2016
DOI: 10.1137/130947076
|View full text |Cite
|
Sign up to set email alerts
|

Known Algorithms for Edge Clique Cover are Probably Optimal

Abstract: In the EDGE CLIQUE COVER (ECC) problem, given a graph G and an integer k, we ask whether the edges of G can be covered with k complete subgraphs of G or, equivalently, whether G admits an intersection model on k-element universe. Gramm et al. [JEA 2008] have shown a set of simple rules that reduce the number of vertices of G to 2 k , and no algorithm is known with significantly better running time bound than a brute-force search on this reduced instance. In this paper we show that the approach of Gramm et al.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(18 citation statements)
references
References 48 publications
0
18
0
Order By: Relevance
“…Theorem 1.1 shows that GC behaves qualitatively different from every other problem previously studied on graphs of bounded cliquewidth. Indeed, to the best of our knowledge, GC parameterized by cliquewidth is the first (natural) parameterized problem known to require exponential dependence on the parameter in the exponent of n. Note here that there do exist problems for which the tight upper and lower bounds on the dependence of the running time on the parameter are double exponential, triple exponential, or even nonelementary (see e.g [15,22,34,37]. However these lower bounds are all for the g(k) factor of FPT algorithms, and not for the exponent of the input size n.…”
Section: Introductionmentioning
confidence: 99%
“…Theorem 1.1 shows that GC behaves qualitatively different from every other problem previously studied on graphs of bounded cliquewidth. Indeed, to the best of our knowledge, GC parameterized by cliquewidth is the first (natural) parameterized problem known to require exponential dependence on the parameter in the exponent of n. Note here that there do exist problems for which the tight upper and lower bounds on the dependence of the running time on the parameter are double exponential, triple exponential, or even nonelementary (see e.g [15,22,34,37]. However these lower bounds are all for the g(k) factor of FPT algorithms, and not for the exponent of the input size n.…”
Section: Introductionmentioning
confidence: 99%
“…. , v 11 , where for 1 ≤ i ≤ 10, v i is adjacent to v i+1 , v i+2 (reading subscripts modulo 10) and v 0 is adjacent to v 1 , v 3 , v 5 , v 7 , v 9 and v 11 is adjacent to v 2 , v 4 , v 6 , v 8 , v 10 (see Figure 1). Let G 1 be obtained from G 0 by deleting v 11 and let G 2 be obtained from G 1 by deleting v 10 .…”
Section: Global Structure Of Claw-free Graphsmentioning
confidence: 99%
“…Recall that the NP-analogue ETH [47] is widely used (e.g. [49,55,1,25,30]), often in stronger variants such as SETH [46,26] and NSETH [27].…”
Section: Techniquesmentioning
confidence: 99%