2] Univ Paris Cite, IRIF, CNRS, F-75205 Paris, France
关键词
Model-Checking; Fine-grained complexity; Vertex Integrity;
D O I
10.46298/LMCS-20(4:18)2024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vertex Integrity is a graph measure which sits squarely between two more well-studied notions, namely vertex cover and tree-depth, and that has recently gained attention as a structural graph parameter. In this paper we investigate the algorithmic trade-offs involved with this parameter from the point of view of algorithmic meta-theorems for First-Order (FO) and Monadic Second Order (MSO) logic. Our positive results are the following: (i) given a graph G of vertex integrity k and an FO formula with q quantifiers, deciding if G satisfies can be done in time 2 O ( k 2 q + q log q ) + n O (1) ; (ii) for MSO formulas with q quantifiers, the same can be done in time 2 2O ( k 2+ kq ) + n O (1) . Both results are obtained using kernelization arguments, which pre-process the input to sizes 2 O ( k 2 ) q and 2 O ( k 2 + kq ) respectively. The complexities of our meta-theorems are significantly better than the corresponding meta-theorems for tree-depth, which involve towers of exponentials. However, they are worse than the roughly 2O(kq)and 2 2O ( k + q ) complexities known for corresponding meta-theorems for vertex cover. To explain this deterioration we present two formula constructions which lead to fine-grained complexity lower bounds and establish that the dependence of our meta-theorems on k is the best possible. More precisely, we show that it is not possible to decide FO formulas with q quantifiers in time 2 o ( k 2 q ) , and that there exists an MSO formula which cannot be decided in time 2 2o ( k 2) , both under the ETH. Hence, the quadratic blow-up in the dependence on k is unavoidable and vertex integrity has a complexity for FO and MSO logic which is truly intermediate between vertex cover and tree-depth.
引用
收藏
页码:1 / 18
页数:17
相关论文
共 50 条
  • [21] Is fine-grained viable?
    Aaldering, M
    EDN, 1997, 42 (02) : 28 - 28
  • [22] Fine-Grained Cryptography
    Degwekar, Akshay
    Vaikuntanathan, Vinod
    Vasudevan, Prashant Nalini
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 533 - 562
  • [23] Meta label associated loss for fine-grained visual recognition
    Li, Yanchao
    Xiao, Fu
    Li, Hao
    Li, Qun
    Yu, Shui
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (06)
  • [24] Regularized Fine-Grained Meta Face Anti-Spoofing
    Shao, Rui
    Lan, Xiangyuan
    Yuen, Pong C.
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 11974 - 11981
  • [25] Meta label associated loss for fine-grained visual recognition
    Yanchao LI
    Fu XIAO
    Hao LI
    Qun LI
    Shui YU
    Science China(Information Sciences), 2024, 67 (06) : 230 - 247
  • [26] FINE-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
    Li, Jinku
    Tong, Xiaomeng
    Zhang, Fengwei
    Ma, Jianfeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1535 - 1550
  • [27] TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection
    She, Cairui
    Chen, Liwei
    Shi, Gang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 407 - 414
  • [28] DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing
    Wang, Xiayang
    Huang, Fuqian
    Chen, Haibo
    CYBERSECURITY, 2019, 2 (01)
  • [29] TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud
    Jiang, Fangjie
    Cai, Quanwei
    Lin, Jingqiang
    Luo, Bo
    Guan, Le
    Ma, Ziqiang
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 57 - 69
  • [30] DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing
    Xiayang Wang
    Fuqian Huang
    Haibo Chen
    Cybersecurity, 2