This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Parameterized Complexity of Globally Minimal Defensive Alliances

Ajinkya Gaikwad ajinkya.gaikwad@students.iiserpune.ac.in Indian Institute of Science Education and Research, Pune, India Soumen Maity soumen@iiserpune.ac.in Indian Institute of Science Education and Research, Pune, India
Abstract

A defensive alliance in an undirected graph G=(V,E)G=(V,E) is a non-empty set of vertices SS satisfying the condition that every vertex vSv\in S has at least as many neighbours (including itself) in SS as it has in VSV\setminus S. We consider the notion of global minimality in this paper. We are interested in globally minimal defensive alliance of maximum size. This problem is known to be NP-hard but its parameterized complexity remains open until now. We enhance our understanding of the problem from the viewpoint of parameterized complexity by showing that the Globally Minimal Defensive Alliance problem is W[1]-hard when parameterized by the treewidth of the graph. We also present a polynomial time algorithm when the input graph happens to be a tree.

keywords:
FPT , treewidth , W[1]-hard
journal: Elsevier

1 Introduction

During the last 20 years, the Defensive Alliance problem has been studied extensively. A defensive alliance in an undirected graph is a non-empty set of vertices with the property that each vertex has at least as many neighbours in the alliance (including itself) as outside the alliance. In 2000, Kristiansen, Hedetniemi, and Hedetniemi [kris] introduced defensive, offensive, and powerful alliances, and further studied by Shafique [HassanShafique2004PartitioningAG] and other authors [BAZGAN2019111, BLIEM2018334, small, Cami2006OnTC, Enciso2009AlliancesIG, Fernau, FERNAU2009177, ICDCIT2021, Lindsay, ROD, SIGARRETA20091687, SIGARRETA20061345, SIGA]. In this paper, we will focus on defensive alliances. A defensive alliance is strong if each vertex of the alliance has at least as many neighbours in the alliance (not counting itself) as outside the alliance. The theory of alliances in graphs have been studied intensively [Cami2006OnTC, 10.5614/ejgta.2014.2.1.7, frick] both from a combinatorial and from a computational perspective. As mentioned in [BAZGAN2019111], the focus has been mostly on finding small alliances, although studying large alliances do not only make a lot of sense from the original motivation of these notions, but was actually also delineated in the very first papers on alliances [kris].

Note that a defensive alliance is not a hereditary property, that is, a subset of defensive alliance is not necessarily a defensive alliance. Shafique [HassanShafique2004PartitioningAG] called an alliance a locally minimal alliance if the set obtained by removing any vertex of the alliance is not an alliance. Bazgan et al. [BAZGAN2019111] considered another notion of alliance that they called a globally minimal alliance which has the property that no proper subset is an alliance. In this paper we are interested in globally minimal alliances of maximum size. Clearly, the motivation is that big communities where every member still matters somehow are of more interest than really small communities. Also, there is a general mathematical interest in such type of problems, see [Manlove1998MinimaximalAM].

2 Basic Notations

Throughout this article, G=(V,E)G=(V,E) denotes a finite, simple and undirected graph of order |V|=n|V|=n. For a non-empty subset SVS\subseteq V and a vertex vV(G)v\in V(G), let NS(v)={uS:(u,v)E(G)}N_{S}(v)=\{u\in S~{}:~{}(u,v)\in E(G)\}, NS[v]=NS(v){v}N_{S}[v]=N_{S}(v)\cup\{v\}, and dS(v)d_{S}(v) denote its open neighborhood, closed neighborhood, and degree respectively in SS. The complement of the vertex set SS in VV is denoted by ScS^{c}.

Definition 1.

A non-empty set SVS\subseteq V is a defensive alliance in GG if for each vSv\in S, |N[v]S||N(v)S||N[v]\cap S|\geq|N(v)\setminus S|, or equivalently, dS(v)+1dSc(v)d_{S}(v)+1\geq d_{S^{c}}(v).

A vertex vSv\in S is said to be protected if dS(v)+1dSc(v)d_{S}(v)+1\geq d_{S^{c}}(v). A non-empty set SVS\subseteq V is a defensive alliance if every vertex in SS is protected.

Definition 2.

A vertex vSv\in S is said to be marginally protected if it becomes unprotected when any of its neighbour in SS is moved from SS to VSV\setminus S. A vertex vSv\in S is said to be strongly protected if it remains protected when any of its neighbours is moved from SS to VSV\setminus S.

Definition 3.

An alliance SS is called a locally minimal alliance if for any vSv\in S, S{v}S\setminus\{v\} is not an alliance.

Definition 4.

A defensive alliance SS is globally minimal defensive alliance or shorter minimal defensive alliance if no proper subset is an alliance.

In literature, a defensive alliance SS is called global defensive alliance if SS is a dominating set. It is to be noted that globally minimal defensive alliance is different from global defensive alliance.

Observation 1.

Let SS be a globally minimal defensive alliance of size at least two in graph GG. Then SS can never contain a vertex of degree one.

This can be proved by contradiction. Suppose SS contains a vertex vv of degree one. Note that {v}\{v\} is a proper subset of SS and it is a defensive alliance, a contradiction to the fact that SS is a globally minimal defensive alliance.

11234567891011121314151617181920212223242526
Figure 1: The set S1={7,2,9,3,11,4,13,5,15,6}S_{1}=\{7,2,9,3,11,4,13,5,15,6\} is a locally minimal defensive alliance of size 10 and S2={1,2,3}S_{2}=\{1,2,3\} is a globally minimal defensive alliance of size 3 in GG.

A defensive alliance SS is connected if the subgraph induced by SS is connected. Notice that any globally minimal defensive alliance is also connected. In this paper, we consider Globally Minimal Defensive Alliance problem under structural parameters. We define the problem as follows:
Globally Minimal Defensive Alliance
Input: An undirected graph G=(V,E)G=(V,E) and an integer k2k\geq 2.
Question: Is there a globally minimal defensive alliance SV(G)S\subseteq V(G) such that |S|k|S|\geq k?

We now review the concept of a tree decomposition, introduced by Robertson and Seymour in [Neil]. Treewidth is a measure of how “tree-like” the graph is.

Definition 5.

[Downey] A tree decomposition of a graph G=(V,E)G=(V,E) is a tree TT together with a collection of subsets XtX_{t} (called bags) of VV labeled by the vertices tt of TT such that tTXt=V\bigcup_{t\in T}X_{t}=V and (1) and (2) below hold:

  1. 1.

    For every edge uvE(G)uv\in E(G), there is some tt such that {u,v}Xt\{u,v\}\in X_{t}.

  2. 2.

    (Interpolation Property) If tt is a vertex on the unique path in TT from t1t_{1} to t2t_{2}, then Xt1Xt2XtX_{t_{1}}\cap X_{t_{2}}\subseteq X_{t}.

Definition 6.

[Downey] The width of a tree decomposition is the maximum value of |Xt|1|X_{t}|-1 taken over all the vertices tt of the tree TT of the decomposition. The treewidth tw(G)tw(G) of a graph GG is the minimum width among all possible tree decomposition of GG.

For the standard concepts in parameterized complexity, see the recent textbook by Cygan et al. [marekcygan]. In this paper we prove that the Globally Minimal Defensive Alliance problem is polynomial time solvable on trees and it is W[1]-hard when parameterized by the treewidth of the graph.

Known Results: The decision version for several types of alliances have been shown to be NP-complete. For an integer rr, a nonempty set SV(G)S\subseteq V(G) is a defensive rr-alliance if for each vSv\in S, |N(v)S||N(v)S|+r|N(v)\cap S|\geq|N(v)\setminus S|+r. A set is a defensive alliance if it is a defensive (1)(-1)-alliance. A defensive rr-alliance SS is global if SS is a dominating set. The defensive rr-alliance problem is NP-complete for any rr [SIGARRETA20091687]. The defensive alliance problem is NP-complete even when restricted to split, chordal and bipartite graph [Lindsay]. For an integer rr, a nonempty set SV(G)S\subseteq V(G) is an offensive rr-alliance if for each vN(S)v\in N(S), |N(v)S||N(v)S|+r|N(v)\cap S|\geq|N(v)\setminus S|+r. An offensive 1-alliance is called an offensive alliance. An offensive rr-alliance SS is global if SS is a dominating set. Fernau et al. showed that the offensive rr-alliance and global offensive rr-alliance problems are NP-complete for any fixed rr [FERNAU2009177]. They also proved that for r>1r>1, rr-offensive alliance is NP-hard, even when restricted to rr-regular planar graphs. There are polynomial time algorithms for finding minimum alliances in trees [CHANG2012479, Lindsay]. Bliem and Woltran [BLIEM2018334] proved that deciding if a graph contains a defensive alliance of size at most kk is W[1]-hard when parameterized by treewidth of the input graph. Bazgan et al. [BAZGAN2019111] proved that deciding if a graph contains a globally minimal strong defensive alliance of size at least kk is NP-complete, even for cubic graphs. Moreover, deciding if a graph contains a globally minimal defensive alliance of size at least kk is NP-complete, even for graphs of degree 3 or 4 [BAZGAN2019111].

3 FPT algorithm parameterized by neighbourhood diversity

In this section, we present an FPT algorithm for Globally Minimal Defensive Alliance problem parameterized by neighbourhood diversity. We say two vertices uu and vv have the same type if and only if N(u){v}=N(v){u}N(u)\setminus\{v\}=N(v)\setminus\{u\}. The relation of having the same type is an equivalence relation. The idea of neighbourhood diversity is based on this type structure.

Definition 7.

[Lampis] The neighbourhood diversity of a graph G=(V,E)G=(V,E), denoted by 𝚗𝚍(G){\tt nd}(G), is the least integer kk for which we can partition the set VV of vertices into kk classes, such that all vertices in each class have the same type.

If neighbourhood diversity of a graph is bounded by an integer kk, then there exists a partition {C1,C2,,Ck}\{C_{1},C_{2},\ldots,C_{k}\} of V(G)V(G) into kk type classes. It is known that such a minimum partition can be found in linear time using fast modular decomposition algorithms [Tedder]. Notice that each type class could either be a clique or an independent set by definition. For algorithmic purpose it is often useful to consider a type graph HH of graph GG, where each vertex of HH is a type class in GG, and two vertices CiC_{i} and CjC_{j} are adjacent iff there is complete bipartite clique between these type classes in GG. It is not difficult to see that there will be either a complete bipartite clique or no edges between any two type classes. The key property of graphs of bounded neighbourhood diversity is that their type graphs have bounded size. In this section, we prove the following theorem:

Theorem 1.

The Globally Minimal Defensive Alliance problem is fixed-parameter tractable when parameterized by the neighbourhood diversity.

Let GG be a connected graph such that 𝚗𝚍(G)=k{\tt nd}(G)=k. Let C1,,CkC_{1},\ldots,C_{k} be the partition of V(G)V(G) into sets of type classes. We assume k2k\geq 2 since otherwise the problem becomes trivial. Let xi=|CiS|x_{i}=|C_{i}\cap S| where SS is a globally minimal defensive alliance. We define I0={Ci|xi=0}I_{0}=\{C_{i}~{}|~{}x_{i}=0\}, I1={Ci|xi=1}I_{1}=\{C_{i}~{}|~{}x_{i}=1\} and I2={Ci|xi2}I_{2}=\{C_{i}~{}|~{}x_{i}\geq 2\}. We next guess if CiC_{i} belongs to I0I_{0}, I1I_{1}, or I2I_{2}. There are at most 3k3^{k} possibilities as each CiC_{i} has three options: either in I0I_{0}, I1I_{1}, or I2I_{2}. We reduce the problem of finding a globally minimal defensive alliance to an integer linear programming optimization with kk variables. Since integer linear programming is fixed parameter tractable when parameterized by the number of variables [lenstra], we conclude that our problem is FPT when parameterized by the neighbourhood diversity kk.

ILP formulation: Our goal here is to find a largest globally minimal defensive alliance SS of GG, with CiS=C_{i}\cap S=\emptyset when CiI0C_{i}\in I_{0}, |CiS|=1|C_{i}\cap S|=1 when CiI1C_{i}\in{I_{1}}, and |CiS|2|C_{i}\cap S|\geq 2 when CiI2C_{i}\in{I_{2}} where I0,I1,I2I_{0},I_{1},I_{2} are given. For each CiC_{i}, we associate a variable xix_{i} that indicates |SCi|=xi|S\cap C_{i}|=x_{i}. As the vertices in CiC_{i} have the same neighbourhood, the variables xix_{i} determine SS uniquely, up to isomorphism. The objective here is to maximize CiI1I2xi\sum\limits_{C_{i}\in I_{1}\cup I_{2}}{x_{i}} under the conditions given below. Let 𝒞\mathcal{C} be a subset of I1I2I_{1}\cup I_{2} consisting of all type classes which are cliques; and =I1I2𝒞\mathcal{I}={I_{1}\cup I_{2}}\setminus\mathcal{C}. We consider two cases:

Case 1: Suppose vCjv\in C_{j} where CjC_{j}\in\mathcal{I}. Then the degree of vv in SS, that is,

dS(v)\displaystyle d_{S}(v) =CiNH(Cj)(I1I2)xi\displaystyle=\sum\limits_{C_{i}\in N_{H}(C_{j})\cap{(I_{1}\cup I_{2})}}{x_{i}} (1)

Thus, including itself, vv has 1+CiNH(Cj)(I1I2)xi1+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap{(I_{1}\cup I_{2})}}{x_{i}} defenders in GG. Note that if CiI1I2C_{i}\in I_{1}\cup I_{2}, then only xix_{i} vertices of CiC_{i} are in SS and the the remaining nixin_{i}-x_{i} vertices of CiC_{i} are outside SS. The number of neighbours of vv outside SS, that is,

dSc(v)\displaystyle d_{S^{c}}(v) =CiNH(Cj)(I1I2)(nixi)+CiNH(Cj)I0ni\displaystyle=\sum\limits_{C_{i}\in N_{H}(C_{j})\cap{(I_{1}\cup I_{2})}}{(n_{i}-x_{i})}+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap I_{0}}{n_{i}} (2)

Therefore, a vertex vv from an independent type class CjC_{j}\in\mathcal{I} is protected if and only if 1+CiNH(Cj)(I1I2)xiCiNH(Cj)(I1I2)(nixi)+CiNH(Cj)I0ni1+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap{(I_{1}\cup I_{2})}}{x_{i}}\geq\sum\limits_{C_{i}\in N_{H}(C_{j})\cap{(I_{1}\cup I_{2})}}{(n_{i}-x_{i})}+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap{I_{0}}}{n_{i}}.
Case 2: Suppose vCjv\in C_{j} where Cj𝒞C_{j}\in\mathcal{C}. The number of neighbours of vv in SS, that is,

dS(v)=(xj1)+CiNH(Cj)(I1I2)xi\displaystyle d_{S}(v)=(x_{j}-1)+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap(I_{1}\cup I_{2})}{x_{i}} (3)

This is to ensure that when vv is picked in the solution it contributes to the xjx_{j} value and hence it itself cannot be accounted as its own neighbour. The number of neighbours of vv outside SS, that is,

dSc(v)=CiNH[Cj](I1I2)(nixi)+CiNH[Cj]I0ni\displaystyle d_{S^{c}}(v)=\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap(I_{1}\cup I_{2})}{(n_{i}-x_{i})}+\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap{I_{0}}}{n_{i}} (4)

Thus a vertex vv from clique type class Cj𝒞C_{j}\in\mathcal{C} is protected if and only if dS(v)+1dSc(v)d_{S}(v)+1\geq d_{S^{c}}(v), that is, CiNH[Cj](I1I2)xiCiNH[Cj](I1I2)(nixi)+CiNH[Cj]I0ni\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap(I_{1}\cup I_{2})}{x_{i}}\geq\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap(I_{1}\cup I_{2})}{(n_{i}-x_{i})}+\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap I_{0}}{n_{i}}.

Let 𝐱=(x1,,xk){\bf x}=(x_{1},\ldots,x_{k}) be the vector corresponds to the set SV(G)S\subseteq V(G). We want to make sure that the vector 𝐱=(x1,,xk){\bf x}=(x_{1},\ldots,x_{k}) or the set SS forms a defensive alliance, but no proper subset of SS forms defensive alliance. We now characterize all proper subsets of SS in terms of kk-length vectors. We define a new variable yiy_{i} as follows: 0<yi<xi0<y_{i}<x_{i} for all ii. Let L(𝐱)L({\bf x}) be the set of all length kk vectors where the iith entry be either 0, yiy_{i} or xix_{i}. Note that each vector in L(𝐱)L({\bf x}) represents a proper subset of SS unless the iith entry is xix_{i} for all ii. The number of vectors in L(𝐱)L({\bf x}) is i=1k(xi+1)\prod\limits_{i=1}^{k}{(x_{i}+1)}. We define another set L(𝐱)L^{\prime}({\bf x}) as follows: let L(𝐱)L^{\prime}({\bf x}) be the set of all length kk vectors where the iith entry is either 0, xi1x_{i}-1 or xix_{i}; note that xi1x_{i}-1 is possible only if xi2x_{i}\geq 2, that is, CiI2C_{i}\in I_{2}. Clearly, L(𝐱)L(𝐱)L^{\prime}({\bf x})\subseteq L({\bf x}) and L(𝐱)L^{\prime}({\bf x}) has at most 3k3^{k} vectors.

Lemma 2.

Let 𝐱=(x1,,xk){\bf x}=(x_{1},\ldots,x_{k}) be the vector that represent SV(G)S\subseteq V(G). If no vector in L(𝐱)L^{\prime}({\bf x}) forms a defensive alliance then no vector in L(𝐱)L({\bf x}) forms a defensive alliance.

Proof.

Assume, for the sake of contradiction, that the vector 𝐱1L(𝐱){\bf x}_{1}\in L({\bf x}) forms a defensive alliance. Without loss of generality, let 𝐱1=(y1,x21,y3,,xk){\bf x}_{1}=(y_{1},x_{2}-1,y_{3},\ldots,x_{k}), then we obtain the vector 𝐱1=(x11,x21,x31,,xk)L(𝐱){\bf x}^{\prime}_{1}=(x_{1}-1,x_{2}-1,x_{3}-1,\ldots,x_{k})\in L^{\prime}({\bf x}) from 𝐱1{\bf x}_{1} by replacing yiy_{i} by xi1x_{i}-1 for all ii. As 𝐱1L(𝐱){\bf x}^{\prime}_{1}\in L^{\prime}({\bf x}), we know 𝐱1{\bf x}^{\prime}_{1} does not form a defensive alliance. This means, there is a vertex uCiu\in C_{i} which is not protected in 𝐱1{\bf x}^{\prime}_{1} (assume that the iith entry of 𝐱1{\bf x}^{\prime}_{1} is non-zero). We observe that the number of neighbours of uu in 𝐱1{\bf x}_{1}, is less than or equal to the number of neighbours in 𝐱1{\bf x}^{\prime}_{1}. In other words, uu is not protected in 𝐱1{\bf x}_{1} either, a contradiction to that assumption that 𝐱1S{\bf x}_{1}\in S forms a defensive alliance. This proves the lemma.

In order to ensure that SS is a globally minimal defensive alliance, we check 𝐱=(x1,x1,,xk){\bf x}=(x_{1},x_{1},\ldots,x_{k}) forms a defensive alliance but none of the vectors in L(𝐱)L^{\prime}({\bf x}) forms a defensive alliance. Let 𝐱1,𝐱2,,𝐱3k{\bf x}^{\prime}_{1},{\bf x}^{\prime}_{2},\ldots,{\bf x}^{\prime}_{3^{k}} be the vectors in L(𝐱)L^{\prime}({\bf x}). We make guesses in two phases. In the first phase, we guess if CiC_{i} belongs to I0,I1I_{0},I_{1} or I2I_{2}. There are at most 3k3^{k} possibilities as each CiC_{i} has three options: either I0,I1I_{0},I_{1} or I2I_{2}. In the second phase, we guess if an unprotected vertex of 𝐱i{\bf x}^{\prime}_{i} belongs to type class either C1,C2,,Ck1C_{1},C_{2},\ldots,C_{k-1} or CkC_{k}. We define

Rj={𝐱iL(𝐱)| an unprotected vertex of 𝐱i is in type class Cj}.R_{j}=\Big{\{}{\bf x}^{\prime}_{i}\in L^{\prime}({\bf x})~{}|~{}\text{ an unprotected vertex of }{\bf x}^{\prime}_{i}\text{ is in type class }C_{j}\Big{\}}.

There are at most k3kk^{3^{k}} possibilities as each 𝐱i{\bf x}^{\prime}_{i} has at most kk options: R1,R2,,RkR_{1},R_{2},\ldots,R_{k}. If CjC_{j} is an independent type class, then it contains an unprotected vertex if,

1+CiNH(Cj)(I1I2)2xi<CiNH(Cj)ni.1+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap(I_{1}\cup I_{2})}{2x_{i}^{\prime}}<\sum\limits_{C_{i}\in N_{H}(C_{j})}{n_{i}}.

If CjC_{j} is a clique type class, then it contains an unprotected vertex if,

CiNH[Cj](I1I2)2xi<CiNH[Cj]ni.\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap(I_{1}\cup I_{2})}{2x_{i}^{\prime}}<\sum\limits_{C_{i}\in N_{H}[C_{j}]}{n_{i}}.

We now formulate ILP formulation of globally minimal defensive alliance problem, for given I0,I1,I2I_{0},I_{1},I_{2} and R1,R2,,RkR_{1},R_{2},\ldots,R_{k}. There are at most 3kk3k3^{k}k^{3^{k}} ILPs:

Maximize CiI1I2xiSubject to xi=1 for all i:CiI1;xi{2,,|Ci|} for all i:CiI21+CiNH(Cj)(I1I2)2xiCiNH(Cj)ni,for all Cj,CiNH[Cj](I1I2)2xiCiNH[Cj]ni,for all Cj𝒞, for j=1 to k;1+CiNH(Cj)(I1I2)2xi<CiNH(Cj)ni,𝐱iRj;Cj is an independent classCiNH[Cj](I1I2)2xi<CiNH[Cj]ni,𝐱iRj;Cj is a clique class\begin{split}&\text{Maximize }\sum\limits_{C_{i}\in I_{1}\cup I_{2}}{x_{i}}\\ &\text{Subject to~{}~{}~{}}\\ &x_{i}=1\text{ for all }i~{}:~{}C_{i}\in I_{1};\\ &x_{i}\in\{2,\ldots,|C_{i}|\}\text{ for all }i~{}:~{}C_{i}\in I_{2}\\ &1+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap(I_{1}\cup I_{2})}{2x_{i}}\geq\sum\limits_{C_{i}\in N_{H}(C_{j})}{n_{i}},~{}~{}\text{for all }C_{j}\in\mathcal{I},\\ &\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap(I_{1}\cup I_{2})}{2x_{i}}\geq\sum\limits_{C_{i}\in N_{H}[C_{j}]}{n_{i}},~{}~{}\text{for all }C_{j}\in\mathcal{C},\\ &\text{ for }j=1\text{ to }k;\\ &1+\sum\limits_{C_{i}\in N_{H}(C_{j})\cap(I_{1}\cup I_{2})}{2x_{i}^{\prime}}<\sum\limits_{C_{i}\in N_{H}(C_{j})}{n_{i}},\forall~{}{\bf x}^{\prime}_{i}\in R_{j};C_{j}\text{ is an independent class}\\ &\sum\limits_{C_{i}\in N_{H}[C_{j}]\cap(I_{1}\cup I_{2})}{2x_{i}^{\prime}}<\sum\limits_{C_{i}\in N_{H}[C_{j}]}{n_{i}},\forall~{}{\bf x}^{\prime}_{i}\in R_{j};C_{j}\text{ is a clique class}\\ \end{split}

Solving the ILP: Lenstra [lenstra] showed that the feasibility version of pp-ILP is FPT with running time doubly exponential in pp, where pp is the number of variables. Later, Kannan [kannan] proved an algorithm for pp-ILP running in time pO(p)p^{O(p)}. In our algorithm, we need the optimization version of pp-ILP rather than the feasibility version. We state the minimization version of pp-ILP as presented by Fellows et. al. [fellows].

pp-Variable Integer Linear Programming Optimization (pp-Opt-ILP): Let matrices AZm×pA\in\ Z^{m\times p}, bZp×1b\in\ Z^{p\times 1} and cZ1×pc\in\ Z^{1\times p} be given. We want to find a vector xZp×1x\in\ Z^{p\times 1} that minimizes the objective function cxc\cdot x and satisfies the mm inequalities, that is, AxbA\cdot x\geq b. The number of variables pp is the parameter. Then they showed the following:

Lemma 3.

[fellows] pp-Opt-ILP can be solved using O(p2.5p+o(p)Llog(MN))O(p^{2.5p+o(p)}\cdot L\cdot log(MN)) arithmetic operations and space polynomial in LL. Here LL is the number of bits in the input, NN is the maximum absolute value any variable can take, and MM is an upper bound on the absolute value of the minimum taken by the objective function.

In the formulation for Globally Minimal Defensive Alliance problem, we have at most kk variables. The value of objective function is bounded by nn and the value of any variable in the integer linear programming is also bounded by nn. The constraints can be represented using O(k2logn)O(k^{2}\log{n}) bits. Lemma 3 implies that we can solve the problem with one guess in FPT time. There are at most 3kk3k3^{k}k^{3^{k}} guesses, and the ILP formula for each guess can be solved in FPT time. Thus Theorem 1 holds.

4 W[1]-hardnes parameterized by treewidth

Theorem 4.

The Globally Minimal Defensive Alliance problem is W[1]-hard when parameterized by the treewidth, pathwidth, treedepth and feedback vertex set of the graph.

Proof.

The approach for using Multi-Colored Clique in reductions is described in [?], and has been proven to be very useful in showing hardness results in the parameterized complexity setting. Before giving details of our construction, we will need to introduce some new terminology. We use G to denote a graph colored with kk colors given in an instance of Multi-Colored Clique, and GG^{\prime} to denote the graph in the reduced instance of Globally minimal defensive alliance. For a color c[k]c\in[k], we let VcV_{c} denote the subset of vertices in GG colored with color cc and for a pair of distinct colors c1,c2[k]c_{1},c_{2}\in[k], we let Ec1,c2E_{c_{1},c_{2}} denote the subset of edges in GG with endpoints colored c1c_{1} and c2c_{2}. In general, we use uu and vv for denoting arbitrary vertices in GG, and xx to denote an arbitrary vertex in GG^{\prime}.

We construct GG^{\prime} using two types of gadgets. Our goal is to guarantee that any globally minimal defensive alliance in GG^{\prime} with a specific size encodes a multi-colored clique in GG. These gadgets are the selection and validation gadgets. The selection gadgets encode the selection of kk vertices and (k2)k\choose 2 edges that together encode a vertex and edge set of some multi-colored clique in GG. The selection gadgets also ensure that in fact kk distinct vertices are chosen from kk distinct color classes, and that distinct (k2)k\choose 2 edges are chosen from (k2)k\choose 2 distinct edge color classes. The validation gadgets validate the selection done in the selection gadgets in the sense that they make sure that the edges chosen are in fact incident to the selected vertices. In the following we sketch the construction of these gadgets:

Selection: For each color-class c[k]c\in[k], and each pair of distinct colors c1,c2[k]c_{1},c_{2}\in[k], we construct a cc-selection gadget and a {c1,c2}\{c_{1},c_{2}\}-selection gadget which respectively encode the selection of a vertex colored cc and an edge colored {c1,c2}\{c_{1},c_{2}\} in GG. The cc-selection gadget consists of a vertex xvx_{v} for every vertex vVcv\in V_{c} , and likewise, the {c1,c2}\{c_{1},c_{2}\}-selection gadget consists of a vertex x{u,v}x_{\{u,v\}} for every edge {u,v}E{c1,c2}\{u,v\}\in E_{\{c_{1},c_{2}\}}. There are no edges between the vertices of the selection gadgets, that is, the union of all vertices in these gadgets is an independent set in GG^{\prime}.

Validation: We assign to every vertex vv in GG two unique identification numbers, low(v)\text{low}(v) and high(v)\text{high}(v), with low(v)[n]\text{low}(v)\in[n] and high(v)=2nlow(v)\text{high}(v)=2n-\text{low}(v). For every pair of distinct colors c1,c2[k]c_{1},c_{2}\in[k], we construct validation gadgets between the {c1,c2}\{c_{1},c_{2}\}-selection gadget and the c1c_{1}- and c2c_{2}-selection gadget. Let c1c_{1} and c2c_{2} be any pair of distinct colors. We describe the validation gadget between the c1c_{1}- and c1,c2{c_{1},c_{2}}-selection gadgets. It consists of two vertices {λ{c1,(c1,c2)}1,λ{c1,(c1,c2)}2}\{\lambda^{1}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{2}_{\{c_{1},(c_{1},c_{2})\}}\}, the validation-pair of this gadget. The first vertex λ{c1,(c1,c2)}1\lambda^{1}_{\{c_{1},(c_{1},c_{2})\}} of this pair is connected to each vertex xv,vVc1x_{v},v\in V_{c_{1}}, by low(v)\text{low}(v) parallel edges, and to each edge-selection vertex x{u,v},{u,v}E{c1,c2}x_{\{u,v\}},\{u,v\}\in E_{\{c_{1},c_{2}\}} and vVc1v\in V_{c_{1}} , by high(v)\text{high}(v) parallel edges. The other λ{c1,(c1,c2)}2\lambda^{2}_{\{c_{1},(c_{1},c_{2})\}} vertex is connected to each xv,vVc1x_{v},v\in V_{c_{1}}, by high(v)\text{high}(v) parallel edges, and to each x{u,v},{u,v}E{c1,c2}x_{\{u,v\}},\{u,v\}\in E_{\{c_{1},c_{2}\}} and vVc1v\in V_{c_{1}}, by low(v)\text{low}(v) parallel edges. We next subdivide the edges between the selection and validation gadgets to obtain a simple graph, where all new vertices introduced by the subdivision are referred to as the connection vertices. The connection vertices adjacent to λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} and xvx_{v} are denoted by Y{xv,λ{c1,(c1,c2)}j}Y_{\{x_{v},\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\}} and similarly the connection vertices adjacent to λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} and x{u,v}x_{\{u,v\}} are denoted by Y{x{u,v},λ{c1,(c1,c2)}j}Y_{\{x_{\{u,v\}},\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\}}.

We next add two one degree vertices adjacent to all connection vertices. For every vertex xvx_{v} in cc-selection gadget and x{u,v}x_{\{u,v\}} in {c1,c2}\{c_{1},c_{2}\}-selection gadget, we add equal number of one degree vertices adjacent to xvx_{v} and x{u,v}x_{\{u,v\}} as much as the degree of xvx_{v} and x{u,v}x_{\{u,v\}} until this point in construction respectively. Next, we add the following gadget corresponding to every vertex λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} in validation pair gadget for all distinct colors c1,c2[k]c_{1},c_{2}\in[k] and 1j21\leq j\leq 2. Let us assume that the degree of vertex λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} until this point in construction is dd. First, we add a set Vλ{c1,(c1,c2)}jV_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}^{\triangle} of NN vertices adjacent to λ{c1,c2}j\lambda^{j}_{\{c_{1},c_{2}\}} and to a new vertex λ{c1,(c1,c2)}j\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}}. We make the vertex λ{c1,(c1,c2)}j\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}} adjacent to a set Vλ{c1,(c1,c2)}jV_{\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}}}^{\square} of NN one degree vertices. We also make every vertex in Vλ{c1,(c1,c2)}jV_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}^{\triangle} adjacent to two one degree vertices. Next, we introduce two vertices λ{c1,(c1,c2)}j\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}} and λ{c1,(c1,c2)}j\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}}. Next add an edge between λ{c1,(c1,c2)}j\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}} and λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}. Again, we add a new set Vλ{c1,(c1,c2)}jV_{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}^{\triangle} of NN vertices adjacent to λ{c1,(c1,c2)}j\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}} and λ{c1,(c1,c2)}j\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}}. Similar to before, We make every vertex in Vλ{c1,(c1,c2)}jV_{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}^{\triangle} adjacent to two one degree vertices. We also make the vertex λ{c1,(c1,c2)}j\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}} and λ{c1,(c1,c2)}j\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}} adjacent to a set Vλ{c1,(c1,c2)}jV_{\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}}}^{\square} and Vλ{c1,(c1,c2)}jV_{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}^{\square} of NN and N+1N+1 one degree vertices respectively. Finally, for the vertex λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}, we add a set Vλ{c1,(c1,c2)}jV_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}^{\square} of N+4nd+1N+4n-d+1 many one degree vertices adjacent to λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}. We define N=100n2N=100n^{2}. This completes the construction of graph GG^{\prime}. We set k=(4N+8).2.(k2)+(k2)+kk^{\prime}=(4N+8).2.{k\choose 2}+{k\choose 2}+k. We observe that removing the vertices

R=\displaystyle R= {λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,\displaystyle\{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}},
λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j\displaystyle\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{2},(c_{1},c_{2})\}}
|1j2,distinct colorsc1,c2[k]}\displaystyle|1\leq j\leq 2,\ \text{distinct colors}\ \ c_{1},c_{2}\in[k]\}

of 8.(k2)8.{k\choose 2} from graph GG^{\prime}, we are left with trees of height at most 33. Now, we will prove that both instances are equivalent. Let us assume that there exists a multi-colored clique CC of size kk. We claim that the following set

S\displaystyle S ={xv,x{vi,vj}|v,vi,vjC}\displaystyle=\{x_{v},x_{\{v_{i},v_{j}\}}~{}|~{}v,v_{i},v_{j}\in C\}
1j2{Y{xv,λ{c1,c2}j},Y{x{vi,vj},λ{c1,c2}j}|c1,c2[k],c1c2,{v,vi,vj}C}\displaystyle\bigcup\limits_{1\leq j\leq 2}\{Y_{\{x_{v},\lambda^{j}_{\{c_{1},c_{2}\}}\}},Y_{\{x_{\{v_{i},v_{j}\}},\lambda^{j}_{\{c_{1},c_{2}\}}\}}~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2},\{v,v_{i},v_{j}\}\in C\}
1j2{λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j\displaystyle\bigcup\limits_{1\leq j\leq 2}\{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}}
Vλ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j|c1,c2[k],c1c2}\displaystyle V^{\triangle}_{{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}}~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2}\}
1j2{λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j\displaystyle\bigcup\limits_{1\leq j\leq 2}\{\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{2},(c_{1},c_{2})\}}
Vλ{c2,(c1,c2)}j,Vλ{c2,(c1,c2)}j|c1,c2[k],c1c2}\displaystyle V^{\triangle}_{{\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}}}}~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2}\}

is a globally minimal defensive alliance of size at exactly kk^{\prime}. We observe that |S|=k|S|=k^{\prime}. To prove that SS is a globally minimal defensive alliance, we will prove that SS is a connected defensive alliance such that every vertex is marginally protected. It is easy to see every vertex in the set {xv,x{vi,vj}|v,vi,vjC}\{x_{v},x_{\{v_{i},v_{j}\}}~{}|~{}v,v_{i},v_{j}\in C\} is marginally protected as it has all the connection vertices adjacent to it inside the solution and equal number of one degree neighbours outside the solution. It is also easy to see that all the vertices in the set

1j2\displaystyle\bigcup\limits_{1\leq j\leq 2} {Y{xv,λ{c1,(c1,c2)}j},Y{x{vi,vj},λ{c1,(c1,c2)}j},Y{xv,λ{c2,(c1,c2)}j},Y{x{vi,vj},λ{c2,(c1,c2)}j}\displaystyle\{Y_{\{x_{v},\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\}},Y_{\{x_{\{v_{i},v_{j}\}},\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\}},Y_{\{x_{v},\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}\}},Y_{\{x_{\{v_{i},v_{j}\}},\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}\}}
|c1,c2[k],c1c2,{v,vi,vj}C}\displaystyle~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2},\{v,v_{i},v_{j}\}\in C\}

are marginally protected as they have two neighbours inside the solution and two neighbours outside the solution. Similarly, we observe that all the vertices in the set

1j2\displaystyle\bigcup\limits_{1\leq j\leq 2} {λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j,\displaystyle\{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}},V^{\triangle}_{{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}},
λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,Vλ{c2,(c1,c2)}j,Vλ{c2,(c1,c2)}j\displaystyle\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{2},(c_{1},c_{2})\}},V^{\triangle}_{{\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}}}}
|c1,c2[k],c1c2}\displaystyle~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2}\}

are also marginally protected. Lastly, we prove that the vertices in the set 1j2{λ{c1,(c1,c2)}j,λ{c2,(c1,c2)}j|c1,c2[k],c1c2}\bigcup\limits_{1\leq j\leq 2}\{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2}\} are marginally protected. Let us take any vertex λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} for some fixed c1c_{1} and c2c_{2}. We denote degree of λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} inside the c1c_{1}-selection gadget, c2c_{2}-selection gadget and {c1,c2}\{c_{1},c_{2}\}-selection gadget together by dd. Without loss of generality, we assume that the neighbours xux_{u} and x{u,v}x_{\{u,v\}} of λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} are inside the solution where uVc1u\in V_{c_{1}} and vVc2v\in V_{c_{2}}. It implies that the vertices in the set Y{xu,λ{c1,c2}j}Y_{\{x_{u},\lambda^{j}_{\{c_{1},c_{2}\}}\}} and Y{x{u,v},λ{c1,c2}j}Y_{\{x_{\{u,v\}},\lambda^{j}_{\{c_{1},c_{2}\}}\}} are inside the solution. Therefore, λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} has total 2n2n connection vertices neighbours inside the solution as high(u)+low(n)=2n\text{high}(u)+\text{low}(n)=2n. Since Vλ{c1,(c1,c2)}jSV^{\triangle}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}\subseteq S and Vλ{c1,(c1,c2)}jS=V^{\square}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}\cap S=\emptyset, we have dS(λ{c1,(c1,c2)}j)=2n+1+Nd_{S}(\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}})=2n+1+N and dSc(λ{c1,(c1,c2)}j)=(d2n)+(N+4nd+2)=N+2n+1d_{S^{c}}(\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}})=(d-2n)+(N+4n-d+2)=N+2n+1, therefore the vertex λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} is marginally protected. It is easy to observe that SS is connected. This shows that SS is a globally minimal defensive alliance.

In the reverse direction, we assume that there exists a globally minimal defensive alliance of size at least kk^{\prime}. First, We observe that no vertex of degree 1 can be part of globally minimal defensive alliance of size greater than or equal to two as the vertex itself forms defensive alliance. Next, we will prove that

1j2\displaystyle\bigcup\limits_{1\leq j\leq 2} {λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j\displaystyle\{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}},V^{\triangle}_{{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}}
λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,Vλ{c2,(c1,c2)}j,Vλ{c2,(c1,c2)}j\displaystyle\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{2},(c_{1},c_{2})\}},V^{\triangle}_{{\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}}}}
|c1,c2[k],c1c2}S.\displaystyle~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2}\}\subseteq S.

If λ{c1,(c1,c2)}jS\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\not\in S or λ{c1,(c1,c2)}jS\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}\not\in S then we cannot add any vertex from the set Vλ{c1,(c1,c2)}jV^{\triangle}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}} inside the solution. If we cannot add the set Vλ{c1,(c1,c2)}jV^{\triangle}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}} then |S|k|S|\leq k^{\prime}. This is true because every globally minimal defensive alliance is always connected and if we add any vertex from Vλ{c1,(c1,c2)}jV^{\triangle}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}} inside the solution then |S|N+1|S|\leq N+1 which is a contradiction. Next, we observe that protection of λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} require at least one vertex from the set Vλ{c1,(c1,c2)}jV^{\triangle}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}} inside the solution. As every vertex in Vλ{c1,(c1,c2)}jV^{\triangle}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}} has two one degree neighbours, it implies that the protection of that vertex requires λ{c1,(c1,c2)}j\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}} inside the solution. Now, the protection of λ{c1,(c1,c2)}j\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}} forces the full set Vλ{c1,(c1,c2)}jV^{\triangle}_{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}} inside the solution as the one degree neighbours are always outside SS. Similarly, we observe that Vλ{c1,(c1,c2)}jV^{\triangle}_{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}} and λ{c1,(c1,c2)}j\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}} will be inside the solution. Symmetrically, we argue for c2c_{2} color as well. This proves that

1j2\displaystyle\bigcup\limits_{1\leq j\leq 2} {λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j\displaystyle\{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}},V^{\triangle}_{{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}}
λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,λ{c2,(c1,c2)}j,Vλ{c2,(c1,c2)}j,Vλ{c2,(c1,c2)}j\displaystyle\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{j\triangle}_{\{c_{2},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{2},(c_{1},c_{2})\}},V^{\triangle}_{{\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}}},V^{\triangle}_{{\lambda^{\prime j}_{\{c_{2},(c_{1},c_{2})\}}}}
|c1,c2[k],c1c2}S.\displaystyle~{}|~{}c_{1},c_{2}\in[k],c_{1}\neq c_{2}\}\subseteq S.

Observe that the above set has size exactly equal to (4N+8).2.(k2)(4N+8).2.{k\choose 2}. We need to add at least k+(k2)k+{k\choose 2} vertices from selection gadgets. Next, we observe that λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} must be marginally protected inside the solution as otherwise S{λ{c1,(c1,c2)}j,λ{c1,(c1,c2)}j,Vλ{c1,(c1,c2)}j}S\setminus\{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}},\lambda^{\prime j\triangle}_{\{c_{1},(c_{1},c_{2})\}},V^{\triangle}_{\lambda^{\prime j}_{\{c_{1},(c_{1},c_{2})\}}}\} will form defensive alliance. This is equivalent to say that the protection of λ{c1,(c1,c2)}j\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}} requires exactly 2n2n neighbours from connection vertices inside the solution corresponding to the set c1c_{1}-selection gadget and {c1,c2}\{c_{1},c_{2}\}-selection gadget. Now, we will prove that every vertex or edge selection gadget contributes at most one vertex inside the solution. Let us assume that there exists a vertex or edge selection gadget which contributes at least two vertices inside the solution. Without loss of generality, if xu1x_{u_{1}} and xu2x_{u_{2}} are inside the solution where u1,u2c1u_{1},u_{2}\in c_{1}. It implies that the protection of xu1x_{u_{1}} and xu2x_{u_{2}} requires Y{xu1,λ{c1,(c1,c2)}j}Y_{\{x_{u_{1}},\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\}} and Y{xu2,λ{c1,(c1,c2)}j}Y_{\{x_{u_{2}},\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\}} inside the solution. Note that λ{c2,(c1,c2)}2\lambda^{2}_{\{c_{2},(c_{1},c_{2})\}} will get more than 2n2n connection vertex neighbours inside the solution as high(u1)+high(u2)>2n\text{high}(u_{1})+\text{high}(u_{2})>2n. This is a contradiction as λ{c2,(c1,c2)}2\lambda^{2}_{\{c_{2},(c_{1},c_{2})\}} is not marginally protected inside SS. We can argue similarly for edge selection gadget and other color classes as well. Since the contribution from selection gadgets is at least k+(k2)k+{k\choose 2}, it implies that each selection gadget contributes exactly one vertex inside the solution. Next, we will show that if c1c_{1}-selection gadget contributes xux_{u} and c2c_{2}-selection gadget contributes xvx_{v} then c1,c2c_{1},c_{2}-selection gadget must contributes x{u,v}x_{\{u,v\}}. For the sake of contradiction assume that c1,c2c_{1},c_{2}-selection gadget contributes x{u,v}x_{\{u^{\prime},v^{\prime}\}} such that uuu\neq u^{\prime}. In this case, we get

{\displaystyle\{ Y{xu,λ{c1,(c1,c2)j},Y{xv,λ{c2,(c1,c2)j},Y{x{u,v},λ{c1,(c1,c2)}j},Y{x{u,v},λ{c2,(c1,c2)}j}\displaystyle Y_{\{x_{u},\lambda^{j}_{\{c_{1},(c_{1},c_{2})}\}},Y_{\{x_{v},\lambda^{j}_{\{c_{2},(c_{1},c_{2})}\}},Y_{\{x_{\{u^{\prime},v^{\prime}\}},\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}\}},Y_{\{x_{\{u^{\prime},v^{\prime}\}},\lambda^{j}_{\{c_{2},(c_{1},c_{2})\}}\}}
|1j2}S.\displaystyle~{}|~{}1\leq j\leq 2\}\subseteq S.

We observe that |Y{xu,λ{c1,(c1,c2)}1}|=low(u),|Y{xu,λ{c1,(c1,c2)}2}|=high(u),|Y{xv,λ{c2,(c1,c2)}1}|=low(v),|Y{xv,λ{c2,(c1,c2)}2}|=high(v),|Y{x{u,v},λ{c1,(c1,c2)}1}|=high(u),|Y{x{u,v},λ{c1,(c1,c2)}2}|=low(u),|Y{x{u,v},λ{c2,(c1,c2)}1}|=high(v),|Y{x{u,v},λ{c2,(c1,c2)}2}|=low(v)|Y_{\{x_{u},\lambda^{1}_{\{c_{1},(c_{1},c_{2})\}}\}}|=\text{low}(u),|Y_{\{x_{u},\lambda^{2}_{\{c_{1},(c_{1},c_{2})\}}\}}|=\text{high}(u),\\ |Y_{\{x_{v},\lambda^{1}_{\{c_{2},(c_{1},c_{2})\}}\}}|=\text{low}(v),|Y_{\{x_{v},\lambda^{2}_{\{c_{2},(c_{1},c_{2})\}}\}}|=\text{high}(v),\\ |Y_{\{x_{\{u,v\}},\lambda^{1}_{\{c_{1},(c_{1},c_{2})\}}\}}|=\text{high}(u),|Y_{\{x_{\{u,v\}},\lambda^{2}_{\{c_{1},(c_{1},c_{2})\}}\}}|=\text{low}(u),|Y_{\{x_{\{u,v\}},\lambda^{1}_{\{c_{2},(c_{1},c_{2})\}}\}}|=\text{high}(v),|Y_{\{x_{\{u,v\}},\lambda^{2}_{\{c_{2},(c_{1},c_{2})\}}\}}|=\text{low}(v). We see that one of the vertex from the set {λ{c1,(c1,c2)}j|1j2}\{\lambda^{j}_{\{c_{1},(c_{1},c_{2})\}}~{}|~{}1\leq j\leq 2\} is not protected because when uuu\neq u^{\prime} either high(u)(u)+low(u)<2n(u^{\prime})<2n or low(u)+high(u)<2n(u^{\prime})<2n. This is a contradiction. It implies that we get a multicolored clique in GG.

Theorem 5.

The Exact Globally Minimal Defensive Alliance problem is W[1]-hard when parameterized by the treewidth, pathwidth, treedepth and feedback vertex set of the graph.

5 No polynomial kernel parameterized by vertex cover

Theorem 6.

No polynomial kernel parameterized by vertex cover number of input graph.

To prove Theorem LABEL:ppt, we give a polynomial parameter transformation from the well-known Red Blue Dominating Set problem (RBDS) to Globally Minimal Defensive Alliance problem parameterized by vertex cover number. Recall that in RBDS we are given a bipartite graph G=(TS,E)G=(T\cup S,E) and an integer kk, and we are asked whether there exists a vertex set XSX\subseteq S of size at most kk such that every vertex in TT has at least one neighbour in XX. We also refer to the vertices of TT as terminals and to the vertices of SS as sources or nonterminals. The following theorem is known:

Theorem 7.

[fomin_lokshtanov_saurabh_zehavi_2019] RBDS parameterized by |T||T| does not admit a polynomial compression unless coNP \subseteq NP/poly.

5.1 Proof of Theorem LABEL:ppt

By Theorem 7, RBDS parameterized by |T||T| does not admit a polynomial compression unless coNP \subseteq NP/poly. To prove Theorem LABEL:ppt, we give a PPT from RBDS parameterized by |T||T| to Globally Minimal Defensive Alliance parameterized by the vertex cover number. Given an instance I=(G=(TS,E),k)I=(G=(T\cup S,E),k) of RBDS, we construct an instance I=(G,k)I^{\prime}=(G^{\prime},k^{\prime}) of Globally Minimal Defensive Alliance as follows. First, we take the graph GG. We add two vertices xx and xx^{\prime} such that xx is adjacent to all the vertices in SS. We also add a set VxV_{x}^{\triangle} of 4n4n vertices adjacent to both xx and xx^{\prime}. We add two more sets VxV_{x}^{\square} and VxV_{x^{\prime}}^{\square} of (|S|k)+4n(|S|-k)+4n and 4n+14n+1 vertices adjacent to xx and xx^{\prime} respectively. Next, for every vertex uTu\in T, we add two vertices u1,u2u_{1},u_{2} and a set VuV_{u}^{\triangle} of 4n4n vertices. We make both u1u_{1} and u2u_{2} adjacent to all the vertices in VuV_{u}^{\triangle}. Next, we add two sets Vu1V_{u_{1}}^{\square} and Vu1V_{u_{1}}^{\square} of size 4n+14n+1 and 4n4n adjacent to u1u_{1} and u2u_{2} respectively. Finally, we add an edge (u,u1)(u,u_{1}). Next, we add two vertices aa and bb. We make bb adjacent to all the vertices in TT and the vertex xx^{\prime}. We add another set VbV_{b}^{\square} of |T|+1|T|+1 many vertices adjacent to bb. We also make aa adjacent to all the vertices in TT. Let dS(u)d_{S}(u) denote the neighbours of uu in set SS for all uTu\in T. For every uTu\in T, we add a set Vua={u1a,u2a,,udS(u)1a}V_{u}^{a}=\{u_{1}^{a},u_{2}^{a},\ldots,u_{d_{S}(u)-1}^{a}\} of dS(u)1d_{S}(u)-1 vertices adjacent to uu and aa. We also add a set of one degree vertices VaV_{a}^{\square} of size |T|+uT(dS(u)1)+2|T|+\sum\limits_{u\in T}(d_{S}(u)-1)+2. We make aa adjacent to all the vertices in VaV_{a}^{\square}. Finally, we add a set T=T1T2T^{\square}=T_{1}^{\square}\cup T_{2}^{\square} where |T1|=|T|+1|T_{1}^{\square}|=|T|+1 and |T2|=2|T_{2}^{\square}|=2. We make every vertex in the set Vx\bigcup V_{x}^{\triangle} adjacent to two arbitrary vertices in the set T1T_{1}^{\square}. Similarly, we make every vertex in the set Vu\bigcup V_{u}^{\triangle} adjacent to both the vertices in the set T2T_{2}^{\square}. For every vertex in sSs\in S, we make ss adjacent to dT(s)+1d_{T}(s)+1 many arbitrary vertices in TT^{\square}. Now for every vertex tTt\in T^{\square}, we add d+2d+2 many one degree vertices adjacent to tt where dd is the degree of tt until this point in the construction. Finally, we set k=(|S|k)+4n+2+|T|.(4n+3)+1k^{\prime}=(|S|-k)+4n+2+|T|.(4n+3)+1. Now, we will show that II is a yes instance if and only if II^{\prime} is a yes instance. Let us assume that II is a yes instance, that is, there exists a set XX of size at most kk in SS such that every vertex uTu\in T have at least one neighbour in XX. Without loss of generality, we can assume that |X|=k|X|=k. Let dX(u)d_{X}(u) denotes the number of neighbours of uu in XX. We claim that the set H=SXuT({u,u1,u2}Vu)VxuT{u1a,,udX(u)1a}{b,x,x}H=S\setminus X\bigcup\limits_{u\in T}(\{u,u_{1},u_{2}\}\cup V_{u}^{\triangle})\bigcup V_{x}^{\square}\bigcup\limits_{u\in T}\{u_{1}^{a},\ldots,u_{d_{X}(u)-1}^{a}\}\bigcup\{b,x,x^{\prime}\} is a globally minimal defensive alliance. It is clear that |H|k|H|\geq k^{\prime}. First, we observe that every vertex in HH is marginally protected. We also see that G[H]G^{\prime}[H] is connected. This implies that HH is a globally minimal defensive alliance.

In the reverse direction, we assume that there exists a globally minimal defensive alliance HH of size at least kk^{\prime}. First, we observe that no vertex of degree one can be part of HH as one degree vertex forms a defensive alliance. As the one degree vertices are not part of the solution, we observe that no vertex from TT^{\square} is part of the solution. This is true because we will not be able to protect any vertex from TT^{\square} as more than half of the neighbours are one degree vertices. Next, we see that THT\subseteq H. For the sake of contradiction assume that there exists some uTu\in T such that uHu\not\in H. We observe that, we cannot use Vu{u1,u2}V_{u}^{\triangle}\cup\{u_{1},u_{2}\} inside HH as the solution cannot be connected and if we do not add set VuV_{u}^{\triangle} inside HH then HH cannot achieve size kk^{\prime}. Therefore, we must include uu in HH. From above, we also see that we must add u1u_{1} and u2u_{2} inside HH as otherwise vertices in VuV_{u}^{\triangle} cannot be protected. Therefore, we have uT(Vu{u,u1,u2})H\bigcup\limits_{u\in T}(V_{u}^{\triangle}\cup\{u,u_{1},u_{2}\})\subseteq H. Similarly, we can argue that Vx{x,x,b}HV_{x}^{\triangle}\cup\{x,x^{\prime},b\}\subseteq H. Next, we see that uTu\in T must be marginally protected in HH as otherwise H(Vu{u1,u2})H\setminus(V_{u}^{\triangle}\cup\{u_{1},u_{2}\}) forms a defensive alliance, which is not possible. For a vertex uTu\in T, we have d(u)=2dS(u)+2d(u)=2d_{S}(u)+2 and N(u)=NS(u)Vua{a,b,u1}N(u)=N_{S}(u)\cup V_{u}^{a}\cup\{a,b,u_{1}\}. Since aHa\not\in H and b,u1Hb,u_{1}\in H, we must have added at most dS(u)1d_{S}(u)-1 from set NS(u)N_{S}(u) for all uTu\in T. Let us denote the set HcS=XH^{c}\cap S=X. Clearly, every vertex uTu\in T have at least one neighbour in XX. Next, we see that |X|k|X|\leq k. As otherwise, if |SH||S|k|S\cap H|\leq|S|-k then the vertex xx cannot be protected. This implies that II is a yes instance.

Theorem 8.

Given a vertex vv, decide whether there exists a globally minimal defensive alliance containing vertex vv is a NP-complete problem.

Proof.

We will prove the above result by giving a polynomial reduction from r-regular clique problem. Let I=(G,k)I=(G,k) be any instance of clique problem. We construct an instance I=(G,x)I^{\prime}=(G^{\prime},x) of above problem.

xxVxV_{x}^{\square}z1z_{1}zn2kz_{n-2k}u1u_{1}unu_{n}Vz1V_{z_{1}}^{\square}Vzn2kV_{z_{n-2k}}^{\square}VunV_{u_{n}}^{\square}Vu1V_{u_{1}}^{\square}
Figure 2: Reduction from r-regular clique to globally minimal defensive alliance containing vertex xx.

First, we add the vertex xx and a clique Kn2kK_{n-2k} of size n2kn-2k. We make every vertex in Kn2kK_{n-2k} adjacent to all the vertices in GG and the vertex xx. Next, we add a set VxV_{x}^{\square} of n2kn-2k one degree vertices adjacent to xx. We also add a set VuV_{u}^{\square} of nr2kn-r-2k one degree vertices adjacent to uu for each uV(G)u\in V(G). Finally, we add a set VzV_{z}^{\square} of 2(nk)2(n-k) one degree vertices adjacent to zz for each zKn2kz\in K_{n-2k}. This completes the construction of GG^{\prime}. Now, we will show that II is yes instance if and only if II^{\prime} is a yes instance. Let us assume that II is a yes instance, that is, there exists a clique CC of size kk in graph GG. We claim that S=CKn2k{x}S=C\cup K_{n-2k}\cup\{x\} is a globally minimal defensive alliance containing vertex xx in graph GG^{\prime}. We observe that all the vertices in SS are marginally protected in SS and G[S]G[S] is connected. This implied that SS is a globally minimal defensive alliance in GG^{\prime}. In the reverse direction, let us assume that there exists a globally minimal defensive alliance SS containing vertex xx. First, we observe that the one degree vertices cannot part SS as any one degree vertex forms a defensive alliance. This implies that the protection of xx requires all the vertices of Kn2kK_{n-2k} in the solution. Therefore, we can assume that Kn2kSK_{n-2k}\subseteq S. We observe that since one degree vertices cannot be part of solution, every vertex in Kn2kK_{n-2k} need at least kk vertices from V(G)V(G). We also see that, if we take more than kk vertices from V(G)V(G) inside SS then all the vertices in Kn2kK_{n-2k} are overprotected. Then, we see that SxS\setminus{x} is also defensive alliance. This is a contradiction as SS is globally minimal defensive alliance. This proves that V(G)V(G) contributes exactly kk vertices in the solution. Lets denote this set by CC. Since GG is rr-regular, we see that every vertex uGu\in G that is also part of the solution requires exactly k1k-1 neighbours from the V(G)V(G). This implies that CC is a clique of size exactly kk. This implies that II is a yes instance.

Theorem 9.

Globally minimal defensive alliance problem is NP-complete even on planar graphs.

6 Conclusion

The main contributions in this paper are that the Globally Minimal Defensive Alliance problem is polynomial time solvable on trees, and the problem parameterized by treewidth is W[1]-hard. It would be interesting to consider the parameterized complexity with respect to parameters neighbourhood diversity, vertex cover and twin cover. The modular width parameter also appears to be a natural parameter to consider here; and since there are graphs with bounded modular-width and unbounded neighborhood diversity, we believe this is also an interesting open problem. The parameterized complexity of the Globally Minimal Defensive Alliance problem remains unsettle when parameterized by solution size and other important structural graph parameters like clique-width and modular width.

Acknowledgement

The first author gratefully acknowledges support from the Ministry of Human Resource Development, Government of India, under Prime Minister’s Research Fellowship Scheme (No. MRF-192002-211). The second author’s research is supported in part by the Science and Engineering Research Board (SERB), Govt. of India, under Sanction Order No. MTR/2018/001025.