Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/62013
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Binkele-Raible, Daniel | en |
dc.contributor.author | Brankovic, Ljiljana | en |
dc.contributor.author | Cygan, Marek | en |
dc.contributor.author | Fernau, Henning | en |
dc.contributor.author | Kneis, Joachim | en |
dc.contributor.author | Kratsch, Dieter | en |
dc.contributor.author | Langer, Alexander | en |
dc.contributor.author | Liedloff, Mathieu | en |
dc.contributor.author | Pilipczuk, Marcin | en |
dc.contributor.author | Rossmanith, Peter | en |
dc.contributor.author | Wojtaszczyk, Jakub Onufry | en |
dc.date.accessioned | 2024-08-08T00:22:14Z | - |
dc.date.available | 2024-08-08T00:22:14Z | - |
dc.date.issued | 2011-09 | - |
dc.identifier.citation | Journal of Discrete Algorithms, 9(3), p. 214-230 | en |
dc.identifier.issn | 1570-8675 | en |
dc.identifier.issn | 1570-8667 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/62013 | - |
dc.description.abstract | <p>The lower and the upper irredundance numbers of a graph <i>G</i>, denoted ir(<i>G</i>) and IR(<i>G</i>), respectively, are conceptually linked to the domination and independence numbers and have numerous relations to other graph parameters. It has been an open question whether determining these numbers for a graph <i>G</i> on <i>n</i> vertices admits exact algorithms running in time faster than the trivial Θ(<i>2<sup>n</sup></i> · poly(<i>n</i>)) enumeration, also called the <i>2<sup>n</sup></i>-barrier. The main contributions of this article are exact exponential-time algorithms breaking the <i>2<sup>n</sup></i>-barrier for irredundance. We establish algorithms with running times of <i>O<sup>*</sup></i>(1.99914<sup><i>n</i></sup>) for computing ir(<i>G</i>) and <i>O<sup>*</sup></i>(1.9369<sup><i>n</i></sup>) for computing IR(<i>G</i>). Both algorithms use polynomial space. The first algorithm uses a parameterized approach to obtain (faster) exact algorithms. The second one is based, in addition, on a reduction to the Maximum Induced Matching problem providing a branch-and-reduce algorithm to solve it.</p> | en |
dc.language | en | en |
dc.publisher | Elsevier BV | en |
dc.relation.ispartof | Journal of Discrete Algorithms | en |
dc.title | Breaking the 2n-barrier for Irredundance: Two lines of attack | en |
dc.type | Journal Article | en |
dc.identifier.doi | 10.1016/j.jda.2011.03.002 | en |
dcterms.accessRights | Bronze | en |
local.contributor.firstname | Daniel | en |
local.contributor.firstname | Ljiljana | en |
local.contributor.firstname | Marek | en |
local.contributor.firstname | Henning | en |
local.contributor.firstname | Joachim | en |
local.contributor.firstname | Dieter | en |
local.contributor.firstname | Alexander | en |
local.contributor.firstname | Mathieu | en |
local.contributor.firstname | Marcin | en |
local.contributor.firstname | Peter | en |
local.contributor.firstname | Jakub Onufry | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | C1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | The Netherlands | en |
local.format.startpage | 214 | en |
local.format.endpage | 230 | en |
local.peerreviewed | Yes | en |
local.identifier.volume | 9 | en |
local.identifier.issue | 3 | en |
local.title.subtitle | Two lines of attack | en |
local.access.fulltext | Yes | en |
local.contributor.lastname | Binkele-Raible | en |
local.contributor.lastname | Brankovic | en |
local.contributor.lastname | Cygan | en |
local.contributor.lastname | Fernau | en |
local.contributor.lastname | Kneis | en |
local.contributor.lastname | Kratsch | en |
local.contributor.lastname | Langer | en |
local.contributor.lastname | Liedloff | en |
local.contributor.lastname | Pilipczuk | en |
local.contributor.lastname | Rossmanith | en |
local.contributor.lastname | Wojtaszczyk | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/62013 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Breaking the 2n-barrier for Irredundance | en |
local.output.categorydescription | C1 Refereed Article in a Scholarly Journal | en |
local.search.author | Binkele-Raible, Daniel | en |
local.search.author | Brankovic, Ljiljana | en |
local.search.author | Cygan, Marek | en |
local.search.author | Fernau, Henning | en |
local.search.author | Kneis, Joachim | en |
local.search.author | Kratsch, Dieter | en |
local.search.author | Langer, Alexander | en |
local.search.author | Liedloff, Mathieu | en |
local.search.author | Pilipczuk, Marcin | en |
local.search.author | Rossmanith, Peter | en |
local.search.author | Wojtaszczyk, Jakub Onufry | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2011 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/368e66a5-8a36-4ef3-a7c3-11eb7db899f1 | en |
local.subject.for2020 | 461305 Data structures and algorithms | en |
local.subject.seo2020 | 220499 Information systems, technologies and services not elsewhere classified | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Journal Article School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
SCOPUSTM
Citations
22
checked on Jan 4, 2025
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.